Patent application number | Description | Published |
20120207824 | ORALLY EFFECTIVE METHYLPHENIDATE EXTENDED RELEASE POWDER AND AQUEOUS SUSPENSION PRODUCT - An oral methylphenidate powder which is reconstitutable into a final oral aqueous sustained release formulation containing at least about 50%, or at least about 80% by weight water based on the total weight of the suspension, is provided. The powder is a blend containing a combination of an uncoated methylphenidate-ion exchange resin complex, a barrier coated methylphenidate-ion exchange resin complex-matrix, and a water soluble buffering agent such that upon formed into an aqueous liquid formulation, the formulation has a pH in the range of about 3.5 to about 5, or about 4 to about 4.5. Following administration of a single dose of the oral aqueous methylphenidate suspension, a therapeutically effective amount of methylphenidate is reached in less than one hour and the composition provides a twelve-hour extended release profile. | 08-16-2012 |
20130004571 | Orally Effective Methylphenidate Extended Release Powder and Aqueous Suspension Product - An oral methylphenidate powder which is reconstitutable into a final oral aqueous sustained release formulation containing at least about 50%, or at least about 80% by weight water based on the total weight of the suspension, is provided. The powder is a blend containing a combination of an uncoated methylphenidate-ion exchange resin complex, a barrier coated methylphenidate-ion exchange resin complex-matrix, and a water soluble buffering agent such that upon formed into an aqueous liquid formulation, the formulation has a pH in the range of about 3.5 to about 5, or about 4 to about 4.5. Following administration of a single dose of the oral aqueous methylphenidate suspension, a therapeutically effective amount of methylphenidate is reached in less than one hour and the composition provides a twelve-hour extended release profile. | 01-03-2013 |
20130261152 | ORALLY EFFECTIVE METHYLPHENIDATE EXTENDED RELEASE POWDER AND AQUEOUS SUSPENSION PRODUCT - An oral methylphenidate powder which is reconstitutable into a final oral aqueous sustained release formulation containing at least about 50%, or at least about 80% by weight water based on the total weight of the suspension, is provided. The powder is a blend containing a combination of an uncoated methylphenidate-ion exchange resin complex, a barrier coated methylphenidate-ion exchange resin complex-matrix, and a water soluble buffering agent such that upon formed into an aqueous liquid formulation, the formulation has a pH in the range of about 3.5 to about 5, or about 4 to about 4.5. Following administration of a single dose of the oral aqueous methylphenidate suspension, a therapeutically effective amount of methylphenidate is reached in less than one hour and the composition provides a twelve-hour extended release profile. | 10-03-2013 |
20140004160 | ORALLY EFFECTIVE METHYLPHENIDATE EXTENDED RELEASE POWDER AND AQUEOUS SUSPENSION PRODUCT | 01-02-2014 |
20140287038 | Orally Effective Methylphenidate Extended Release Powder and Aqueous Suspension Product - An oral methylphenidate powder which is reconstitutable into a final oral aqueous sustained release formulation containing at least about 50%, or at least about 80% by weight water based on the total weight of the suspension, is provided. The powder is a blend containing a combination of an uncoated methylphenidate-ion exchange resin complex, a barrier coated methylphenidate-ion exchange resin complex-matrix, and a water soluble buffering agent such that upon formed into an aqueous liquid formulation, the formulation has a pH in the range of about 3.5 to about 5, or about 4 to about 4.5. Following administration of a single dose of the oral aqueous methylphenidate suspension, a therapeutically effective amount of methylphenidate is reached in less than one hour and the composition provides a twelve-hour extended release profile. | 09-25-2014 |
Patent application number | Description | Published |
20140287041 | Methylphenidate Extended Release Chewable Tablet - An oral methylphenidate extended release tablet is described, which can be scored and still retain its extended release profile. The tablet contains a combination of an uncoated methylphenidate-ion exchange resin complex, a barrier coated methylphenidate-ion exchange resin complex-matrix, and an uncomplexed methylphenidate active component. Following administration of a single dose of the extended release methylphenidate chewable tablet, a therapeutically effective amount of methylphenidate is reached in less than about 20 minutes and the composition provides a twelve-hour extended release profile. | 09-25-2014 |
20140294916 | Methylphenidate Extended Release Chewable Tablet - An oral methylphenidate extended release tablet is described, which can be scored and still retain its extended release profile. The tablet contains a combination of an uncoated methylphenidate-ion exchange resin complex, a barrier coated methylphenidate-ion exchange resin complex-matrix, and an uncomplexed methylphenidate active component. Following administration of a single dose of the extended release methylphenidate chewable tablet, a therapeutically effective amount of methylphenidate is reached in less than about 20 minutes and the composition provides a twelve-hour extended release profile. | 10-02-2014 |
20150086641 | Orally Effective Methylphenidate Extended Release Powder and Aqueous Suspension Product - An oral methylphenidate powder which is reconstitutable into a final oral aqueous sustained release formulation containing at least about 50%, or at least about 80% by weight water based on the total weight of the suspension, is provided. The powder is a blend containing a combination of an uncoated methylphenidate-ion exchange resin complex, a barrier coated methylphenidate-ion exchange resin complex-matrix, and a water soluble buffering agent such that upon formed into an aqueous liquid formulation, the formulation has a pH in the range of about 3.5 to about 5, or about 4 to about 4.5. Following administration of a single dose of the oral aqueous methylphenidate suspension, a therapeutically effective amount of methylphenidate is reached in less than one hour and the composition provides a twelve-hour extended release profile. | 03-26-2015 |
20150157574 | METHYLPHENIDATE EXTENDED RELEASE CHEWABLE TABLET - An oral methylphenidate extended release tablet is described, which can be scored and still retain its extended release profile. The tablet contains a combination of an uncoated methylphenidate-ion exchange resin complex, a barrier coated methylphenidate-ion exchange resin complex-matrix, and an uncomplexed methylphenidate active component. Following administration of a single dose of the extended release methylphenidate chewable tablet, a therapeutically effective amount of methylphenidate is reached in less than about 20 minutes and the composition provides a twelve-hour extended release profile. | 06-11-2015 |
20150182469 | Orally Effective Methylphenidate Extended Release Powder and Aqueous Suspension Product - An oral methylphenidate powder which is reconstitutable into a final oral aqueous sustained release formulation containing at least about 50%, or at least about 80% by weight water based on the total weight of the suspension, is provided. The powder is a blend containing a combination of an uncoated methylphenidate-ion exchange resin complex, a barrier coated methylphenidate-ion exchange resin complex-matrix, and a water soluble buffering agent such that upon formed into an aqueous liquid formulation, the formulation has a pH in the range of about 3.5 to about 5, or about 4 to about 4.5. Following administration of a single dose of the oral aqueous methylphenidate suspension, a therapeutically effective amount of methylphenidate is reached in less than one hour and the composition provides a twelve-hour extended release profile. | 07-02-2015 |
Patent application number | Description | Published |
20150093107 | RATELESS VISIBLE LIGHT COMMUNICATION - Methods, systems, apparatuses, and devices are described for transmitting and receiving data using rateless visible light communication (VLC). A codeword having a plurality of symbols is identified. The codeword is repetitively transmitted in a VLC signal while, from one transmission of the codeword to a next transmission of the codeword, imparting changes in timings of the symbols of the codeword relative to a timing reference of an image capture frame of an image sensor configured to receive the codeword. A VLC signal including repetitions of a codeword is received. The codeword has a plurality of symbols. A determination is made regarding whether at least one symbol of the codeword is undetected in a repetition of the codeword. Upon determining that the at least one symbol is undetected in the repetition of the codeword, at least one other repetition of the codeword is searched to detect the at least one symbol. | 04-02-2015 |
20150372753 | TRANSMISSION OF IDENTIFIERS USING VISIBLE LIGHT COMMUNICATION - Methods, systems, and devices are described for transmitting an identifier using visible light communication (VLC) and for generating a plurality of identifiers for transmission using VLC. Input identifying an illumination factor associated with a light source is received. A first set of modulation parameters is modified for transmitting the identifier using VLC. The first set of modulation parameters is modified based on the illumination factor. A signal, in which the identifier is encoded, is applied to the light source. The signal is applied according to the first set of modulation parameters. Another method includes identifying a number of light transmitting devices, generating a plurality of identifiers based on the identified number of light transmitting devices, storing the generated identifiers, determining a plurality of cyclic shifts for each identifier in the plurality of identifiers, and removing identifiers from the plurality of identifiers that match the identified cyclic shifts. | 12-24-2015 |
Patent application number | Description | Published |
20100293297 | INTER-WORKING BETWEEN NETWORK ADDRESS TYPE (ANAT) ENDPOINTS AND INTERACTIVE CONNECTIVITY ESTABLISHMENT (ICE) ENDPOINTS - A method for inter-working between an alternative network address type (ANAT) endpoint and an interactive connectivity establishment (ICE) is provided. The method may include identifying one or more network addresses operable to be used to communicate with a alternative network address type (ANAT) endpoint. One or more candidates operable to be used for interactive connectivity establishment (ICE) traversal may also be identified. A preferred network address may be determined from the one or more network addresses based on an ANAT endpoint preference. A corresponding candidate may be determined based on the ANAT endpoint preference. The corresponding candidate may use a candidate address to communicate. A media stream may be established between the preferred network address and the corresponding candidate address. | 11-18-2010 |
20120158974 | INTER-WORKING BETWEEN NETWORK ADDRESS TYPE (ANAT) ENDPOINTS AND INTERATIVE CONNECTIVITY ESTABLISHMENT (ICE) ENDPOINTS - A method for inter-working between an alternative network address type (ANAT) endpoint and an interactive connectivity establishment (ICE) is provided. The method may include identifying one or more network addresses operable to be used to communicate with a alternative network address type (ANAT) endpoint. One or more candidates operable to be used for interactive connectivity establishment (ICE) traversal may also be identified. A preferred network address may be determined from the one or more network addresses based on an ANAT endpoint preference. A corresponding candidate may be determined based on the ANAT endpoint preference. The corresponding candidate may use a candidate address to communicate. A media stream may be established between the preferred network address and the corresponding candidate address. | 06-21-2012 |
20140310797 | METHOD AND APPARATUS TO SCALE AUTHENTICATED FIREWALL TRAVERSAL USING TRUSTED ROUTING POINT - A Trusted Routing Point (TROP) generates a signaling message that includes an authorization token used to authorize a firewall to open a pinhole. The signaling message contains a first indicator that indicates whether a data field in the signaling message represents a source address of a media flow. The signaling message also includes a second indicator that indicates whether the firewall should derive the source address of the media flow from the data field. The authorization token is generated using a one-way hash function over information that may be included in the signaling message, including the first indicator and the second indicator. | 10-16-2014 |
20150249606 | SMARTER POLICY DECISIONS BASED ON METADATA IN DATA FLOWS - Modern day user applications leverages new communication technologies such as WebRTC, WebEx, and Jabber allow devices to connect and exchange media content including audio streams, video streams, and data stream/channels. The present disclosure describes mechanisms for a Port Control Protocol (PCP) server to provide feedback to PCP clients to enforce certain policies on the transport of such media content for a network. A policy may include a traffic handling policy for enforcing differentiated quality of service characteristics for different types of media streams. Another policy may include a security policy ensuring a data files being transmitted over a data channel from one endpoint travels to a security application via a relay element before the packets reaches another endpoint. The mechanisms are transparent to the endpoints, and advantageously preserve the user experience for these user applications. | 09-03-2015 |
20150249668 | SMARTER POLICY DECISIONS BASED ON METADATA IN DATA FLOWS - Modern day user applications leverages new communication technologies such as WebRTC, WebEx, and Jabber allow devices to connect and exchange media content including audio streams, video streams, and data stream/channels. The present disclosure describes mechanisms for a Port Control Protocol (PCP) server to provide feedback to PCP clients to enforce certain policies on the transport of such media content for a network. A policy may include a traffic handling policy for enforcing differentiated quality of service characteristics for different types of media streams. Another policy may include a security policy ensuring a data files being transmitted over a data channel from one endpoint travels to a security application via a relay element before the packets reaches another endpoint. The mechanisms are transparent to the endpoints, and advantageously preserve the user experience for these user applications. | 09-03-2015 |
Patent application number | Description | Published |
20110091565 | METHOD OF FORMING NON-IMMUNOGENIC HYDROPHOBIC PROTEIN NANOPARTICLES AND USES THEREFOR - Methods are described for producing non-immunogenic nanoparticles from protein sources by controlling the pH in a nanoprecipitation process. The nanoparticles that are produced by the disclosed methods range in diameter size from about 100 ran to about 400 nm, with a preferred diameter size of from approximately 100 nm to approximately 300 nm, thereby rendering them non-immunogenic. The invention further discloses methods for producing nanoconjugates that are suitable for a variety of therapeutic, diagnostic and other uses. | 04-21-2011 |
20120195947 | PROTEIN NANOCARRIERS FOR TOPICAL DELIVERY - The invention encompasses nanoparticle assemblies and methods for preparing nanoparticle and compositions comprising such nanoparticles for use in topical or skin applications. The invention further encompasses methods of complexing various molecular and cellular entities to the nanoparticles using the resulting nanoparticles of the invention as delivery devices. The nanoparticles can be used for a variety of applications, such as treating cancer, targeting tumors, reducing the toxicity of a drug in vivo, increasing the efficacy of a complexed agent in vivo, protecting a complexed agent against degradation, increasing skin penetration and retention of drugs, and enhancing the water solubility/dispersibility of a drug or other agent. | 08-02-2012 |
20120219600 | POLYMER CONJUGATED PROTEIN MICELLES - The invention encompasses micelle assemblies, compositions having micelle assemblies, and methods for preparing micelle assemblies and compositions thereof. The invention also encompasses a prolamine protein conjugated to a polymer, such as a polyethylene glycol (PEG) chain, which conjugates can be used to prepare micelle assemblies. The invention further encompasses methods of encapsulating molecules using the conjugates of the invention. The micelle assemblies can be used for a variety of applications, such as treating cancer, targeting tumors, reducing the toxicity of a drug in vivo, increasing the efficacy of an encapsulated agent in vivo, protecting an encapsulated agent against degradation, and enhancing the water solubility of a drug or other agent. | 08-30-2012 |
20140088059 | Compositions and Methods for Localized Drug Delivery through Mammary Papillae - The invention provides compositions and methods for the prevention, diagnosis, or treatment of conditions affecting breast tissue. The compositions can include one or more therapeutic agents or diagnostic agents, and an effective carrier. The composition can be specifically adapted for transdermal permeation through the mammary papilla, areola, or a combination thereof, and into underlying breast tissue. | 03-27-2014 |
20140234420 | Method of Treating Skin Disorders using Nanoscale Delivery Devices and Transdermal Enhancing Compositions - The present invention describes methods and compositions for treating diverse dermatological conditions, including acne and psoriasis, using zein containing nanocarrier devices for topical delivery of methotrexate, retinoic acid and benzoyl peroxide to select targets in the skin. | 08-21-2014 |
20140308351 | Method of Forming Non-Immunogenic Hydrophobic Protein Nanoparticles, and Uses Therefor - Methods are described for producing non-immunogenic nanoparticles from protein sources by controlling the pH in a nanoprecipitation process. The nanoparticles that are produced by the disclosed methods range in diameter size from about 100 ran to about 400 nm, with a preferred diameter size of from approximately 100 nm to approximately 300 nm, thereby rendering them non-immunogenic. The invention further discloses methods for producing nanoconjugates that are suitable for a variety of therapeutic, diagnostic and other uses. | 10-16-2014 |
20140370110 | POLYMER CONJUGATED PROTEIN MICELLES - The invention encompasses micelle assemblies, compositions having micelle assemblies, and methods for preparing micelle assemblies and compositions thereof. The invention also encompasses a prolamine protein conjugated to a polymer, such as a polyethylene glycol (PEG) chain, which conjugates can be used to prepare micelle assemblies. The invention further encompasses methods of encapsulating molecules using the conjugates of the invention. The micelle assemblies can be used for a variety of applications, such as treating cancer, targeting tumors, reducing the toxicity of a drug in vivo, increasing the efficacy of an encapsulated agent in vivo, protecting an encapsulated agent against degradation, and enhancing the water solubility of a drug or other agent. | 12-18-2014 |
Patent application number | Description | Published |
20100241660 | RETRIEVAL OF METADATA FOR PERIPHERAL DEVICES - Techniques whereby a client computer may request metadata relating to a peripheral device from one or more server computers are provided. Upon connecting to a peripheral device, the client computer receives information identifying the device, and generates a query, using the received information, for metadata relating to the device. The client computer may, for example, first attempt to execute the query locally to determine if metadata appropriate for use (e.g., not outdated) is stored on the client computer. If not, the client computer may issue the query to one or more server computers which stores metadata received from manufacturers and/or suppliers of peripheral devices. The one or more server computers may issue a response making the requested metadata available to the client computer and providing instructions relating to subsequent requests from the client computer, so as to manage the processing load borne by the one or more server computers. The client computer may employ the metadata to present a graphical interface that enables the user to manage the device. | 09-23-2010 |
20130278957 | METADATA RETRIEVAL FOR MULTI-FUNCTION DEVICES - Systems and methods are provided for retrieving metadata relating to a multi-function device. In some embodiments, metadata is retrieved using a plurality of identifiers (e.g., hardware identifiers each identifying at least one function performed by the device) received from the device. The plurality of identifiers are arranged into a sequence, and at least one of the identifiers in the sequence is associated with metadata specifying a characteristic of the device. Using the metadata that is retrieved, a client computer may present an graphical user interface displaying information relating to the device. | 10-24-2013 |
20130282930 | METADATA RETRIEVAL FOR MULTI-FUNCTION DEVICES - Systems and methods are provided for retrieving metadata relating to a multi-function device. In some embodiments, metadata is retrieved using a plurality of identifiers (e.g., hardware identifiers each identifying at least one function performed by the device) received from the device. The plurality of identifiers are arranged into a sequence, and at least one of the identifiers in the sequence is associated with metadata specifying a characteristic of the device. Using the metadata that is retrieved, a client computer may present an graphical user interface displaying information relating to the device. | 10-24-2013 |
Patent application number | Description | Published |
20110126281 | Controlling Resource Access Based on Resource Properties - Described is a technology by which access to a resource is determined by evaluating a resource label of the resource against a user claim of an access request, according to policy decoupled from the resource. The resource may be a file, and the resource label may be obtained by classifying the file into classification properties, such that a change to the file may change its resource label, thereby changing which users have access to the file. The resource label-based access evaluation may be logically combined with a conventional ACL-based access evaluation to determine whether to grant or deny access to the resource. | 05-26-2011 |
20110231940 | CREDENTIAL-BASED ACCESS TO DATA - Existing mechanisms that control access to data based upon whether the user seeking to access the data is identified among the users that are allowed to access the data, can be extended to further control access based upon the provision of credential data by the user, or processes associated therewith. Access control entries can limit access based upon Boolean conditionals, including those referencing credential data, such that access can be granted only to specific users that provide the credential data or, alternatively, to any user that provides it. The referenced credential data can be specified in the access control information in an obfuscated form for security purposes. Information associated with the user, such as a user token, can be temporarily updated to include credential data when provided by the user, so as to enable access to the data but to prevent such access from remaining open too long. | 09-22-2011 |
20110239293 | AUDITING ACCESS TO DATA BASED ON RESOURCE PROPERTIES - Described is a technology, such as implemented in an operating system security system, by which a resource's metadata (e.g., including data properties) is evaluated against an audit rule or audit rules associated with that resource (e.g., object). The audit rule may be associated with all such resources corresponding to a resource manager, and/or by a resource-specific audit rule. When a resource is accessed, each audit rule is processed against the metadata to determine whether to generate an audit event for that rule. The audit rule may be in the form of one or more conditional expressions. Audit events may be maintained and queried to obtain audit information for various usage scenarios. | 09-29-2011 |
Patent application number | Description | Published |
20100042735 | CROSS-DOMAIN AUTHENTICATION - Providing services within a network of service providers sharing an authentication service and a set of business rules. A central server receives a first request from a first server to provide a first service to a user via a client without forcing the user to present credentials. In response to the received first request, the central server stores data identifying the first service on the client. The central server further receives a second request from a second server to provide a second service to the user via the client after the user presents the credentials to the second service. After receiving the second request and the presented credentials, the central server allows the user access to the second service. In response to allowing the user access to the second service, the central server further allows the user access to the first service as a result of the stored data. | 02-18-2010 |
20110179469 | CROSS-DOMAIN AUTHENTICATION - Providing services within a network of service providers sharing an authentication service and a set of business rules. A central server receives a first request from a first server to provide a first service to a user via a client without forcing the user to present credentials. In response to the received first request, the central server stores data identifying the first service on the client. The central server further receives a second request from a second server to provide a second service to the user via the client after the user presents the credentials to the second service. After receiving the second request and the presented credentials, the central server allows the user access to the second service. In response to allowing the user access to the second service, the central server further allows the user access to the first service as a result of the stored data. | 07-21-2011 |
20140101718 | CROSS-DOMAIN AUTHENTICATION - Providing services within a network of service providers sharing an authentication service and a set of business rules. A central server receives a first request from a first server to provide a first service to a user via a client without forcing the user to present credentials. In response to the received first request, the central server stores data identifying the first service on the client. The central server further receives a second request from a second server to provide a second service to the user via the client after the user presents the credentials to the second service. After receiving the second request and the presented credentials, the central server allows the user access to the second service. In response to allowing the user access to the second service, the central server further allows the user access to the first service as a result of the stored data. | 04-10-2014 |
Patent application number | Description | Published |
20100241978 | DYNAMIC GENERATION OF USER INTERFACES AND AUTOMATED MAPPING OF INPUT DATA FOR SERVICE-ORIENTED ARCHITECTURE-BASED SYSTEM MANAGEMENT APPLICATIONS - A method and system for dynamically generating a semantically correct user interface (UI) panel for a service request and automatically mapping input data for service-oriented architecture-based system management applications. A document is received that includes semantic annotations specifying semantics of elements of a service request input message. During runtime, a UI panel is generated based on the semantics and by interpreting metadata generated by interpreting hints included in the document Further, the semantic annotations may include a mapping definition of information technology (IT) resource selections. Based on the mapping definition, the IT resource selections are extracted from a registry and automatically mapped to a UI input element in a UI panel. In response to selecting an IT resource from the UI panel, properties of the selected IT resource are automatically mapped to an element of the service request input message according to the semantic annotations. | 09-23-2010 |
20130325568 | SYNCHRONIZATION OF HOME SHOPPING CARTS WITH ADVERTISEMENTS - Advertisement content is received at a processor that manages inventory of a smart home appliance from an advertising distribution device within a home network. A determination is made to add an advertised item of the advertisement content to a spoke shopping cart based upon commodity data of the managed inventory of the smart home appliance. The advertised item is added to the spoke shopping cart. | 12-05-2013 |
20150026002 | SMART HOME ENVIRONMENT FOR SHOPPING - A smart home environment shopping system. One or more inventory needs lists are received from one or more respective smart appliances. Sources for available inventory items on the received inventory needs lists are identified, based on pre-defined rules. In another aspect of the invention, the available items are displayed to a user, and one or more inputs indicating inventory items to purchase are received. In a further aspect, associated metadata for one or more of the available items is displayed, the metadata including one or more of: price, discounts, quality, brand, flavor, user reviews, and advertisements. In a further aspect, one or more optimal travel routes connecting all identified sources of the available inventory items on the received inventory needs lists are determined. | 01-22-2015 |
20150026007 | SMART HOME ENVIRONMENT FOR SHOPPING - A smart home environment shopping system. One or more inventory needs lists are received from one or more respective smart appliances. Sources for available inventory items on the received inventory needs lists are identified, based on pre-defined rules. In another aspect of the invention, the available items are displayed to a user, and one or more inputs indicating inventory items to purchase are received. In a further aspect, associated metadata for one or more of the available items is displayed, the metadata including one or more of: price, discounts, quality, brand, flavor, user reviews, and advertisements. In a further aspect, one or more optimal travel routes connecting all identified sources of the available inventory items on the received inventory needs lists are determined. | 01-22-2015 |
20150242491 | REPRESENTING A MACHINE-TO-MACHINE DEVICE MODEL BASED ON ONTOLOGICAL RELATIONSHIPS - In an approach for creating a machine-to-machine device model based on ontological relationship, one or more computer processors determine a plurality of characteristics of one or more machine-to-machine devices within a machine-to-machine communication environment. The one or more computer processors determine one or more ontological relationships between the one or more machine-to-machine devices and the plurality of characteristics of the one or more machine-to-machine devices. The one or more computer processors create a semantic device model, based, at least in part, on the one or more ontological relationships between the one or more machine-to-machine devices and the plurality of characteristics of the one or more machine-to-machine devices. | 08-27-2015 |
20150244561 | REPRESENTING A MACHINE-TO-MACHINE DEVICE MODEL BASED ON ONTOLOGICAL RELATIONSHIPS - In an approach for creating a machine-to-machine device model based on ontological relationship, one or more computer processors determine a plurality of characteristics of one or more machine-to-machine devices within a machine-to-machine communication environment. The one or more computer processors determine one or more ontological relationships between the one or more machine-to-machine devices and the plurality of characteristics of the one or more machine-to-machine devices. The one or more computer processors create a semantic device model, based, at least in part, on the one or more ontological relationships between the one or more machine-to-machine devices and the plurality of characteristics of the one or more machine-to-machine devices. | 08-27-2015 |