Abstract: Embodiments of the present invention are directed to methods of rapidly obtaining ultrasonic images of the eye using a set of procedural options that can be automated by a positioning mechanism that can be controlled by software.
Type:
Application
Filed:
April 3, 2009
Publication date:
January 7, 2010
Applicant:
ArcScan, Inc.
Inventors:
George J. Eilers, J. David Stienmier, Wes Weber, Eric Osmann, Randy Rasmussen, Paul McGregor, Olga Medvedeva
Abstract: Embodiments of the present invention are directed to methods of rapidly obtaining ultrasonic images of the eye using a set of procedural options that can be automated by a positioning mechanism that can be controlled by software.
Type:
Grant
Filed:
April 3, 2009
Date of Patent:
July 30, 2013
Assignee:
Arcscan, Inc.
Inventors:
George J. Eilers, J. David Stienmier, Wes Weber, Eric Osmann, Randy Rasmussen, Paul McGregor, Olga Medvedeva
Abstract: The present invention involves a desktop administration system and method which allows a network administrator to remotely create, protect, and manage desktops and control file systems across a network. The invention provides security software, a PDF and Daemon, which is installed as the primary Registry process. Upon starting of the workstation, the security software mask off any other interrupt or process and complete an authentication procedure while creating an electronic trail for operating system to continue operation as if the security software did not preempt the operating system. The PDF receives desktop information from the network server and builds a desktop which the user manipulates to invoke local and/or network programs and access local and/or network utilities, providing appropriate keys or other authentication information to access restricted network resources.
Abstract: The present invention involves a desktop administration system and method which allows a network administrator to remotely create, protect, and manage desktops and control file systems across a network. The invention provides a graphic user interface to construct user desktops, apply restriction options, maintain transaction logs, and password protect any object accessible from the user workstation. The server software operates to lock out any unpermitted users, allowing access to programs or processes presenting appropriate keys or other authentication information. Each workstation includes a personal desktop facility (PDF) and a Daemon which protects the user's desktop. The PDF receives desktop information from the network server and builds a desktop which the user manipulates to invoke local and/or network programs and access local and/or network utilities, providing appropriate keys or other authentication information to access restricted network resources.
Abstract: The present invention involves a desktop administration system and method which allows a network administrator to remotely create, protect, and manage desktops and control file systems across a network. The method involves masking operation of the network providers while obtaining a user security information record relating to the user's allowed scope of access to the network providers. Next, the operation of the user is enabled only with the network providers authorized based on the user security information record. Finally, the user's interaction with each network provider is monitored and the user is only allowed to act consistent with the user security information record. Each workstation includes a personal desktop facility (PDF) and a Daemon which protects the user's desktop.
Abstract: The present invention involves a desktop administration system and method which allows a network administrator to remotely create, protect, and manage desktops and control file systems across a network. The method involves masking operation of the network providers while obtaining a user security information record relating to the user's allowed scope of access to the network providers. Next, the operation of the user is enabled only with the network providers authorized based on the user security information record. Finally, the user's interaction with each network provider is monitored and the user is only allowed to act consistent with the user security information record. Each workstation includes a personal desktop facility (PDF) and a Daemon which protects the user's desktop.