WO/2015/026379 ELASTIC BAND LIGATION DEVICE WITH ANTI-PINCH FEATURE AND METHOD FOR TREATMENT OF HEMORRHOIDS||WO||26.02.2015|
||PCT/US2013/066407||CRH MEDICAL CORPORATION||GUTTENPLAN, Mitchel|
An elastic band ligation device for treatment of hemorrhoids including an inner tubular member for retaining a stretched elastic band over the front end thereof, a plunger in the tubular member with a handle extending away from the front end of the inner tubular member, the handle for sliding the plunger away from the rear end of the inner tubular member to provide a suction for drawing hemorrhoidal tissue into the inner tubular member through the opening at the front end. An obturator is disposed within the inner tubular member having a rounded end, the end of the obturator and the inner surface of the inner tubular member defining an anti-pinch structure. An outer tubular pusher sleeve is configured to provide a limited friction fit over the inner tubular member, with an external end of the outer tubular pusher sleeve adjacent the stretched elastic band.
WO/2015/026383 METHOD FOR MANUFACTURING EXTENDED CONTENT BOOKLET LABELS||WO||26.02.2015|
||PCT/US2013/070951||MINIGRAPHICS, INC.||DELISE, Stephen W., Jr.|
A method of manufacturing an extended content booklet label. A multi-up book includes folds that are parallel to the book's spine. The multi-up book is disposed on the label web and held in place by an overlaminate. The overlaminate, book log and labels are all pre-trimmed in the longitudinal direction. The web is moved passed cutting elements to progressively slit the web and trim the major web into minor webs in which the overlaminate, booklets and labels are trimmed in the width direction to have a common edge.
WO/2015/026384 METHOD AND APPARATUS FOR UTILITY-AWARE PRIVACY PRESERVING MAPPING AGAINST INFERENCE ATTACKS||WO||26.02.2015|
||PCT/US2013/071284||THOMSON LICENSING||FAWAZ, Nadia|
The present principles focus on the privacy-utility tradeoff encountered by a user who wishes to release some public data (denoted by X) to an analyst, that is correlated with his private data (denoted by S), in the hope of getting some utility. The public data is distorted before its release according to a probabilistic privacy preserving mapping mechanism, which limits information leakage under utility constraints. In particular, this probabilistic privacy mechanism is modeled as a conditional distribution, P_(Y|X), where Y is the actual released data to the analyst. The present principles design utility-aware privacy preserving mapping mechanisms against inference attacks, when only partial, or no, statistical knowledge of the prior distribution, P_(S,X), is available. Specifically, using maximal correlation techniques, the present principles provide a separability result on the information leakage that leads to the design of the privacy preserving mapping.
WO/2015/026385 METHOD AND APPARATUS FOR UTILITY-AWARE PRIVACY PRESERVING MAPPING IN VIEW OF COLLUSION AND COMPOSITION||WO||26.02.2015|
||PCT/US2013/071287||THOMSON LICENSING||FAWAZ, Nadia|
The present embodiments focus on the privacy-utility tradeoff encountered by a user who wishes to release some public data to an analyst, which is correlated with his private data, in the hope of getting some utility. When multiple data are released to one or more analyst, we design privacy preserving mappings in a decentralized fashion. In particular, each privacy preserving mapping is designed to protect against the inference of private data from each of the released data separately. Decentralization simplifies the design, by breaking one large joint optimization problem with many variables into several smaller optimizations with fewer variables.
WO/2015/026381 GESTURE-BASED VISUALIZATION OF FINANCIAL DATA||WO||26.02.2015|
||PCT/US2013/070422||INTUIT INC.||SHENOY, Mithun U.|
The disclosed embodiments provide a system that processes financial data. During operation, the system provides a user interface for displaying the financial data to a user. Upon detecting a gesture provided by the user through the user interface, the system identifies a context associated with the gesture. Next, the system displays a visualization of the financial data within the user interface based on the context.
WO/2015/026332 DOWNHOLE DRILLING OPTIMIZATION COLLAR WITH FIBER OPTICS||WO||26.02.2015|
||PCT/US2013/055825||HALLIBURTON ENERGY SERVICES, INC.||KADAM, Ratish, Suhas|
A drilling optimization collar for use proximate a drilling tool within a wellbore includes a fiber optic sensor filament that is sized and configured to fit within a groove formed within the drilling optimization collar. The drilling optimization collar may be a pipe segment that is sized and configured to be installed in a drill string proximate the drilling tool, and may have a plurality of sensor elements. All or a portion of the sensor elements may be formed by discrete segments of the sensor filament, and as such, the sensor filament includes sensor elements that are configured to sense a condition of the wellbore and a load on the drilling optimization collar.
WO/2015/026338 MEDIA CONTENT INCLUDING A PERCEPTUAL PROPERTY AND/OR A CONTEXTUAL PROPERTY||WO||26.02.2015|
||PCT/US2013/056003||INTEL CORPORATION||MORAN, Amit|
Apparatuses, systems, media and/or methods may involve creating content. A property component may be added to a media object to impart one or more of a perceptual property or a contextual property to the media object. The property component may be added responsive to an operation by a user that is independent of a direct access by the user to computer source code. An event corresponding to the property component may be mapped with an action for the media object. The event may be mapped with the action responsive to an operation by a user that is independent of a direct access by the user to computer source code. A graphical user interface may be rendered to create the content. In addition, the media object may be modified based on the action in response to the event when content created including the media object is utilized.
WO/2015/026318 SECURE WIRELESS DEVICE CONNECTION USING POWER LINE MESSAGES||WO||26.02.2015|
||PCT/US2013/055607||EMPIRE TECHNOLOGY DEVELOPMENT LLC||KRUGLICK, Ezekiel|
Technologies are generally provided to establish a secure connection between a wireless network access point and a wireless enabled device by sharing a secret key synthesized from one or more messages exchanged over power lines. Messages exchanged between devices within a location such as a household over power lines and/or with a power utility control center may be collected, for example, communication messages between a wireless enabled device and a smart meter or any other device. The wireless enabled device and a wireless network access point may synthesize a secret key from the collected messages and share the secret key to establish a secure wireless connection over a channel that is not secure.
WO/2015/026323 PAYMENT UNIFICATION SERVICE||WO||26.02.2015|
||PCT/US2013/055693||HEWLETT-PACKARD DEVELOPMENT COMPANY, L.P.||SANDRAZ, Dominique|
Example embodiments relate to a payment unification service. In some examples, a system may include a gateway interface to communicate with multiple unification gateways respectively associated with multiple payment services. Each unification gateway may allow the associated payment service to transact with other of the payment services via their associated unification gateways. The system may include a gateway directory to store a list of trusted unification gateways. The gateway directory may receive a gateway lookup request from a first unification gateway associated with a first payment service when a transaction is to be initiated between the first payment service and a second payment service via their associated unification gateways. The gateway directory may return gateway connection information to the first unification gateway in response to the gateway lookup requests to allow the transaction to proceed.
WO/2015/026386 METHOD AND APPARATUS FOR UTILITY-AWARE PRIVACY PRESERVING MAPPING THROUGH ADDITIVE NOISE||WO||26.02.2015|
||PCT/US2013/071290||THOMSON LICENSING||FAWAZ, Nadia|
The present embodiments focus on the privacy-utility tradeoff encountered by a user who wishes to release some public data (denoted by X) to an analyst, that is correlated with his private data (denoted by S), in the hope of getting some utility. When noise is added as a privacy preserving mechanism, that is, Y=X+N, where Y is the actual released data to the analyst and N is noise, we show that adding Gaussian noise is optimal under l_2-norm distortion for continuous data X. We denote the mechanism of adding Gaussian noise that minimizes the worst-case information leakage by Gaussian mechanism. The parameters for Gaussian mechanism are determined based on the eigenvectors and eigenvalues of the covariance of X. We also develop a probabilistic privacy preserving mapping mechanism for discrete data X, wherein the random discrete noise follows a maximum-entropy distribution.