Patents by Inventor Alvaro CARDENAS

Alvaro CARDENAS has filed for patents to protect the following inventions. This listing includes patent applications that are pending as well as patents that have already been granted by the United States Patent and Trademark Office (USPTO).

  • Patent number: 11939319
    Abstract: The present invention relates to pyridinyl and pyrazinyl-(aza)indolsulfonamides having GPR17 modulator activity. The compounds have utility in the treatment of a variety of GPR17-associated disorders.
    Type: Grant
    Filed: June 18, 2019
    Date of Patent: March 26, 2024
    Assignee: UCB PHARMA GMBH
    Inventors: Cecile Pegurier, Laurent Provins, Alvaro Cardenas, Marie Ledecq, Christa E. Mueller, Joerg Hockemeyer, Ali El-Tayeb, Nader Boshta, Mahmoud Rashed
  • Publication number: 20210206749
    Abstract: The present invention relates to pyridinyl and pyrazinyl-(aza)indolsulfonamides having GPR17 modulator activity. The compounds have utility in the treatment of a variety of GPR17-associated disorders.
    Type: Application
    Filed: June 18, 2019
    Publication date: July 8, 2021
    Inventors: Cecile Pegurier, Laurent Provins, Alvaro Cardenas, Marie Ledecq, Christa E. Mueller, Joerg Hockemeyer, Ali El-Tayeb, Nader Boshta, Mahmoud Rashed
  • Patent number: 9208318
    Abstract: A networked device performs integrity authentication by determining, using a processor, a measured integrity value of the device. The measured integrity value is compared by the processor to an embedded integrity value of the device. Application of a policy to the device is facilitated by the processor based on the comparison.
    Type: Grant
    Filed: August 20, 2010
    Date of Patent: December 8, 2015
    Assignee: Fujitsu Limited
    Inventors: Sung Lee, Alvaro A. Cardenas, Ryusuke Masuoka
  • Patent number: 8792360
    Abstract: According to an aspect of an embodiment, a method of managing packets in a communication network including multiple communication nodes is described. The method may include receiving a packet including a packet header. The packet header may include a packet identifier uniquely identifying the packet. The method may also include determining a packet type of the packet received by a first communication node based on the packet identifier. The method may also include dropping the packet when the packet is determined to be a duplicate packet or routing the packet to a neighbor communication node in a manner that prevents the packet from being caught in a loop when the packet is determined to be a returned packet or a new packet.
    Type: Grant
    Filed: April 30, 2012
    Date of Patent: July 29, 2014
    Assignee: Fujitsu Limited
    Inventors: Ulrich Herberg, Jr., Alvaro Cardenas
  • Publication number: 20130287024
    Abstract: According to an aspect of an embodiment, a method of managing packets in a communication network including multiple communication nodes is described. The method may include receiving a packet including a packet header. The packet header may include a packet identifier uniquely identifying the packet. The method may also include determining a packet type of the packet received by a first communication node based on the packet identifier. The method may also include dropping the packet when the packet is determined to be a duplicate packet or routing the packet to a neighbor communication node in a manner that prevents the packet from being caught in a loop when the packet is determined to be a returned packet or a new packet.
    Type: Application
    Filed: April 30, 2012
    Publication date: October 31, 2013
    Applicant: FUJITSU LIMITED
    Inventors: Ulrich HERBERG, Alvaro CARDENAS
  • Publication number: 20130124436
    Abstract: Embodiments for detecting anomalous consumption of energy are provided. Information associated with energy consumption over a designated period of time is received. A threshold value is received. A classifier based on an Auto-Regressive Moving Average model is applied to the information and a result representing the likelihood of an attack is determined. The result is then analyzed to determine if it attained a threshold value. The information is then classified as indicating an attack. Additionally, embodiments for utilizing machine learning to train a classifier using training data to develop parameters for the auto-regressive moving average model are provided. Further, embodiments for evaluating the effectiveness of the parameters used in the Auto-Regressive Moving Average model to classify data are provided.
    Type: Application
    Filed: November 15, 2011
    Publication date: May 16, 2013
    Applicant: Fujitsu Limited
    Inventors: Alvaro A. Cardenas Mora, Daisuke Mashima
  • Publication number: 20120260113
    Abstract: A first electronic device comprises an information-filtering module configured to identify one or more second electronic devices that supply one or more types of information needed by the first electronic device; an information-gathering module coupled to the information-filtering module configured to collect information from the second electronic devices; and an operation module coupled to the information-gathering module configured to adjust operational behavior of the first electronic device based on the collected information.
    Type: Application
    Filed: April 8, 2011
    Publication date: October 11, 2012
    Applicant: FUJITSU LIMITED
    Inventors: Zhexuan Song, Alvaro A. Cárdenas Mora, Ryusuke Masuoka
  • Publication number: 20120047550
    Abstract: A networked device performs integrity authentication by determining, using a processor, a measured integrity value of the device. The measured integrity value is compared by the processor to an embedded integrity value of the device. Application of a policy to the device is facilitated by the processor based on the comparison.
    Type: Application
    Filed: August 20, 2010
    Publication date: February 23, 2012
    Applicant: Fujitsu Limited
    Inventors: Sung Lee, Alvaro A. Cardenas, Ryusuke Masuoka
  • Publication number: 20120047578
    Abstract: Device integrity authentication is performed by receiving, at a second device, data from a first device. A determination is made at the second device as to whether at least a portion of the data is associated with a protected datatype. A measured integrity value of the first device is determined in response to the portion of the data being associated with the protected datatype. The measured integrity value of the first device is compared to an embedded integrity value associated with the second device. Application of at least one of a plurality of policies associated with processing the data is facilitated at the second device based on the comparison and the protected datatype.
    Type: Application
    Filed: November 16, 2010
    Publication date: February 23, 2012
    Inventors: Sung Lee, Alvaro A. Cardenas, Ryusuke Masuoka
  • Publication number: 20120047557
    Abstract: Device integrity authentication is performed by receiving, at a second device, a measured integrity value from a first device. The measured integrity value of the first device is compared at the second device to an embedded integrity value associated with the second device. A level of trust for the first device is determined by the second device based on the comparison. Application of a policy to the first device is facilitated by the second device based on the comparison.
    Type: Application
    Filed: November 16, 2010
    Publication date: February 23, 2012
    Inventors: Sung Lee, Alvaro A. Cardenas, Ryusuke Masuoka