Patents Issued in April 24, 2008
-
Publication number: 20080098462Abstract: Techniques for identity enabled virtualized edge processing are provided. A target service, its data content, and its processing context are packaged with an identity as a self-contained virtual distribution within an enterprise environment and distributed to a host environment in accordance with distribution policy. The host environment represents an edge of a network, and the virtual distribution's identity is validated and the virtual distribution is subsequently deployed as a virtual machine at the edge in accordance with deployment policy.Type: ApplicationFiled: March 28, 2007Publication date: April 24, 2008Inventor: Stephen R. Carter
-
Publication number: 20080098463Abstract: A system for providing access control for an information server implemented by a mobile terminal includes a proxy gateway configured for receiving a set of control rules, the rules identifying one or more clients by respective telephone numbers associated therewith. The proxy gateway receives a client request across a network to access a resource of the information server, where the request reflects a network address of the proxy gateway, and an identity of the information server outside the network. The proxy gateway determines if the client is authorized to access the requested resource based upon a telephone number associated with the client and the set of control rules, the proxy gateway having received the telephone number associated with the client before the request. If the client is authorized, the proxy gateway sends the request to the information server based upon the identity of the information server reflected in the request.Type: ApplicationFiled: October 20, 2006Publication date: April 24, 2008Applicant: Nokia CorporationInventor: Johan Wikman
-
Publication number: 20080098464Abstract: Random partial shared secret recognition is combined with using more than one communication channel between server-side resources and two logical or physical client-side data processing machines. After a first security tier, a first communication channel is opened to a first data processing machine on the client side. The session proceeds by delivering an authentication challenge, identifying a random subset of an authentication credential, to a second data processing machine on the client side using a second communication channel. Next, the user enters an authentication response in the first data processing machine, based on a random subset of the authentication credential. The authentication response is returned to the server side on the first communication channel for matching. The authentication credential can be a one-session-only credential delivered to the user for one session, or a static credential used many times.Type: ApplicationFiled: October 24, 2006Publication date: April 24, 2008Applicant: AUTHERNATIVE, INC.Inventor: Len L. Mizrah
-
Publication number: 20080098465Abstract: A computer readable medium includes instructions for managing execution of an application module by receiving a request to execute the application module, where the application module is configured to execute on a virtual machine, retrieving license registration information and license status information associated with the application module, communicating the license registration information and the license status information to a license validation module to obtain an authorization response, where the license validation module is associated with the application module and registered with the virtual machine, and executing the application module, if the authorization response indicates that the license registration information and the license status information are valid.Type: ApplicationFiled: October 19, 2006Publication date: April 24, 2008Applicant: Sun Microsystems, Inc.Inventors: Srikanth Ramakrishna, Suresh R. Warrier
-
Publication number: 20080098466Abstract: An authentication system includes: a first information processor; a second information processor; an authentication-service-providing device; and an authentication device, wherein the authentication-service-providing device has: an unit that receives second authentication information for authenticating a user from the second information processor and executes a second authentication based on the second authentication information; and an unit that issues third authentication information to the second information processor when the second authentication is successful; and the authentication device has: an unit that receives first authentication information for authenticating the user from the first information processor and executes a first authentication based on the first authentication information; and an unit that receives, from the first information processor, third authentication information obtained by the second information processor and input to the first information processor and cooperates with the aType: ApplicationFiled: May 22, 2007Publication date: April 24, 2008Applicant: FUJI XEROX CO., LTD.Inventors: Takeo Yoshida, Ryuichi Aoki
-
Publication number: 20080098467Abstract: The present invention is a procedure for a self configuring eNB/E-UTRAN. The eNB/E-UTRAN interacts with the Enhanced Packet Core (EPC) of the LTE network in order to complete the mutual authentication task between the eNB and the EPC and other operating procedures in the eNB self configuration phase.Type: ApplicationFiled: October 19, 2007Publication date: April 24, 2008Applicant: INTERDIGITAL TECHNOLOGY CORPORATIONInventors: James M. Miller, Peter S. Wang, Ulises Olvera-Hernandez
-
Publication number: 20080098468Abstract: One embodiment in accordance with the present invention includes implementing a personal digital assistant (PDA) with a wireless personal identification mechanism. Specifically, the wireless identification mechanism can be a radio frequency identification (RFID) integrated circuit which is incorporated on the inside of the rear housing (e.g., plastic) of the personal digital assistant. Once the radio frequency identification integrated circuit has been implemented with an authorized security code, the personal digital assistant in accordance with the present embodiment is capable of functioning as a “key” enabling entry into restricted areas which are secured with non-contact radio frequency security systems such as corporate campuses, buildings, and/or laboratories. In this manner, an authorized person does not have to carry around a separate radio frequency keycard in order to gain access to restricted areas.Type: ApplicationFiled: September 12, 2007Publication date: April 24, 2008Inventors: Michael Cortopassi, Wayne Hile, Thomas Robinson
-
Publication number: 20080098469Abstract: A verification device transmits challenge information to a first entity device, and for each authentication context received in return, verifies that challenge information identical to the challenge information transmitted in advance is described, to thereby confirm that the authentication context is the current one. As a result, a repetitive attack in which the past authentication context is repeatedly used is prevented and the security against repetitive attacks is improved.Type: ApplicationFiled: November 29, 2007Publication date: April 24, 2008Inventors: Tomoaki Morijiri, Koji Okada, Hidehisa Takamizawa, Asahiko Yamada, Tatsuro Ikeda
-
Publication number: 20080098470Abstract: A device capable of communicating with a computer via a USB interface, the device comprising a USB hub and a wireless USB network adapter which is connected to the USB hub, and being adapted such that a smart card capable of communication using the USB protocol can be connected to the USB hub.Type: ApplicationFiled: September 9, 2005Publication date: April 24, 2008Applicant: AXALTO SAInventor: Nicolas Danre
-
Publication number: 20080098471Abstract: An apparatus and method of modular manufacturing process for a transmitter, receiver and/or transceiver is disclosed. The modular process assembles an array of optoelectronic devices to an array header to form an optoelectronic array package. Once the optoelectronic array package is assembled, it is tested and verified the functionality and alignment between the optoelectronic devices and optical fibers. The optoelectronic array package is subsequently coupled to an optical lens array to form an array optical subassembly. After the array optical subassembly is tested, it is coupled to an optical fiber connector to form an optical module. The optical module is then tested to verify its functionality and alignment.Type: ApplicationFiled: October 30, 2007Publication date: April 24, 2008Applicant: TREK 2000 INTERNATIONAL LTD.Inventors: Chin Shyan Ooi, Lay Lim, Teng Poo, Henry Tan
-
Publication number: 20080098472Abstract: A VPN connection method and a communication system are provided, each which can omit the setting of a firewall and the installation of a relay server and can establish communications from the outside of a firewall to the inside thereof. The internal network 2 is connected to the external network 1 via the firewall 13. The internal network 2 enables communications by an e-mail from the external network 1 (outside the firewall) to the mail server 21 in the internal network 2 (inside the firewall) or communications by telephone or radio, which is not via the firewall 3. The feature of the firewall 3 is utilized that access from the outside to the inside of the firewall through VPN connection is very difficult but the access in the reverse stream can be simply performed. Using the mail server, telephone line or radio line, the internal network 2 receives an e-mail, which requires for VPN connection from the external network 1, or control information through the telephone line.Type: ApplicationFiled: July 26, 2005Publication date: April 24, 2008Inventors: Nobuyuki Enomoto, Youichi Hidaka, Hideo Yoshimi, Atsushi Iwata, Akira Arutaki
-
Publication number: 20080098473Abstract: The present invention provides a method, a device and a system for controlling VoIP border security. The system includes: a border security controller, which includes two dynamic information tables, an active session information table and a registered user information table, acting as the basis of security control; and a security policy server, in communication with the border security controller, adapted to provide a security policy to the border security controller and check the security of a signaling packet forwarded by the border security controller. The border security control system first checks the security and processes the packets of a user datagram received according to the active session information table and the registered user information table, and allows a packet which passed the security processing to pass, and then performs protocol processing on the media packet and signaling packet which are allowed to pass.Type: ApplicationFiled: November 20, 2007Publication date: April 24, 2008Applicant: HUAWEI TECHNOLOGIES CO., LTD.Inventors: Lifeng Liu, Zhibin Zheng
-
Publication number: 20080098474Abstract: When a process (interrupt process) causing no problem in the content copyright management but to be executed with a higher priority than a content reproduction such as a telephone call or alarm display is started or ended during a content reproduction/execution, process judgment means (308) reports it to control means (305). The control means (305) outputs a reproduction interrupt instruction for temporarily stopping the use time measurement and interrupting the content reproduction to reproduction/execution means (304) and outputs a reproduction resume instruction for resuming the use time measurement and resuming the content reproduction to the reproduction/execution means (304) in accordance with the end report of process judgment means (308).Type: ApplicationFiled: May 12, 2005Publication date: April 24, 2008Applicant: NEC CorporationInventor: Yuichi Nino
-
Publication number: 20080098475Abstract: The present invention provides a method, apparatus, and computer instructions for warning of a presence of a person in a zone having an inadequate security clearance. Movement of the person in the zone is detected. A message is broadcast to selected data processing systems associated with the zone, wherein the data processing systems initiate actions to protect data in the selected data processing systems.Type: ApplicationFiled: December 14, 2007Publication date: April 24, 2008Inventors: Janice Girouard, Mark Hamzy, Emily Ratliff
-
Publication number: 20080098476Abstract: Honey pots are used to attract computer attacks to a virtual operating system that is a virtual instantiation of a typical deployed operational system. Honey nets are a collection of these virtual systems assembled to create a virtual network. The subject system uses a forward deployed honey net combined with a parallel monitoring system collecting data into and from the honey net, leveraging the controlled environment to identify malicious behavior and new attacks. This honey net/monitoring pair is placed ahead of the real deployed operational network and the data it uncovers is used to reconfigure network protective devices in real time to prevent zero-day based attacks from entering the real network.Type: ApplicationFiled: March 30, 2006Publication date: April 24, 2008Applicant: BAE SYSTEMS INFORMATION AND ELECTRONIC SYSTEMS INTEGRATION INC.Inventor: Jason Syversen
-
Publication number: 20080098477Abstract: In one embodiment, a technique for enhancing the inspection of data sent from a server is provided. By modifying a client request in an effort to prevent the transformation (e.g., encoding and/or compression) of data by the server, unencoded data may be received, which can be inspected without the overhead associated with first decoding the data. Further, in the event the data is encoded despite modifying the client request to prevent such encoding, the server may be untrustworthy and one or more appropriate actions may be taken.Type: ApplicationFiled: September 17, 2007Publication date: April 24, 2008Inventors: CRAIG ALLEN WILLIAMS, Gerald S. Lathem
-
Publication number: 20080098478Abstract: A system, method and computer program product for administering trust dependent functional control over a portable endpoint security device (PEPS). A reconnoitering application in conjunction with a trust enforcement policy determines a relative trusted state of the host processing unit and administers trust dependent functional control over the PEPS in dependence on one or more trust dependent characteristics reconnoitered from the host processing unit. The trust dependent characteristics reconnoitered from the host processing unit may be location dependent, context dependent, hardware configuration dependent and logical state dependent.Type: ApplicationFiled: October 20, 2006Publication date: April 24, 2008Applicant: Redcannon, Inc.Inventors: Vimal Vaidya, Sylvia Siu
-
Publication number: 20080098479Abstract: Methods of simulating vulnerability are provided. In an example, multi-stage vulnerability across multiple systems may be simulated by first simulating a probing of at least one intermediate entity, the at least one intermediate entity connected to a target system, second simulating a probing of the target system if the first simulated probing is successful and generating an attack graph based on the results of the first and second simulating steps. In another example, multi-system vulnerability may be simulated by receiving a plurality of attributes associated with vulnerabilities of a plurality of systems within a network, the plurality of systems including at least one target system and generating an attack graph including one or more attack chains based at least in part on the received plurality of attributes. In another example, system (e.g.Type: ApplicationFiled: October 23, 2006Publication date: April 24, 2008Inventors: Paul F. O'Rourke, Robert J. Shanley
-
Publication number: 20080098480Abstract: A method and apparatus associate different characteristics with different information portions and selectively distribute or provide access to the different portions based on the different characteristics associated with the portions.Type: ApplicationFiled: October 20, 2006Publication date: April 24, 2008Inventors: Shaun P. Henry, Robert M. Sesek
-
Publication number: 20080098481Abstract: Provided is digital rights management (DRM) provision technology, and more particularly, are an apparatus, system, and method which can easily provide content using one or more DRM systems. A DRM provision apparatus includes a content download unit which downloads encrypted real content and dummy content from a download server and which manages the downloaded real content and dummy content; a license management unit which manages a license issued by a license server; and a processing unit which manages the downloaded real content and dummy content and the issued license.Type: ApplicationFiled: September 24, 2007Publication date: April 24, 2008Applicant: SAMSUNG ELECTRONICS CO., LTD.Inventors: Nam-Geol LEE, Hyung-Chan KIM, Gyu-Baek KIM
-
Publication number: 20080098482Abstract: Systems and methods for binding a secret to a computer system are disclosed. Systems and methods for generating a strong hardware identification (SHWID) for a given computer system are also disclosed. The strong hardware identification (SHWID) is coupled to a bound secret. The strong hardware identification (SHWID) may be used to control the use of software on the given computer system depending on the degree of hardware changes to the computer system.Type: ApplicationFiled: October 22, 2007Publication date: April 24, 2008Applicant: Microsoft CorporationInventor: Aidan Hughes
-
Publication number: 20080098483Abstract: A system and method for securing and tracking an electronic device. The system includes hardware, software and firmware components that cooperate to allow tracking, disabling, and other interaction with the stolen electronic device. The system includes an application component, non-viewable component and Basic Input/Output Subsystem (BIOS) component that are present on the electronic device. The BIOS component maintains the secured environment of the application and non-viewable components. If only the application component was provided, a simple low level format of the hard disk drive would remove the application and bypass the security features. The system implements an “application and BIOS” based solution to electronic device security.Type: ApplicationFiled: October 30, 2007Publication date: April 24, 2008Applicant: SOFTEX INCORPORATEDInventors: Apurva Bhansali, Manoj Jain, Shradha Dube, Gayathri Rangarajan, Mehul Patel, Rayesh Raikar, Kamal Dhanani, Ranjit Kapila, Elza Varghese, Thomas Tucker
-
Publication number: 20080098484Abstract: Exemplary embodiments provide a method and system for self-service resource provisioning having collaborative compliance enforcement. Method and system aspects of the exemplary embodiments include displaying a hierarchical list of resources for selection of at least one privilege associated with the resources; in response to a user selecting least one of the privileges from the hierarchical list, adding the selected privilege to a request cart to enable the user to initiate a request for the privilege; and in response to a user submitting the request cart, automatically invoking a workflow process to approve a request for the privilege, wherein the workflow is dynamically generated at least in part from the structure of the hierarchical list of resources and a location of the privilege within the hierarchical list.Type: ApplicationFiled: October 24, 2006Publication date: April 24, 2008Applicant: Avatier CorporationInventors: Nelson A. Cicchitto, Scott L. Chiou, Billy J. Barron
-
Publication number: 20080098485Abstract: Exemplary embodiments provide a method and system for providing a hybrid meta-directory for recording a grant of privileges. In one embodiment method and system aspects of the exemplary embodiment include: assigning a privilege identifier to each privilege stored in a privilege repository; in response to a granting of one of the privileges to a target user, storing the privilege identifier assigned to the granted privilege in an authoritative source domain record for the target user; and in response to receiving a query of the authoritative source domain based on a user ID, retrieving a list of privileges granted to the corresponding target user based on the privilege identifiers associated with the user ID.Type: ApplicationFiled: October 24, 2006Publication date: April 24, 2008Applicant: Avatier CorporationInventor: Scott L. Chiou
-
Publication number: 20080098486Abstract: An application portal selectively provides a user selective access to data. A data access layer is included in the portal and includes a map associating the user with a permission and further associating a combination of the user and the permission with a data entity, whereby it may be determined whether the user is permitted to access data identified with the data entity. A data stage included in the portal selectively undergoes a synchronization with a remote data store, the synchronization providing data access information that is used to update the map.Type: ApplicationFiled: October 20, 2006Publication date: April 24, 2008Applicant: Verizon Business Financial Management CorporationInventors: Chi-Hwei Julie Lin, Tsehsin Jason Liu, Wei Miao, Yunyan Wang
-
Publication number: 20080098487Abstract: An AV communication control circuit suitable for a radio LAN-LSI in a radio AV transmission/reception device is formed by a copyright protection processing unit configured to carry out a copyright protection processing with respect to AV data entered from an AV stream signal line, a selection unit configured to select either one of AV data entered from an AV stream signal line through the copyright protection processing unit and AV data entered from a general purpose bus, and a transmission control unit configured to carry out control for transmitting AV data selected by the selection unit to a network.Type: ApplicationFiled: October 31, 2007Publication date: April 24, 2008Applicant: Kabushiki Kaisha ToshibaInventors: Takeshi Saito, Hiroshi Isozaki, Koji Kanazawa, Hideaki Nakakita
-
Publication number: 20080098488Abstract: A component has a substrate (1) made of a transparent material, for example glass. On this layer (1), there is a linear polarizer (2) on which there is a layer (3) of a photo-oriented polymer network (PPN)(-LPP) which is oriented in locally varying fashion via its surface which covers the substrate. The layer (3) is adjoined by an anisotropic layer (4) of cross-linked liquid-crystal monomers. This layer (4) then has a molecular arrangement whose orientation is defined by the underlying orientation layer (3). The layer (4) will have been photocross-linked by exposure to a suitable wavelength of light, with the result that the molecular orientation defined by the PPN layer (3) is fixed. The element, denoted as a whole by 7, can then be used as an optical component which is protected against forgery, it being possible for the orientation pattern of the liquid-crystal layer or the optical information stored therein to be made visible by means of an external polarizer (5), for example.Type: ApplicationFiled: October 31, 2007Publication date: April 24, 2008Inventors: Martin Schadt, Hubert Seiberle
-
Publication number: 20080098489Abstract: The invention relates to a system for protecting a portable computing device wherein the system comprises a device housing adapted to protectively encase the portable computing device to prevent exposure of the portable computing device to potentially harmful operational conditions and a protectively hardened user input device in communication with the device housing. The system may further include a protectively hardened display in communication with the device housing, wherein the device housing allows a user of the portable computing device to operate the portable computing device via the protectively hardened user input device and the protectively hardened display.Type: ApplicationFiled: December 18, 2007Publication date: April 24, 2008Applicant: TECHNOLOGY ADVANCEMENT GROUP, INC.Inventors: John MCEWAN, James MCEWAN
-
Publication number: 20080098490Abstract: The present invention relates to transgenic non-human animals that are engineered to contain human immunoglobulin gene loci. In particular, animals in accordance with the invention possess human Ig loci that include plural variable (VH and V?) gene regions. Advantageously, the inclusion of plural variable region genes enhances the specificity and diversity of human antibodies produced by the animal. Further, the inclusion of such regions enhances and reconstitutes B-cell development to the animals, such that the animals possess abundant mature B-cells secreting extremely high affinity antibodies.Type: ApplicationFiled: August 20, 2007Publication date: April 24, 2008Inventors: Aya Jakobovits, Raju Kucherlapati, Susan Klapholz, Michael Mendez, Larry Green
-
Publication number: 20080098491Abstract: Embodiments of the invention provide mouse tumor models involving either the B16 mouse melanoma or MXT mouse mammary tumor, untreated or treated with chemotherapy and/or anti-cachectic agents, for the study of tumor-generated or cancer therapy-generated cachexia-inducing signals and mechanisms. Other embodiments of the invention also provide additional models, including pre-treatment of mouse skin with anti-cachectic proteins prior to tumor implantation, for the study of anti-cachectic signals and mechanisms generated by the skin. To reduce or reverse tumor- and chemotherapy-induced cachexia, embodiments of the invention use the human proteins placental alkaline phosphatase, transferrin, ?1-antitrypsin preparations or combinations thereof as well as chemically synthesized CCDTHT or N,N-diethyl-N-methyl-2-[(9-oxo-9H-thioxanthen-2-yl)methoxy]-ethanaminium iodide or CCDTHT-like compounds.Type: ApplicationFiled: October 19, 2006Publication date: April 24, 2008Applicant: ZOLTAN LABORATORIES LLCInventor: Zoltan Kiss
-
Publication number: 20080098492Abstract: The invention relates to the field of crop selection and crop breeding, particularly to selection methods for breeding colony varieties of crops involving self-pollination and normal cross-pollination. Selection methods include crossing male parents with female parents to obtain crop populations, wherein the female parents are individual plants in a segregation population or self-crossed descendants of early segregation generations, said segregation population obtained by hybridizing pairs of parental plants with different desired characteristics to produce population F1, and then hybridizing pairs of F1 one more time. The male parents are homozygous breeding lines, varieties, F1, heterozygous plants in the segregation generations or individual plants produced in the same manner as for the female group.Type: ApplicationFiled: June 18, 2004Publication date: April 24, 2008Inventors: Li Xiaofang, Yanzhou Liu, Xin Xiao, Wenyong Luo, Jianwei Chen, Xingxue Mao, Xiaoling Wang, Danying Xing, Guiyuan Zhou
-
Publication number: 20080098493Abstract: The present invention relates to carrot lines having roots containing increased levels of lycopene, as well as containers of such carrots. The present invention also relates to parts of carrot plants from lines having roots with increased lycopene content, including seeds capable of growing carrot plants with increased root lycopene content. The invention also provides seed and plants of the carrot lines designated RN 71-4904C, RF 71-4911A, RF 71-4912A, RIF 71-4966C, RIF 71-4967B, or RIF 71-4968B. The invention thus relates to the plants, seeds and tissue cultures of carrot line RN 71-4904C, RF 71-4911A, RF 71-4912A, RIF 71-4966C, RIF 71-4967B, or RIF 71-4968B, and to methods for producing a carrot plant produced by crossing a plant of carrot line RN 71-4904C, RF 71-4911A, RF 71-4912A, RIF 71-4966C, RIF 71-4967B, or RIF 71-4968B with itself or with another carrot plant, such as a plant of another line. The invention further relates to seeds and plants produced by such crossing.Type: ApplicationFiled: October 18, 2007Publication date: April 24, 2008Inventor: Robert Maxwell
-
Publication number: 20080098494Abstract: The invention provides sudangrass inbred and hybrid plants having adaptation, productivity, and disease resistance with reduced lignin concentration, reduced cell wall concentration, and improved digestibility. Plants and plant parts of the invention are useful in the efficient production of meat and milk due to improved whole plant and fiber digestibility.Type: ApplicationFiled: December 21, 2007Publication date: April 24, 2008Inventor: Jonathan Reich
-
Publication number: 20080098495Abstract: The present invention discloses rucola plants, including an E. sativa plant, with cytoplasmic inherited male sterility (CMS) for hybrid breeding purposes. The present invention includes plants that comprise CMS-cytoplasm from cauliflower (B. oleracea var. botrytis) transferred to E. sativa by a wide interspecific cross.Type: ApplicationFiled: September 13, 2007Publication date: April 24, 2008Inventors: Merete Olesen, Henrik Romme, Hans Kampmann
-
Publication number: 20080098496Abstract: Provided is a method for producing a homozygous non-human organism from a heterozygous non-human organism, which homozygous organism can be crossed to obtain a hybrid, comprising providing a heterozygous starting organism; allowing the organism to produce SDR-0 cells through meiosis, which cells originate from second division restitution; regenerating SDR-0 organisms from the SDR-0 cells; and producing the homozygous organism from the SDR-0 organisms thus obtained. Further provided is a method for producing a hybrid, comprising crossing a first homozygous organism that is produced according to the above method with a second homozygous organism. Also provided is a homozygous non-human organism and hybrid non-human organisms obtainable by these methods. In a preferred embodiment, the organisms are plants.Type: ApplicationFiled: August 31, 2007Publication date: April 24, 2008Inventors: Cornelis Van Dun, Robert Dirks
-
Publication number: 20080098497Abstract: The invention provides sudangrass inbred and hybrid plants having adaptation, productivity, and disease resistance with reduced lignin concentration, reduced cell wall concentration, and improved digestibility. Plants and plant parts of the invention are useful in the efficient production of meat and milk due to improved whole plant and fiber digestibility.Type: ApplicationFiled: December 21, 2007Publication date: April 24, 2008Inventor: Jonathan Reich
-
Publication number: 20080098498Abstract: The invention provides sudangrass inbred and hybrid plants having adaptation, productivity, and disease resistance with reduced lignin concentration, reduced cell wall concentration, and improved digestibility. Plants and plant parts of the invention are useful in the efficient production of meat and milk due to improved whole plant and fiber digestibility.Type: ApplicationFiled: December 21, 2007Publication date: April 24, 2008Inventor: Jonathan Reich
-
Publication number: 20080098499Abstract: A flow assembly has a hollow housing including a lumen extending from a proximal aperture to a distal aperture. The flow assembly can have a first set of blades including at least one first blade disposed within the lumen, wherein the at least one first blade extends from the housing and can be positioned between the proximal aperture and the distal aperture. The flow assembly also has a second set of blades including at least one second blade disposed within the lumen, wherein the at least one second blade extends from the housing and can be positioned between the at least one first blade and the distal aperture. Also, the flow assembly can have a central passageway substantially free of blades extending from the proximal aperture to the distal aperture.Type: ApplicationFiled: September 29, 2006Publication date: April 24, 2008Inventor: James Oxborrow