Results 1-10 of 31 for Criteria:(FP:("1250 Aviation")) Office(s):all Language:EN Stemming: true
1 2 3 4
Page: / 4
Analysis
List Length
TitleCtrPubDate
Int.ClassAppl.NoApplicantInventor
1. WO/2017/135993 CATHETER ASSEMBLY WITH DISTINCT INFLATION AND DRUG DELIVERY CHANNELS AND OVERLAPPING BALLOON LAYERSWO10.08.2017
A61M 25/04
A HUMAN NECESSITIES
61
MEDICAL OR VETERINARY SCIENCE; HYGIENE
M
DEVICES FOR INTRODUCING MEDIA INTO, OR ONTO, THE BODY; DEVICES FOR TRANSDUCING BODY MEDIA OR FOR TAKING MEDIA FROM THE BODY; DEVICES FOR PRODUCING OR ENDING SLEEP OR STUPOR
25
Catheters; Hollow probes
01
Introducing, guiding, advancing, emplacing or holding catheters
02
Holding devices, e.g. on the body
04
in the body, e.g. expansible
PCT/US2016/043920PATIENT SHIELD CONCEPTS, LLCWHITE, Lynn
A catheter is comprised of a shaft having a distal end and a proximal end, the distal end being the end an end of the catheter to be placed within the bladder, the proximal end being the end of the catheter to be coupled to the inputs outside of the body, the shaft having at least three discrete lumens, the at least three lumens including an inflation lumen, the inflation lumen in fluid communication with an inflation side hole in the shaft. The shaft has a drug delivery lumen, the drug delivery lumen in fluid communication with a drug fluid side hole in the shaft. The shaft has a bladder fluid lumen, the bladder fluid lumen in fluid communication with a bladder drainage aperture in the shaft. The drug delivery lumen, the inflation lumen, and the bladder fluid lumen are not in fluid communication.

2. WO/2016/044856 NADO CRYPTOGRAPHY WITH KEY GENERATORSWO24.03.2016
H04L 9/06
H ELECTRICITY
04
ELECTRIC COMMUNICATION TECHNIQUE
L
TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
9
Arrangements for secret or secure communication
06
the encryption apparatus using shift registers or memories for blockwise coding, e.g. D.E.S. systems
PCT/US2015/052734FISKE SOFTWARE LLCFISKE, Michael
A symmetric cryptography for encrypting and decrypting information is provided, that can be implemented efficiently in hardware or in software. The symmetric cryptography uses a key generator, so that the cryptography is not dependent on a single, static cryptography key. The key generator is a value or collection of values from which the key is generated. The key generator substantially increases the computational complexity of differential cryptanalysis and other cryptographic attacks. In an embodiment, the key generator is updated with one-way functions exhibiting the avalanche effect, which generates an unpredictable sequence of keys used during the encryption or decryption process. In an embodiment, a dynamic key is derived from a key generator with a one-way hash function. In an embodiment, a block cipher uses a different dynamic key to encrypt each block of plaintext, where each key is derived from a different key generator.

3. WO/2015/023550 NADO CRYPTOGRAPHY USING ONE-WAY FUNCTIONSWO19.02.2015
H04L 9/06
H ELECTRICITY
04
ELECTRIC COMMUNICATION TECHNIQUE
L
TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
9
Arrangements for secret or secure communication
06
the encryption apparatus using shift registers or memories for blockwise coding, e.g. D.E.S. systems
PCT/US2014/050462FISKE SOFTWARE, LLC.FISKE, Michael Stephen
A symmetric cryptography for encrypting and decrypting information is provided, that can be implemented efficiently in hardware or in software. The symmetric cryptography uses a key generator, so that the cryptography is not dependent on a single, static cryptography key. The key generator is a value or collection of values from which the key is generated. The key generator substantially increases the computational complexity of differential cryptanalysis and other cryptographic attacks. In an embodiment, the key generator is updated with one- way functions exhibiting the avalanche effect, which generates an unpredictable sequence of keys used during the encryption or decryption process. In an embodiment, the key generator updating helps create a sequence of unpredictable permutations that diffuses the information across one or more blocks. In an embodiment, a distinct key generator helps create a sequence of unpredictable permutations that act as a series of substitution boxes.

4. WO/2014/201060 COMPUTER SIMULATION OF ELECTROMAGNETIC FIELDSWO18.12.2014
G06F 17/10
G PHYSICS
06
COMPUTING; CALCULATING; COUNTING
F
ELECTRIC DIGITAL DATA PROCESSING
17
Digital computing or data processing equipment or methods, specially adapted for specific functions
10
Complex mathematical operations
PCT/US2014/041805VOLD, TerjeVOLD, Terje
A method and system is provided for solving for electromagnetic fields by approximating an electromagnetic function as a sum of basis functions multiplied by coefficients to be determined. The set of equations used to determine the coefficients results from taking derivatives of the action integral with respect to the coefficients (and/or other parameters) and setting the derivative equal to zero, thereby extremizing the action integral.

5. WO/2014/165296 METHODS AND FORMULATIONS TO ACHIEVE TUMOR TARGETED DOUBLE STRANDED RNA MEDIATED CELL DEATHWO09.10.2014
C12N 15/113
C CHEMISTRY; METALLURGY
12
BIOCHEMISTRY; BEER; SPIRITS; WINE; VINEGAR; MICROBIOLOGY; ENZYMOLOGY; MUTATION OR GENETIC ENGINEERING
N
MICRO-ORGANISMS OR ENZYMES; COMPOSITIONS THEREOF; PROPAGATING, PRESERVING, OR MAINTAINING MICRO-ORGANISMS; MUTATION OR GENETIC ENGINEERING; CULTURE MEDIA
15
Mutation or genetic engineering; DNA or RNA concerning genetic engineering, vectors, e.g. plasmids, or their isolation, preparation or purification; Use of hosts therefor
09
Recombinant DNA-technology
11
DNA or RNA fragments; Modified forms thereof
113
Non-coding nucleic acids modulating the expression of genes, e.g. antisense oligonucleotides
PCT/US2014/025113MULTICELL IMMUNOTHERAPEUTICS, INC.BOT, Simona
A composition having double stranded ribonucleic acid (dsRNA) molecules is provided. The composition induces tumor cell death or suppresses tumor growth. The double stranded RNA molecules contain equal to or less than 15 base pairs. Methods for delivery of the composition are also disclosed.

6. WO/2013/044192 SECURING TRANSACTIONS AGAINST CYBERATTACKSWO28.03.2013
G06Q 20/40
G PHYSICS
06
COMPUTING; CALCULATING; COUNTING
Q
DATA PROCESSING SYSTEMS OR METHODS, SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL, SUPERVISORY OR FORECASTING PURPOSES; SYSTEMS OR METHODS SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL, SUPERVISORY OR FORECASTING PURPOSES, NOT OTHERWISE PROVIDED FOR
20
Payment architectures, schemes or protocols
38
Payment protocols; Details thereof
40
Authorisation, e.g. identification of payer or payee, verification of customer or shop credentials; Review and approval of payers, e.g. check of credit lines or negative lists
PCT/US2012/056786BIOGY, INC.FISKE, Michael Stephen
Methods and systems are provided for performing a secure transaction. Users register biometric and/or other identifying information. A registration code and an encryption key are generated from the biometric information and/or information obtained from a unpredictable physical process and are stored in a secure area of a device and also transmitted to a service provider. A transaction passcode generator may be computed based on the stored registration code. In at least one embodiment, a unique transaction passcode depends upon the transaction information, so that on the next step of that transaction, only that unique transaction passcode will be valid. In an embodiment, the passcode includes the transaction information. In at least one embodiment, if the transaction information has been altered relative to the transaction information stored in the device's secure area, then the transaction passcode sent during this step will be invalid and transaction may be aborted.

7. WO/2013/013104 LOW-FORCE ROLLING TRIGGERWO24.01.2013
F41A 19/10
[IPC code unknown for ERROR IPC Code incorrect: invalid subclass (B=>S)!]
PCT/US2012/047494ARDUINI, DouglasARDUINI, Douglas
In an embodiment, a low-force, low-friction, short-travel, low-energy control rolling trigger utilizes a rolling element as a trigger-release mechanism in equipment, machines and tools such as for clutches, brakes, actuators, and projectile launchers. The rolling elements within the trigger mechanism reduce the friction, which in-turn reduces the force necessary to discharge trigger. In an embodiment, the trigger is part of a firearm and uses a mechanical trigger. In another embodiment, the trigger is activated by an electronic signal that activates a solenoid, which pulls the rolling element, and thereby releases the striker or in a trigger-release assembly.

8. WO/2012/106383 SECURE ACTIVE ELEMENT MACHINEWO09.08.2012
G06F 21/00
G PHYSICS
06
COMPUTING; CALCULATING; COUNTING
F
ELECTRIC DIGITAL DATA PROCESSING
21
Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
PCT/US2012/023408FISKE SOFTWARE, LLC.FISKE, Michael
Based upon the principles of Turing incomputability, connectedness and novel properties of the Active Element Machine, a malware-resistant computing machine is constructed. Using randomness, the active element machine can deterministically execute a universal Turing machine (universal digital computer program) with active element firing patterns that are Turing incomputable. In some embodiments, if the state and tape (or other memory) contents of the universal Turing machine and the random bits generated from the quantum source are all kept perfectly secret and no information is leaked about the dynamic connections between the active elements, then it is Turing incomputable to construct a translator Turing machine (translator digital computer program) that maps the random firing interpretations back to the sequence of instructions executed by the universal Turing machine. A more powerful computational procedure is created than Turing's computational procedure (digital computer procedure).

9. WO/2012/097362 PROTECTING CODES, KEYS AND USER CREDENTIALS WITH IDENTITY AND PATTERNSWO19.07.2012
G08B 13/22
G PHYSICS
08
SIGNALLING
B
SIGNALLING OR CALLING SYSTEMS; ORDER TELEGRAPHS; ALARM SYSTEMS
13
Burglar, theft, or intruder alarms
22
Electrical actuation
PCT/US2012/021458FISKE SOFTWARE, LLC.FISKE, Michael
In an embodiment, the invariant is at least partially generated (e.g., derived) from the biometric templates or prints and a transformation between the biometric templates or prints. In an embodiment, the invariant may be used as a cryptography key. In an embodiment, the transformation or transformations that are used in deriving the invariant are transformations that are performed in order to authenticate a user. For example, the transformation may be a rotation of two fingerprints so that the two fingerprints match. In an embodiment, the transformation(s) are executed by digital computer program instructions. In an embodiment, the transformation(s) is between patterns. In an embodiment, the transformation(s) are between color patterns. In an embodiment, the transformation(s) are between geometric patterns.

10. WO/2011/059487 HOLLOW BODY CAVITY ABLATION APPARATUSWO19.05.2011
A61B 18/18
A HUMAN NECESSITIES
61
MEDICAL OR VETERINARY SCIENCE; HYGIENE
B
DIAGNOSIS; SURGERY; IDENTIFICATION
18
Surgical instruments, devices or methods for transferring non-mechanical forms of energy to or from the body
18
by applying electromagnetic radiation, e.g. microwaves
PCT/US2010/002944CARDEA MEDSYSTEMS, INC.STERN, Roger A.
An ablation apparatus places electrodes at the perimeter of a cavity. In an embodiment, the alternating electric field is used to expose the cavity to enough energy to ablate the cavity. In an embodiment, two modes are used to expose different regions of the cavity to different amount of power for so that the thermal effect is more uniform. In an embodiment, the electrodes have a relatively large surface area so as to avoid charring the cavity, but are shaped so as to fit within a body orifice. For example, the diameter of the sheathed housing the electrodes during penetration may be only 5.5 mm.

Results 1-10 of 31 for Criteria:(FP:("1250 Aviation")) Office(s):all Language:EN Stemming: true
1 2 3 4
Page: / 4
Query Tree
Save query