Abstract: A system for performing authentication of a first user to a second user includes the ability for the first user to submit multiple instances of authentication data which are evaluated and then used to generate an overall level of confidence in the claimed identity of the first user. The individual authentication instances are evaluated based upon: the degree of match between the user provided by the first user during the authentication and the data provided by the first user during his enrollment; the inherent reliability of the authentication technique being used; the circumstances surrounding the generation of the authentication data by the first user; and the circumstances surrounding the generation of the enrollment data by the first user. This confidence level is compared with a required trust level which is based at least in part upon the requirements of the second user, and the authentication result is based upon this comparison.
Type:
Grant
Filed:
September 9, 2010
Date of Patent:
July 3, 2012
Assignee:
Security First Corporation
Inventors:
Alexander G. Dickinson, Brian Berger, Robert T. Dobson, Jr.
Abstract: A technique for performing commercial venture analysis involves establishing an empirically-derived structure and evaluating companies using analytical techniques within that structure. The technique may involve defining jobs, or goals a customer is attempting to reach, with dozens or even hundreds of outcomes. Ideally, the structure and tools facilitate analysis that would not be possible otherwise. Moreover, the nature of the system enables real-time input for changing conditions and the ability to calculate returns for new markets in which products or services do not exist.
Type:
Grant
Filed:
June 1, 2009
Date of Patent:
July 3, 2012
Assignee:
Strategyn, Inc.
Inventors:
James M. Haynes, III, Anthony W. Ulwick
Abstract: A control device, such as a device for connecting with and providing control data on a low voltage line, is provided disclosed. The control device includes a power supply that generates a DC voltage from an input voltage communicated via a low voltage line by a power source. The control device also includes a receiver that extracts timing data from the input voltage and output circuitry that is operable to communicate information to the power source via the low voltage line.
Type:
Grant
Filed:
December 15, 2008
Date of Patent:
July 3, 2012
Assignee:
J. Baxter Brinkman International Corporation
Abstract: The present invention provides a system and method for tracking an interrogator relay unit disposed on a shopping cart within a store. The method comprises emitting an RF interrogation signal using the IRU; receiving, at the IRU, location data from an RFID tag in response to the RF interrogation signal; transmitting the location data, an identification information of the IRU, and timestamp data to a remote server using the IRU; and generating a behavior report using the transmitted location data, the identification information, and the timestamp data.
Abstract: The present invention discloses methods and materials for delivering a cargo compound into a cancer cell. Delivery of the cargo compound is accomplished by the use of protein transduction domains derived from cupredoxins. The invention further discloses methods for treating cancer and diagnosing cancer.
Type:
Grant
Filed:
April 5, 2010
Date of Patent:
June 26, 2012
Assignee:
The Board of Trustees of The University of Illinois
Inventors:
Ananda Chakrabarty, Tapas Das Gupta, Tohru Yamada, Arsenio Fialho
Abstract: Systems and methods for performing channel equalization in a communication system are presented. More particularly, embodiments of the disclosed method and apparatus are directed toward systems and methods for performing channel equalization in an OFDM system. One example of a method of negating the effects of IQ imbalance can include the operations of transmitting a channel estimation string across a channel. The channel estimation string comprises a plurality of known channel estimation symbols. The method further includes logically inverting predetermined symbols within the known channel estimation string; transmitting a second channel estimation string across the channel, the second channel estimation string including the logically inverted predetermined symbols; and estimating the IQ image noise based on received first and second channel estimation symbols.
Abstract: An estimate compliance tool to specify estimate compliance criteria is presented. In one embodiment, the tool can be provided using hardware, software or a combination thereof, and can be configured to include functionality to facilitate creation of rules to outline criteria for estimate creation or invoicing. In one embodiment, a user interface is provided to a user to provide the opportunity to enter vehicle and parts identification to which a rule will apply. The user can also be prompted to enter a rule requirement or suggestion such as, for example, the type of parts required. The system can include a first module configured to accept user input specifying vehicle criteria; a second module configured to accept user input specifying parts criteria; and a third module configured to create an estimate compliance rule based on the entered vehicle selection criteria and parts criteria.
Type:
Grant
Filed:
November 8, 2006
Date of Patent:
June 12, 2012
Assignee:
Mitchell International, Inc.
Inventors:
Hans Littooy, Vincent Pugliese, Michael Emmerson
Abstract: The present invention provides a holographic storage apparatus comprising a polarizing beam splitter configured to split an incoming beam into an object beam and a reference beam; a first spatial light modulator configured to modulate the object beam with an array of data; a second spatial light modulator configured to phase modulate the reference beam with an orthogonal phase function; a holographic medium configured to record an interference pattern between the modulated object beam and the modulated reference beam; a first image sensor configured to read an image of the modulated object beam; and a second image sensor configured to read an image of the modulated reference beam.
Type:
Grant
Filed:
September 14, 2009
Date of Patent:
June 12, 2012
Assignee:
Physical Optics Corporation
Inventors:
Tin Maung Aye, Tomasz Jannson, Andrew Kostrzewski, Min-Yi Shih
Abstract: This invention is directed to indolone derivatives which are antagonists for the GALR3 receptor. The invention provides a pharmaceutical composition comprising a therapeutically effective amount of a compound of the invention and a pharmaceutically acceptable carrier. This invention also provides a pharmaceutical composition made by combining a therapeutically effective amount of a compound of the invention and a pharmaceutically acceptable carrier. This invention further provides a process for making a pharmaceutical composition comprising combining a therapeutically effective amount of a compound of the invention and a pharmaceutically acceptable carrier.
Type:
Grant
Filed:
January 10, 2011
Date of Patent:
June 12, 2012
Assignee:
H. Lundbeck A/S
Inventors:
Michael Konkel, John M. Werzel, Jamie Talisman
Abstract: A technique for securing a flash memory block in a secure device system involves cryptographic techniques including the generation of a Message Authentication Code (MAC). The MAC may be generated each time a file is saved to one or more data blocks of a flash memory device and stored with the file's metadata and to each of the data blocks. A technique for reading and storing versioned files may be employed when applications utilize versioning.
Type:
Grant
Filed:
February 26, 2007
Date of Patent:
June 12, 2012
Assignee:
iGware, Inc.
Inventors:
Pramila Srinivasan, John Princen, Andy Chan, Paul Mielke, Rob Wheeler
Abstract: A power detection circuit is described that provides for a wide dynamic range power detection. In one embodiment, a system comprises a transmitter, a diplexer, an antenna, a detector module, a signal converter and a microprocessor. The transmitter may be configured to transmit an output signal. The diplexer electrically may be coupled to the transmitter and may be configured to provide the output signal. The antenna may be electrically coupled to the diplexer and may be configured to transmit the output signal from the diplexer. The detector module may be electrically coupled to the diplexer and the antenna. The detector module may be configured to detect a power level of the output signal. The signal converter may be electrically coupled to the detector module. The signal converter may be configured to convert the output signal to a digital signal. The microprocessor may be electrically coupled to the signal converter.
Abstract: The present invention relates to compositions that may be swallowable, chewable or dissolvable, comprising various vitamins and minerals, and in a specific embodiment comprising vitamin A, beta carotene, B-complex vitamins, vitamin C, vitamin D3, vitamin E, iron, magnesium and zinc, and methods for using these compositions for nutritional supplementation in subjects undergoing physiologically stressful events, such as, for example and without limitation, pregnancy, lactation or any disease state.
Abstract: Exemplary methods and systems for providing network credentials are described. An exemplary method includes receiving a credential request from a digital device over a network device, identifying a network record based on at least some information within the credential request, retrieving a network credential from a plurality of network credentials based on the network record, and transmitting a credential request response containing the network credentials from the plurality of network credentials to the digital device.
Abstract: The present invention provides a method for a data encryption device to perform network communications, the method comprising obtaining an indexed array of encryption keys, wherein the indexed array of encryption keys is shared with a data decryption device; obtaining a message to be encrypted; using a first random or pseudorandom number to determine an index; obtaining a first key from the array of encryption keys, wherein the first key corresponds to the index; selecting a second key from the plurality of encryption keys; encrypting the message using the first key and a second random or pseudorandom number; encrypting the index using the second key and a third random or pseudorandom number; transmitting the encrypted message and the encrypted index to the data decryption device.
Type:
Grant
Filed:
November 25, 2009
Date of Patent:
June 5, 2012
Assignee:
Physical Optics Corporation
Inventors:
Leonid Bukshpun, Thomas Forrester, Tomasz Jannson, Andrew Kostrzewski, Alexander Milovanov, Ranjit Pradhan
Abstract: Systems and methods for wireless network selection based on attributes stored in a network database are disclosed. In some embodiments, a method comprises receiving a network identifier associated with a wireless network, determining if a network profile associated with the network identifier is stored within a network profile database comprising a plurality of network profiles, and if the network profile associated with the network identifier is stored within the network profile database, retrieving the network profile, or if the network profile associated with the network identifier is not stored within the network profile database, initiating the network profile, obtaining an attribute associated with the network device identifier, and storing the attribute within the network profile.
Abstract: A semi-custom intraoral discluder device for preventing chronic tension and common migraine headaches and temporomandibular disorders that are caused or perpetuated by chronic activity of the temporalis muscle. The discluder includes a trough, contoured to encompass at least one maxillary or mandibular incisor, from which extends a protrusion, typically of a dome shape. The trough can be retained on the teeth by any adaptable material which can flow around the teeth and then maintain its shape. The adaptation of the retentive material can be performed by the end user, health care provider, or anyone trained in the art. Once in place in the wearer's mouth, one or two opposing incisor teeth will come into contact with the protrusion prior to the upper and lower posterior and/or canine teeth coming into contact, regardless of the position of the mandible, thereby reducing the intensity of the activity of the temporalis muscle.