Patent application number | Description | Published |
20120215216 | ELECTROSURGICAL GENERATOR CONTROLLER FOR REGULATION OF ELECTROSURGICAL GENERATOR OUTPUT POWER - An electrosurgical generator may reduce unintended tissue damage by improving regulation of output power. The electrosurgical generator may control the power during a cycle, and react to a change in power if arcing occurs. Voltage sources, especially, demonstrate the tendency to have large, uncontrolled power excursions during normal electrosurgical use. The magnitude of the power excursions may be dependent on various factors. An exemplary electrosurgical generator control scheme reduces or minimizes the thermal spread by accurately supplying the specified power within a few cycles. Additionally, fast and accurate regulation provided by the constant voltage mode reduces or minimizes unintentional tissue charring. Thus, reduced thermal spread and charring should result in better surgical outcomes by reducing scarring and decreasing healing times. An electrosurgical generator controller may be configured to control both a DC-DC buck converter and a DC-AC boost inverter based in part on electrical parameters of the electrosurgical generator. | 08-23-2012 |
20150025521 | ELECTROSURGICAL GENERATORS - An electrosurgical generator is provided. The electrosurgical generator includes at least one converter configured to output a DC waveform and a nonlinear carrier control current. At least one boost inverter is coupled to the at least one converter and is configured to convert the DC waveform to generate at least one electrosurgical waveform. At least one inductor is connected in series with the at least one converter and at least one boost inverter and is configured to output an inductor current. A controller is coupled to the at least one converter and the at least one boost inverter and is configured to maintain the inductor current at a predetermined value by controlling a pulse duration of a duty cycle of the at least one converter based on a comparison of inductor current and the nonlinear control current. | 01-22-2015 |
20150025523 | ELECTROSURGICAL GENERATOR WITH CONTINUOUSLY AND ARBITRARILY VARIABLE CREST FACTOR - An electrosurgical generator is provided. The electrosurgical generator includes: a non-resonant radio frequency output stage configured to output a substantially square electrosurgical waveform; and a controller coupled to the non-resonant radio frequency output stage, the controller configured to adjust a crest factor of the substantially square electrosurgical waveform on a cycle-by-cycle basis. | 01-22-2015 |
20150080880 | ELECTROSURGICAL INSTRUMENT WITH END-EFFECTOR ASSEMBLY INCLUDING ELECTRICALLY-CONDUCTIVE, TISSUE-ENGAGING SURFACES AND SWITCHABLE BIPOLAR ELECTRODES - An electrosurgical instrument includes a housing, an elongated shaft, and an end-effector assembly. The proximal end of the shaft is operably associated with the housing. The end-effector assembly is operably coupled to the distal end of the shaft and includes first and second jaw members. Each of the first and second jaw members includes a sealing plate and a bipolar electrode. Either one or both of the first and second jaw members is movable from a position in spaced relation relative to the other jaw member to at least one subsequent position wherein the sealing plates cooperate to grasp tissue therebetween. The electrosurgical instrument includes a semiconductor switch operably coupled to at least one of the sealing plates and at least one of the bipolar electrodes. The semiconductor switch is configured to enable user selection between energizing the at least one sealing plate or the at least one bipolar electrode. | 03-19-2015 |
Patent application number | Description | Published |
20110100471 | Drill String Valve and Method - Method and drill string valve for closing a conduit through which a high pressure fluid flows. The drill string valve includes an elongated housing having an inside cavity, a seal element attached to a first end of the elongated housing, the seal element being disposed within the inside cavity such that a flow of liquid through the inside cavity from the first end to a second end of the elongated housing is allowed, a sliding valve disposed within the inside cavity and configured to slide to and from the seal element along the axis such that when the sliding valve contacts the seal element the flow of liquid is suppressed, a biasing cartridge disposed within the inside cavity, between the seal element and the second end of the elongated housing, and configured to apply a first force on the sliding valve such that the sliding valve is contacting the seal element, and a loading mechanism disposed within the inside cavity, between the biasing cartridge and the second end of the elongated housing, and configured to apply a second force on the biasing cartridge. | 05-05-2011 |
20120103619 | Drill String Valve and Method - Method and drill string valve assembly for closing a conduit through which a high pressure fluid flows. The drill string valve assembly includes first, second and third portions forming an elongated housing having an inside cavity; and a drill string valve provided inside the cavity, to extend from the first portion to the third portion. The second portion has an extension that fits inside a groove of the third portion and prevents the second portion to linearly move relative to the third portion and also allows the second portion to rotate relative to the third portion, and the second portion has a distal region provided with a thread configured to engage a corresponding thread of the first portion such that a rotation of the second portion relative to the third portion determines a tight connection between the first portion and the second portion. | 05-03-2012 |
Patent application number | Description | Published |
20120210422 | METHOD AND APPARATUS FOR DETECTING MALICIOUS SOFTWARE USING GENERIC SIGNATURES - Novel methods, components, and systems for automatically detecting malicious software are presented. More specifically, we describe methods, components, and systems for the automated deployment of generic signatures to detect malicious software. (Typically, generic signature creation and deployment require more extensive manual processes.) The disclosed invention provides a significant improvement with regard to automation compared to previous approaches. | 08-16-2012 |
20120210423 | METHOD AND APPARATUS FOR DETECTING MALICIOUS SOFTWARE THROUGH CONTEXTUAL CONVICTIONS, GENERIC SIGNATURES AND MACHINE LEARNING TECHNIQUES - Novel methods, components, and systems that enhance traditional techniques for detecting malicious software are presented. More specifically, methods, components, and systems that use important contextual information from a client system (such as recent history of events on that system), machine learning techniques, the automated deployment of generic signatures, and combinations thereof, to detect malicious software. The disclosed invention provides a significant improvement with regard to automation compared to previous approaches. | 08-16-2012 |
20120227105 | METHOD AND APPARATUS FOR DETECTING MALICIOUS SOFTWARE USING MACHINE LEARNING TECHNIQUES - Novel methods, components, and systems for detecting malicious software in a proactive manner are presented. More specifically, we describe methods, components, and systems that leverage machine learning techniques to detect malicious software. The disclosed invention provides a significant improvement with regard to detection capabilities compared to previous approaches. | 09-06-2012 |
20130139261 | METHOD AND APPARATUS FOR DETECTING MALICIOUS SOFTWARE THROUGH CONTEXTUAL CONVICTIONS - Novel methods, components, and systems that enhance traditional techniques for detecting malicious software are presented. More specifically, we describe methods, components, and systems that leverage important contextual information from a client system (such as recent history of events on that system) to detect malicious software that might have otherwise gone ignored. The disclosed invention provides a significant improvement with regard to detection capabilities compared to previous approaches. | 05-30-2013 |
20130276114 | METHOD AND APPARATUS FOR RETROACTIVELY DETECTING MALICIOUS OR OTHERWISE UNDESIRABLE SOFTWARE - A system for retroactively detecting malicious software on an end user system without performing expensive cross-referencing directly on the endpoint device. A client provides a server with information about files that are on it together with what it knows about these files. The server tracks this information and cross-references it against new intelligence it gathers on clean or malicious files. If a discrepancy is found (i.e., a file that had been called malicious, but that is actually benign or vice versa), the server informs the client, which in turn takes an appropriate action based on this information. | 10-17-2013 |
20140165203 | Method and Apparatus for Retroactively Detecting Malicious or Otherwise Undesirable Software As Well As Clean Software Through Intelligent Rescanning - The present invention relates to the security of general purpose computing devices, such as laptop or desktop PCs, and more specifically to the detection of malicious software (malware) on a general purpose computing device. A challenge in detecting malicious software is that files are typically scanned for the presence of malicious intent only once (and subsequent rescanning is typically performed in a simplistic manner). Existing methods in the art do not address how to most effectively rescan collections of files in a way that tries to optimize performance and efficacy. Accordingly we present novel methods, components, and systems for intelligently rescanning file collections and thereby enabling retroactive detection of malicious software and also retroactive identification of clean software. These methods may also be useful if additional information is now available regarding a file that might be useful to an end-user or an administrator, even though the file's core disposition might not have changed. More specifically, we describe methods, components, and systems that perform data analytics to intelligently rescan file collections for the purpose of retroactively identifying malware and retroactively identifying clean files. The disclosed invention provides a significant improvement with regard to efficacy and performance compared to previous approaches. | 06-12-2014 |
20140188986 | Method and Apparatus for Identifying Computing Resource Trajectory - The present invention relates to the security of general purpose computing devices, such as laptop or desktop PCs, and more specifically to the detection of malicious software (malware) on a general purpose computing device. A challenge in maintaining a plurality of computing systems is that it may be required to have visibility into the extensive collection of computing related resources located across those systems as well as information about resources together with their behaviors and evolutions within those systems. Examples of such resources include files, file names, registry keys, entries in network communications logs, etc. Accordingly, we present novel methods, components, and systems for keeping track of information about these resources and presenting this information to an ultimate end user. More specifically, we describe methods, components, and systems that perform data analytics on system data to obtain and report upon resource trajectory information, such as when particular resources were seen in an environment, the actions associated with those resources, and other resources related to those original resources. If a particular resource is believed to be malicious or otherwise undesirable, then it can be determined which systems that resource is on, how it arrived on those systems, what it did on those systems as well as what resources are related to the original resource, and as such what might need to be removed from those systems to restore them to a more desirable state. Through the disclosed invention, system administrators will be better able to determine how to more effectively address issues related to the presence of those resources. | 07-03-2014 |
20150026810 | Method and Apparatus for Detecting Malicious Software Using Machine Learning Techniques - Novel methods, components, and systems for detecting malicious software in a proactive manner are presented. More specifically, we describe methods, components, and systems that leverage machine learning techniques to detect malicious software. The disclosed invention provides a significant improvement with regard to detection capabilities compared to previous approaches. | 01-22-2015 |
20150205959 | METHOD AND APPARATUS FOR RETROACTIVELY DETECTING MALICIOUS OR OTHERWISE UNDESIRABLE SOFTWARE - A system retroactively detects malicious software on an end user system without performing expensive cross-referencing directly on the endpoint device. A client provides a server with information about files that are on it together with what it knows about these files. The server tracks this information and cross-references it against new intelligence it gathers on clean or malicious files. If a discrepancy in found (i.e., a file that had been called malicious, but that is actually benign or vice versa), the server informs the client, which in turn takes an appropriate action based on this information. | 07-23-2015 |
Patent application number | Description | Published |
20110200171 | METHODS AND APPARATUS FOR RENAL NEUROMODULATION VIA STEREOTACTIC RADIOTHERAPY - The present disclosure describes methods and apparatus for renal neuromodulation via stereotactic radiotherapy for the treatment of hypertension, heart failure, chronic kidney disease, diabetes, insulin resistance, metabolic disorder or other ailments. Renal neuromodulation may be achieved by locating renal nerves and then utilizing stereotactic radiotherapy to expose the renal nerves to a radiation dose sufficient to reduce neural activity. A neural location element may be provided for locating target renal nerves, and a stereotactic radiotherapy system may be provided for exposing the located renal nerves to a radiation dose sufficient to reduce the neural activity, with reduced or minimized radiation exposure in adjacent tissue. Renal nerves may be located and targeted at the level of the ganglion and/or at postganglionic positions, as well as at pre-ganglionic positions. | 08-18-2011 |
20120101538 | DEVICES, SYSTEMS AND METHODS FOR EVALUATION AND FEEDBACK OF NEUROMODULATION TREATMENT - The present disclosure relates to devices, systems and methods for evaluating the success of a treatment applied to tissue in a patient, such as a radio frequency ablative treatment used to neuromodulate nerves associated with the renal artery. A system monitors parameters or values generated during the course of a treatment. Feedback provided to an operator is based on the monitored values and relates to an assessment of the likelihood that a completed treatment was technically successful. In other embodiments, parameters or values generated during the course of an incomplete treatment (such as due to high temperature or high impedance conditions) may be evaluated to provide additional instructions or feedback to an operator. | 04-26-2012 |