Patent application number | Description | Published |
20110082355 | PHOTOPLETHYSMOGRAPHY DEVICE AND METHOD - A system and method for measuring one or more light-absorption related blood analyte concentration parameters of a mammalian subject, is disclosed. In some embodiments, the system comprises: a) a photoplethysmography (PPG) device configured to effect a PPG measurement by illuminating skin of the subject with at least two distinct wavelengths of light and determining relative absorbance at each of the wavelengths; b) a dynamic light scattering measurement (DLS) device configured to effect a DLS measurement of the subject to rheologically measure a pulse parameter of the subject; and c) electronic circuitry configured to: i) temporally correlating the results of the PPG and DLS measurements; and ii) accordance with the temporal correlation between the PPG and DLS measurements, assessing value(s) of the one or more light-absorption related blood analyte concentration parameter(s). | 04-07-2011 |
20120087111 | SUBMERGED PLANAR ILLUMINATION DEVICE - A submerged planar illumination device for providing specified, substantially uniform distribution of light in liquid from one or few light sources such as LED. The device comprises a light guiding plate having an entrance edge to which the LEDs are fixed, a collimator for redirecting the light and forming substrate light which is coupled to a light guiding plate having at least one light extracting surface. Light extracting surface are optionally on both large surfaces of the light guiding plate. Each light extracting surface is covered with a pattern of light extracting and scattering elements capable of collecting, scattering and extracting light propagating in the light guiding plate into the liquid ambient medium in which the device is submerged. A cover, sealed to the entrance edge of the light guiding plate, protects the light emitting element from the liquid ambient medium. | 04-12-2012 |
20130131475 | PHOTOPLETHYSMOGRAPHY DEVICE AND METHOD - A system and method for measuring one or more light-absorption related blood analyte concentration parameters of a mammalian subject, is disclosed. In some embodiments, the system comprises: a) a photoplethysmography (PPG) device configured to effect a PPG measurement by illuminating skin of the subject with at least two distinct wavelengths of light and determining relative absorbance at each of the wavelengths; b) a dynamic light scattering measurement (DLS) device configured to effect a DLS measurement of the subject to rheologically measure a pulse parameter of the subject; and c) electronic circuitry configured to: i) temporally correlating the results of the PPG and DLS measurements; and ii) accordance with the temporal correlation between the PPG and DLS measurements, assessing value(s) of the one or more light-absorption related blood analyte concentration parameter(s). | 05-23-2013 |
20140200423 | WEARABLE PULSE OXIMETRY DEVICE - A pulse oximetry device that is mounted on a wrist strap and fixates an area above a distal end of the ulna with a dome shaped structure. This area is used as measuring area. The measurement is carried out by a detector positioned above the fixated area, that detects light emitted by light sources having different wave lengths that are located at a periphery of the fixated area. Hence, the reflections are measured at neither a reflection mode nor a transmission mode, but are at an angle between 20° and 160° from the emitted light. This mode, termed trans-illumination, allows achieving an excellent signal to noise ratio that for the first time enables continuous and reliable measurement of oximetry data on the wrist. | 07-17-2014 |
Patent application number | Description | Published |
20130008852 | UREA SORBENT - A sorbent polymer is provided that interacts or reacts with aqueous urea to aid the regeneration of a dialysate liquid. The sorbent polymer may include one or more specific functional groups bonded thereto. Such specific functional groups are selected from carboxylic acids, carboxylic acid esters, carboxylates, amides, dicarboxylic acids, dicarboxylic acid esters, and dicer boxylates to produce the desired urea sorbent. | 01-10-2013 |
20130313188 | Urea Sorbent - A sorbent polymer is provided that interacts or reacts with aqueous urea to aid the regeneration of a dialysate liquid. The sorbent polymer may include one or more specific functional groups bonded thereto. Such specific functional groups are selected from carboxylic acids, carboxylic acid esters, carboxylates, amides, dicarboxylic acids, dicarboxylic acid esters, and dicer boxylates to produce the desired urea sorbent. | 11-28-2013 |
Patent application number | Description | Published |
20100246822 | SECURELY PROVIDING SECRET DATA FROM A SENDER TO A RECEIVER - The invention provides a system and a method for securely providing a secret data from a sender to one or more receivers. The receiver uses a sequence of functions originating from a hierarchy of functions to migrate the secret data from an input transform space to an output transform space using a mathematical transformation under control of one or more seeds. The seeds are provided to the receiver by the sender. The sender conditionally allows the receiver to obtain the secret data by controlling the seeds. | 09-30-2010 |
20100251285 | CONDITIONAL ENTITLEMENT PROCESSING FOR OBTAINING A CONTROL WORD - Embodiments of the invention provide an improved method and an improved receiver for obtaining a control word. Two or more subkeys are obtained in a receiver. Each subkey was encrypted under control of a key received in an entitlement message or transformed under control of a seed received in an entitlement message. After decryption or transformation, the subkeys are combined to obtain the control word. Typically at least one of the entitlement messages is a positive entitlement message and at least one of the entitlement messages is a negative entitlement message. Embodiments of the invention can be used in a conditional access system such as a Pay-TV system. | 09-30-2010 |
20110067012 | SYSTEM AND METHOD FOR GENERATING WHITE-BOX IMPLEMENTATIONS OF SOFTWARE APPLICATIONS - A development suite for generating files, such as DRM-protected files, using white-box cryptography. The suite consists of a code generation tool, a data transformation engine, and a white-box data generation tool, and a white-box library. In the white-box cryptography context, the data transformation engine is used to protect the boundary between the cryptographic operation and the surrounding code. In particular, the data transformation engine is used to apply data transformations to the inputs to and outputs from the cryptographic operations. If the user specifies that transformations are required via a white-box parameterization file, the code generation tool puts the information specified by the user into a form the data transformation engine understands, namely as qualifiers on data variables and function prototypes. The data transformation engine then applies the specified transformations, and passes information to the data generation tool regarding which transformations were chosen. | 03-17-2011 |
20130024699 | System and Method for Protecting Cryptographic Assets From a White-Box Attack - A digital signature generation (DSG) process which provides resistance against white box attackers is disclosed. This is done by applying specially selected data transformations to the inputs, outputs and internal parameters of the algorithm. In particular, the signatory's private key does not appear in the clear in our protected implementation. Our new white box implementation produces signatures that are compatible with signatures created by conventional implementations; thus our solution facilitates interoperability and can be used as a drop-in replacement for conventional implementations. In particular, we describe transformations to the key (d) and the generator domain parameter (usually denoted G or g) of the digital signature generation processes, such that embodiments of the invention can produce signed messages which appear to a verifier as if the key (d) was used, without actually ever using the key (d). This makes it impossible for an adversary to ever observe the key (d), as it is not actually used. Further embodiments include additional protections to make it even harder for an adversary to deduce the key (d) by observing the process which generates the digital signature. | 01-24-2013 |
20130125090 | System and Method for Efficiently Deploying Massively Diverse Program Instances to Resist Differential Attacks - A system and method for producing a massive number of diverse program instances so as to deter differential attacks, collusion, and similar hostile actions. Code portions are shown to be defined in various manners, instantiated, and aggregated. The system and method establishes a very large number of program instances that may be deployed. Furthermore, testing is accomplished over a minimal set of instances to provide for high test coverage and high confidence over the fully deployed instance set without incurring a high testing penalty. | 05-16-2013 |
20140019771 | Method and System for Protecting Execution of Cryptographic Hash Functions - A method of protecting the execution of a cryptographic hash function, such as SHA-256, in a computing environment where inputs, outputs and intermediate values can be observed. The method consists of encoding input messages so that hash function inputs are placed in a transformed domain, and then applying a transformed cryptographic hash function to produce an encoded output digest; the transformed cryptographic hash function implements the cryptographic hash function in the transformed domain. | 01-16-2014 |
20140362987 | SECURELY PROVIDING SECRET DATA FROM A SENDER TO A RECEIVER - The invention provides a system and a method for securely providing a secret data from a sender to one or more receivers. The receiver uses a sequence of functions originating from a hierarchy of functions to migrate the secret data from an input transform space to an output transform space using a mathematical transformation under control of one or more seeds. The seeds are provided to the receiver by the sender. The sender conditionally allows the receiver to obtain the secret data by controlling the seeds. | 12-11-2014 |