Abstract: Bearing apparatuses including contacting bearing surfaces comprising superhard materials are disclosed. In one embodiment, the present invention relates to bearings including polycrystalline diamond inserts or compacts defining a plurality of surfaces that move relative to one another and contact one another. For example, apparatuses may include radial bearings, or other bearings including arcuate bearing surfaces that more in relation to one another, without limitation. In one embodiment, a superhard bearing element may comprise a superhard table (e.g., polycrystalline diamond) forming an arcuate bearing surface. Further, such a superhard bearing element may comprise a chamfer formed about at least a portion of a periphery of the arcuate bearing surface. Bearing apparatuses including such bearing elements and various mechanical systems are disclosed.
Abstract: There are disclosed methods of vein closure. In an embodiment, a method includes elevating a leg of a patient during a vein closure procedure so as to effect substantial emptying of the vein. The method also includes applying radio-frequency energy to a vein within the leg of the patient to cause the vein closure. In another embodiment, a method includes elevating a leg of a patient during a vein closure procedure within a range of about 30 degrees to about 45 degrees from a horizontal position. The method also includes applying radio-frequency energy to a vein within the leg of the patient. In one embodiment, a method includes elevating a leg, and emptying of a segment of the vein prior to applying radio-frequency energy. In another embodiment, the method includes elevating a leg of a patient, and applying energy to a vein. Other embodiments are also disclosed.
Abstract: A computer-implemented method for managing access to a peripheral device is described. A request is received from an operating system to interface with a peripheral device. The operating system requesting to interface with the peripheral device is analyzed. A determination is made as to whether the operating system is a host operating system based on the analysis of the operating system. The operating system is prevented from interfacing with the peripheral device if the operating system is a host operating system.
Abstract: Systems and methods for monitoring of vehicle efficiency use wireless remote sensors associated with the vehicle and with a fueling station. Vehicle data is collected from the wireless sensors in conjunction with fueling of the vehicle. Efficiency is calculated, such as by calculating miles per gallon for the vehicle, and the information is stored in a computing system. Vehicle efficiency may be tracked over time to identify deviations or irregularities that may be addressed to improve overall vehicle efficiency, and overall vehicle efficiency for a fleet of vehicles that are all monitored in such a manner.
Abstract: The invention provides for an expandable multi channel radiometer imaging method and system. The imaging system includes a scanner for reflecting millimeter wave energy emanating from a pre-determined scene. The millimeter wave energy is focused to a focal plane array using an optical lens and a multi channel radiometer receives the millimeter wave energy. The focal plane array is formed by a plurality of pixels that each includes a single low noise amplifier. The number of pixels of the focal plane array is expendable to increase the resolution of a millimeter wave image. A virtual grid of cells is formed representing different values of millimeter wave energy within the imaging zone. Algorithms calculate differences of millimeter wave energy between cells of said virtual grid to display a composite image to identify concealed objects on an individual.
Abstract: A subterranean drilling system may include a drill string and a rotary drill bit coupled to the drill string. The rotary drill bit may include a bit body and a cutting element coupled to the bit body, with the cutting element being structured to rotate in response to torque applied to the cutting element. The system also may include a cam assembly coupled to the drill string, a cam follower assembly in contact with a cam surface of the cam assembly, and a torque-applying structure coupled to the cam follower assembly. The torque-applying structure may be configured to apply torque to the cutting element in response to relative rotation between the cam assembly and the cam follower assembly.
Type:
Grant
Filed:
November 4, 2011
Date of Patent:
July 3, 2012
Assignee:
US Synthetic Corporation
Inventors:
Craig H. Cooley, Timothy N. Sexton, S. Barrett Peterson, Jeffrey Lund, Christopher F. Johnson
Abstract: The invention relates to a rehabilitation children's sport stroller, comprising a frame (28), a seat (10), and a pivot device (16), which at least in some regions connects the seat (10) to the frame (28) pivotally about a seat pivot axis (S) and comprises a first joint (20) and a second joint (22), which are provided on the seat (10) on mutually opposing sides, wherein the first joint (20) and the second joint (22) can be locked, the first joint (20) comprising a first-joint operating element (40) for releasing the first joint (20). According to the invention, the second joint (22) is connected to the first-joint operating element (40) by means of a push-stable transfer device such that during an actuation of the first-joint operating element (40) the first joint (20) and the second joint (22) are released.
Type:
Grant
Filed:
September 3, 2008
Date of Patent:
June 26, 2012
Assignee:
Otto Bock Healthcare GmbH
Inventors:
Oliver Kretschmer, Christian Wilke, Jürgen Christmann
Abstract: A computer-implemented method for preventing threats originating from a non-process based component hosted by a trusted process is described. The loading activity of the trusted process is monitored. A trust level associated with the trusted process is altered when an unverified component is loaded into the trusted process. Events performed by the trusted process are monitored. An unverified component that originated the event is identified. The trusted process is terminated based on a security risk associated with the unverified component that originated the event.
Type:
Grant
Filed:
July 28, 2009
Date of Patent:
June 19, 2012
Assignee:
Symantec Corporation
Inventors:
Sourabh Satish, Shane Pereira, Uri Mann
Abstract: A method for analyzing an unverified executable file within an antivirus engine in order to identify the executable file as being obfuscated by an unknown obfuscator program is described. An unverified executable file comprising obfuscated library strings is received. A list of pre-verified library strings is accessed. A determination is made as to whether the unverified executable file comprises one or more of the pre-verified library strings. The unverified executable file is identified as being obfuscated by an unknown obfuscator program if the file does not comprise one or more of the pre-verified library strings.
Abstract: A method for managing file access history information is described. An application opening a file is identified. Access rights used to open the file are determined. A time parameter associated with the opening of the file is recorded. An access frequency parameter for the file over a predetermined period of time is calculated. File access history information associated with the file is stored.
Abstract: Determining a security policy to apply to access requests to network sites that have not been classified for security risks is accomplished according to user behavior. Past behavior of users and requests to access network sites that are known security risks is recorded. When a user requests access to a site that is not classified for security purposes, a security policy is selected based on one or more users' past behavior. When a user has a history of not accessing sites that pose security risks, a more permissive security policy is set, and when a user has a history of requesting access to sites that do pose security risks a more restrictive security policy is set. Access requests are tracked, and security policy may be set at a name server that is remote from a user or user's computing system.
Abstract: Foldable table that is easy to handle is described, which is provided for use by a plurality of people but do not require a plurality of people when it is folded. The table can be unfolded and be folded in a fast and simple way, and can be provided with a parasol, wherein the table and the parasol can be unfolded simultaneously.
Abstract: Devices and methods are provided for treatment of tissue in a body lumen with an electrode deployment device. Embodiments typically include a device with a plurality of electrodes having a pre-selected electrode density arranged on the surface of a support. The support may comprise a non-distensible electrode backing that is spirally furled about an axis and coupled to an expansion member such as an inflatable elastic balloon. In some embodiments, the balloon is inflated to selectively expose a portion of the electrode surface while maintaining the electrode density.
Type:
Grant
Filed:
December 18, 2007
Date of Patent:
June 5, 2012
Assignee:
TYCO Healthcare Group LP
Inventors:
Roger A. Stern, Jerome Jackson, Vincent N. Sullivan, George H. Smith, Roy D. Corbitt, Jennifer A. Hodor, Carson J. Shellenberger
Abstract: A container (12) suitable for use in packaging pharmaceutical products such as tablets and capsules. The container (12) can be withdrawn from a box or sleeve (14) in a first direction X to a fully extended position whereby a user can remove any item stored by the container (12). The container (12) has a base (32) which includes an end portion (40) that remains substantially within the box or sleeve (14) when in the fully extended position. The base (32) carries at least one chamber formation (42) for containing an item to be removed by the user. The base (32) also has at least one stabilizing formation (44) on the end portion (40) that interacts with the box or sleeve (14) when in the fully extended position to resist pivoting of the container (12) relative to the box or sleeve (14). The or each stabilizing formation (44) differs in size and/or shape to the or each chamber formation (42), and has a length in the first direction X that is greater than or equal to its width in a second direction Y.
Abstract: A method, system, computer program product and/or computer readable medium of instructions to detect malicious activity. The method comprises intercepting an activity in a processing system, wherein a requesting entity requests the activity to be performed in relation to a target entity; determining, using a filter module if the activity is suspicious or non-suspicious; and in response to determining that the activity is suspicious, analysing at least one of the activity, the requesting entity and the target entity using an analysis module to detect malicious activity. There is also disclosed a method, system, computer program product and/or computer readable medium of instructions to facilitate the detection of malicious activity.
Type:
Grant
Filed:
July 19, 2007
Date of Patent:
June 5, 2012
Assignee:
Symantec Corporation
Inventors:
Rolf Repasi, Simon Clausen, Ian Oliver, Ryan Pereira
Abstract: An identification apparatus and methods of use are presented. Embodiments include a loop of flexible material, having and exterior surface. Indicia, identifying an organization, is displayed on at least a portion of the exterior surface. A container is provided to store the loop of flexible material. Some embodiments couple the container with a belt or other article of clothing or clothing accessory. The loop of flexible material may be coupled with the container. The container may serve as an anchoring point for one or more methods of displaying the loop of flexible material. Some methods of use position the loop of flexible material over portions of a user's body. Some methods of use permit one hand operation of the apparatus.