Patent application number | Description | Published |
20090252384 | Fingerprint Sensing Circuit Having Programmable Sensing Patterns - A fingerprint sensor with programmable sensing patterns is disclosed in one embodiment of the invention as including a fingerprint sensing circuit having multiple I/O interconnects. The I/O interconnects are configured to sequentially drive a plurality of fingerprint sensing elements. A memory device may be operably coupled to the fingerprint sensing circuit. A programmable data structure, such as a table, file, character string, numeric value, array, or the like may be stored in the memory device to designate a pattern for driving the fingerprint sensing elements. The fingerprint sensing circuit is configured to drive the fingerprint sensing elements according to the designated pattern. In selected embodiments, the fingerprint sensing elements may include transmitting elements, receiving elements, or a combination thereof. | 10-08-2009 |
20090252385 | Apparatus and Method for Reducing Noise In Fingerprint Sensing Circuits - An apparatus for reducing noise in fingerprint sensing circuits is disclosed in one embodiment of the invention as including a fingerprint sensing area onto which a user can apply a fingerprint. An analog front end is coupled to the fingerprint sensing area and is configured to generate an analog response signal. An analog-to-digital converter (ADC) samples the analog response signal and converts the sample to a digital value, which may be received by a digital device such as a processor or CPU. To reduce the amount of the noise that is present in the analog response signal and therefore reflected in the digital value, the digital device may be shut down while the ADC is sampling the analog response signal. | 10-08-2009 |
20090252386 | Apparatus and Method for Reducing Parasitic Capacitive Coupling and Noise in Fingerprint Sensing Circuits - A fingerprint sensing circuit for reducing noise and parasitic capacitive coupling is disclosed in one embodiment of the invention as including a plurality of transmitting elements to sequentially emit a probing signal. A digital ground is provided to ground digital components in the fingerprint sensing circuit. A quiet ground, separate from and quieter than the digital ground, is provided to ground transmitting elements that are not transmitting the probing signal. Similarly, control logic is provided to connect, to the quiet ground, transmitting elements that are not transmitting the probing signal, while disconnecting, from the quiet ground, transmitting elements that are emitting the probing signal. The quiet ground helps to reduce the adverse effects of parasitic capacitive coupling and noise on the inactive transmitting elements. | 10-08-2009 |
20100176823 | Apparatus and Method for Detecting Finger Activity on a Fingerprint Sensor - An apparatus and method for detecting the presence of a finger on a fingerprint sensor is disclosed in one embodiment of the invention as including transmitting a probing signal, comprising a series of probing pulses, to a fingerprint sensing area. A response signal, comprising a series of response pulses, is received from the fingerprint sensing area in response to the probing signal. An upper reference signal is generated and finger activity is detected on the fingerprint sensing area by monitoring whether the peaks of the response pulses exceed the reference signal. | 07-15-2010 |
20100176892 | Ultra Low Power Oscillator - A low power oscillator is disclosed in one embodiment of the invention as including a Schmitt trigger having an input, an output, and an input stage coupled to the input. The input stage may include multiple transistors connected in series between a power source and ground. A switch, controlled by the output of the Schmitt trigger, may be connected in series with the multiple transistors. The switch is configured to interrupt shoot-through current passing through the transistors when the transistors are turned on at the same time. In certain embodiments, the switch may reduce the shoot-through current by substantially half. | 07-15-2010 |
20100177940 | Apparatus and Method for Culling Substantially Redundant Data in Fingerprint Sensing Circuits - An apparatus for culling substantially redundant data in a fingerprint sensing circuit is disclosed in one embodiment of the invention as including an input module, a storage module, a comparator module, and a determination module. The input module may receive sets of data samples from an array of fingerprint sensing elements. The sets of data samples may be stored by the storage module. The comparator module may calculate a difference between each data sample from a first-received set, and a corresponding data sample from a second-received set. The determination module may count the number of difference values that exceed a predetermined difference limit, and identify the second set of data samples as redundant if the number of difference values counted is less than a pre-set count limit. | 07-15-2010 |
20100180136 | Ultra Low Power Wake-On-Event Mode For Biometric Systems - An apparatus for reducing power consumption in fingerprint-sensing circuits is disclosed in one embodiment of the invention as including a fingerprint sensing area onto which a user can apply a fingerprint. An integrated circuit communicates with the fingerprint sensing area and is configured to detect finger activity over the fingerprint sensing area. The integrated circuit includes a primary logic portion configured to assume control of the integrated circuit when finger activity is detected over the fingerprint sensing area. The integrated circuit also includes a secondary logic portion configured to assume control of the integrated circuit and shut off power to the primary logic portion when finger activity is not detected over the fingerprint sensing area. | 07-15-2010 |
20130021044 | Apparatus and Method for Finger Activity on a Fingerprint Sensor - An apparatus and method for detecting the presence of a finger on a fingerprint sensor is disclosed in one embodiment of the invention as including transmitting a probing signal, comprising a series of probing pulses, to a fingerprint sensing area. A response signal, comprising a series of response pulses, is received from the fingerprint sensing area in response to the probing signal. An upper reference signal is generated and finger activity is detected on the fingerprint sensing area by monitoring whether the peaks of the response pulses exceed the reference signal. | 01-24-2013 |
20130258086 | BIOMETRIC OBJECT SENSOR AND METHOD - A biometric image sensor system and method is disclosed which may comprise a first light source having a first wavelength λ | 10-03-2013 |
20130263252 | BUTTON DEPRESS WAKEUP AND WAKEUP STRATEGY - Disclosed is a biometric authentication system. The system comprises a biometric image sensor in an operative position with respect to a mechanical switch on a host electronic device and configured to sense biometric characteristics of a biometric object while the biometric object is operating the mechanical switch, the operating of the mechanical switch providing at least one of input and control to the host electronic device; and wake on event logic cooperating with at least one of the biometric image sensor and the host electronic device and configured to at least delay any response by the biometric image sensor or the host electronic device that increases power consumption by either the biometric image sensor or the host electronic device, beyond that needed for the performance, by at least one of the biometric image sensor and the host electronic device, of a bona fides analysis of an object being sensed while operating the mechanical switch, until a positive completion of the bona fides analysis determines that the object being sensed is an object desired to be sensed to perform a user authentication. | 10-03-2013 |
20140016838 | APPARATUS AND METHOD FOR REDUCING NOISE IN FINGERPRINT SENSING CIRCUITS - An apparatus for reducing noise in fingerprint sensing circuits is disclosed in one embodiment of the invention as including a fingerprint sensing area onto which a user can apply a fingerprint. An analog front end is coupled to the fingerprint sensing area and is configured to generate an analog response signal. An analog-to-digital converter (ADC) samples the analog response signal and converts the sample to a digital value, which may be received by a digital device such as a processor or CPU. To reduce the amount of the noise that is present in the analog response signal and therefore reflected in the digital value, the digital device may be shut down while the ADC is sampling the analog response signal. | 01-16-2014 |
20140093143 | Low Power Navigation Devices, Systems and Methods - A system and method are disclosed for conserving power during navigation, e.g., user device pointer/cursor navigation, using a fingerprint image sensor, that may comprise processing, via a computing device, fingerprint image sensor data indicative of finger position and movement with respect to a fingerprint image sensor surface in a finger navigation mode to determine if the finger is in a first finger navigation mode; processing, via the computing device, fingerprint image sensor data indicative of finger position and movement with respect to a fingerprint image sensor surface in a finger navigation mode to determine if the finger is in a second finger navigation mode; and transitioning, via the computing device, the fingerprint image sensor from a first power consumption mode to a second power consumption mode, based on detecting a transition from the first finger navigation mode to the second finger navigation mode. | 04-03-2014 |
20140198960 | TIERED WAKEUP STRATEGY - A biometric authentication apparatus and method is disclosed which may comprise a biometric authentication unit which may comprise: a biometric object sensor comprising sensor elements and a sensor computing device; a wake-on-event logic controller maintaining the sensor computing device in one of a powered-off or powered down mode, and including a bulk biometric object detector configured to detect a biometric object on or in the vicinity of the sensor elements and to power-on or power-up the sensor computing device responsive to the detection of the biometric object on or in the vicinity of the sensor elements; the sensor computing device configured to analyze one or more lines of biometric object image comprising a partial biometric object image and determine if the partial biometric image belongs to a biometric object desired to be imaged to obtain a complete biometric object image, and to provide a power-on or power-up signal to a host electronic device computing device when the partial biometric image is determined to belong to a biometric object desired to be imaged. | 07-17-2014 |
20140328522 | APPARATUS AND METHOD FOR REDUCING NOISE IN FINGERPRINT SENSING CIRCUITS - An apparatus for reducing noise in fingerprint sensing circuits is disclosed in one embodiment of the invention as including a fingerprint sensing area onto which a user can apply a fingerprint. An analog front end is coupled to the fingerprint sensing area and is configured to generate an analog response signal. An analog-to-digital converter (ADC) samples the analog response signal and converts the sample to a digital value, which may be received by a digital device such as a processor or CPU. To reduce the amount of the noise that is present in the analog response signal and therefore reflected in the digital value, the digital device may be shut down while the ADC is sampling the analog response signal. | 11-06-2014 |
20150030217 | SIGNAL STRENGTH ENHANCEMENT IN A BIOMETRIC SENSOR ARRAY - A biometric imager may comprise a plurality of sensor element traces formed in or on a sensor substrate which may comprise at least a portion of a display screen defining a biometric sensing area and forming in-active pixel locations; an auxiliary active circuit formed in or on the sensor substrate on the periphery of the biometric sensing area and in direct or indirect electrical contact with the sensor element traces; and providing a signal processing interface to a remotely located controller integrated circuit. The sensor element traces may form a portion of one dimensional linear sensor array or pixel locations in a two dimensional grid array capacitive gap biometric imaging sensor. The auxiliary circuit may provide pixel location selection or pixel signal amplification. The auxiliary circuit may be mounted on a surface of the display screen. The auxiliary circuit further comprising a separate pixel location selection controller circuit. | 01-29-2015 |
Patent application number | Description | Published |
20130159221 | Systems for Monitoring Computer Resources - One embodiment of a system of the present invention for monitoring computer resources includes means for retrieving a set of resource-metric records for a predetermined time interval, means for forming a first mathematical matrix containing metric's values arranged on date-time and resource-metric axes, means for creating a second mathematical matrix containing features and a third mathematical matrix containing weights, means for building a feature relationship tree, means for generating a predicted value for the resource-metric identifier, means for determining a variance between predicted value and metric's value, and means for triggering an alert if the variance exceeds a predetermined alert threshold. | 06-20-2013 |
20130159502 | Methods for Monitoring Computer Resources - One embodiment of a method of the present invention for monitoring computer resources provides for retrieving a set of resource-metric records for a predetermined time interval, forming a first mathematical matrix containing metric's values arranged on date-time and resource-metric axes, creating a second mathematical matrix containing features and a third mathematical matrix containing weights, building a feature relationship tree, generating a predicted value for the resource-metric identifier, determining a variance between predicted value and metric's value, and triggering an alert if the variance exceeds a predetermined alert threshold. | 06-20-2013 |
20130311536 | Suspending and Terminating Events in Computer Systems - One embodiment of a method of the present invention provides for obtaining from one or more event generators an event for a hosting account, determining whether a suspended execution condition exists for the event for the hosting account, suspending an execution of the event while the suspended execution condition still exists, and executing the event for the hosting account after the suspended execution condition no longer exists. | 11-21-2013 |
20130311537 | Grouping and Throttling Events in Computer Systems - One embodiment of a method of the present invention provides for obtaining a first event for a first hosting account, a second event for the first hosting account, a third event for a second hosting account, and a fourth event for the second hosting account, executing the first event for the first hosting account and the second event for the first hosting account sequentially in relation to the first event and the second event, and executing the third event for the second hosting account and the fourth event for the second hosting account sequentially in relation to the third event and the fourth event and parallel in relation to the first event and the second event. | 11-21-2013 |
20130311639 | Event Precedence and Exclusivity in Computer Systems - One embodiment of a method of the present invention provides for obtaining from one or more event generators a first event for one or more hosting accounts and a second event for the one or more hosting accounts, determining whether the first event for the one or more hosting accounts requires a first event execution exclusivity, determining whether the second event for the one or more hosting accounts requires a second event execution exclusivity, and executing the first event and the second event sequentially if the first event requires the first event execution exclusivity or the second event requires the second event execution exclusivity, or parallel if the first event does not require the first event execution exclusivity and the second event does not require the second event execution exclusivity. | 11-21-2013 |
20130312012 | Updating and Consolidating Events in Computer Systems - One embodiment of a method of the present invention provides for obtaining from one or more event generators a first event for one or more hosting accounts with a first content and a second event for the one or more hosting accounts with a second content, changing the second content of the second event for the one or more hosting accounts as a function of the first content of the first event for the one or more hosting accounts, and executing the first event and the second event. | 11-21-2013 |
Patent application number | Description | Published |
20120150811 | Flash-copying within asynchronous mirroring environment - A first command is sent from a primary host system to a primary storage controller device, specifying that a first primary volume is to be flash-copied to a second primary volume. Flash-copying provides for completion of copying the first primary volume to the second primary volume to be signaled prior to data on the first primary volume being physically copied to the second primary volume. A first state of the first primary volume and the second primary volume is verified by the primary storage controller device to determine whether the first state permits flash-copying of the first primary volume to the second primary volume. A first query is sent from the primary storage controller device to a secondary host system, requesting whether a first secondary volume can be flash-copied to a second secondary volume. The first and second secondary volumes asynchronously mirror the first and second primary volumes, respectively. | 06-14-2012 |
20120216000 | Flash-copying with asynchronous mirroring environment - A first command is sent from a primary host system to a primary storage controller device, specifying that a first primary volume is to be flash-copied to a second primary volume. Flash-copying provides for completion of copying the first primary volume to the second primary volume to be signaled prior to data on the first primary volume being physically copied to the second primary volume. A first state of the first primary volume and the second primary volume is verified by the primary storage controller device to determine whether the first state permits flash-copying of the first primary volume to the second primary volume. A first query is sent from the primary storage controller device to a secondary host system, requesting whether a first secondary volume can be flash-copied to a second secondary volume. The first and second secondary volumes asynchronously mirror the first and second primary volumes, respectively. | 08-23-2012 |
20120254114 | METHOD AND SYSTEM FOR REPLICATING DATA - Methods, computing environments, and computer program products are provided for replicating data. Point-in-time copy parameters are generated at a primary host site. A side file entry having the point-in-time copy parameters and a track information field (TIF) associated with the point-in-time copy parameters is generated. The side file entry is transferred to a secondary host site. A point-in-time copy process is performed at the secondary host site based on the point-in-time copy parameters and the TIF. | 10-04-2012 |
20120254124 | SYSTEM, METHOD, AND COMPUTER PROGRAM PRODUCT FOR DISASTER RECOVERY USING ASYNCHRONOUS MIRRORING - In one embodiment, a computer program product for handling a point-in-time copy (PITC) command includes a computer readable storage medium having computer readable program code embodied therewith. The computer readable program code is configured to: receive a PITC command at a local site, create a data representation that represents updates to make to the at least one target volume of the local target storage location, wherein the updates correspond to changes made to at least one source volume of the local source storage location since execution of an earlier PITC command, create a source data sidefile entry for the at least one source volume, create a target data sidefile entry for the at least one target volume, execute the PITC command at the local site, and create a PITC sidefile entry for the PITC command, the PITC sidefile entry including a timestamp that indicates when the PITC command was executed. | 10-04-2012 |
20120254566 | PREVENTION OF OVERLAY OF PRODUCTION DATA BY POINT IN TIME COPY OPERATIONS IN A HOST BASED ASYNCHRONOUS MIRRORING ENVIRONMENT - A primary storage controller is configured to communicate with a secondary storage controller via a system data mover. In response to receiving a command to perform a point in time copy of a source volume of the primary storage controller to a target volume of the primary storage controller, a determination is made as to whether the target volume of the primary storage controller is a source for an asynchronous data replication operation, initiated by the system data mover, between the primary storage controller and the secondary storage controller. In response to determining that the target volume of the primary storage controller is the source for the asynchronous data replication operation, initiated by the system data mover, the point in time copy of the source volume of the primary storage controller to the target volume of the primary storage controller is performed. | 10-04-2012 |
20130111026 | SERIALIZATION OF ACCESS TO DATA IN MULTIMAINFRAME COMPUTING ENVIRONMENTS | 05-02-2013 |
20130111557 | ACCESS CONTROL IN A HYBRID ENVIRONMENT | 05-02-2013 |
20130111563 | ACCESS CONTROL IN A HYBRID ENVIRONMENT | 05-02-2013 |
20130166867 | PREVENTION OF OVERLAY OF PRODUCTION DATA BY POINT IN TIME COPY OPERATIONS IN A HOST BASED ASYNCHRONOUS MIRRORING ENVIRONMENT - A primary storage controller is configured to communicate with a secondary storage controller via a system data mover. In response to receiving a command to perform a point in time copy of a source volume of the primary storage controller to a target volume of the primary storage controller, a determination is made as to whether the target volume of the primary storage controller is a source for an asynchronous data replication operation, initiated by the system data mover, between the primary storage controller and the secondary storage controller. In response to determining that the target volume of the primary storage controller is the source for the asynchronous data replication operation, initiated by the system data mover, the point in time copy of the source volume of the primary storage controller to the target volume of the primary storage controller is performed. | 06-27-2013 |
20130246354 | POLICY-BASED MANAGEMENT OF STORAGE FUNCTIONS IN DATA REPLICATION ENVIRONMENTS - A method for managing storage functions in a data replication environment is disclosed. In one embodiment, such a method includes continually monitoring for changes to a storage configuration at a secondary site. Upon detecting changes to the storage configuration at the secondary site, the method transmits remote metadata describing the changes to the primary site and stores the remote metadata at the primary site. The method then initiates a storage management function at the primary site which is mirrored to the secondary site. In order to perform the storage management function, the method reads the remote metadata at the primary site to determine the storage configuration at the secondary site. The method then performs the storage management function at the primary site in a way that takes into account the storage configuration at the secondary site. | 09-19-2013 |
20130246367 | POLICY-BASED MANAGEMENT OF STORAGE FUNCTIONS IN DATA REPLICATION ENVIRONMENTS - A method for managing storage functions in a data replication environment is disclosed. In one embodiment, such a method includes continually monitoring for changes to a storage configuration at a secondary site. Upon detecting changes to the storage configuration at the secondary site, the method transmits remote metadata describing the changes to the primary site and stores the remote metadata at the primary site. The method then initiates a storage management function at the primary site which is mirrored to the secondary site. In order to perform the storage management function, the method reads the remote metadata at the primary site to determine the storage configuration at the secondary site. The method then performs the storage management function at the primary site in a way that takes into account the storage configuration at the secondary site. A corresponding apparatus, system, and computer-readable medium are also disclosed and claimed herein. | 09-19-2013 |
20140351534 | RECOVERY FROM FAILURE OF PRIMARY STORAGE VOLUMES BY USING MIRRORED DATA MAINTAINED WITH HOST TIMESTAMPS - A primary storage controller receives an input/output (I/O) command from a host, wherein a host timestamp is associated with the I/O command. During a mirroring of storage volumes to a secondary storage controller, the primary storage controller communicates the host timestamp associated with the I/O command to the secondary storage controller, wherein mirrored copies of the storage volumes are timestamped based on at least the host timestamp and an elapsed time since a last host I/O command. A recovery is made from a failure of one or more of the storage volumes in the primary storage controller, by using the timestamped mirrored copies of the storage volumes. | 11-27-2014 |
20150113116 | PROBLEM DETERMINATION IN A HYBRID ENVIRONMENT - A multi-mainframe system problem determination method includes recording, in a first computing system, diagnostic data, receiving, in the first computing system, a data collection trigger, responsive to the data collection trigger, coordinating, in the first computing system, synchronized collection of recorded diagnostic data with a second computing system and delivering collected diagnostic data to a storage medium. | 04-23-2015 |
20150113130 | PROBLEM DETERMINATION IN A HYBRID ENVIRONMENT - A multi-mainframe system problem determination method includes receiving, in a first computing system, a data collection trigger, coordinating, in the first computing system, synchronized diagnostic data collection with a second computing system, and delivering the diagnostic data to a storage medium. | 04-23-2015 |
20150156263 | POLICY-BASED MANAGEMENT OF STORAGE FUNCTIONS IN DATA REPLICATION ENVIRONMENTS - A method for managing storage functions in a data replication environment is disclosed. In one embodiment, such a method includes continually monitoring for changes to a storage configuration at a secondary site. Upon detecting changes to the storage configuration at the secondary site, the method transmits remote metadata describing the changes to the primary site and stores the remote metadata at the primary site. The method then initiates a storage management function at the primary site which is mirrored to the secondary site. In order to perform the storage management function, the method reads the remote metadata at the primary site to determine the storage configuration at the secondary site. The method then performs the storage management function at the primary site in a way that takes into account the storage configuration at the secondary site. A corresponding apparatus, system, and computer-readable medium are also disclosed and claimed herein. | 06-04-2015 |
20150229642 | CONTROLLING ACCESS TO STORAGE DEVICES SHARED BY HOST SYSTEMS - To control access to a source storage device shared by a plurality of host systems, methods and systems include confirming a presence of an application on each host system of the plurality of host systems accessing the storage device. After confirming the presence of the application on each host system accessing the storage device, the application is run allowing each host system to access the storage device. A request is received from a new host system to access the storage device. A presence of the application is verified on the new host system. If the presence of the application is verified on the new host system, the new host system is provided with access to the storage device. If the presence of the application is not verified on the new host system, the new host system is denied access to the storage device. | 08-13-2015 |
Patent application number | Description | Published |
20110232106 | Trimmer Head with Drop-Down Reservoir for Ease of Loading - An improved head for a vegetation trimmer has a drop-down line reservoir that remains in cooperation with the head housing when the reservoir is in a load position. The reservoir fits inside the head housing and is biased against the housing for secure use. The reservoir is rotated to unlock it from the housing, whereby it drops down to allow access to the line in the reservoir. A user can add, remove, and manipulate line as desired without the inconvenience of detachable pieces. The reservoir can be pushed back into the housing and locked into place for use. The reservoir can also be placed in an advance position and rotated to advance more line through line openings in the housing as needed. | 09-29-2011 |
20110258861 | Container and Packaging Method for Vegetation Trimmer Line - A substantially toroidal container for coiled vegetation trimmer line has a front shell and a rear shell capable of bonding at the center with heat and pressure, radio frequency, ultrasonic welding, adhesive, or attachment mechanisms. The bonding of the shells leaves a separation between the outer edges of the shells. The separation is nonlinear around the circumference of the container, so that a user can access the trimmer line, but the trimmer line cannot uncoil and spill out of the container. The separation is preferably defined by a series of offset uniform teeth on the outer edges of the shells. One or more teeth may be removed, providing a line aperture through which the end of the trimmer line extends out of the container. Male and female indices on each shell are used to align the teeth during packaging. | 10-27-2011 |
20120285850 | Container and Packaging Method for Vegetation Trimmer Line - A substantially toroidal container for coiled vegetation trimmer line has a front shell and a rear shell capable of bonding at the center with heat and pressure, radio frequency, ultrasonic welding, adhesive, or attachment mechanisms. The bonding of the shells leaves a separation between the outer edges of the shells. The separation is nonlinear around the circumference of the container, so that a user can access the trimmer line, but the trimmer line cannot uncoil and spill out of the container. The separation is preferably defined by a series of offset uniform teeth on the outer edges of the shells. One or more teeth may be removed, providing a line aperture through which the end of the trimmer line extends out of the container. Male and female indices on each shell are used to align the teeth during packaging. | 11-15-2012 |
Patent application number | Description | Published |
20130209962 | SYSTEM AND PROCESS FOR DUPLICATION OF DENTURES - Systems and processes for the duplication of dentures from existing dentures. The interior and exterior of the dentures are scanned and a best fit procedure is used to create a fully digitized denture. The denture teeth are selected from a library that is the closest fit to the original denture teeth. The library teeth are offset a preset distance to compensate for the best fit. The teeth are then subtracted from the digitized denture. The margins of the denture are then cleaned after subtracting the teeth. The denture base is then ready for manufacturing. The teeth are then installed onto the denture base and provided to the patient. | 08-15-2013 |
20130216978 | SYSTEMS AND PROCESS FOR FORMING ANATOMICAL FEATURES IN DENTURES - The system of a preferred embodiment uses a process whereby a true replication of the patient's jaw structure is created in a digital three dimensional model. This true replication is then used to precisely locate and/or copy the anatomical landmarks of the patient for use in fabricating a denture base for use in a denture for the individual patient. This system is able to create a denture with precisely located features corresponding to the anatomical landmarks of the patient with little manual intervention. | 08-22-2013 |
20130218532 | SYSTEM AND PROCESS FOR OPTIMIZATION OF DENTURES - System and processes for optimal selection of teeth for dentures based on the anatomical measurements and bite impressions of the patient. This information is applied in an iterative manner to rules that balance the anatomical and aesthetic considerations to select the best teeth for a patient. The system may also use this information in an iterative manner to rules that balance the anatomical and aesthetic considerations to design the optimal denture base for the patient as well. | 08-22-2013 |
20130249132 | Process and Systems for Molding Thermosetting Plastics - Process and systems for molding or forming products from thermosetting plastics. The system utilizes a deformable container that is placed within the cavity of the housing of the mold with the resins and initiator mixed therein. As a piston slides into the cavity, the upper edges of the container engage between the housing and the piston to seal the housing form leakage. The pressure of the piston along with heat on the housing enable the curing process to be controlled to minimize shrinkage and porosity. | 09-26-2013 |
20130280672 | Combination Tool For Anatomical Measurement for Denture Manufacture - A combination tool for defining and measuring anatomical features of a patient for the fabrication of dentures. The tool includes components for preparing a double arch impression, for determining the vertical spacing of the patient's mouth, for measuring the lip, mid line and smile lines of the patient, and for determining the occlusal plane of the patient. This single tool replaces the need for a multitude of tools typically used in preparing for the fabrication of dentures. | 10-24-2013 |
20150134094 | Systems and Processes for Forming Anatomical Features in Dentures - The system of a preferred embodiment uses a process whereby a true replication of the patient's jaw structure is created in a digital three dimensional model. This true replication is then used to precisely locate and/or copy the anatomical landmarks of the patient for use in fabricating a denture base for use in a denture for the individual patient. This system is able to to create a denture with precisely located features corresponding to the anatomical landmarks of the patient with little manual intervention. | 05-14-2015 |
20150327961 | SYSTEMS AND PROCESSES FOR FORMING ANATOMICAL FEATURES IN DENTURES - The system of a preferred embodiment uses a process whereby a true replication of the patient's jaw structure is created in a digital three dimensional model. This true replication is then used to precisely locate and/or copy the anatomical landmarks of the patient for use in fabricating a denture base for use in a denture for the individual patient. This system is able to create a denture with precisely located features corresponding to the anatomical landmarks of the patient with little manual intervention. | 11-19-2015 |