Unnamed: 0
int64
0
350k
ApplicationNumber
int64
9.75M
96.1M
ArtUnit
int64
1.6k
3.99k
Abstract
stringlengths
7
8.37k
Claims
stringlengths
3
292k
abstract-claims
stringlengths
68
293k
TechCenter
int64
1.6k
3.9k
340,100
16,801,054
1,642
Embodiments are directed towards providing supplemental content to a viewer based on the viewer's environment while the viewer is viewing content. Content is provided to a content receiver for presentation to the viewer. While the viewer is viewing the content, an image of the viewer's environment is captured and analyzed to detect the context of the environment. Supplemental content is selected based on this detected context and presented to the viewer, which allows the supplemental content to be tailored to the viewer. One or more additional images of the viewer's environment are captured while the viewer is viewing the supplemental content and the context of the viewer's environment emotion while the viewer is viewing the supplemental content is detected. This subsequent context is analyzed to determine if the viewer had an expected response to the supplemental content, which can be used to determine the efficiency of the supplemental content.
1. A system, comprising: one or more processors; and a memory device storing computer instructions that, when executed by the one or more processors, cause the one or more processors to: present first content to a viewer; analyze at least one image of an environment associated with the viewer during presentation of the first content to the viewer; and present second content to the viewer based on the analysis of the at least one image. 2. The system of claim 1, wherein the memory device stores further computer instructions that, when executed by the one or more processors, cause the one or more processors to: analyze at least one other image of the environment relative to presentation of the second content to the viewer to detect a change in the environment in response to the second content being presented to the viewer; and store an indication of whether the change in the viewer's environment is a positive or negative change. 3. The system of claim 2, wherein the memory device stores further computer instructions that, when executed by the one or more processors, cause the one or more processors to: provide an update to a third party with the indication of whether the change in the viewer's environment is positive or negative. 4. The system of claim 2, wherein the memory device stores further computer instructions that, when executed by the one or more processors, cause the one or more processors to: determine context information associated with the environment based on the analysis of the at least one other image; and store a relationship between the second content and context information. 5. The system of claim 2, wherein the memory device stores further computer instructions that, when executed by the one or more processors, cause the one or more processors to: determine that the change in the viewer's environment is a positive or negative change based on the viewer reacting to the second content with an expected response. 6. The system of claim 2, wherein the memory device stores further computer instructions that, when executed by the one or more processors, cause the one or more processors to: determine that the change in the viewer's environment is a positive or negative change based on an action taken by the viewer in response to viewing the second content. 7. The system of claim 1, further comprising: a database that stores a plurality of relationships between content and environment information; and wherein the memory device stores further computer instructions that, when executed by the one or more processors, cause the one or more processors to: select the second content from the plurality of content based on the relationships stored in the database and the environment associated with the viewer. 8. The system of claim 1, wherein the environment associated with the viewer is an area surrounding the viewer within a viewable portion of the at least one image. 9. The system of claim 1, wherein the memory device stores further computer instructions that, when executed by the one or more processors, cause the one or more processors to: compare the at least one image with at least one other image to identify a product in the at least one other image that was not in the at least one image; determine if the product is associated with the second content; and in response to the product being in the at least one other image and associated with the second content, indicate a positive change in the viewer's environment. 10. The system of claim 1, wherein the memory device stores further computer instructions that, when executed by the one or more processors, cause the one or more processors to: compare the at least one image with at least one other image to identify movement of a product within the environment; determine if the product movement is associated with an expected response to the second content; and in response to the product movement being associated with the expected response, indicate a positive change in the viewer's environment. 11. A computing device, comprising: a memory device that stores computer instructions; and one or more processors that execute the computer instructions to: provide first content to a content receiver for presentation to a viewer; analyze at least one image of an environment surrounding the viewer taken with respect to the presentation of the content to the viewer; and provide second content to the content receiver for presentation to the viewer based on the analysis of the at least one image. 12. The computing device of claim 11, wherein the memory device further stores a plurality of relationships between a plurality of second content and a plurality of contextual information, and wherein the one or more processors further executes the computer instructions to: determine contextual information associated with the environment based on the analysis of the at least one image; and select the second content from the plurality of second content based on the plurality of relationships and the contextual information associated with the environment. 13. The computing device of claim 11, wherein the one or more processors further executes the computer instructions to: analyze at least one other image of the environment taken with respect to the presentation of the second content to the viewer; determine a change in the environment based on the analysis of the at least one other image; and provide an indication of the change to a third party. 14. The computing device of claim 13, wherein the one or more processors determines the change in the environment by further executing the computer instructions to: determine whether the change in the viewer's environment is a positive or negative change. 15. The computing device of claim 13, wherein the one or more processors determines the change in the environment by further executing the computer instructions to: determine whether the change in the environment is an expected response by the viewer to the second content. 16. The computing device of claim 13, wherein the determination of the change in the environment is based on an action taken by the viewer in response to viewing the second content. 17. The computing device of claim 11, wherein the one or more processors further executes the computer instructions to: compare the at least one image with at least one other image of the environment with respect to the presentation of the second content to the viewer to identify a product in the at least one other image that was not in the at least one image; determine if the product is associated with the second content; and in response to the product being in the at least one other image and associated with the second content, generate an indication of a positive change in the viewer's environment. 18. The computing device of claim 11, wherein the one or more processors further executes the computer instructions to: compare the at least one image with at least one other image of the environment with respect to the presentation of the second content to the viewer to identify movement of a product within the environment; determine if the product movement is associated with an expected response to the second content; and in response to the product movement being associated with an expected response, generate an indication of a positive change in the viewer's environment. 19. A method, comprising: presenting first content to a user; analyzing at least one image of the user's environment during presentation of the first content to the user; and present second content to the user based on the analysis of the at least one image. 20. The method of claim 19, further comprising: analyzing at least one other image of the user's environment during presentation of the second content to the user; and determine whether a change in the user's environment is a positive or negative change based on a comparison between the analysis of the at least one image and the analysis of the at least one other image.
Embodiments are directed towards providing supplemental content to a viewer based on the viewer's environment while the viewer is viewing content. Content is provided to a content receiver for presentation to the viewer. While the viewer is viewing the content, an image of the viewer's environment is captured and analyzed to detect the context of the environment. Supplemental content is selected based on this detected context and presented to the viewer, which allows the supplemental content to be tailored to the viewer. One or more additional images of the viewer's environment are captured while the viewer is viewing the supplemental content and the context of the viewer's environment emotion while the viewer is viewing the supplemental content is detected. This subsequent context is analyzed to determine if the viewer had an expected response to the supplemental content, which can be used to determine the efficiency of the supplemental content.1. A system, comprising: one or more processors; and a memory device storing computer instructions that, when executed by the one or more processors, cause the one or more processors to: present first content to a viewer; analyze at least one image of an environment associated with the viewer during presentation of the first content to the viewer; and present second content to the viewer based on the analysis of the at least one image. 2. The system of claim 1, wherein the memory device stores further computer instructions that, when executed by the one or more processors, cause the one or more processors to: analyze at least one other image of the environment relative to presentation of the second content to the viewer to detect a change in the environment in response to the second content being presented to the viewer; and store an indication of whether the change in the viewer's environment is a positive or negative change. 3. The system of claim 2, wherein the memory device stores further computer instructions that, when executed by the one or more processors, cause the one or more processors to: provide an update to a third party with the indication of whether the change in the viewer's environment is positive or negative. 4. The system of claim 2, wherein the memory device stores further computer instructions that, when executed by the one or more processors, cause the one or more processors to: determine context information associated with the environment based on the analysis of the at least one other image; and store a relationship between the second content and context information. 5. The system of claim 2, wherein the memory device stores further computer instructions that, when executed by the one or more processors, cause the one or more processors to: determine that the change in the viewer's environment is a positive or negative change based on the viewer reacting to the second content with an expected response. 6. The system of claim 2, wherein the memory device stores further computer instructions that, when executed by the one or more processors, cause the one or more processors to: determine that the change in the viewer's environment is a positive or negative change based on an action taken by the viewer in response to viewing the second content. 7. The system of claim 1, further comprising: a database that stores a plurality of relationships between content and environment information; and wherein the memory device stores further computer instructions that, when executed by the one or more processors, cause the one or more processors to: select the second content from the plurality of content based on the relationships stored in the database and the environment associated with the viewer. 8. The system of claim 1, wherein the environment associated with the viewer is an area surrounding the viewer within a viewable portion of the at least one image. 9. The system of claim 1, wherein the memory device stores further computer instructions that, when executed by the one or more processors, cause the one or more processors to: compare the at least one image with at least one other image to identify a product in the at least one other image that was not in the at least one image; determine if the product is associated with the second content; and in response to the product being in the at least one other image and associated with the second content, indicate a positive change in the viewer's environment. 10. The system of claim 1, wherein the memory device stores further computer instructions that, when executed by the one or more processors, cause the one or more processors to: compare the at least one image with at least one other image to identify movement of a product within the environment; determine if the product movement is associated with an expected response to the second content; and in response to the product movement being associated with the expected response, indicate a positive change in the viewer's environment. 11. A computing device, comprising: a memory device that stores computer instructions; and one or more processors that execute the computer instructions to: provide first content to a content receiver for presentation to a viewer; analyze at least one image of an environment surrounding the viewer taken with respect to the presentation of the content to the viewer; and provide second content to the content receiver for presentation to the viewer based on the analysis of the at least one image. 12. The computing device of claim 11, wherein the memory device further stores a plurality of relationships between a plurality of second content and a plurality of contextual information, and wherein the one or more processors further executes the computer instructions to: determine contextual information associated with the environment based on the analysis of the at least one image; and select the second content from the plurality of second content based on the plurality of relationships and the contextual information associated with the environment. 13. The computing device of claim 11, wherein the one or more processors further executes the computer instructions to: analyze at least one other image of the environment taken with respect to the presentation of the second content to the viewer; determine a change in the environment based on the analysis of the at least one other image; and provide an indication of the change to a third party. 14. The computing device of claim 13, wherein the one or more processors determines the change in the environment by further executing the computer instructions to: determine whether the change in the viewer's environment is a positive or negative change. 15. The computing device of claim 13, wherein the one or more processors determines the change in the environment by further executing the computer instructions to: determine whether the change in the environment is an expected response by the viewer to the second content. 16. The computing device of claim 13, wherein the determination of the change in the environment is based on an action taken by the viewer in response to viewing the second content. 17. The computing device of claim 11, wherein the one or more processors further executes the computer instructions to: compare the at least one image with at least one other image of the environment with respect to the presentation of the second content to the viewer to identify a product in the at least one other image that was not in the at least one image; determine if the product is associated with the second content; and in response to the product being in the at least one other image and associated with the second content, generate an indication of a positive change in the viewer's environment. 18. The computing device of claim 11, wherein the one or more processors further executes the computer instructions to: compare the at least one image with at least one other image of the environment with respect to the presentation of the second content to the viewer to identify movement of a product within the environment; determine if the product movement is associated with an expected response to the second content; and in response to the product movement being associated with an expected response, generate an indication of a positive change in the viewer's environment. 19. A method, comprising: presenting first content to a user; analyzing at least one image of the user's environment during presentation of the first content to the user; and present second content to the user based on the analysis of the at least one image. 20. The method of claim 19, further comprising: analyzing at least one other image of the user's environment during presentation of the second content to the user; and determine whether a change in the user's environment is a positive or negative change based on a comparison between the analysis of the at least one image and the analysis of the at least one other image.
1,600
340,101
16,801,088
1,642
A radially expandable trocar, port or cannula system is provided for use in minimally invasive surgeries. The cannula creates a port access with an initial small internal diameter. The passage of the cannula devices is defined by a plurality of elongate rigid members. A number of mechanisms are provided for expanding the passage of the cannula devices, by moving the plurality of elongate rigid members towards a larger radial location, thereby creating a larger internal diameter for the port. The elongate rigid members can be prevented from unintended movement when the system is at the un-expanded state, during expansion and when it is expanded to the desired larger diameter. Exemplary embodiments include methods of preventing gas loss from the tissue that would occur through the gaps created during expansion.
1. A cannula device, comprising: a first housing defining a first throughbore aligned along a central axis; a second housing defining a second throughbore aligned with the first throughbore along the central axis, the second housing moveable in an axial direction along the central axis with respect to the first housing; a plurality of elongate rigid members cooperatively defining a passage axially aligned with the first throughbore along the central axis between proximal ends and distal tips of the elongate rigid members; wherein the proximal ends of the elongate rigid members and the first housing comprise first tracks including inter-engaging first tongues and first guides oriented diagonally relative to the central axis, and the second housing and the elongate rigid members comprise second tracks including second tongues and second guides such that axial movement of the second housing with respect to the first housing along the central axis causes the plurality of elongate rigid members to move outwardly and diagonally with respect to the central axis to move away from each other and increase a size of the passage. 2. The cannula device of claim 1, wherein each of the elongate rigid members includes a first tongue that slides in a corresponding first guide in the first housing. 3. The cannula device of claim 1, wherein the second tracks are oriented radially relative to the central axis. 4. The cannula device of claim 3, wherein each of the elongate rigid members includes a second tongue that slides in a corresponding second guide in the second housing. 5. The cannula device of claim 4, wherein the second tongue is located distal to the first tongue on each of the elongate rigid members. 6. The cannula device of claim 1, wherein the first housing is at least partially received in the second throughbore of the second housing. 7. The cannula device of claim 1, wherein each of the rigid members comprises a distal tip that is tapered to facilitate insertion. 8. The cannula device of claim 1, wherein the second housing is configured to at least partially surround the first housing. 9. The cannula device of claim 1, further comprising a centering mechanism for axially aligning the first throughbore and the second throughbore. 10. The cannula device of claim 9, wherein the centering mechanism comprises a plurality of concentricity features on the second housing and a plurality of complimentary concentricity features on the first housing. 11. The cannula device of claim 10, wherein the concentricity features comprise a plurality of pins and the complimentary concentricity features comprise a plurality of receptacles for receiving the plurality of pins. 12. The cannula device of claim 1, further comprising a check-valve within the inner side of the first housing configured to bleed gas and keep the insufflated region at a particular range of acceptable pressure, or to prevent backflow of injected fluid. 13. The cannula device of claim 1, further comprising an obturator configured to be inserted into the first housing throughbore, all the way through the unexpanded passage such that the obturator tip is exposed prior to inserting the cannula device into tissue. 14. A cannula device, comprising: a first housing defining a first throughbore aligned along a central axis; a second housing defining a second throughbore aligned with the first throughbore along the central axis, the second housing moveable in an axial direction along the central axis with respect to the first housing; and a plurality of elongate rigid members cooperatively defining a passage axially aligned with the first throughbore along the central axis between proximal ends and distal tips of the elongate rigid members, wherein the proximal ends of the elongate rigid members and the first housing comprise first tracks including inter-engaging first tongues and first guides oriented diagonally relative to the central axis, and the second housing and the elongate rigid members comprise second tracks including second tongues and second guides oriented radially relative to the central axis such that axial movement of the second housing relative to the first housing along the central axis causes the first tongues to slide diagonally along the first guides and the second tongues to slide radially along the second guides to move the proximal ends of the elongate rigid members away from each other and increase a size of the passage. 15. A method for performing a medical procedure within a subject's body, comprising: providing a cannula device including a first housing defining a first throughbore aligned along a central axis, a second housing defining a second throughbore aligned with the first throughbore, and a plurality elongate rigid members extending from the first and second housings that cooperatively defining a passage axially aligned with a first throughbore; inserting distal tips of the elongate rigid members through tissue into the subject's body; expanding the cannula by moving the second housing relative to the first housing along the central axis, thereby causing proximal ends of the elongate rigid members to move outwardly and diagonally with respect to the central axis to move the elongate rigid members away from each other and increase a size of the passage; and introducing one or more instruments through the passage to perform the medical procedure within the subject's body. 16. The method of claim 15, wherein moving the second housing relative to the first housing causes first tongues of the elongate rigid members to slide diagonally along first guides of the first housing and second tongues of the elongate rigid members to slide radially along second guides of the second housing to move the proximal ends of the elongate rigid members away from each other and increase the size of the passage. 17. The method of claim 15, wherein the cannula is expanded to open the passage to a diameter between 3 mm and 12 mm. 18. The method of claim 15, wherein the inserting distal tips of the elongate rigid members through tissue into the subject's body creates an entry hole through tissue into the subject's body. 19. The method of claim 15, further comprising, before inserting the distal tips of the elongate members through tissue, inserting an obturator through the passage such an obturator tip is exposed, and wherein the obturator tip is used to penetrate the tissue to create an entry hole into the subject's body. 20. The method of claim 19, further comprising removing the obturator from the cannula device before expanding the cannula device. 21-44. (canceled)
A radially expandable trocar, port or cannula system is provided for use in minimally invasive surgeries. The cannula creates a port access with an initial small internal diameter. The passage of the cannula devices is defined by a plurality of elongate rigid members. A number of mechanisms are provided for expanding the passage of the cannula devices, by moving the plurality of elongate rigid members towards a larger radial location, thereby creating a larger internal diameter for the port. The elongate rigid members can be prevented from unintended movement when the system is at the un-expanded state, during expansion and when it is expanded to the desired larger diameter. Exemplary embodiments include methods of preventing gas loss from the tissue that would occur through the gaps created during expansion.1. A cannula device, comprising: a first housing defining a first throughbore aligned along a central axis; a second housing defining a second throughbore aligned with the first throughbore along the central axis, the second housing moveable in an axial direction along the central axis with respect to the first housing; a plurality of elongate rigid members cooperatively defining a passage axially aligned with the first throughbore along the central axis between proximal ends and distal tips of the elongate rigid members; wherein the proximal ends of the elongate rigid members and the first housing comprise first tracks including inter-engaging first tongues and first guides oriented diagonally relative to the central axis, and the second housing and the elongate rigid members comprise second tracks including second tongues and second guides such that axial movement of the second housing with respect to the first housing along the central axis causes the plurality of elongate rigid members to move outwardly and diagonally with respect to the central axis to move away from each other and increase a size of the passage. 2. The cannula device of claim 1, wherein each of the elongate rigid members includes a first tongue that slides in a corresponding first guide in the first housing. 3. The cannula device of claim 1, wherein the second tracks are oriented radially relative to the central axis. 4. The cannula device of claim 3, wherein each of the elongate rigid members includes a second tongue that slides in a corresponding second guide in the second housing. 5. The cannula device of claim 4, wherein the second tongue is located distal to the first tongue on each of the elongate rigid members. 6. The cannula device of claim 1, wherein the first housing is at least partially received in the second throughbore of the second housing. 7. The cannula device of claim 1, wherein each of the rigid members comprises a distal tip that is tapered to facilitate insertion. 8. The cannula device of claim 1, wherein the second housing is configured to at least partially surround the first housing. 9. The cannula device of claim 1, further comprising a centering mechanism for axially aligning the first throughbore and the second throughbore. 10. The cannula device of claim 9, wherein the centering mechanism comprises a plurality of concentricity features on the second housing and a plurality of complimentary concentricity features on the first housing. 11. The cannula device of claim 10, wherein the concentricity features comprise a plurality of pins and the complimentary concentricity features comprise a plurality of receptacles for receiving the plurality of pins. 12. The cannula device of claim 1, further comprising a check-valve within the inner side of the first housing configured to bleed gas and keep the insufflated region at a particular range of acceptable pressure, or to prevent backflow of injected fluid. 13. The cannula device of claim 1, further comprising an obturator configured to be inserted into the first housing throughbore, all the way through the unexpanded passage such that the obturator tip is exposed prior to inserting the cannula device into tissue. 14. A cannula device, comprising: a first housing defining a first throughbore aligned along a central axis; a second housing defining a second throughbore aligned with the first throughbore along the central axis, the second housing moveable in an axial direction along the central axis with respect to the first housing; and a plurality of elongate rigid members cooperatively defining a passage axially aligned with the first throughbore along the central axis between proximal ends and distal tips of the elongate rigid members, wherein the proximal ends of the elongate rigid members and the first housing comprise first tracks including inter-engaging first tongues and first guides oriented diagonally relative to the central axis, and the second housing and the elongate rigid members comprise second tracks including second tongues and second guides oriented radially relative to the central axis such that axial movement of the second housing relative to the first housing along the central axis causes the first tongues to slide diagonally along the first guides and the second tongues to slide radially along the second guides to move the proximal ends of the elongate rigid members away from each other and increase a size of the passage. 15. A method for performing a medical procedure within a subject's body, comprising: providing a cannula device including a first housing defining a first throughbore aligned along a central axis, a second housing defining a second throughbore aligned with the first throughbore, and a plurality elongate rigid members extending from the first and second housings that cooperatively defining a passage axially aligned with a first throughbore; inserting distal tips of the elongate rigid members through tissue into the subject's body; expanding the cannula by moving the second housing relative to the first housing along the central axis, thereby causing proximal ends of the elongate rigid members to move outwardly and diagonally with respect to the central axis to move the elongate rigid members away from each other and increase a size of the passage; and introducing one or more instruments through the passage to perform the medical procedure within the subject's body. 16. The method of claim 15, wherein moving the second housing relative to the first housing causes first tongues of the elongate rigid members to slide diagonally along first guides of the first housing and second tongues of the elongate rigid members to slide radially along second guides of the second housing to move the proximal ends of the elongate rigid members away from each other and increase the size of the passage. 17. The method of claim 15, wherein the cannula is expanded to open the passage to a diameter between 3 mm and 12 mm. 18. The method of claim 15, wherein the inserting distal tips of the elongate rigid members through tissue into the subject's body creates an entry hole through tissue into the subject's body. 19. The method of claim 15, further comprising, before inserting the distal tips of the elongate members through tissue, inserting an obturator through the passage such an obturator tip is exposed, and wherein the obturator tip is used to penetrate the tissue to create an entry hole into the subject's body. 20. The method of claim 19, further comprising removing the obturator from the cannula device before expanding the cannula device. 21-44. (canceled)
1,600
340,102
16,801,061
1,642
A semiconductor device package includes a metal carrier, a passive device, a conductive adhesive material, a dielectric layer and a conductive via. The metal carrier has a first conductive pad and a second conductive pad spaced apart from the first conductive pad. The first conductive pad and the second conductive pad define a space therebetween. The passive device is disposed on top surfaces of first conductive pad and the second conductive pad. The conductive adhesive material electrically connects a first conductive contact and a second conductive contact of the passive device to the first conductive pad and the second conductive pad respectively. The dielectric layer covers the metal carrier and the passive device and exposes a bottom surface of the first conductive pad and the second conductive pad. The conductive via extends within the dielectric layer and is electrically connected to the first conductive pad and/or the second conductive pad.
1-23. (canceled) 24. A semiconductor device package comprising: a metal carrier having a first conductive pad and a second conductive pad, each of the first conductive pad and the second conductive pad having a top surface and a bottom surface; a passive device disposed on the top surfaces of the first conductive pad and the second conductive pad, the passive device having a first conductive contact and a second conductive contact; a conductive adhesive material electrically connecting the first conductive contact and the second conductive contact of the passive device to the first conductive pad and the second conductive pad respectively; a dielectric layer covering the metal carrier and the passive device; and a conductive via extending within the dielectric layer and electrically connected to at least one of the first conductive pad and the second conductive pad; wherein the dielectric layer completely covers a top surface of the passive device. 25. The semiconductor device package of claim 24, wherein the first conductive contact and the second conductive contact of the passive device include tin or its alloy. 26. The semiconductor device package of claim 24, wherein the metal carrier includes a cavity to expose the first conductive pad and the second conductive pad, and the passive device is disposed within the cavity. 27. The semiconductor device package of claim 24, wherein the first conductive pad having a first lateral surface between the top surface and the bottom surface; the second conductive pad having a second lateral surface between the top surface and the bottom surface; and each of the first lateral surface and the second lateral surface includes a curved surface. 28. The semiconductor device package of claim 27, wherein the first conductive pad and the second conductive pad define a space therebetween. 29. The semiconductor device package of claim 28, wherein the space is between the first lateral surface and the second lateral surface. 30. The semiconductor device package of claim 27, wherein each of the first lateral surface and the second lateral surface includes a first curved surface and a second curved surface connected to each other. 31. The semiconductor device package of claim 30, wherein the first curved surface of the first lateral surface and the first curved surface of the second lateral surface define a first space in which the dielectric layer is disposed; and the second curved surface of the first lateral surface and the second curved surface of the second lateral surface define a second space exposed from the dielectric layer. 32. A semiconductor device package comprising: a metal carrier having a first conductive pad and a second conductive pad, each of the first conductive pad and the second conductive pad having a top surface and a bottom surface a passive device disposed on the top surfaces of the first conductive pad and the second conductive pad, the passive device having a first conductive contact and a second conductive contact; a conductive adhesive material electrically connecting the first conductive contact and the second conductive contact of the passive device to the first conductive pad and the second conductive pad respectively; a dielectric layer covering the metal carrier and the passive device; and one or more conductive vias extending within the dielectric layer; wherein the first conductive contact and the second conductive contact are physically spaced apart from any of the conductive vias. 33. The semiconductor device package of claim 32, wherein the first conductive contact and the second conductive contact of the passive device include tin or its alloy. 34. The semiconductor device package of claim 32, wherein the metal carrier includes a cavity to expose the first conductive pad and the second conductive pad, and the passive device is disposed within the cavity. 35. The semiconductor device package of claim 32, wherein the first conductive pad having a first lateral surface between the top surface and the bottom surface; the second conductive pad having a second lateral surface between the top surface and the bottom surface; and each of the first lateral surface and the second lateral surface includes a curved surface. 36. The semiconductor device package of claim 35, wherein the first conductive pad and the second conductive pad define a space therebetween. 37. The semiconductor device package of claim 36, wherein the space is between the first lateral surface and the second lateral surface. 38. The semiconductor device package of claim 35, wherein each of the first lateral surface and the second lateral surface includes a first curved surface and a second curved surface connected to each other. 39. The semiconductor device package of claim 38, wherein the first curved surface of the first lateral surface and the first curved surface of the second lateral surface define a first space in which the dielectric layer is disposed; and the second curved surface of the first lateral surface and the second curved surface of the second lateral surface define a second space exposed from the dielectric layer. 40. A semiconductor device package comprising: a metal carrier having a first conductive pad and a second conductive pad, wherein the metal carrier includes a cavity; a passive device disposed within the cavity and on the first conductive pad and the second conductive pad; and a dielectric layer covering the metal carrier and the passive device. 41. The semiconductor device package of claim 40, wherein the metal carrier has a first sidewall on the first conductive pad and a second sidewall on the second conductive pad; wherein the first sidewall, the second sidewall, the first conductive pad, and the second conductive pad define the cavity; and wherein the semiconductor device package further comprises conductive vias extending within the dielectric layer and electrically connected to the first sidewall and the second sidewall. 42. The semiconductor device package of claim 40, wherein the passive device is partially disposed within the cavity. 43. The semiconductor device package of claim 40, wherein the dielectric layer completely covers a top surface of the passive device.
A semiconductor device package includes a metal carrier, a passive device, a conductive adhesive material, a dielectric layer and a conductive via. The metal carrier has a first conductive pad and a second conductive pad spaced apart from the first conductive pad. The first conductive pad and the second conductive pad define a space therebetween. The passive device is disposed on top surfaces of first conductive pad and the second conductive pad. The conductive adhesive material electrically connects a first conductive contact and a second conductive contact of the passive device to the first conductive pad and the second conductive pad respectively. The dielectric layer covers the metal carrier and the passive device and exposes a bottom surface of the first conductive pad and the second conductive pad. The conductive via extends within the dielectric layer and is electrically connected to the first conductive pad and/or the second conductive pad.1-23. (canceled) 24. A semiconductor device package comprising: a metal carrier having a first conductive pad and a second conductive pad, each of the first conductive pad and the second conductive pad having a top surface and a bottom surface; a passive device disposed on the top surfaces of the first conductive pad and the second conductive pad, the passive device having a first conductive contact and a second conductive contact; a conductive adhesive material electrically connecting the first conductive contact and the second conductive contact of the passive device to the first conductive pad and the second conductive pad respectively; a dielectric layer covering the metal carrier and the passive device; and a conductive via extending within the dielectric layer and electrically connected to at least one of the first conductive pad and the second conductive pad; wherein the dielectric layer completely covers a top surface of the passive device. 25. The semiconductor device package of claim 24, wherein the first conductive contact and the second conductive contact of the passive device include tin or its alloy. 26. The semiconductor device package of claim 24, wherein the metal carrier includes a cavity to expose the first conductive pad and the second conductive pad, and the passive device is disposed within the cavity. 27. The semiconductor device package of claim 24, wherein the first conductive pad having a first lateral surface between the top surface and the bottom surface; the second conductive pad having a second lateral surface between the top surface and the bottom surface; and each of the first lateral surface and the second lateral surface includes a curved surface. 28. The semiconductor device package of claim 27, wherein the first conductive pad and the second conductive pad define a space therebetween. 29. The semiconductor device package of claim 28, wherein the space is between the first lateral surface and the second lateral surface. 30. The semiconductor device package of claim 27, wherein each of the first lateral surface and the second lateral surface includes a first curved surface and a second curved surface connected to each other. 31. The semiconductor device package of claim 30, wherein the first curved surface of the first lateral surface and the first curved surface of the second lateral surface define a first space in which the dielectric layer is disposed; and the second curved surface of the first lateral surface and the second curved surface of the second lateral surface define a second space exposed from the dielectric layer. 32. A semiconductor device package comprising: a metal carrier having a first conductive pad and a second conductive pad, each of the first conductive pad and the second conductive pad having a top surface and a bottom surface a passive device disposed on the top surfaces of the first conductive pad and the second conductive pad, the passive device having a first conductive contact and a second conductive contact; a conductive adhesive material electrically connecting the first conductive contact and the second conductive contact of the passive device to the first conductive pad and the second conductive pad respectively; a dielectric layer covering the metal carrier and the passive device; and one or more conductive vias extending within the dielectric layer; wherein the first conductive contact and the second conductive contact are physically spaced apart from any of the conductive vias. 33. The semiconductor device package of claim 32, wherein the first conductive contact and the second conductive contact of the passive device include tin or its alloy. 34. The semiconductor device package of claim 32, wherein the metal carrier includes a cavity to expose the first conductive pad and the second conductive pad, and the passive device is disposed within the cavity. 35. The semiconductor device package of claim 32, wherein the first conductive pad having a first lateral surface between the top surface and the bottom surface; the second conductive pad having a second lateral surface between the top surface and the bottom surface; and each of the first lateral surface and the second lateral surface includes a curved surface. 36. The semiconductor device package of claim 35, wherein the first conductive pad and the second conductive pad define a space therebetween. 37. The semiconductor device package of claim 36, wherein the space is between the first lateral surface and the second lateral surface. 38. The semiconductor device package of claim 35, wherein each of the first lateral surface and the second lateral surface includes a first curved surface and a second curved surface connected to each other. 39. The semiconductor device package of claim 38, wherein the first curved surface of the first lateral surface and the first curved surface of the second lateral surface define a first space in which the dielectric layer is disposed; and the second curved surface of the first lateral surface and the second curved surface of the second lateral surface define a second space exposed from the dielectric layer. 40. A semiconductor device package comprising: a metal carrier having a first conductive pad and a second conductive pad, wherein the metal carrier includes a cavity; a passive device disposed within the cavity and on the first conductive pad and the second conductive pad; and a dielectric layer covering the metal carrier and the passive device. 41. The semiconductor device package of claim 40, wherein the metal carrier has a first sidewall on the first conductive pad and a second sidewall on the second conductive pad; wherein the first sidewall, the second sidewall, the first conductive pad, and the second conductive pad define the cavity; and wherein the semiconductor device package further comprises conductive vias extending within the dielectric layer and electrically connected to the first sidewall and the second sidewall. 42. The semiconductor device package of claim 40, wherein the passive device is partially disposed within the cavity. 43. The semiconductor device package of claim 40, wherein the dielectric layer completely covers a top surface of the passive device.
1,600
340,103
16,801,082
2,163
A system for transfer learning and domain adaptation using distributable data models is provided, comprising a network-connected distributable model configured to serve instances of a plurality of distributable models; and a directed computation graph module configured to receive at least an instance of at least one of the distributable models from the network-connected computing system, create a second dataset from machine learning performed by a transfer engine, train the instance of the distributable model with the second dataset, and generate an update report based at least in part by updates to the instance of the distributable model.
1. A system for transfer learning and domain adaptation using distributable data models, comprising: a distributable model source comprising a first plurality of programming instructions stored in a memory of, and operable on a processor of, a computing device, wherein the first plurality of programming instructions, when operating on the processor, cause the computing device to: retrieve a distributable model; instantiate a distributable model instance of the distributable model; transfer the distributable model instance to an electronic device; receive a report from the electronic device, the report comprising updates to the distributable model instance made by the electronic device while training the distributable model instance on the electronic device; and update the distributable model based on the report. 2. The system of claim 1, wherein the distributable model source further: instantiates a plurality of distributable model instances; transfers each distributable model instance to one of a plurality of electronic devices; receives reports from the plurality of electronic devices; and updates the distributable model based on the reports received. 3. The system of claim 1, further comprising a transfer engine comprising a second plurality of programming instructions stored in the memory of, and operable on the processor of, the computing device, wherein the second plurality of programming instructions, when operating on the processor, cause the computing device to: receive a distributable model instance from the distributable model source and information about a desired adaptation of the distributable model instance; apply one or more machine learning algorithms to the distributable model instance to adapt it to the environment or purpose; and return the adapted distributable model instance to the distributable model source. 4. The system of claim 3, wherein the desired adaptation is adaptation to the computing environment of a type of electronic device. 5. The system of claim 3, wherein the desired adaptation is adaptation of the distributable model instance for a particular purpose or use. 6. The system of claim 3, wherein the desired adaptation is changing the domain of the distributable model instance. 7. The system of claim 3, further comprising a distributed computational graph engine comprising a third plurality of programming instructions stored in the memory of, and operable on the processor of, the computing device, wherein the third plurality of programming instructions, when operating on the processor, cause the computing device to: receive the distributable model from the distributable model source; receive one or more reports from distributable model instances which have been trained on one or more electronic devices; create a bias-specific distributable model from the distributable model based on biases contained in the one or more reports; and return the bias-specific distributable model to the distributable model source; and wherein the distributable model source incorporates the bias-specific distributable model as a subset of the distributable model. 8. A method for transfer learning and domain adaptation using distributable data models, comprising the steps of: retrieving a distributable model; instantiating a distributable model instance of the distributable model; transferring the distributable model instance to an electronic device; receiving a report from the electronic device, the report comprising updates to the distributable model instance made by the electronic device while training the distributable model instance on the electronic device; and updating the distributable model based on the report. 9. The method of claim 8, further comprising the steps of: instantiating a plurality of distributable model instances; transferring each distributable model instance to one of a plurality of electronic devices; receiving reports from the plurality of electronic devices; and updating the distributable model based on the reports received. 10. The method of claim 1, further comprising the steps of: receiving a distributable model instance from the distributable model source and information about a desired adaptation of the distributable model instance; applying one or more machine learning algorithms to the distributable model instance to adapt it to the environment or purpose; and returning the adapted distributable model instance to the distributable model source. 11. The method of claim 10, wherein the desired adaptation is adaptation to the computing environment of a type of electronic device. 12. The method of claim 10, wherein the desired adaptation is adaptation of the distributable model instance for a particular purpose or use. 13. The method of claim 10, wherein the desired adaptation is changing the domain of the distributable model instance. 14. The method of claim 10, further comprising the steps of: receiving the distributable model from the distributable model source; receiving one or more reports from distributable model instances which have been trained on one or more electronic devices; creating a bias-specific distributable model from the distributable model based on biases contained in the one or more reports; and returning the bias-specific distributable model to the distributable model source; and wherein the distributable model source incorporates the bias-specific distributable model as a subset of the distributable model.
A system for transfer learning and domain adaptation using distributable data models is provided, comprising a network-connected distributable model configured to serve instances of a plurality of distributable models; and a directed computation graph module configured to receive at least an instance of at least one of the distributable models from the network-connected computing system, create a second dataset from machine learning performed by a transfer engine, train the instance of the distributable model with the second dataset, and generate an update report based at least in part by updates to the instance of the distributable model.1. A system for transfer learning and domain adaptation using distributable data models, comprising: a distributable model source comprising a first plurality of programming instructions stored in a memory of, and operable on a processor of, a computing device, wherein the first plurality of programming instructions, when operating on the processor, cause the computing device to: retrieve a distributable model; instantiate a distributable model instance of the distributable model; transfer the distributable model instance to an electronic device; receive a report from the electronic device, the report comprising updates to the distributable model instance made by the electronic device while training the distributable model instance on the electronic device; and update the distributable model based on the report. 2. The system of claim 1, wherein the distributable model source further: instantiates a plurality of distributable model instances; transfers each distributable model instance to one of a plurality of electronic devices; receives reports from the plurality of electronic devices; and updates the distributable model based on the reports received. 3. The system of claim 1, further comprising a transfer engine comprising a second plurality of programming instructions stored in the memory of, and operable on the processor of, the computing device, wherein the second plurality of programming instructions, when operating on the processor, cause the computing device to: receive a distributable model instance from the distributable model source and information about a desired adaptation of the distributable model instance; apply one or more machine learning algorithms to the distributable model instance to adapt it to the environment or purpose; and return the adapted distributable model instance to the distributable model source. 4. The system of claim 3, wherein the desired adaptation is adaptation to the computing environment of a type of electronic device. 5. The system of claim 3, wherein the desired adaptation is adaptation of the distributable model instance for a particular purpose or use. 6. The system of claim 3, wherein the desired adaptation is changing the domain of the distributable model instance. 7. The system of claim 3, further comprising a distributed computational graph engine comprising a third plurality of programming instructions stored in the memory of, and operable on the processor of, the computing device, wherein the third plurality of programming instructions, when operating on the processor, cause the computing device to: receive the distributable model from the distributable model source; receive one or more reports from distributable model instances which have been trained on one or more electronic devices; create a bias-specific distributable model from the distributable model based on biases contained in the one or more reports; and return the bias-specific distributable model to the distributable model source; and wherein the distributable model source incorporates the bias-specific distributable model as a subset of the distributable model. 8. A method for transfer learning and domain adaptation using distributable data models, comprising the steps of: retrieving a distributable model; instantiating a distributable model instance of the distributable model; transferring the distributable model instance to an electronic device; receiving a report from the electronic device, the report comprising updates to the distributable model instance made by the electronic device while training the distributable model instance on the electronic device; and updating the distributable model based on the report. 9. The method of claim 8, further comprising the steps of: instantiating a plurality of distributable model instances; transferring each distributable model instance to one of a plurality of electronic devices; receiving reports from the plurality of electronic devices; and updating the distributable model based on the reports received. 10. The method of claim 1, further comprising the steps of: receiving a distributable model instance from the distributable model source and information about a desired adaptation of the distributable model instance; applying one or more machine learning algorithms to the distributable model instance to adapt it to the environment or purpose; and returning the adapted distributable model instance to the distributable model source. 11. The method of claim 10, wherein the desired adaptation is adaptation to the computing environment of a type of electronic device. 12. The method of claim 10, wherein the desired adaptation is adaptation of the distributable model instance for a particular purpose or use. 13. The method of claim 10, wherein the desired adaptation is changing the domain of the distributable model instance. 14. The method of claim 10, further comprising the steps of: receiving the distributable model from the distributable model source; receiving one or more reports from distributable model instances which have been trained on one or more electronic devices; creating a bias-specific distributable model from the distributable model based on biases contained in the one or more reports; and returning the bias-specific distributable model to the distributable model source; and wherein the distributable model source incorporates the bias-specific distributable model as a subset of the distributable model.
2,100
340,104
16,801,051
2,163
A process for fabricating a micro-electro-mechanical system, includes the following steps: production of a stack on the surface of a temporary substrate so as to produce a first assembly, comprising: at least depositing a piezoelectric material or a ferroelectric material to produce a layer of piezoelectric material or of ferroelectric material; producing a first bonding layer; production of a second assembly comprising at least producing a second bonding layer on the surface of a host substrate; production of at least one acoustic isolation structure in at least one of the two assemblies; production of at least one electrode level containing one or more electrodes in at least one of the two assemblies; bonding the two assemblies via the two bonding layers, before or after the production of the at least one electrode level in at least one of the two assemblies; removing the temporary substrate.
1. A process for fabricating a micro-electro-mechanical system, comprising the following steps: production of a stack on the surface of a temporary substrate so as to produce a first assembly, comprising: at least depositing a piezoelectric material or a ferroelectric material to produce a layer of piezoelectric material or of ferroelectric material; producing a first bonding layer; production of a second assembly comprising at least producing a second bonding layer on the surface of a host substrate; production of at least one acoustic isolation structure in at least one of the two assemblies; production of at least one electrode level containing one or more electrodes in at least one of the two assemblies; bonding said two assemblies via said two bonding layers, before or after the production of the at least one electrode level in at least one of the two assemblies; removing said temporary substrate. 2. The process according to claim 1, wherein said piezoelectric material or said ferroelectric material is deposited by epitaxial growth. 3. The process according to claim 1, wherein the micro-electro-mechanical system comprises at least one bulk acoustic wave resonator or at least one surface acoustic wave resonator or at least one Lamb wave resonator. 4. The process according to claim 1, wherein the bonding comprises a step of thermal annealing. 5. The process according to claim 1, wherein the operation of removing the temporary substrate comprises: a step of thinning said temporary substrate; an operation of chemically etching said thinned temporary substrate. 6. The process according to claim 1, wherein the operation of removing said temporary substrate comprises: a step of diffusing elements that cause precipitation or chemical reactions in the material from which said temporary substrate is made, or a step of implanting ions into said temporary substrate. 7. The process according to claim 1, comprising depositing a buffer layer on the surface of said temporary substrate, prior to the deposition of said piezoelectric material or of said ferroelectric material. 8. The process according to claim 1, comprising: producing a sacrificial layer above a dielectric material; structuring said sacrificial layer so as to define a sacrificial layer structure; depositing a dielectric above said sacrificial layer structure; removing said sacrificial layer structure so as to define said acoustic isolation structure. 9. The process according to claim 8, wherein the dielectric material is an oxide that may be SiO2, the sacrificial layer being made of amorphous silicon or of polysilicon. 10. The process according to claim 8, wherein the production of the acoustic isolation structure comprises: producing at least one sacrificial layer in said first assembly; releasing said sacrificial layer structure after bonding said two assemblies. 11. The process according to claim 1, wherein the production of the acoustic isolation structure comprises producing a Bragg mirror structure (MR). 12. The process according to claim 11, comprising the production of structured layers made of metal and possibly of molybdenum, said structured layers being inserted into the dielectric that may be SiO2. 13. The process according to claim 1, comprising: prior to said bonding of the two assemblies, producing at least one so-called lower electrode on the surface of said layer of piezoelectric material or of ferroelectric material and producing an acoustic isolation structure in said first assembly; after removing said temporary substrate, producing at least one so-called upper electrode on said layer of piezoelectric material or of ferroelectric material. 14. The process according to claim 1, comprising, prior to said bonding of said two assemblies: producing electrodes on the surface of said layer of piezoelectric material or of ferroelectric material; producing an acoustic isolation structure in said second assembly. 15. The process according to claim 1, wherein the piezoelectric material is LiNbO3 or LiTaO3 or solid solutions thereof, or KNbO3 or AlN or GaN. 16. The process according to claim 1, wherein the ferroelectric material is: LiNbO3 or LiTaO3 or PZT. 17. The process according to claim 1, wherein the temporary substrate is made of MgO or of SrTiO3 or of LaAlO3 or of LSAT ((LaAlO3)0.3(Sr2TaAlO6)0.7) or of DyScO3, or of sapphire (Al2O3) or of lithium niobate (LiNbO3) or of lithium tantalate (LiTaO3) or of quartz, the piezoelectric material possibly advantageously being PZT. 18. The process according to claim 1, wherein the bonding layers are made of oxide or made of polymer. 19. A micro-electro-mechanical system obtained using the process according to claim 1.
A process for fabricating a micro-electro-mechanical system, includes the following steps: production of a stack on the surface of a temporary substrate so as to produce a first assembly, comprising: at least depositing a piezoelectric material or a ferroelectric material to produce a layer of piezoelectric material or of ferroelectric material; producing a first bonding layer; production of a second assembly comprising at least producing a second bonding layer on the surface of a host substrate; production of at least one acoustic isolation structure in at least one of the two assemblies; production of at least one electrode level containing one or more electrodes in at least one of the two assemblies; bonding the two assemblies via the two bonding layers, before or after the production of the at least one electrode level in at least one of the two assemblies; removing the temporary substrate.1. A process for fabricating a micro-electro-mechanical system, comprising the following steps: production of a stack on the surface of a temporary substrate so as to produce a first assembly, comprising: at least depositing a piezoelectric material or a ferroelectric material to produce a layer of piezoelectric material or of ferroelectric material; producing a first bonding layer; production of a second assembly comprising at least producing a second bonding layer on the surface of a host substrate; production of at least one acoustic isolation structure in at least one of the two assemblies; production of at least one electrode level containing one or more electrodes in at least one of the two assemblies; bonding said two assemblies via said two bonding layers, before or after the production of the at least one electrode level in at least one of the two assemblies; removing said temporary substrate. 2. The process according to claim 1, wherein said piezoelectric material or said ferroelectric material is deposited by epitaxial growth. 3. The process according to claim 1, wherein the micro-electro-mechanical system comprises at least one bulk acoustic wave resonator or at least one surface acoustic wave resonator or at least one Lamb wave resonator. 4. The process according to claim 1, wherein the bonding comprises a step of thermal annealing. 5. The process according to claim 1, wherein the operation of removing the temporary substrate comprises: a step of thinning said temporary substrate; an operation of chemically etching said thinned temporary substrate. 6. The process according to claim 1, wherein the operation of removing said temporary substrate comprises: a step of diffusing elements that cause precipitation or chemical reactions in the material from which said temporary substrate is made, or a step of implanting ions into said temporary substrate. 7. The process according to claim 1, comprising depositing a buffer layer on the surface of said temporary substrate, prior to the deposition of said piezoelectric material or of said ferroelectric material. 8. The process according to claim 1, comprising: producing a sacrificial layer above a dielectric material; structuring said sacrificial layer so as to define a sacrificial layer structure; depositing a dielectric above said sacrificial layer structure; removing said sacrificial layer structure so as to define said acoustic isolation structure. 9. The process according to claim 8, wherein the dielectric material is an oxide that may be SiO2, the sacrificial layer being made of amorphous silicon or of polysilicon. 10. The process according to claim 8, wherein the production of the acoustic isolation structure comprises: producing at least one sacrificial layer in said first assembly; releasing said sacrificial layer structure after bonding said two assemblies. 11. The process according to claim 1, wherein the production of the acoustic isolation structure comprises producing a Bragg mirror structure (MR). 12. The process according to claim 11, comprising the production of structured layers made of metal and possibly of molybdenum, said structured layers being inserted into the dielectric that may be SiO2. 13. The process according to claim 1, comprising: prior to said bonding of the two assemblies, producing at least one so-called lower electrode on the surface of said layer of piezoelectric material or of ferroelectric material and producing an acoustic isolation structure in said first assembly; after removing said temporary substrate, producing at least one so-called upper electrode on said layer of piezoelectric material or of ferroelectric material. 14. The process according to claim 1, comprising, prior to said bonding of said two assemblies: producing electrodes on the surface of said layer of piezoelectric material or of ferroelectric material; producing an acoustic isolation structure in said second assembly. 15. The process according to claim 1, wherein the piezoelectric material is LiNbO3 or LiTaO3 or solid solutions thereof, or KNbO3 or AlN or GaN. 16. The process according to claim 1, wherein the ferroelectric material is: LiNbO3 or LiTaO3 or PZT. 17. The process according to claim 1, wherein the temporary substrate is made of MgO or of SrTiO3 or of LaAlO3 or of LSAT ((LaAlO3)0.3(Sr2TaAlO6)0.7) or of DyScO3, or of sapphire (Al2O3) or of lithium niobate (LiNbO3) or of lithium tantalate (LiTaO3) or of quartz, the piezoelectric material possibly advantageously being PZT. 18. The process according to claim 1, wherein the bonding layers are made of oxide or made of polymer. 19. A micro-electro-mechanical system obtained using the process according to claim 1.
2,100
340,105
16,801,083
1,731
Aqueous cementitious slurries including predominantly Type I Portland cement containing an aluminate additive. The aluminate additive is an aluminate salt other than calcium aluminate or calcium sulfoaluminate, preferably sodium aluminate. Cementitious reactive powders of the slurry include the Type I Portland cement and 0.1-10 wt. % of the aluminate additive as an accelerator. The slurries may have a set time of about 10 minutes or less. Due to the short set time, the cementitious reactive powders may facilitate cement board fabrication by continuous manufacturing processes. Methods for making cement boards may include disposing the aqueous cementitious slurry including the cementitious reactive powders in a continuous layer, preferably upon a porous support, and setting the aqueous cementitious slurry with a set time of about 10 minutes or less.
1. A cement board comprising: a continuous layer formed from setting of an aqueous cementitious slurry, the aqueous cementitious slurry comprising: water; and a cementitious reactive powder comprising: 60 to 100 wt. % Type I Portland cement, and a set accelerator comprising an aluminate additive other than calcium aluminate or calcium sulphoaluminate, the set accelerator in an amount equal to 0.1-10 wt. % of the cementitious reactive powder. 2. The cement board of claim 1, wherein the aluminate additive comprises an aluminate salt selected from the group consisting of ammonium aluminate, sodium aluminate, potassium aluminate, magnesium aluminate, and any combination thereof. 3. The cement board of claim 1, wherein the aluminate additive is formed from an aluminate precursor within the aqueous cementitious slurry, the aluminate precursor being selected from the group consisting of aluminum sulfate, aluminum hydroxide, boehmite (AlO(OH)), and any combination thereof. 4. The cement board of claim 1, wherein the cementitious reactive powder comprises 80 to 100 wt. % Type I Portland cement. 5. The cement board of claim 1, wherein the cementitious reactive powder has at most 10 wt. % total Type II Portland cement and Type III Portland cement. 6. The cement board of claim 1, wherein the cementitious reactive powder has an absence of Type III Portland cement. 7. The cement board of claim 1, wherein the cementitious reactive powder has an absence of Type II Portland cement and an absence of Type III cement. 8. The cement board of claim 1, wherein the cementitious reactive powder is substantially free of calcium sulphoaluminate, substantially free of calcium aluminate, has an absence of barium borate, has an absence of lithium carbonate and an absence of aluminum sulfate, and has an absence of polyvinyl alcohol, an absence of polyvinyl alcohol polyvinyl acetate, has an absence of a polyhydroxy aromatic compound, has an absence of polycarboxylic acid-containing compound, has an absence of a salt of polycarboxylic acid-containing compound, has an absence of ascorbic acid, has an absence of salt of ascorbic acid, has an absence of lithium carbonate, and has an absence of aluminum sulfate. 9. The cement board of claim 1, wherein the cementitious reactive powder comprises 0 to 30 wt. % pozzolanic material. 10. The cement board of claim 1, wherein the pozzolanic material comprises Class C fly ash, Class F fly ash, or any combination thereof. 11. The cement board of claim 1, wherein the aqueous cementitious slurry comprises an additive selected from sand, a mineral aggregate, a non-mineral aggregate, a clay, mica, calcium carbonate, and any combination thereof. 12. The cement board of claim 1, wherein the cementitious reactive powder comprises up to 5 wt. % of an alkaline additive. 13. The cement board of claim 11, wherein the alkaline additive is selected from the group consisting of sodium hydroxide, calcium oxide, sodium monophosphate, sodium polyphosphates, and sodium trimetaphosphate (STMP). 14. The cement board of claim 1, wherein the aqueous cementitious slurry comprises an additive selected from the group consisting of an accelerator, a retarder, a plasticizer, a superplasticizer, a foaming agent, gypsum, triethanolamine, a polyacrylamide, potassium dichromate, and any combination thereof. 15. The cement board of claim 1, wherein Type I Portland cement is the only cement present in the cementitious reactive powder. 16. A method for processing a cementitious composition, comprising: combining water and a cementitious reactive powder to form an aqueous cementitious slurry; wherein the cementitious reactive powder comprises: 60 to 100 wt. % Type I Portland cement, and a set accelerator comprising an aluminate additive other than calcium aluminate or calcium sulphoaluminate, the set accelerator provided in an amount equal to 0.1-10 wt. % of the cementitious reactive powder. 17. The method of claim 16, wherein the aluminate additive comprises an aluminate salt selected from the group consisting of ammonium aluminate, sodium aluminate, potassium aluminate, magnesium aluminate, and any combination thereof. 18. The method of claim 16, wherein the aluminate additive is formed from an aluminate precursor within the aqueous cementitious slurry, the aluminate precursor being selected from the group consisting of aluminum sulfate, aluminum hydroxide, boehmite (AlO(OH)), and any combination thereof. 19. The method of claim 16, wherein the cementitious reactive comprises at most 10 wt. % Type III Portland cement, wherein the cementitious composition is free of Type III Portland cement, free of calcium aluminate, and free of calcium sulphoaluminate. 20. The method of claim 16, wherein the cementitious reactive powder comprises up to 5 wt. % of an alkaline additive.
Aqueous cementitious slurries including predominantly Type I Portland cement containing an aluminate additive. The aluminate additive is an aluminate salt other than calcium aluminate or calcium sulfoaluminate, preferably sodium aluminate. Cementitious reactive powders of the slurry include the Type I Portland cement and 0.1-10 wt. % of the aluminate additive as an accelerator. The slurries may have a set time of about 10 minutes or less. Due to the short set time, the cementitious reactive powders may facilitate cement board fabrication by continuous manufacturing processes. Methods for making cement boards may include disposing the aqueous cementitious slurry including the cementitious reactive powders in a continuous layer, preferably upon a porous support, and setting the aqueous cementitious slurry with a set time of about 10 minutes or less.1. A cement board comprising: a continuous layer formed from setting of an aqueous cementitious slurry, the aqueous cementitious slurry comprising: water; and a cementitious reactive powder comprising: 60 to 100 wt. % Type I Portland cement, and a set accelerator comprising an aluminate additive other than calcium aluminate or calcium sulphoaluminate, the set accelerator in an amount equal to 0.1-10 wt. % of the cementitious reactive powder. 2. The cement board of claim 1, wherein the aluminate additive comprises an aluminate salt selected from the group consisting of ammonium aluminate, sodium aluminate, potassium aluminate, magnesium aluminate, and any combination thereof. 3. The cement board of claim 1, wherein the aluminate additive is formed from an aluminate precursor within the aqueous cementitious slurry, the aluminate precursor being selected from the group consisting of aluminum sulfate, aluminum hydroxide, boehmite (AlO(OH)), and any combination thereof. 4. The cement board of claim 1, wherein the cementitious reactive powder comprises 80 to 100 wt. % Type I Portland cement. 5. The cement board of claim 1, wherein the cementitious reactive powder has at most 10 wt. % total Type II Portland cement and Type III Portland cement. 6. The cement board of claim 1, wherein the cementitious reactive powder has an absence of Type III Portland cement. 7. The cement board of claim 1, wherein the cementitious reactive powder has an absence of Type II Portland cement and an absence of Type III cement. 8. The cement board of claim 1, wherein the cementitious reactive powder is substantially free of calcium sulphoaluminate, substantially free of calcium aluminate, has an absence of barium borate, has an absence of lithium carbonate and an absence of aluminum sulfate, and has an absence of polyvinyl alcohol, an absence of polyvinyl alcohol polyvinyl acetate, has an absence of a polyhydroxy aromatic compound, has an absence of polycarboxylic acid-containing compound, has an absence of a salt of polycarboxylic acid-containing compound, has an absence of ascorbic acid, has an absence of salt of ascorbic acid, has an absence of lithium carbonate, and has an absence of aluminum sulfate. 9. The cement board of claim 1, wherein the cementitious reactive powder comprises 0 to 30 wt. % pozzolanic material. 10. The cement board of claim 1, wherein the pozzolanic material comprises Class C fly ash, Class F fly ash, or any combination thereof. 11. The cement board of claim 1, wherein the aqueous cementitious slurry comprises an additive selected from sand, a mineral aggregate, a non-mineral aggregate, a clay, mica, calcium carbonate, and any combination thereof. 12. The cement board of claim 1, wherein the cementitious reactive powder comprises up to 5 wt. % of an alkaline additive. 13. The cement board of claim 11, wherein the alkaline additive is selected from the group consisting of sodium hydroxide, calcium oxide, sodium monophosphate, sodium polyphosphates, and sodium trimetaphosphate (STMP). 14. The cement board of claim 1, wherein the aqueous cementitious slurry comprises an additive selected from the group consisting of an accelerator, a retarder, a plasticizer, a superplasticizer, a foaming agent, gypsum, triethanolamine, a polyacrylamide, potassium dichromate, and any combination thereof. 15. The cement board of claim 1, wherein Type I Portland cement is the only cement present in the cementitious reactive powder. 16. A method for processing a cementitious composition, comprising: combining water and a cementitious reactive powder to form an aqueous cementitious slurry; wherein the cementitious reactive powder comprises: 60 to 100 wt. % Type I Portland cement, and a set accelerator comprising an aluminate additive other than calcium aluminate or calcium sulphoaluminate, the set accelerator provided in an amount equal to 0.1-10 wt. % of the cementitious reactive powder. 17. The method of claim 16, wherein the aluminate additive comprises an aluminate salt selected from the group consisting of ammonium aluminate, sodium aluminate, potassium aluminate, magnesium aluminate, and any combination thereof. 18. The method of claim 16, wherein the aluminate additive is formed from an aluminate precursor within the aqueous cementitious slurry, the aluminate precursor being selected from the group consisting of aluminum sulfate, aluminum hydroxide, boehmite (AlO(OH)), and any combination thereof. 19. The method of claim 16, wherein the cementitious reactive comprises at most 10 wt. % Type III Portland cement, wherein the cementitious composition is free of Type III Portland cement, free of calcium aluminate, and free of calcium sulphoaluminate. 20. The method of claim 16, wherein the cementitious reactive powder comprises up to 5 wt. % of an alkaline additive.
1,700
340,106
16,801,065
1,731
A method for utilizing quality of service information in a network with tunneled backhaul is disclosed, comprising: establishing a backhaul bearer at a base station with a first core network, the backhaul bearer established by a backhaul user equipment (UE) at the base station, the backhaul bearer having a single priority parameter, the backhaul bearer terminating at a first packet data network gateway in the first core network; establishing an encrypted internet protocol (IP) tunnel between the base station and a coordinating gateway in communication with the first core network and a second core network; facilitating, for at least one UE attached at the base station, establishment of a plurality of UE data bearers encapsulated in the secure IP tunnel, each with their own QCI; and transmitting prioritized data of the plurality of UE data bearers via the backhaul bearer and the coordinating gateway to the second core network.
1. A method, comprising: establishing, in a multi Radio Access Technology (RAT) network, a first backhaul bearer at a base station with a first core network, the first backhaul bearer established by a backhaul user equipment (UE) at the base station, the first backhaul bearer having a single priority parameter, the first backhaul bearer terminating at a first packet data network gateway in the first core network, the first backhaul bearer for carrying data from a plurality of UEs attached at the base station to the first core network; establishing an encrypted internet protocol (IP) tunnel between the base station and a coordinating gateway in communication with the first core network and a second core network, wherein at least one of the multi-RAT networks is a 5G network; facilitating, for at least one UE attached at the base station, establishment of a plurality of UE data bearers encapsulated in the secure IP tunnel, the plurality of UE data bearers terminating at a second packet data network gateway in the second core network and having a plurality of individual priority parameters for prioritized traffic control at the second core network; transmitting prioritized data of the plurality of UE data bearers via the first backhaul bearer and the coordinating gateway to the second core network; and establishing a second backhaul bearer at the base station having a second priority parameter, where the first backhaul bearer is a dedicated bearer to be used for prioritized traffic, and the second backhaul bearer is a default bearer to be used for non-prioritized traffic. 2. The method of claim 1, wherein the first backhaul bearer is a dedicated bearer, the single priority parameter is a quality of service class indicator (QCI) parameter, and the plurality of individual priority parameters are each QCI parameters. 3. The method of claim 2, further comprising establishing the second backhaul bearer at the base station wherein the second priority parameter is a second QCI parameter. 4. The method of claim 1, wherein the first backhaul bearer is a dedicated non-guaranteed bit rate (non-GBR) bearer with an allocation retention priority (ARP) parameter. 5. The method of claim 1, wherein the first backhaul bearer is a dedicated non-guaranteed bit rate (non-GBR) bearer with a quality of service class identifier (QCI) parameter of 6 and an allocation retention priority (ARP) parameter of 1; wherein the first backhaul bearer is a GBR bearer with an ARP parameter of 6; or wherein the first backhaul bearer is a GBR bearer with an ARP parameter of 1. 6. The method of claim 1, where the first backhaul bearer is a guaranteed bit rate (GBR) bearer and the second backhaul bearer is a non-GBR bearer. 7. The method of claim 1, wherein the base station has a UE modem with an associated subscriber information module (SIM) card configured for use with the first core network. 8. The method of claim 1, further comprising: receiving, at the coordinating gateway, uplink UE data from the UE on one of the plurality of UE data bearers; identifying, at the coordinating gateway, a filter template for the uplink UE data based on a priority parameter associated with the one of the plurality of UE data bearers; and applying, at the coordinating gateway, the filter template to the uplink UE data to create an IP flow with a quality of service parameter based on the priority parameter. 9. The method of claim 8, wherein the priority parameter is a quality of service class identifier (QCI) and the priority parameter is one of a differentiated services code point (DSCP) or IPv4 type of service (TOS) IP envelope tag. 10. The method of claim 1, further comprising: receiving, at the coordinating gateway, a downlink IP flow from the second packet data network gateway (PGW); identifying, at the coordinating gateway, a filter template to the downlink IP flow based on a parameter; and applying, at the coordinating gateway, the filter template to the downlink IP flow to cause the downlink IP flow to be mapped to one of the plurality of UE data bearers as a selected UE data bearer with an associated quality of service class identifier (QCI). 11. The method of claim 10, wherein the filter template is a traffic filter template (TFT). 12. The method of claim 10, wherein the downlink IP flow is tagged with differentiated services code point (DSCP) or IPv4 type of service (TOS) tagging, and wherein the DSCP or TOS tagging is the parameter. 13. The method of claim 10, wherein the parameter is one or more of a source or destination IP address, a protocol identifier, a local or remote port range, or an IP packet envelope field. 14. The method of claim 10, wherein the selected UE data bearer is a dedicated bearer or a default bearer. 15. The method of claim 10, wherein the selected UE data bearer is a guaranteed bit rate (GBR) bearer or a non-GBR bearer. 16. The method of claim 10, wherein the selected UE data bearer is further characterized by an associated allocation retention priority (ARP) parameter. 17. The method of claim 10, wherein the downlink IP flow is a conversational voice IP flow, and wherein the associated QCI of the selected UE data bearer is 1. 18. The method of claim 10, wherein the downlink IP flow is a mission critical data flow, and wherein the associated QCI of the selected UE data bearer is 65 or 69. 19. The method of claim 1, wherein the plurality of UE data bearers include a 5G UE data bearer, and wherein the backhaul data bearer is a data bearer of a single radio access technology.
A method for utilizing quality of service information in a network with tunneled backhaul is disclosed, comprising: establishing a backhaul bearer at a base station with a first core network, the backhaul bearer established by a backhaul user equipment (UE) at the base station, the backhaul bearer having a single priority parameter, the backhaul bearer terminating at a first packet data network gateway in the first core network; establishing an encrypted internet protocol (IP) tunnel between the base station and a coordinating gateway in communication with the first core network and a second core network; facilitating, for at least one UE attached at the base station, establishment of a plurality of UE data bearers encapsulated in the secure IP tunnel, each with their own QCI; and transmitting prioritized data of the plurality of UE data bearers via the backhaul bearer and the coordinating gateway to the second core network.1. A method, comprising: establishing, in a multi Radio Access Technology (RAT) network, a first backhaul bearer at a base station with a first core network, the first backhaul bearer established by a backhaul user equipment (UE) at the base station, the first backhaul bearer having a single priority parameter, the first backhaul bearer terminating at a first packet data network gateway in the first core network, the first backhaul bearer for carrying data from a plurality of UEs attached at the base station to the first core network; establishing an encrypted internet protocol (IP) tunnel between the base station and a coordinating gateway in communication with the first core network and a second core network, wherein at least one of the multi-RAT networks is a 5G network; facilitating, for at least one UE attached at the base station, establishment of a plurality of UE data bearers encapsulated in the secure IP tunnel, the plurality of UE data bearers terminating at a second packet data network gateway in the second core network and having a plurality of individual priority parameters for prioritized traffic control at the second core network; transmitting prioritized data of the plurality of UE data bearers via the first backhaul bearer and the coordinating gateway to the second core network; and establishing a second backhaul bearer at the base station having a second priority parameter, where the first backhaul bearer is a dedicated bearer to be used for prioritized traffic, and the second backhaul bearer is a default bearer to be used for non-prioritized traffic. 2. The method of claim 1, wherein the first backhaul bearer is a dedicated bearer, the single priority parameter is a quality of service class indicator (QCI) parameter, and the plurality of individual priority parameters are each QCI parameters. 3. The method of claim 2, further comprising establishing the second backhaul bearer at the base station wherein the second priority parameter is a second QCI parameter. 4. The method of claim 1, wherein the first backhaul bearer is a dedicated non-guaranteed bit rate (non-GBR) bearer with an allocation retention priority (ARP) parameter. 5. The method of claim 1, wherein the first backhaul bearer is a dedicated non-guaranteed bit rate (non-GBR) bearer with a quality of service class identifier (QCI) parameter of 6 and an allocation retention priority (ARP) parameter of 1; wherein the first backhaul bearer is a GBR bearer with an ARP parameter of 6; or wherein the first backhaul bearer is a GBR bearer with an ARP parameter of 1. 6. The method of claim 1, where the first backhaul bearer is a guaranteed bit rate (GBR) bearer and the second backhaul bearer is a non-GBR bearer. 7. The method of claim 1, wherein the base station has a UE modem with an associated subscriber information module (SIM) card configured for use with the first core network. 8. The method of claim 1, further comprising: receiving, at the coordinating gateway, uplink UE data from the UE on one of the plurality of UE data bearers; identifying, at the coordinating gateway, a filter template for the uplink UE data based on a priority parameter associated with the one of the plurality of UE data bearers; and applying, at the coordinating gateway, the filter template to the uplink UE data to create an IP flow with a quality of service parameter based on the priority parameter. 9. The method of claim 8, wherein the priority parameter is a quality of service class identifier (QCI) and the priority parameter is one of a differentiated services code point (DSCP) or IPv4 type of service (TOS) IP envelope tag. 10. The method of claim 1, further comprising: receiving, at the coordinating gateway, a downlink IP flow from the second packet data network gateway (PGW); identifying, at the coordinating gateway, a filter template to the downlink IP flow based on a parameter; and applying, at the coordinating gateway, the filter template to the downlink IP flow to cause the downlink IP flow to be mapped to one of the plurality of UE data bearers as a selected UE data bearer with an associated quality of service class identifier (QCI). 11. The method of claim 10, wherein the filter template is a traffic filter template (TFT). 12. The method of claim 10, wherein the downlink IP flow is tagged with differentiated services code point (DSCP) or IPv4 type of service (TOS) tagging, and wherein the DSCP or TOS tagging is the parameter. 13. The method of claim 10, wherein the parameter is one or more of a source or destination IP address, a protocol identifier, a local or remote port range, or an IP packet envelope field. 14. The method of claim 10, wherein the selected UE data bearer is a dedicated bearer or a default bearer. 15. The method of claim 10, wherein the selected UE data bearer is a guaranteed bit rate (GBR) bearer or a non-GBR bearer. 16. The method of claim 10, wherein the selected UE data bearer is further characterized by an associated allocation retention priority (ARP) parameter. 17. The method of claim 10, wherein the downlink IP flow is a conversational voice IP flow, and wherein the associated QCI of the selected UE data bearer is 1. 18. The method of claim 10, wherein the downlink IP flow is a mission critical data flow, and wherein the associated QCI of the selected UE data bearer is 65 or 69. 19. The method of claim 1, wherein the plurality of UE data bearers include a 5G UE data bearer, and wherein the backhaul data bearer is a data bearer of a single radio access technology.
1,700
340,107
16,801,069
1,731
A sample testing device, a sample testing method, and a sample analyze are provided. The sample testing device includes a pipeline assembly, a testing assembly, and a reaction assembly. The pipeline assembly includes a first pipeline and a second pipeline. The testing assembly includes a sample needle which includes a first connection point. The reaction assembly includes a first reaction cell group connected to a second connection point of the first pipeline and a second reaction cell group which communicates with the second pipeline, and the reaction assembly is configured to treat a biological sample to prepare a test liquid. A test liquid in the first reaction cell group flows to the first connection point via the second connection point of the first pipeline, and a test liquid in the second reaction cell group flows to the first connection point via the second pipeline.
1. A sample testing device, comprising: a pipeline assembly which comprises a first pipeline and a second pipeline; a testing assembly which comprises a sample needle, wherein the sample needle comprises a first connection point; and a reaction assembly which comprises a first reaction cell group and a second reaction cell group, wherein the first reaction cell group is connected to a second connection point of the first pipeline, and the second reaction cell group communicates with the second pipeline, and the reaction assembly is configured to treat a biological sample to prepare a test liquid; wherein a test liquid in the first reaction cell group flows to the first connection point of the sample needle via the second connection point of the first pipeline, and a test liquid in the second reaction cell group flows to the first connection point of the sample needle via the second pipeline, such that the test liquid in the first reaction cell group or in the second reaction cell group respectively flows into the sample needle of the testing assembly for detecting, wherein the sample testing device further comprises a sample injecting assembly, the sample injecting assembly is respectively connected to a third connection point of the first pipeline and a fourth connection point of the second pipeline, the third connection point is located between the second connection point and the first connection point, a channel between the third connection point and the first connection point is configured as a first test liquid preparation section, and a channel between the fourth connection point and the first connection point is configured as a second test liquid preparation section, wherein the test liquid in the first reaction cell group flows to the third connection point of the first pipeline via the second connection point of the first pipeline, and flows into the first test liquid preparation section via the third connection point of the first pipeline, wherein the test liquid in the second reaction cell group flows to the fourth connection point of the second pipeline via the second pipeline, and flows into the second test liquid preparation section via the fourth connection point of the second pipeline, wherein the sample injecting assembly is configured to inject the test liquid in the first test liquid preparation section or in the second test liquid preparation section into the sample needle of the testing assembly. 2. The sample testing device of claim 1, wherein the sample testing device further comprises a sample drawing assembly, the sample drawing assembly is connected to an end of the first pipeline or an end of the second pipeline, and the sample drawing assembly is configured to generate a negative pressure to correspondingly draw the test liquid in the first reaction cell group into the first test liquid preparation section, or draw the test liquid in the second reaction cell group into the second test liquid preparation section. 3. The sample testing device of claim 1, wherein the sample testing device further comprises a first cleaning assembly and a second cleaning assembly, the first cleaning assembly is connected to the first pipeline, and a cleaning fluid in the first cleaning assembly flows into the first pipeline to clean the first pipeline, and wherein the second cleaning assembly is connected to the second pipeline, and a cleaning fluid in the second cleaning assembly flows into the second pipeline to clean the second pipeline. 4. The sample testing device of claim 1, wherein the sample testing device comprises a third cleaning assembly, the first pipeline and the second pipeline are commonly connected to the third cleaning assembly, and a cleaning fluid in the third cleaning assembly flows into the first pipeline or the second pipeline to clean the first pipeline or the second pipeline. 5. The sample testing device of claim 4, wherein the second reaction cell group is further connected to a fifth connection point of the first pipeline, and the third cleaning assembly is connected to an end of the first pipeline, wherein the cleaning fluid in the third cleaning assembly flows into the first pipeline from the end of the first pipeline to clean the first pipeline, or the cleaning liquid in the third cleaning assembly flows from the end of the first pipeline to the fifth connection point of the first pipeline, and flows from the fifth connection point into the connection point of the second reaction cell group in the second pipeline to clean the second pipeline. 6. The sample testing device of claim 1, wherein the reaction assembly further comprises a third reaction cell group, the third reaction cell group is connected to a sixth connection point of the first pipeline, and a test liquid in the third reaction cell group flows to the first connection point of the sample needle via the sixth connection point of the first pipeline, so that the test liquid in the third reaction cell group flows into the sample needle of the testing assembly for detecting, wherein the test liquid in the first reaction cell group or the third reaction cell group respectively flows to the third connection point of the first pipeline via the second connection point of the first pipeline or the sixth connection point of the first pipeline, and flows into the first test liquid preparation section via the third connection point of the first pipeline, or the test liquid in the second reaction cell group flows to the fourth connection point of the second pipeline via the second pipeline, and flows into the second test liquid preparation section via the fourth connection point of the second pipeline. 7. The sample testing device of claim 1, wherein the sample injecting assembly comprises an injector, a selection switching member disposed at an injection port of the injector, a fourth branch and a fifth branch; one end of the fourth branch and one end of the fifth branch are respectively connected to the third connection point and the fourth connection point, another end of the fourth branch and another end of the fifth branch are commonly disposed at the selection switching member, and the selection switching member is configured to switch between the fourth branch and the fifth branch to communication with the injector. 8. The sample testing device of claim 7, wherein the sample testing device further comprises a sample drawing assembly, the sample drawing assembly is connected to an end of the first pipeline or an end of the second pipeline, and the sample drawing assembly is configured to: generate a negative pressure to draw the test liquid in the first reaction cell group or in the third reaction cell group into the first test liquid preparation section; or generate a negative pressure to draw the test liquid in the second reaction cell group into the second test liquid preparation section. 9. The sample testing device of claim 1, wherein the pipeline assembly further comprises a third pipeline, the reaction assembly further comprises a third reaction cell group, and the third reaction cell group communicates with the third pipeline; and a test liquid in the third reaction cell group flows to the first connection point of the sample needle via the third pipeline, so that the test liquid in the third reaction cell group flows into the sample needle of the testing assembly for detecting. 10. The sample testing device of claim 9, wherein the sample injecting assembly is further connected to a seventh connection point of the third pipeline, and a channel between the seventh connection point and the first connection point is a third test liquid preparation section, wherein the test liquid in the third reaction cell group flows via the third pipeline to the seventh connection point of the third pipeline, and flows into the third test liquid preparation section via the seventh connection point of the third pipeline, wherein the sample injecting assembly is configured to inject the test liquid in the first test liquid preparation section, the test liquid in the second test liquid preparation section or the test liquid in the third test liquid preparation section into the sample needle of the testing assembly. 11. The sample testing device of claim 10, wherein the sample injecting assembly comprises an injector, a selection switching member disposed at an injection port of the injector, a fourth branch, a fifth branch and a sixth branch; one end of the fourth branch, one end of the fifth branch and one end of the sixth branch are respectively connected to the third connection point, the fourth connection point and the seventh connection point, another end of the fourth branch, another end of the fifth branch and another end of the sixth branch are commonly disposed at the selection switching member, and the selection switching member is configured to switch between the fourth branch, the fifth branch and the sixth branch to communication with the injector. 12. The sample testing device of claim 10, wherein the sample testing device further comprises a sample drawing assembly, the sample drawing assembly is connected to an end of the first pipeline, an end of the second pipeline, or an end of the third pipeline, and the sample drawing assembly is configured to generate a negative pressure to correspondingly draw the test liquid in the first reaction cell group into the first test liquid preparation section, or draw the test liquid in the second reaction cell group into the second test liquid preparation section, or draw the test liquid in the third reaction cell group into the third test liquid preparation section. 13. The sample testing device of claim 1 ; wherein the second cell group is directly connected to the second pipeline; or, wherein the second reaction cell group is connected to the second pipeline indirectly via the first pipeline. 14. The sample testing device of claim 1, wherein the second reaction cell group is further connected to a fifth connection point of the first pipeline, and the second pipeline is connected to an eighth connection point of the first pipeline, the test liquid in the second reaction cell group flows from the fifth connection point to the eighth connection point, and flows into the second pipeline from the eighth connection point such that the second reaction cell group communicates with the second pipeline; or, wherein the second reaction cell group is further connected to a fifth connection point of the first pipeline, and the second pipeline is connected to an eighth connection point of the second pipeline, the test liquid in the first reaction cell group flows from the second connection point to the eighth connection point, and flows from the eighth connection point to the first connection point; the second pipeline is connected to the eighth connection point of the first pipeline, and the test liquid in the second reaction cell group flows from the fifth connection point to the eighth connection point, and flows into the second pipeline from the eighth connection point such that the second reaction cell group communicates with the second pipeline; or, wherein the second pipeline and the second reaction cell group are commonly connected to the fifth connection point of the first pipeline, and the test liquid in the second reaction cell group flows into the second pipeline from the fifth connection point such that the second reaction cell group communicates with the second pipeline. 15. The sample testing device of claim 1, wherein the second pipeline is connected to a tenth connection point of the first pipeline, and the tenth connection point communicates with the first connection point of the sample needle, the test liquid in the second reaction cell group flows to the tenth connection point of the first pipeline via the second pipeline, and flows from the tenth connection point of the first pipeline to the first connection point of the sample needle. 16. The sample testing device of claim 15, wherein the test liquid in the first reaction cell group does not flow through the tenth connection point of the first pipeline when flowing from the second connection point of the first pipeline to the first connection point of the sample needle. 17. The sample testing device of claim 1, wherein the first reaction cell group comprises a first reaction cell, a first branch, and a first switching member; the first reaction cell is configured to prepare a first test liquid, the first branch is connected between the first reaction cell and the second connection point, and the first switching member is disposed in the first branch and is configured to implement cutting-off and connecting of the first branch; and wherein the second reaction cell group comprises a second reaction cell, a second branch, and a second switching member, wherein the second reaction cell is configured to prepare a second test liquid, one end of the second branch is connected to the second reaction cell, the second branch communicates with the second pipeline, and the second switching member is disposed in the second branch and is configured to implement cutting-off or connecting of the second branch. 18. The sample testing device of claim 1, wherein the testing assembly further comprises a flow chamber, a sheath liquid cell, a fifth switching member, a first waste liquid cell, and a sixth switching member, wherein the flow chamber has an test liquid inlet, a sheath liquid inlet, and an outlet, wherein the test liquid inlet is connected to the first connection point of the sample needle, and the sheath liquid inlet is connected to the sheath liquid cell, wherein the sheath liquid cell is configured to store a sheath liquid, the fifth switching member is connected between the sheath liquid cell and the sheath liquid inlet, and the fifth switching member is configured to implement cutting-off and connecting, wherein the outlet is connected to the first waste liquid cell, the sixth switching member is connected between the first waste liquid cell and the outlet, and the sixth switching member is configured to implement cutting-off and connecting. 19. The sample testing device of claim 2, wherein the sample drawing assembly comprises a second waste liquid cell and a seventh switching member; a negative pressure is generated in the second waste liquid cell, and the seventh switching member is connected between the second waste liquid cell and an end of the first pipeline, an end of the second pipeline or an end of the third pipeline, and the seventh switching member is configured to implement cutting-off and connecting. 20. The sample testing device of claim 1, wherein the sample testing device further comprises a fourth switching member, the fourth switching member is disposed in the first pipeline, and the fourth switching member is located between the third connection point and the second connection point and is configured to implement cutting-off or connecting; and wherein an eighth switching member is disposed in the second pipeline, and the eighth switching member is located between the fourth connection point and the second pipeline and is configured to implement cutting-off or connecting. 21. The sample testing device of claim 1, wherein the first reaction cell group is configured to prepare the first test liquid for counting leukocytes, the second reaction cell group is configured to prepare the second test liquid for counting reticulocytes. 22. A sample testing method, which is performed by using the sample testing device of claim 1, comprising: placing a first biological sample and a second biological sample in the first reaction cell group and the second reaction cell group for treating, respectively, so as to prepare a test liquid; flowing the test liquid in the first reaction cell group to the third connection point of the first pipeline via the second connection point of the first pipeline, and further into the first test liquid preparation section via the third connection point of the first pipeline, and injecting, by the sample injecting assembly, the test liquid from the first test liquid preparation section into the first connection point of the sample needle, and detecting, by the testing assembly, the test liquid in the first reaction cell group which flows to the first connection point of the sample needle at a first time; and flowing the test liquid in the second reaction cell group to the fourth connection point of the second pipeline via the second pipeline, and further into the second test liquid preparation section via the fourth connection point of the second pipeline, and injecting, by the sample injecting assembly, the test liquid from the second test liquid preparation section into the first connection point of the sample needle, and detecting, by the testing assembly, the test liquid in the second reaction cell group which flows to the first connection point of the sample needle at a second time. 23. The method of claim 22, wherein the sample testing device further comprises a sample drawing assembly, and the sample drawing assembly is connected to an end of the first pipeline or an end of the second pipeline, wherein the flowing the test liquid in the first reaction cell group to the first connection point of the sample needle via the second connection point of the first pipeline further comprises: firstly drawing, by the sample drawing assembly, the test liquid from the first reaction cell group into the first test liquid preparation section, and then injecting, by the sample injecting assembly, the test liquid from the first test liquid preparation section into the first connection point of the sample needle, and wherein the flowing the test liquid in the second reaction cell group to the first connection point of the sample needle via the second pipeline comprises: firstly drawing, by the sample drawing assembly, the test liquid from the second reaction cell group into the second test liquid preparation section, and then injecting, by the sample injecting assembly, the test liquid from the second test liquid preparation section into the first connection point of the sample needle. 24. The method of claim 22, wherein the method further comprises: after detecting the test liquid in the first reaction cell group by the testing assembly, cleaning the first pipeline; or after detecting the test liquid in the second reaction cell group by the testing assembly, cleaning the second pipeline. 25. The method of claim 22, wherein the sample testing device further comprises a controller, and the controller is configured to count a number of times that the testing assembly tests the test liquid in the first reaction cell group and a number of times that the testing assembly tests the test liquid in the second reaction cell group, and determine whether the counted numbers of times reach a preset test number, wherein the method further comprises: cleaning the first pipeline after the testing assembly has performed the preset number of tests on the test liquid in the first reaction cell group; or cleaning the second pipeline after the testing assembly has performed the preset test number of tests on the test liquid in the second reaction cell group. 26. The method of claim 22, wherein the reaction assembly further comprises a third reaction cell group, the third reaction cell group is connected to a sixth connection point of the first pipeline, and a test liquid in the third reaction cell group flows to the first connection point of the sample needle via the sixth connection point of the first pipeline, wherein and the sample testing method further comprises: placing a third biological sample in the third reaction cell group for treating, so as to generate a test liquid; and flowing the test liquid in the third reaction cell group to the third connection point of the first pipeline via the sixth connection point of the first pipeline, and further into the first test liquid preparation section via the third connection point of the first pipeline, and injecting, by the sample injecting assembly, the test liquid from the first test liquid preparation section to the first connection point of the sample needle, and detecting, by the testing assembly, the test liquid of the third reaction cell group which flows to the first connection point of the sample needle at a third time. 27. The method of claim 26, wherein the sample testing device further comprises a sample drawing assembly, and the sample drawing assembly is connected to an end of the first pipeline or an end of the second pipeline, wherein the flowing the test liquid in the first reaction cell group to the first connection point of the sample needle via the second connection point of the first pipeline further comprises: firstly drawing, by the sample drawing assembly, the test liquid from the first reaction cell group into the first test liquid preparation section, and then injecting, by the sample injecting assembly, the test liquid from the first test liquid preparation section into the first connection point of the sample needle, wherein the flowing the test liquid in the second reaction cell group to the first connection point of the sample needle via the second pipeline comprises: firstly drawing, by the sample drawing assembly, the test liquid from the second reaction cell group into the second test liquid preparation section, and then injecting, by the sample injecting assembly, the test liquid from the second test liquid preparation section into the first connection point of the sample needle, and wherein the flowing the test liquid in the third reaction cell group to the first connection point of the sample needle via the sixth connection point of the first pipeline further comprises: firstly drawing, by the sample drawing assembly, the test liquid in the third reaction cell group into the first test liquid preparation section by generating a negative pressure, and then injecting, by the sample drawing assembly, the test liquid from the first test liquid preparation section to the first connection point of the sample needle. 28. The method of claim 22, wherein the pipeline assembly further comprises a third pipeline, the reaction assembly further comprises a third reaction cell group, and the third reaction cell group communicates with the third pipeline, wherein a test liquid in the third reaction cell group flows to the first connection point of the sample needle via the third pipeline; the sample injecting assembly is further connected to the seventh connection point of the third pipeline, and a channel between the seventh connection point and the first connection point is a third test liquid preparation section, wherein the sample testing method further comprises: placing a third biological sample in the third reaction cell group for treating, so as to prepare a test liquid; and flowing the test liquid in the third reaction cell group to the seventh connection point of the third pipeline via the third pipeline, and further into the third test liquid preparation section via the seventh connection point of the third pipeline, and injecting, by the sample injecting assembly, the test liquid from the third test liquid preparation section to the first connection point of the sample needle, and detecting, by the testing assembly, the test liquid of the third reaction cell group which flows to the first connection point of the sample needle at a third time. 29. The method of claim 28, wherein the sample testing device further comprises a sample drawing assembly, and the sample drawing assembly is connected to an end of the first pipeline or an end of the second pipeline or an end of the third pipeline, wherein the flowing the test liquid in the first reaction cell group to the first connection point of the sample needle via the second connection point of the first pipeline further comprises: firstly drawing, by the sample drawing assembly, the test liquid from the first reaction cell group into the first test liquid preparation section, and then injecting, by the sample injecting assembly, the test liquid from the first test liquid preparation section into the first connection point of the sample needle, wherein the flowing the test liquid in the second reaction cell group to the first connection point of the sample needle via the second pipeline comprises: firstly drawing, by the sample drawing assembly, the test liquid from the second reaction cell group into the second test liquid preparation section, and then injecting, by the sample injecting assembly, the test liquid from the second test liquid preparation section into the first connection point of the sample needle, wherein the flowing the test liquid in the third reaction cell group to the first connection point of the sample needle via the third pipeline further comprises: firstly drawing, by the sample drawing assembly, the test liquid in the third reaction cell group into the third test liquid preparation section by generating a negative pressure, and then injecting, by the sample injecting assembly, the test liquid from the third test liquid preparation section to the first connection point of the sample needle. 30. A sample analyzer, comprising: a sampling assembly; and a sample testing device, wherein the sampling assembly comprises a sampler which is configured to collect a biological sample and move to a position above the reaction assembly to dispense the biological sample into the reaction assembly, and wherein the sample testing device comprising: a pipeline assembly which comprises a first pipeline and a second pipeline; a testing assembly which comprises a sample needle, wherein the sample needle comprises a first connection point; and a reaction assembly which comprises a first reaction cell group and a second reaction cell group, wherein the first reaction cell group is connected to a second connection point of the first pipeline, and the second reaction cell group communicates with the second pipeline, and the reaction assembly is configured to treat a biological sample to prepare a test liquid; wherein a test liquid in the first reaction cell group flows to the first connection point of the sample needle via the second connection point of the first pipeline, and a test liquid in the second reaction cell group flows to the first connection point of the sample needle via the second pipeline, such that the test liquid in the first reaction cell group or in the second reaction cell group respectively flows into the sample needle of the testing assembly for detecting, wherein the sample testing device further comprises a sample injecting assembly, the sample injecting assembly is respectively connected to a third connection point of the first pipeline and a fourth connection point of the second pipeline, the third connection point is located between the second connection point and the first connection point, a channel between the third connection point and the first connection point is configured as a first test liquid preparation section, and a channel between the fourth connection point and the first connection point is configured as a second test liquid preparation section, wherein the test liquid in the first reaction cell group flows to the third connection point of the first pipeline via the second connection point of the first pipeline, and flows into the first test liquid preparation section via the third connection point of the first pipeline, wherein the test liquid in the second reaction cell group flows to the fourth connection point of the second pipeline via the second pipeline, and flows into the second test liquid preparation section via the fourth connection point of the second pipeline, wherein the sample injecting assembly is configured to inject the test liquid in the first test liquid preparation section or in the second test liquid preparation section into the sample needle of the testing assembly.
A sample testing device, a sample testing method, and a sample analyze are provided. The sample testing device includes a pipeline assembly, a testing assembly, and a reaction assembly. The pipeline assembly includes a first pipeline and a second pipeline. The testing assembly includes a sample needle which includes a first connection point. The reaction assembly includes a first reaction cell group connected to a second connection point of the first pipeline and a second reaction cell group which communicates with the second pipeline, and the reaction assembly is configured to treat a biological sample to prepare a test liquid. A test liquid in the first reaction cell group flows to the first connection point via the second connection point of the first pipeline, and a test liquid in the second reaction cell group flows to the first connection point via the second pipeline.1. A sample testing device, comprising: a pipeline assembly which comprises a first pipeline and a second pipeline; a testing assembly which comprises a sample needle, wherein the sample needle comprises a first connection point; and a reaction assembly which comprises a first reaction cell group and a second reaction cell group, wherein the first reaction cell group is connected to a second connection point of the first pipeline, and the second reaction cell group communicates with the second pipeline, and the reaction assembly is configured to treat a biological sample to prepare a test liquid; wherein a test liquid in the first reaction cell group flows to the first connection point of the sample needle via the second connection point of the first pipeline, and a test liquid in the second reaction cell group flows to the first connection point of the sample needle via the second pipeline, such that the test liquid in the first reaction cell group or in the second reaction cell group respectively flows into the sample needle of the testing assembly for detecting, wherein the sample testing device further comprises a sample injecting assembly, the sample injecting assembly is respectively connected to a third connection point of the first pipeline and a fourth connection point of the second pipeline, the third connection point is located between the second connection point and the first connection point, a channel between the third connection point and the first connection point is configured as a first test liquid preparation section, and a channel between the fourth connection point and the first connection point is configured as a second test liquid preparation section, wherein the test liquid in the first reaction cell group flows to the third connection point of the first pipeline via the second connection point of the first pipeline, and flows into the first test liquid preparation section via the third connection point of the first pipeline, wherein the test liquid in the second reaction cell group flows to the fourth connection point of the second pipeline via the second pipeline, and flows into the second test liquid preparation section via the fourth connection point of the second pipeline, wherein the sample injecting assembly is configured to inject the test liquid in the first test liquid preparation section or in the second test liquid preparation section into the sample needle of the testing assembly. 2. The sample testing device of claim 1, wherein the sample testing device further comprises a sample drawing assembly, the sample drawing assembly is connected to an end of the first pipeline or an end of the second pipeline, and the sample drawing assembly is configured to generate a negative pressure to correspondingly draw the test liquid in the first reaction cell group into the first test liquid preparation section, or draw the test liquid in the second reaction cell group into the second test liquid preparation section. 3. The sample testing device of claim 1, wherein the sample testing device further comprises a first cleaning assembly and a second cleaning assembly, the first cleaning assembly is connected to the first pipeline, and a cleaning fluid in the first cleaning assembly flows into the first pipeline to clean the first pipeline, and wherein the second cleaning assembly is connected to the second pipeline, and a cleaning fluid in the second cleaning assembly flows into the second pipeline to clean the second pipeline. 4. The sample testing device of claim 1, wherein the sample testing device comprises a third cleaning assembly, the first pipeline and the second pipeline are commonly connected to the third cleaning assembly, and a cleaning fluid in the third cleaning assembly flows into the first pipeline or the second pipeline to clean the first pipeline or the second pipeline. 5. The sample testing device of claim 4, wherein the second reaction cell group is further connected to a fifth connection point of the first pipeline, and the third cleaning assembly is connected to an end of the first pipeline, wherein the cleaning fluid in the third cleaning assembly flows into the first pipeline from the end of the first pipeline to clean the first pipeline, or the cleaning liquid in the third cleaning assembly flows from the end of the first pipeline to the fifth connection point of the first pipeline, and flows from the fifth connection point into the connection point of the second reaction cell group in the second pipeline to clean the second pipeline. 6. The sample testing device of claim 1, wherein the reaction assembly further comprises a third reaction cell group, the third reaction cell group is connected to a sixth connection point of the first pipeline, and a test liquid in the third reaction cell group flows to the first connection point of the sample needle via the sixth connection point of the first pipeline, so that the test liquid in the third reaction cell group flows into the sample needle of the testing assembly for detecting, wherein the test liquid in the first reaction cell group or the third reaction cell group respectively flows to the third connection point of the first pipeline via the second connection point of the first pipeline or the sixth connection point of the first pipeline, and flows into the first test liquid preparation section via the third connection point of the first pipeline, or the test liquid in the second reaction cell group flows to the fourth connection point of the second pipeline via the second pipeline, and flows into the second test liquid preparation section via the fourth connection point of the second pipeline. 7. The sample testing device of claim 1, wherein the sample injecting assembly comprises an injector, a selection switching member disposed at an injection port of the injector, a fourth branch and a fifth branch; one end of the fourth branch and one end of the fifth branch are respectively connected to the third connection point and the fourth connection point, another end of the fourth branch and another end of the fifth branch are commonly disposed at the selection switching member, and the selection switching member is configured to switch between the fourth branch and the fifth branch to communication with the injector. 8. The sample testing device of claim 7, wherein the sample testing device further comprises a sample drawing assembly, the sample drawing assembly is connected to an end of the first pipeline or an end of the second pipeline, and the sample drawing assembly is configured to: generate a negative pressure to draw the test liquid in the first reaction cell group or in the third reaction cell group into the first test liquid preparation section; or generate a negative pressure to draw the test liquid in the second reaction cell group into the second test liquid preparation section. 9. The sample testing device of claim 1, wherein the pipeline assembly further comprises a third pipeline, the reaction assembly further comprises a third reaction cell group, and the third reaction cell group communicates with the third pipeline; and a test liquid in the third reaction cell group flows to the first connection point of the sample needle via the third pipeline, so that the test liquid in the third reaction cell group flows into the sample needle of the testing assembly for detecting. 10. The sample testing device of claim 9, wherein the sample injecting assembly is further connected to a seventh connection point of the third pipeline, and a channel between the seventh connection point and the first connection point is a third test liquid preparation section, wherein the test liquid in the third reaction cell group flows via the third pipeline to the seventh connection point of the third pipeline, and flows into the third test liquid preparation section via the seventh connection point of the third pipeline, wherein the sample injecting assembly is configured to inject the test liquid in the first test liquid preparation section, the test liquid in the second test liquid preparation section or the test liquid in the third test liquid preparation section into the sample needle of the testing assembly. 11. The sample testing device of claim 10, wherein the sample injecting assembly comprises an injector, a selection switching member disposed at an injection port of the injector, a fourth branch, a fifth branch and a sixth branch; one end of the fourth branch, one end of the fifth branch and one end of the sixth branch are respectively connected to the third connection point, the fourth connection point and the seventh connection point, another end of the fourth branch, another end of the fifth branch and another end of the sixth branch are commonly disposed at the selection switching member, and the selection switching member is configured to switch between the fourth branch, the fifth branch and the sixth branch to communication with the injector. 12. The sample testing device of claim 10, wherein the sample testing device further comprises a sample drawing assembly, the sample drawing assembly is connected to an end of the first pipeline, an end of the second pipeline, or an end of the third pipeline, and the sample drawing assembly is configured to generate a negative pressure to correspondingly draw the test liquid in the first reaction cell group into the first test liquid preparation section, or draw the test liquid in the second reaction cell group into the second test liquid preparation section, or draw the test liquid in the third reaction cell group into the third test liquid preparation section. 13. The sample testing device of claim 1 ; wherein the second cell group is directly connected to the second pipeline; or, wherein the second reaction cell group is connected to the second pipeline indirectly via the first pipeline. 14. The sample testing device of claim 1, wherein the second reaction cell group is further connected to a fifth connection point of the first pipeline, and the second pipeline is connected to an eighth connection point of the first pipeline, the test liquid in the second reaction cell group flows from the fifth connection point to the eighth connection point, and flows into the second pipeline from the eighth connection point such that the second reaction cell group communicates with the second pipeline; or, wherein the second reaction cell group is further connected to a fifth connection point of the first pipeline, and the second pipeline is connected to an eighth connection point of the second pipeline, the test liquid in the first reaction cell group flows from the second connection point to the eighth connection point, and flows from the eighth connection point to the first connection point; the second pipeline is connected to the eighth connection point of the first pipeline, and the test liquid in the second reaction cell group flows from the fifth connection point to the eighth connection point, and flows into the second pipeline from the eighth connection point such that the second reaction cell group communicates with the second pipeline; or, wherein the second pipeline and the second reaction cell group are commonly connected to the fifth connection point of the first pipeline, and the test liquid in the second reaction cell group flows into the second pipeline from the fifth connection point such that the second reaction cell group communicates with the second pipeline. 15. The sample testing device of claim 1, wherein the second pipeline is connected to a tenth connection point of the first pipeline, and the tenth connection point communicates with the first connection point of the sample needle, the test liquid in the second reaction cell group flows to the tenth connection point of the first pipeline via the second pipeline, and flows from the tenth connection point of the first pipeline to the first connection point of the sample needle. 16. The sample testing device of claim 15, wherein the test liquid in the first reaction cell group does not flow through the tenth connection point of the first pipeline when flowing from the second connection point of the first pipeline to the first connection point of the sample needle. 17. The sample testing device of claim 1, wherein the first reaction cell group comprises a first reaction cell, a first branch, and a first switching member; the first reaction cell is configured to prepare a first test liquid, the first branch is connected between the first reaction cell and the second connection point, and the first switching member is disposed in the first branch and is configured to implement cutting-off and connecting of the first branch; and wherein the second reaction cell group comprises a second reaction cell, a second branch, and a second switching member, wherein the second reaction cell is configured to prepare a second test liquid, one end of the second branch is connected to the second reaction cell, the second branch communicates with the second pipeline, and the second switching member is disposed in the second branch and is configured to implement cutting-off or connecting of the second branch. 18. The sample testing device of claim 1, wherein the testing assembly further comprises a flow chamber, a sheath liquid cell, a fifth switching member, a first waste liquid cell, and a sixth switching member, wherein the flow chamber has an test liquid inlet, a sheath liquid inlet, and an outlet, wherein the test liquid inlet is connected to the first connection point of the sample needle, and the sheath liquid inlet is connected to the sheath liquid cell, wherein the sheath liquid cell is configured to store a sheath liquid, the fifth switching member is connected between the sheath liquid cell and the sheath liquid inlet, and the fifth switching member is configured to implement cutting-off and connecting, wherein the outlet is connected to the first waste liquid cell, the sixth switching member is connected between the first waste liquid cell and the outlet, and the sixth switching member is configured to implement cutting-off and connecting. 19. The sample testing device of claim 2, wherein the sample drawing assembly comprises a second waste liquid cell and a seventh switching member; a negative pressure is generated in the second waste liquid cell, and the seventh switching member is connected between the second waste liquid cell and an end of the first pipeline, an end of the second pipeline or an end of the third pipeline, and the seventh switching member is configured to implement cutting-off and connecting. 20. The sample testing device of claim 1, wherein the sample testing device further comprises a fourth switching member, the fourth switching member is disposed in the first pipeline, and the fourth switching member is located between the third connection point and the second connection point and is configured to implement cutting-off or connecting; and wherein an eighth switching member is disposed in the second pipeline, and the eighth switching member is located between the fourth connection point and the second pipeline and is configured to implement cutting-off or connecting. 21. The sample testing device of claim 1, wherein the first reaction cell group is configured to prepare the first test liquid for counting leukocytes, the second reaction cell group is configured to prepare the second test liquid for counting reticulocytes. 22. A sample testing method, which is performed by using the sample testing device of claim 1, comprising: placing a first biological sample and a second biological sample in the first reaction cell group and the second reaction cell group for treating, respectively, so as to prepare a test liquid; flowing the test liquid in the first reaction cell group to the third connection point of the first pipeline via the second connection point of the first pipeline, and further into the first test liquid preparation section via the third connection point of the first pipeline, and injecting, by the sample injecting assembly, the test liquid from the first test liquid preparation section into the first connection point of the sample needle, and detecting, by the testing assembly, the test liquid in the first reaction cell group which flows to the first connection point of the sample needle at a first time; and flowing the test liquid in the second reaction cell group to the fourth connection point of the second pipeline via the second pipeline, and further into the second test liquid preparation section via the fourth connection point of the second pipeline, and injecting, by the sample injecting assembly, the test liquid from the second test liquid preparation section into the first connection point of the sample needle, and detecting, by the testing assembly, the test liquid in the second reaction cell group which flows to the first connection point of the sample needle at a second time. 23. The method of claim 22, wherein the sample testing device further comprises a sample drawing assembly, and the sample drawing assembly is connected to an end of the first pipeline or an end of the second pipeline, wherein the flowing the test liquid in the first reaction cell group to the first connection point of the sample needle via the second connection point of the first pipeline further comprises: firstly drawing, by the sample drawing assembly, the test liquid from the first reaction cell group into the first test liquid preparation section, and then injecting, by the sample injecting assembly, the test liquid from the first test liquid preparation section into the first connection point of the sample needle, and wherein the flowing the test liquid in the second reaction cell group to the first connection point of the sample needle via the second pipeline comprises: firstly drawing, by the sample drawing assembly, the test liquid from the second reaction cell group into the second test liquid preparation section, and then injecting, by the sample injecting assembly, the test liquid from the second test liquid preparation section into the first connection point of the sample needle. 24. The method of claim 22, wherein the method further comprises: after detecting the test liquid in the first reaction cell group by the testing assembly, cleaning the first pipeline; or after detecting the test liquid in the second reaction cell group by the testing assembly, cleaning the second pipeline. 25. The method of claim 22, wherein the sample testing device further comprises a controller, and the controller is configured to count a number of times that the testing assembly tests the test liquid in the first reaction cell group and a number of times that the testing assembly tests the test liquid in the second reaction cell group, and determine whether the counted numbers of times reach a preset test number, wherein the method further comprises: cleaning the first pipeline after the testing assembly has performed the preset number of tests on the test liquid in the first reaction cell group; or cleaning the second pipeline after the testing assembly has performed the preset test number of tests on the test liquid in the second reaction cell group. 26. The method of claim 22, wherein the reaction assembly further comprises a third reaction cell group, the third reaction cell group is connected to a sixth connection point of the first pipeline, and a test liquid in the third reaction cell group flows to the first connection point of the sample needle via the sixth connection point of the first pipeline, wherein and the sample testing method further comprises: placing a third biological sample in the third reaction cell group for treating, so as to generate a test liquid; and flowing the test liquid in the third reaction cell group to the third connection point of the first pipeline via the sixth connection point of the first pipeline, and further into the first test liquid preparation section via the third connection point of the first pipeline, and injecting, by the sample injecting assembly, the test liquid from the first test liquid preparation section to the first connection point of the sample needle, and detecting, by the testing assembly, the test liquid of the third reaction cell group which flows to the first connection point of the sample needle at a third time. 27. The method of claim 26, wherein the sample testing device further comprises a sample drawing assembly, and the sample drawing assembly is connected to an end of the first pipeline or an end of the second pipeline, wherein the flowing the test liquid in the first reaction cell group to the first connection point of the sample needle via the second connection point of the first pipeline further comprises: firstly drawing, by the sample drawing assembly, the test liquid from the first reaction cell group into the first test liquid preparation section, and then injecting, by the sample injecting assembly, the test liquid from the first test liquid preparation section into the first connection point of the sample needle, wherein the flowing the test liquid in the second reaction cell group to the first connection point of the sample needle via the second pipeline comprises: firstly drawing, by the sample drawing assembly, the test liquid from the second reaction cell group into the second test liquid preparation section, and then injecting, by the sample injecting assembly, the test liquid from the second test liquid preparation section into the first connection point of the sample needle, and wherein the flowing the test liquid in the third reaction cell group to the first connection point of the sample needle via the sixth connection point of the first pipeline further comprises: firstly drawing, by the sample drawing assembly, the test liquid in the third reaction cell group into the first test liquid preparation section by generating a negative pressure, and then injecting, by the sample drawing assembly, the test liquid from the first test liquid preparation section to the first connection point of the sample needle. 28. The method of claim 22, wherein the pipeline assembly further comprises a third pipeline, the reaction assembly further comprises a third reaction cell group, and the third reaction cell group communicates with the third pipeline, wherein a test liquid in the third reaction cell group flows to the first connection point of the sample needle via the third pipeline; the sample injecting assembly is further connected to the seventh connection point of the third pipeline, and a channel between the seventh connection point and the first connection point is a third test liquid preparation section, wherein the sample testing method further comprises: placing a third biological sample in the third reaction cell group for treating, so as to prepare a test liquid; and flowing the test liquid in the third reaction cell group to the seventh connection point of the third pipeline via the third pipeline, and further into the third test liquid preparation section via the seventh connection point of the third pipeline, and injecting, by the sample injecting assembly, the test liquid from the third test liquid preparation section to the first connection point of the sample needle, and detecting, by the testing assembly, the test liquid of the third reaction cell group which flows to the first connection point of the sample needle at a third time. 29. The method of claim 28, wherein the sample testing device further comprises a sample drawing assembly, and the sample drawing assembly is connected to an end of the first pipeline or an end of the second pipeline or an end of the third pipeline, wherein the flowing the test liquid in the first reaction cell group to the first connection point of the sample needle via the second connection point of the first pipeline further comprises: firstly drawing, by the sample drawing assembly, the test liquid from the first reaction cell group into the first test liquid preparation section, and then injecting, by the sample injecting assembly, the test liquid from the first test liquid preparation section into the first connection point of the sample needle, wherein the flowing the test liquid in the second reaction cell group to the first connection point of the sample needle via the second pipeline comprises: firstly drawing, by the sample drawing assembly, the test liquid from the second reaction cell group into the second test liquid preparation section, and then injecting, by the sample injecting assembly, the test liquid from the second test liquid preparation section into the first connection point of the sample needle, wherein the flowing the test liquid in the third reaction cell group to the first connection point of the sample needle via the third pipeline further comprises: firstly drawing, by the sample drawing assembly, the test liquid in the third reaction cell group into the third test liquid preparation section by generating a negative pressure, and then injecting, by the sample injecting assembly, the test liquid from the third test liquid preparation section to the first connection point of the sample needle. 30. A sample analyzer, comprising: a sampling assembly; and a sample testing device, wherein the sampling assembly comprises a sampler which is configured to collect a biological sample and move to a position above the reaction assembly to dispense the biological sample into the reaction assembly, and wherein the sample testing device comprising: a pipeline assembly which comprises a first pipeline and a second pipeline; a testing assembly which comprises a sample needle, wherein the sample needle comprises a first connection point; and a reaction assembly which comprises a first reaction cell group and a second reaction cell group, wherein the first reaction cell group is connected to a second connection point of the first pipeline, and the second reaction cell group communicates with the second pipeline, and the reaction assembly is configured to treat a biological sample to prepare a test liquid; wherein a test liquid in the first reaction cell group flows to the first connection point of the sample needle via the second connection point of the first pipeline, and a test liquid in the second reaction cell group flows to the first connection point of the sample needle via the second pipeline, such that the test liquid in the first reaction cell group or in the second reaction cell group respectively flows into the sample needle of the testing assembly for detecting, wherein the sample testing device further comprises a sample injecting assembly, the sample injecting assembly is respectively connected to a third connection point of the first pipeline and a fourth connection point of the second pipeline, the third connection point is located between the second connection point and the first connection point, a channel between the third connection point and the first connection point is configured as a first test liquid preparation section, and a channel between the fourth connection point and the first connection point is configured as a second test liquid preparation section, wherein the test liquid in the first reaction cell group flows to the third connection point of the first pipeline via the second connection point of the first pipeline, and flows into the first test liquid preparation section via the third connection point of the first pipeline, wherein the test liquid in the second reaction cell group flows to the fourth connection point of the second pipeline via the second pipeline, and flows into the second test liquid preparation section via the fourth connection point of the second pipeline, wherein the sample injecting assembly is configured to inject the test liquid in the first test liquid preparation section or in the second test liquid preparation section into the sample needle of the testing assembly.
1,700
340,108
16,801,074
1,731
Methods, systems, and apparatuses for programmatically managing integration of a third party resource in a group-based communication system are provided herein.
1. An apparatus for managing integration of a third party resource in a group-based communication system, the apparatus comprising at least one processor and at least one memory including a computer program code, the at least one memory and the computer program code configured to, with the at least one processor, cause the apparatus to: receive a workspace creation request from a client device associated with a first user profile identifier; generate and store, in response to receiving the workspace creation request, a group identifier associated with a new workspace; generate a third party resource integration interface comprising a third party resource provider identifier associated with the group identifier; and cause rendering of the third party resource integration interface in a group-based communication interface associated with the group identifier, wherein the third party resource integration interface is engageable to cause receiving of a third party resource integration user confirmation, and wherein the third party resource integration user confirmation comprises a third party user account identifier. 2. The apparatus of claim 1, wherein the third party resource provider identifier is previously associated with another group identifier associated with the first user profile identifier. 3. The apparatus of claim 1, wherein a third party resource identified by the third party resource provider identifier is integrated within the group-based communication system and utilized in one or more other workspaces associated with an organization identifier associated with the first user profile identifier. 4. The apparatus of claim 1, wherein the third party resource integration interface is configured to, when engaged, to render a description associated with the third party resource provider identifier. 5. The apparatus of claim 4, wherein the description further comprises data representing one or more access rights comprising one or more of: right to transmit third party resource access token, right to transmit group-based communication message, right to access one or more email addresses associated with one or more user identifiers associated with the new workspace, or right to access information regarding one or more group-based communication channel associated with a second user profile. 6. The apparatus of claim 1, wherein the third party resource provider identifier is provided based on one or more of: a usage statistics of third party resources associated with the organization identifiers, a usage statistics of third party resources associated with one or more organizations similar to an organization identified by the organization identifier, or a general usage statistics. 7. The apparatus of claim 1, wherein the at least one memory and the computer program code further configured to, with the at least one processor, cause the apparatus to: record a number of interactions with the third party resource integration interface that indicates a third party resource integration user dismissal. 8. The apparatus of claim 1, wherein the at least one memory and the computer program code further configured to, with the at least one processor, cause the apparatus to: identify a second organization identifier with an organization similarity score higher than a pre-defined threshold between the organization identifier and the second organization identifier; access a third party resource usage map associated with the second organization identifier to identify a most-utilized third party resource identifier associated with the second organization identifier; store the most-utilized third party resource identifier as the third party resource provider identifier. 9. The apparatus of claim 1, wherein a second user profile is previously associated with an email address associated with the third party resource provider identifier. 10. The apparatus of claim 1, wherein the at least one memory and the computer program code further configured to, with the at least one processor, cause the apparatus to: upon receiving the third party resource integration user confirmation, transmit, a third party resource provider associated with the third party resource provider identifier, a third party user account integration request comprising the third party user account identifier; and receive, from the third party resource provider associated with the third party resource provider identifier, a third party resource integration provider confirmation comprising a third party resource access token. 11. A computer implemented method for managing integration of a third party resource in a group-based communication system, the method comprising: receiving a workspace creation request from a client device associated with a first user profile identifier; generating and storing, in response to receiving the workspace creation request, a group identifier associated with a new workspace; generating a third party resource integration interface comprising a third party resource provider identifier associated with the group identifier; and causing rendering of the third party resource integration interface in a group-based communication interface associated with the group identifier, wherein the third party resource integration interface is engageable to cause receiving of a third party resource integration user confirmation, and wherein the third party resource integration user confirmation comprises a third party user account identifier. 12. The method of claim 11, wherein the third party resource provider identifier is previously associated with another group identifier associated with the first user profile identifier. 13. The method of claim 11 wherein a third party resource identified by the third party resource provider identifier is integrated within the group-based communication system and utilized in one or more other workspaces associated with an organization identifier associated with the first user profile identifier. 14. The method of claim 11, wherein the third party resource integration interface is configured to, when engaged, to render a description associated with the third party resource provider identifier. 15. The method of claim 14, wherein the description further comprises data representing one or more access rights comprising one or more of: right to transmit third party resource access token, right to transmit group-based communication message, right to access one or more email addresses associated with one or more user identifiers associated with the new workspace, or right to access information regarding one or more group-based communication channel associated with a second user profile. 16. The method of claim 11, wherein the third party resource provider identifier is provided based on one or more of: a usage statistics of third party resources associated with the organization identifiers, a usage statistics of third party resources associated with one or more organizations similar to an organization identified by the organization identifier, or a general usage statistics. 17. The method of claim 11, further comprising: recording a number of interactions with the third party resource integration interface that indicates a third party resource integration user dismissal. 18. The method of claim 16, further comprising: identifying a second organization identifier with an organization similarity score higher than a pre-defined threshold between the organization identifier and the second organization identifier; accessing a third party resource usage map associated with the second organization identifier to identify a most-utilized third party resource identifier associated with the second organization identifier; storing the most-utilized third party resource identifier as the third party resource provider identifier. 19. The method of claim 11, wherein a second user profile is previously associated with an email address associated with the third party resource provider identifier. 20. The method of claim 11, further comprising: upon receiving the third party resource integration user confirmation, transmitting, to a third party resource provider associated with the third party resource provider identifier, a third party user account integration request comprising the third party user account identifier; and receiving, from the third party resource provider, a third party resource integration provider confirmation comprising a third party resource access token.
Methods, systems, and apparatuses for programmatically managing integration of a third party resource in a group-based communication system are provided herein.1. An apparatus for managing integration of a third party resource in a group-based communication system, the apparatus comprising at least one processor and at least one memory including a computer program code, the at least one memory and the computer program code configured to, with the at least one processor, cause the apparatus to: receive a workspace creation request from a client device associated with a first user profile identifier; generate and store, in response to receiving the workspace creation request, a group identifier associated with a new workspace; generate a third party resource integration interface comprising a third party resource provider identifier associated with the group identifier; and cause rendering of the third party resource integration interface in a group-based communication interface associated with the group identifier, wherein the third party resource integration interface is engageable to cause receiving of a third party resource integration user confirmation, and wherein the third party resource integration user confirmation comprises a third party user account identifier. 2. The apparatus of claim 1, wherein the third party resource provider identifier is previously associated with another group identifier associated with the first user profile identifier. 3. The apparatus of claim 1, wherein a third party resource identified by the third party resource provider identifier is integrated within the group-based communication system and utilized in one or more other workspaces associated with an organization identifier associated with the first user profile identifier. 4. The apparatus of claim 1, wherein the third party resource integration interface is configured to, when engaged, to render a description associated with the third party resource provider identifier. 5. The apparatus of claim 4, wherein the description further comprises data representing one or more access rights comprising one or more of: right to transmit third party resource access token, right to transmit group-based communication message, right to access one or more email addresses associated with one or more user identifiers associated with the new workspace, or right to access information regarding one or more group-based communication channel associated with a second user profile. 6. The apparatus of claim 1, wherein the third party resource provider identifier is provided based on one or more of: a usage statistics of third party resources associated with the organization identifiers, a usage statistics of third party resources associated with one or more organizations similar to an organization identified by the organization identifier, or a general usage statistics. 7. The apparatus of claim 1, wherein the at least one memory and the computer program code further configured to, with the at least one processor, cause the apparatus to: record a number of interactions with the third party resource integration interface that indicates a third party resource integration user dismissal. 8. The apparatus of claim 1, wherein the at least one memory and the computer program code further configured to, with the at least one processor, cause the apparatus to: identify a second organization identifier with an organization similarity score higher than a pre-defined threshold between the organization identifier and the second organization identifier; access a third party resource usage map associated with the second organization identifier to identify a most-utilized third party resource identifier associated with the second organization identifier; store the most-utilized third party resource identifier as the third party resource provider identifier. 9. The apparatus of claim 1, wherein a second user profile is previously associated with an email address associated with the third party resource provider identifier. 10. The apparatus of claim 1, wherein the at least one memory and the computer program code further configured to, with the at least one processor, cause the apparatus to: upon receiving the third party resource integration user confirmation, transmit, a third party resource provider associated with the third party resource provider identifier, a third party user account integration request comprising the third party user account identifier; and receive, from the third party resource provider associated with the third party resource provider identifier, a third party resource integration provider confirmation comprising a third party resource access token. 11. A computer implemented method for managing integration of a third party resource in a group-based communication system, the method comprising: receiving a workspace creation request from a client device associated with a first user profile identifier; generating and storing, in response to receiving the workspace creation request, a group identifier associated with a new workspace; generating a third party resource integration interface comprising a third party resource provider identifier associated with the group identifier; and causing rendering of the third party resource integration interface in a group-based communication interface associated with the group identifier, wherein the third party resource integration interface is engageable to cause receiving of a third party resource integration user confirmation, and wherein the third party resource integration user confirmation comprises a third party user account identifier. 12. The method of claim 11, wherein the third party resource provider identifier is previously associated with another group identifier associated with the first user profile identifier. 13. The method of claim 11 wherein a third party resource identified by the third party resource provider identifier is integrated within the group-based communication system and utilized in one or more other workspaces associated with an organization identifier associated with the first user profile identifier. 14. The method of claim 11, wherein the third party resource integration interface is configured to, when engaged, to render a description associated with the third party resource provider identifier. 15. The method of claim 14, wherein the description further comprises data representing one or more access rights comprising one or more of: right to transmit third party resource access token, right to transmit group-based communication message, right to access one or more email addresses associated with one or more user identifiers associated with the new workspace, or right to access information regarding one or more group-based communication channel associated with a second user profile. 16. The method of claim 11, wherein the third party resource provider identifier is provided based on one or more of: a usage statistics of third party resources associated with the organization identifiers, a usage statistics of third party resources associated with one or more organizations similar to an organization identified by the organization identifier, or a general usage statistics. 17. The method of claim 11, further comprising: recording a number of interactions with the third party resource integration interface that indicates a third party resource integration user dismissal. 18. The method of claim 16, further comprising: identifying a second organization identifier with an organization similarity score higher than a pre-defined threshold between the organization identifier and the second organization identifier; accessing a third party resource usage map associated with the second organization identifier to identify a most-utilized third party resource identifier associated with the second organization identifier; storing the most-utilized third party resource identifier as the third party resource provider identifier. 19. The method of claim 11, wherein a second user profile is previously associated with an email address associated with the third party resource provider identifier. 20. The method of claim 11, further comprising: upon receiving the third party resource integration user confirmation, transmitting, to a third party resource provider associated with the third party resource provider identifier, a third party user account integration request comprising the third party user account identifier; and receiving, from the third party resource provider, a third party resource integration provider confirmation comprising a third party resource access token.
1,700
340,109
16,801,089
3,752
An oscillating range adjusting module with modular design for being mounted into a sprinkler is revealed. The oscillating range adjusting module which includes a first adjusting unit and a second adjusting unit is located between a water-in control module and an oscillation driving module. During assembly, the first adjusting unit is fitted on an inlet tube of a water-in control module. After an O-ring being connected to the first adjusting unit, the second adjusting unit is mounted on the inlet tube and connected to the first adjusting unit by at least one fastener of the second adjusting unit engaged with at least one connection surface of the first adjusting unit. Lastly a water inlet of the oscillation driving module is connected to the second adjusting unit. Thereby, a modular assembly of the oscillating range adjusting module between the oscillation driving module and the water-in control module is achieved.
1. An oscillating range adjusting module, adapted for using in a sprinkler and connected between a water-in control module and an oscillation driving module, comprising: a first adjusting unit, including a first circular plate and a first circular side wall disposed on a top surface of the first circular plate, and having a first curved slot disposed on the first circular plate and located close to the first circular side wall; and a second adjusting unit, including a second circular plate having a top surface connected to a bottom surface of the first circular plate, a second circular side wall formed on a bottom surface of the second circular plate, and having a second curved slot disposed on the second circular plate and located close to the second circular side wall; wherein the first adjusting unit further includes a hollow connecting cylinder formed on a center of the first circular plate and at least one connection surface, wherein the hollow connecting cylinder is connected to an inlet tube of the water-in control module while the connection surface is formed on an edge at the bottom of the hollow connecting cylinder; wherein the second adjusting unit further has an assembly hole formed on a center of the second circular plate and comprises at least one snapping member, wherein the assembly hole is connected to the bottom of the hollow connecting cylinder for connection to a water inlet of the oscillation driving module while the snapping member is formed on the top surface of the second circular plate for being engaged with the connection surface of the first adjusting unit so as to connect the first adjusting unit and the second adjusting unit. 2. The oscillating range adjusting module as claimed in claim 1, wherein the oscillating range adjusting module further includes an O-ring clipped between the bottom of the hollow connecting cylinder and the edge of the assembly hole. 3. The oscillating range adjusting module as claimed in claim 1, wherein the first adjusting unit further includes a first pull member and has a third curved slot and a limiting curved groove, wherein the third curved slot is disposed on the first circular plate and located beside the hollow connecting cylinder, close to the first circular side wall, wherein the first pull member is connected to an outer surface of the first circular side wall and located beside the hollow connecting cylinder, opposite to the first curved slot, wherein the limiting curved groove is formed on the bottom surface of the first circular plate. 4. The oscillating range adjusting module as claimed in claim 3, wherein the second adjusting unit further has a fourth curved slot and includes a second pull member and a limiting curved protrusion, wherein the fourth curved slot is disposed on the second circular plate and located beside the assembly hole, close to the second circular side wall, wherein the second pull member is connected to an outer surface of the second circular side wall and located beside the assembly hole, opposite to the second curved slot, wherein the limiting curved protrusion is formed on the top surface of the second circular plate and mounted into the limiting curved groove. 5. The oscillating range adjusting module as claimed in claim 3, wherein the second adjusting unit further includes at least one insertion member which is formed on the top surface of the second circular plate and inserted into the third curved slot or the first curved slot. 6. The oscillating range adjusting module as claimed in claim 1, wherein a mounting groove is formed at an inner surface of the hollow connecting cylinder for mounting an O-ring therein. 7. An oscillating range adjusting module, adapted to be used in a sprinkler and connected between a water-in control module and an oscillation driving module, comprising: a first adjusting unit, including a first circular plate, a first circular side wall disposed on a top surface of the first circular plate, and a hollow connecting cylinder which is formed on a center of the first circular plate, and having a first curved slot disposed on the first circular plate and located beside the hollow connecting cylinder, close to the first circular side wall; and a second adjusting unit, including a second circular plate having a top surface connected to a bottom surface of the first circular plate, a second circular side wall formed on a bottom surface of the second circular plate, and having an assembly hole formed on a center of the second circular plate and connected to the bottom of the hollow connecting cylinder, and a second curved slot disposed on the second circular plate and located beside the assembly hole, close to the second circular side wall; wherein the hollow connecting cylinder is configured to be connected to an inlet tube of the water-in control module, wherein at least one connection surface is formed on an edge at the bottom of the hollow connecting cylinder of the first adjusting unit, wherein the assembly hole is arranged for connection to a water inlet of the oscillation driving module, wherein at least one snapping member is formed on the top surface of the second circular plate for being engaged with the connection surface of the first adjusting unit so as to connect the first adjusting unit and the second adjusting unit. 8. The oscillating range adjusting module as claimed in claim 7, wherein the oscillating range adjusting module further includes an O-ring clipped between the bottom of the hollow connecting cylinder and the edge of the assembly hole. 9. The oscillating range adjusting module as claimed in claim 7, wherein the first adjusting unit further includes a first pull member and has a third curved slot and a limiting curved groove, wherein the third curved slot is disposed on the first circular plate and located beside the hollow connecting cylinder, close to the first circular side wall, wherein the first pull member is connected to an outer surface of the first circular side wall and located beside the hollow connecting cylinder, opposite to the first curved slot, wherein the limiting curved groove is formed on the bottom surface of the first circular plate. 10. The oscillating range adjusting module as claimed in claim 9, wherein the second adjusting unit further has a fourth curved slot and includes a second pull member and a limiting curved protrusion, wherein the fourth curved slot is disposed on the second circular plate and located beside the assembly hole, close to the second circular side wall, wherein the second pull member is connected to an outer surface of the second circular side wall and located beside the assembly hole, opposite to the second curved slot, wherein the limiting curved protrusion is formed on the top surface of the second circular plate and mounted into the limiting curved groove. 11. The oscillating range adjusting module as claimed in claim 9, wherein the second adjusting unit further includes at least one insertion member which is formed on the top surface of the second circular plate and inserted into the third curved slot or the first curved slot. 12. The oscillating range adjusting module as claimed in claim 7, wherein a mounting groove is formed at an inner surface of the hollow connecting cylinder for mounting an O-ring therein.
An oscillating range adjusting module with modular design for being mounted into a sprinkler is revealed. The oscillating range adjusting module which includes a first adjusting unit and a second adjusting unit is located between a water-in control module and an oscillation driving module. During assembly, the first adjusting unit is fitted on an inlet tube of a water-in control module. After an O-ring being connected to the first adjusting unit, the second adjusting unit is mounted on the inlet tube and connected to the first adjusting unit by at least one fastener of the second adjusting unit engaged with at least one connection surface of the first adjusting unit. Lastly a water inlet of the oscillation driving module is connected to the second adjusting unit. Thereby, a modular assembly of the oscillating range adjusting module between the oscillation driving module and the water-in control module is achieved.1. An oscillating range adjusting module, adapted for using in a sprinkler and connected between a water-in control module and an oscillation driving module, comprising: a first adjusting unit, including a first circular plate and a first circular side wall disposed on a top surface of the first circular plate, and having a first curved slot disposed on the first circular plate and located close to the first circular side wall; and a second adjusting unit, including a second circular plate having a top surface connected to a bottom surface of the first circular plate, a second circular side wall formed on a bottom surface of the second circular plate, and having a second curved slot disposed on the second circular plate and located close to the second circular side wall; wherein the first adjusting unit further includes a hollow connecting cylinder formed on a center of the first circular plate and at least one connection surface, wherein the hollow connecting cylinder is connected to an inlet tube of the water-in control module while the connection surface is formed on an edge at the bottom of the hollow connecting cylinder; wherein the second adjusting unit further has an assembly hole formed on a center of the second circular plate and comprises at least one snapping member, wherein the assembly hole is connected to the bottom of the hollow connecting cylinder for connection to a water inlet of the oscillation driving module while the snapping member is formed on the top surface of the second circular plate for being engaged with the connection surface of the first adjusting unit so as to connect the first adjusting unit and the second adjusting unit. 2. The oscillating range adjusting module as claimed in claim 1, wherein the oscillating range adjusting module further includes an O-ring clipped between the bottom of the hollow connecting cylinder and the edge of the assembly hole. 3. The oscillating range adjusting module as claimed in claim 1, wherein the first adjusting unit further includes a first pull member and has a third curved slot and a limiting curved groove, wherein the third curved slot is disposed on the first circular plate and located beside the hollow connecting cylinder, close to the first circular side wall, wherein the first pull member is connected to an outer surface of the first circular side wall and located beside the hollow connecting cylinder, opposite to the first curved slot, wherein the limiting curved groove is formed on the bottom surface of the first circular plate. 4. The oscillating range adjusting module as claimed in claim 3, wherein the second adjusting unit further has a fourth curved slot and includes a second pull member and a limiting curved protrusion, wherein the fourth curved slot is disposed on the second circular plate and located beside the assembly hole, close to the second circular side wall, wherein the second pull member is connected to an outer surface of the second circular side wall and located beside the assembly hole, opposite to the second curved slot, wherein the limiting curved protrusion is formed on the top surface of the second circular plate and mounted into the limiting curved groove. 5. The oscillating range adjusting module as claimed in claim 3, wherein the second adjusting unit further includes at least one insertion member which is formed on the top surface of the second circular plate and inserted into the third curved slot or the first curved slot. 6. The oscillating range adjusting module as claimed in claim 1, wherein a mounting groove is formed at an inner surface of the hollow connecting cylinder for mounting an O-ring therein. 7. An oscillating range adjusting module, adapted to be used in a sprinkler and connected between a water-in control module and an oscillation driving module, comprising: a first adjusting unit, including a first circular plate, a first circular side wall disposed on a top surface of the first circular plate, and a hollow connecting cylinder which is formed on a center of the first circular plate, and having a first curved slot disposed on the first circular plate and located beside the hollow connecting cylinder, close to the first circular side wall; and a second adjusting unit, including a second circular plate having a top surface connected to a bottom surface of the first circular plate, a second circular side wall formed on a bottom surface of the second circular plate, and having an assembly hole formed on a center of the second circular plate and connected to the bottom of the hollow connecting cylinder, and a second curved slot disposed on the second circular plate and located beside the assembly hole, close to the second circular side wall; wherein the hollow connecting cylinder is configured to be connected to an inlet tube of the water-in control module, wherein at least one connection surface is formed on an edge at the bottom of the hollow connecting cylinder of the first adjusting unit, wherein the assembly hole is arranged for connection to a water inlet of the oscillation driving module, wherein at least one snapping member is formed on the top surface of the second circular plate for being engaged with the connection surface of the first adjusting unit so as to connect the first adjusting unit and the second adjusting unit. 8. The oscillating range adjusting module as claimed in claim 7, wherein the oscillating range adjusting module further includes an O-ring clipped between the bottom of the hollow connecting cylinder and the edge of the assembly hole. 9. The oscillating range adjusting module as claimed in claim 7, wherein the first adjusting unit further includes a first pull member and has a third curved slot and a limiting curved groove, wherein the third curved slot is disposed on the first circular plate and located beside the hollow connecting cylinder, close to the first circular side wall, wherein the first pull member is connected to an outer surface of the first circular side wall and located beside the hollow connecting cylinder, opposite to the first curved slot, wherein the limiting curved groove is formed on the bottom surface of the first circular plate. 10. The oscillating range adjusting module as claimed in claim 9, wherein the second adjusting unit further has a fourth curved slot and includes a second pull member and a limiting curved protrusion, wherein the fourth curved slot is disposed on the second circular plate and located beside the assembly hole, close to the second circular side wall, wherein the second pull member is connected to an outer surface of the second circular side wall and located beside the assembly hole, opposite to the second curved slot, wherein the limiting curved protrusion is formed on the top surface of the second circular plate and mounted into the limiting curved groove. 11. The oscillating range adjusting module as claimed in claim 9, wherein the second adjusting unit further includes at least one insertion member which is formed on the top surface of the second circular plate and inserted into the third curved slot or the first curved slot. 12. The oscillating range adjusting module as claimed in claim 7, wherein a mounting groove is formed at an inner surface of the hollow connecting cylinder for mounting an O-ring therein.
3,700
340,110
16,801,122
3,752
In order to improve the detectability of a structure that is tube-shaped in an imaging method, a method for preparing the structure is specified. A first channel is formed inside an inner wall of an auxiliary device, and a second channel is formed between the inner wall and an outer wall. A first fluid that contains a material for contrast amplification is poured into the structure via the first channel. The first channel is then closed by a swelling element of the auxiliary device being enlarged by pouring a second fluid into the second channel.
1. A method for preparing a structure that is tube-shaped before an imaging method, wherein an auxiliary device has previously been introduced into the structure, the method comprising: forming a first channel within an inner wall of the auxiliary device and forming a second channel between the inner and an outer wall of the auxiliary device; pouring a first fluid, which contains a material for contrast enhancement, into the structure through the first channel; and closing the first channel, the closing of the first channel comprising enlarging a swelling element of the auxiliary device, the enlarging of the swelling element comprising pouring a second fluid into the second channel. 2. The method of claim 1, wherein a liquid or gaseous contrast agent, a fluorogenic material, or a salt solution is used as the material for contrast enhancement. 3. The method of claim 1, wherein the structure is closed through enlarging the swelling element by pouring the second fluid into the second channel such that the outer wall of the auxiliary device fits against an inner wall of the structure. 4. The method of claim 3, wherein closing the structure prevents the first fluid from flowing from one closed part of the structure into another part of the structure. 5. The method of claim 1, wherein at least one bronchus, at least one bronchiole, or at least one bronchus and at least one bronchiole are prepared by the method. 6. A method for mapping a tube-shaped structure, wherein an auxiliary device has previously been introduced into the tube-shaped structure, the method comprising: preparing the tube-shaped structure before an imaging method, the preparing of the tube-shaped structure comprising: forming a first channel within an inner wall of the auxiliary device and forming a second channel between the inner and an outer wall of the auxiliary device; pouring a first fluid, which contains a material for contrast enhancement, into the tube-shaped structure through the first channel; and closing the first channel, the closing of the first channel comprising enlarging a swelling element of the auxiliary device, the enlarging of the swelling element comprising pouring a second fluid into the second channel; and performing the imaging method for mapping the tube-shaped structure using the contrast enhancement by the material of the first fluid. 7. The method of claim 6, further comprising at least partially removing the first fluid from the tube-shaped structure via the first channel after carrying out the imaging method. 8. The method of claim 6, wherein the imaging method comprises a computer tomography method, a cone beam computer tomography method, a fluorescence-based computer tomography method, a digital subtraction angiography method, or a magnetic resonance tomography method. 9. An auxiliary device for preparing at least one tube-shaped structure before an imaging method, wherein the auxiliary device has an inner wall, an outer wall, and a first channel formed within the inner wall, the auxiliary device comprising: a second channel formed between the inner wall and the outer wall, wherein a first fluid is pourable into the first channel when the auxiliary device has been introduced into the at least one tube-shaped structure; and a swelling element that is enlargeable when a second fluid is poured into the second channel, wherein the first channel is closeable by enlarging the swelling element. 10. The auxiliary device of claim 9, wherein the swelling element includes a Fogarty balloon. 11. The auxiliary device of claim 9, further comprising an expandable membrane that is fastened to the inner wall and the outer wall such that a balloon is formed as the swelling element. 12. The auxiliary device of claim 9, further comprising a pump configured to: pump the first fluid for pouring into the first channel; pump the second fluid for pouring into the second channel; or pump the first fluid for pouring into the first channel and pump the second fluid for pouring into the second channel. 13. The auxiliary device of claim 9, further comprising a pump configured to at least partially remove the first fluid from the tube-shaped structure via the first channel. 14. A system for mapping at least one tube-shaped structure, the system comprising: a device for carrying out an imaging method; and an auxiliary device for preparing the at least one tube-shaped structure before the imaging method, wherein the auxiliary device has an inner wall, an outer wall, and a first channel formed within the inner wall, the auxiliary device comprising: a second channel formed between the inner wall and the outer wall, wherein a first fluid is pourable into the first channel when the auxiliary device has been introduced into the at least one tube-shaped structure; and a swelling element that is enlargeable when a second fluid is poured into the second channel, wherein the first channel is closeable by enlarging the swelling element. 15. The system of claim 14, wherein the swelling element includes a Fogarty balloon. 16. The system of claim 14, wherein the auxiliary device further comprises an expandable membrane that is fastened to the inner wall and the outer wall such that a balloon is formed as the swelling element. 17. The system of claim 14, wherein the auxiliary device further comprises a pump configured to: pump the first fluid for pouring into the first channel; pump the second fluid for pouring into the second channel; or pump the first fluid for pouring into the first channel and pump the second fluid for pouring into the second channel. 18. The system of claim 14, wherein the auxiliary device further comprises a pump configured to at least partially remove the first fluid from the tube-shaped structure via the first channel.
In order to improve the detectability of a structure that is tube-shaped in an imaging method, a method for preparing the structure is specified. A first channel is formed inside an inner wall of an auxiliary device, and a second channel is formed between the inner wall and an outer wall. A first fluid that contains a material for contrast amplification is poured into the structure via the first channel. The first channel is then closed by a swelling element of the auxiliary device being enlarged by pouring a second fluid into the second channel.1. A method for preparing a structure that is tube-shaped before an imaging method, wherein an auxiliary device has previously been introduced into the structure, the method comprising: forming a first channel within an inner wall of the auxiliary device and forming a second channel between the inner and an outer wall of the auxiliary device; pouring a first fluid, which contains a material for contrast enhancement, into the structure through the first channel; and closing the first channel, the closing of the first channel comprising enlarging a swelling element of the auxiliary device, the enlarging of the swelling element comprising pouring a second fluid into the second channel. 2. The method of claim 1, wherein a liquid or gaseous contrast agent, a fluorogenic material, or a salt solution is used as the material for contrast enhancement. 3. The method of claim 1, wherein the structure is closed through enlarging the swelling element by pouring the second fluid into the second channel such that the outer wall of the auxiliary device fits against an inner wall of the structure. 4. The method of claim 3, wherein closing the structure prevents the first fluid from flowing from one closed part of the structure into another part of the structure. 5. The method of claim 1, wherein at least one bronchus, at least one bronchiole, or at least one bronchus and at least one bronchiole are prepared by the method. 6. A method for mapping a tube-shaped structure, wherein an auxiliary device has previously been introduced into the tube-shaped structure, the method comprising: preparing the tube-shaped structure before an imaging method, the preparing of the tube-shaped structure comprising: forming a first channel within an inner wall of the auxiliary device and forming a second channel between the inner and an outer wall of the auxiliary device; pouring a first fluid, which contains a material for contrast enhancement, into the tube-shaped structure through the first channel; and closing the first channel, the closing of the first channel comprising enlarging a swelling element of the auxiliary device, the enlarging of the swelling element comprising pouring a second fluid into the second channel; and performing the imaging method for mapping the tube-shaped structure using the contrast enhancement by the material of the first fluid. 7. The method of claim 6, further comprising at least partially removing the first fluid from the tube-shaped structure via the first channel after carrying out the imaging method. 8. The method of claim 6, wherein the imaging method comprises a computer tomography method, a cone beam computer tomography method, a fluorescence-based computer tomography method, a digital subtraction angiography method, or a magnetic resonance tomography method. 9. An auxiliary device for preparing at least one tube-shaped structure before an imaging method, wherein the auxiliary device has an inner wall, an outer wall, and a first channel formed within the inner wall, the auxiliary device comprising: a second channel formed between the inner wall and the outer wall, wherein a first fluid is pourable into the first channel when the auxiliary device has been introduced into the at least one tube-shaped structure; and a swelling element that is enlargeable when a second fluid is poured into the second channel, wherein the first channel is closeable by enlarging the swelling element. 10. The auxiliary device of claim 9, wherein the swelling element includes a Fogarty balloon. 11. The auxiliary device of claim 9, further comprising an expandable membrane that is fastened to the inner wall and the outer wall such that a balloon is formed as the swelling element. 12. The auxiliary device of claim 9, further comprising a pump configured to: pump the first fluid for pouring into the first channel; pump the second fluid for pouring into the second channel; or pump the first fluid for pouring into the first channel and pump the second fluid for pouring into the second channel. 13. The auxiliary device of claim 9, further comprising a pump configured to at least partially remove the first fluid from the tube-shaped structure via the first channel. 14. A system for mapping at least one tube-shaped structure, the system comprising: a device for carrying out an imaging method; and an auxiliary device for preparing the at least one tube-shaped structure before the imaging method, wherein the auxiliary device has an inner wall, an outer wall, and a first channel formed within the inner wall, the auxiliary device comprising: a second channel formed between the inner wall and the outer wall, wherein a first fluid is pourable into the first channel when the auxiliary device has been introduced into the at least one tube-shaped structure; and a swelling element that is enlargeable when a second fluid is poured into the second channel, wherein the first channel is closeable by enlarging the swelling element. 15. The system of claim 14, wherein the swelling element includes a Fogarty balloon. 16. The system of claim 14, wherein the auxiliary device further comprises an expandable membrane that is fastened to the inner wall and the outer wall such that a balloon is formed as the swelling element. 17. The system of claim 14, wherein the auxiliary device further comprises a pump configured to: pump the first fluid for pouring into the first channel; pump the second fluid for pouring into the second channel; or pump the first fluid for pouring into the first channel and pump the second fluid for pouring into the second channel. 18. The system of claim 14, wherein the auxiliary device further comprises a pump configured to at least partially remove the first fluid from the tube-shaped structure via the first channel.
3,700
340,111
16,801,104
3,752
A locator for the placement of a fiducial support device for brachytherapy may be used to perform a brachytherapy treatment in which one or more radioactive seeds are implanted into a treatment region of a patient.
1. A locator device for brachytherapy, comprising: a body portion having a distal end and a proximal end wherein the distal end had a sharpened end; a feature that can be used by a piece of software for treatment planning of the brachytherapy procedure; a plurality of markers along the length of the body portion wherein each marker indicates a depth of the locator device when it is installed into a treatment site; and an anchoring feature that is capable of anchoring the locator device into tissue. 2. The device of claim 1, wherein the body portion further comprises one of a cannula, a guidewire, a catheter, a trocar with a tubular implant and a fiducial marker. 3. The device of claim 2, wherein the body portion is manufactured out of one of a polymer-based material, stainless steel, a stainless steel alloy and a bioabsorbable material. 4. The device of claim 1 further comprising a stylet that slides into an internal cavity in a flexible body portion. 5. The device of claim 1, wherein the anchoring feature is one of a set of deployable hooks, a screw-like tip, a balloon and holes for suturing. 6. A method for locating a brachytherapy needle, the method comprising: providing a locator device having a body portion with a distal end and a proximal end, an anchoring feature at the distal end of the body portion that is capable of anchoring the locator device into tissue and a plurality of markers along the length of the body portion wherein each marker indicates a depth of the locator device when it is installed into a treatment site; inserting the locator device into a treatment region in the tissue; and anchoring, by the anchoring feature of the locator device, the locator device at the treatment region. 7. A brachytherapy treatment method using needle location, the method comprising: installing a locator device into a treatment region in a tissue; anchoring the locator device at the treatment region; using a set of characteristics of the locator device in a treatment planning software; inserting a brachytherapy device using the locator device into the treatment region; and placing one or more radioactive seeds into the treatment region. 8. The method of claim 1 further comprising attaching a brachytherapy template and wherein inserting the brachytherapy device further comprises inserting the brachytherapy device through the brachytherapy template into the treatment region. 9. The method of 8, wherein the brachytherapy device further comprises a brachytherapy fiducial needle. 10. The method of claim 7, wherein installing the locator device further comprises penetrating the tissue using a sharpened tip at a distal end of the locator device. 11. The method of claim 8, wherein anchoring the locator device further comprises suturing the locator device once installed into the treatment region. 12. The method of claim 8, wherein anchoring the locator device further comprises deploying one or more hooks once installed into the treatment region. 13. The method of claim 7, wherein placing one or more radioactive seeds into the treatment region further comprises placing the one or more radioactive seeds into a lumpectomy cavity in breast tissue.
A locator for the placement of a fiducial support device for brachytherapy may be used to perform a brachytherapy treatment in which one or more radioactive seeds are implanted into a treatment region of a patient.1. A locator device for brachytherapy, comprising: a body portion having a distal end and a proximal end wherein the distal end had a sharpened end; a feature that can be used by a piece of software for treatment planning of the brachytherapy procedure; a plurality of markers along the length of the body portion wherein each marker indicates a depth of the locator device when it is installed into a treatment site; and an anchoring feature that is capable of anchoring the locator device into tissue. 2. The device of claim 1, wherein the body portion further comprises one of a cannula, a guidewire, a catheter, a trocar with a tubular implant and a fiducial marker. 3. The device of claim 2, wherein the body portion is manufactured out of one of a polymer-based material, stainless steel, a stainless steel alloy and a bioabsorbable material. 4. The device of claim 1 further comprising a stylet that slides into an internal cavity in a flexible body portion. 5. The device of claim 1, wherein the anchoring feature is one of a set of deployable hooks, a screw-like tip, a balloon and holes for suturing. 6. A method for locating a brachytherapy needle, the method comprising: providing a locator device having a body portion with a distal end and a proximal end, an anchoring feature at the distal end of the body portion that is capable of anchoring the locator device into tissue and a plurality of markers along the length of the body portion wherein each marker indicates a depth of the locator device when it is installed into a treatment site; inserting the locator device into a treatment region in the tissue; and anchoring, by the anchoring feature of the locator device, the locator device at the treatment region. 7. A brachytherapy treatment method using needle location, the method comprising: installing a locator device into a treatment region in a tissue; anchoring the locator device at the treatment region; using a set of characteristics of the locator device in a treatment planning software; inserting a brachytherapy device using the locator device into the treatment region; and placing one or more radioactive seeds into the treatment region. 8. The method of claim 1 further comprising attaching a brachytherapy template and wherein inserting the brachytherapy device further comprises inserting the brachytherapy device through the brachytherapy template into the treatment region. 9. The method of 8, wherein the brachytherapy device further comprises a brachytherapy fiducial needle. 10. The method of claim 7, wherein installing the locator device further comprises penetrating the tissue using a sharpened tip at a distal end of the locator device. 11. The method of claim 8, wherein anchoring the locator device further comprises suturing the locator device once installed into the treatment region. 12. The method of claim 8, wherein anchoring the locator device further comprises deploying one or more hooks once installed into the treatment region. 13. The method of claim 7, wherein placing one or more radioactive seeds into the treatment region further comprises placing the one or more radioactive seeds into a lumpectomy cavity in breast tissue.
3,700
340,112
16,801,111
3,752
An objective lens for an endoscope consists of a negative front group, an aperture stop, and a positive rear group that are arranged in this order from an object side. The front group includes only a negative first lens as a lens. The rear group includes only four lenses that consist of a positive second lens, a positive third lens, a fourth lens, and a fifth lens arranged in this order from the object side, as lenses. The fourth lens and the fifth lens have refractive power having signs different from each other and are cemented to each other. Conditional expression determined in advance about the focal lengths of the second lens and the rear group is satisfied.
1. An objective lens for an endoscope consisting of: a front group having negative refractive power, an aperture stop, and a rear group having positive refractive power that are arranged in this order from an object side toward an image side, wherein the front group comprises only a first lens having negative refractive power as a lens, the rear group comprises only four lenses that consist of a second lens having positive refractive power, a third lens having positive refractive power, a fourth lens, and a fifth lens arranged in this order from the object side toward the image side, as lenses, the fourth lens and the fifth lens have refractive power having signs different from each other and are cemented to each other, and in a case where a focal length of the second lens is denoted by f2, a focal length of the rear group is denoted by fb, a radius of curvature of a surface of the second lens close to the object side is denoted by R2f, and a radius of curvature of a surface of the second lens close to the image side is denoted by R2r, Conditional expressions (1) and (2) are satisfied, 1<f2/fb<1.8  (1) 0<(R2f+R2r)/(R2f−R2r)<5  (2). 2. The objective lens for an endoscope according to claim 1, wherein in a case where a focal length of the front group is denoted by fa, Conditional expression (3) is satisfied, −0.8<fa/fb<−0.4  (3). 3. The objective lens for an endoscope according to claim 1, wherein in a case where a focal length of the third lens is denoted by f3, a radius of curvature of a surface of the third lens close to the object side is denoted by R3f, and a radius of curvature of a surface of the third lens close to the image side is denoted by R3r, Conditional expressions (4) and (5) are satisfied, 2<f3/fb<5  (4) 0<(R3f+R3r)/(R3f−R3r)<5  (5). 4. The objective lens for an endoscope according to claim 1, wherein in a case where a radius of curvature of a surface of the first lens close to the object side is denoted by R1f and a radius of curvature of a surface of the first lens close to the image side is denoted by R1r, Conditional expression (6) is satisfied, 0.95<(R1f+R1r)/(R1f−R1r)<1.2  (6). 5. The objective lens for an endoscope according to claim 1, wherein a surface of the first lens close to the object side is a flat surface. 6. The objective lens for an endoscope according to claim 1, wherein in a case where an Abbe's number of the fourth lens with respect to a d line is denoted by vd4 and an Abbe's number of the fifth lens with respect to the d line is denoted by vd5, Conditional expression (7) is satisfied, 45<|vd4−vd5|<90  (7). 7. The objective lens for an endoscope according to claim 1, wherein the fourth lens has positive refractive power and the fifth lens has negative refractive power. 8. The objective lens for an endoscope according to claim 1, wherein Conditional expression (1-1) is satisfied, 1.2<f2/fb<1.6  (1-1). 9. The objective lens for an endoscope according to claim 1, wherein Conditional expression (2-1) is satisfied, 0.5<(R2f+R2r)/(R2f−R2r)<1.5  (2-1). 10. The objective lens for an endoscope according to claim 2, wherein Conditional expression (3-1) is satisfied, −0.7<fa/fb<−0.5  (3-1). 11. The objective lens for an endoscope according to claim 3, wherein Conditional expression (4-1) is satisfied, 2.4<f3/fb<3.2  (4-1). 12. The objective lens for an endoscope according to claim 3, wherein Conditional expression (5-1) is satisfied, 0.5<(R3f+R3r)/(R3f−R3r)<1.5  (5-1). 13. The objective lens for an endoscope according to claim 4, wherein Conditional expression (6-1) is satisfied, 1≤(R1f+R1r)/(R1f−R1r)<1.05  (6-1). 14. The objective lens for an endoscope according to claim 6, wherein Conditional expression (7-1) is satisfied, 55<|vd4−vd5|<80  (7-1). 15. An endoscope comprising: the objective lens for an endoscope according to claim 1.
An objective lens for an endoscope consists of a negative front group, an aperture stop, and a positive rear group that are arranged in this order from an object side. The front group includes only a negative first lens as a lens. The rear group includes only four lenses that consist of a positive second lens, a positive third lens, a fourth lens, and a fifth lens arranged in this order from the object side, as lenses. The fourth lens and the fifth lens have refractive power having signs different from each other and are cemented to each other. Conditional expression determined in advance about the focal lengths of the second lens and the rear group is satisfied.1. An objective lens for an endoscope consisting of: a front group having negative refractive power, an aperture stop, and a rear group having positive refractive power that are arranged in this order from an object side toward an image side, wherein the front group comprises only a first lens having negative refractive power as a lens, the rear group comprises only four lenses that consist of a second lens having positive refractive power, a third lens having positive refractive power, a fourth lens, and a fifth lens arranged in this order from the object side toward the image side, as lenses, the fourth lens and the fifth lens have refractive power having signs different from each other and are cemented to each other, and in a case where a focal length of the second lens is denoted by f2, a focal length of the rear group is denoted by fb, a radius of curvature of a surface of the second lens close to the object side is denoted by R2f, and a radius of curvature of a surface of the second lens close to the image side is denoted by R2r, Conditional expressions (1) and (2) are satisfied, 1<f2/fb<1.8  (1) 0<(R2f+R2r)/(R2f−R2r)<5  (2). 2. The objective lens for an endoscope according to claim 1, wherein in a case where a focal length of the front group is denoted by fa, Conditional expression (3) is satisfied, −0.8<fa/fb<−0.4  (3). 3. The objective lens for an endoscope according to claim 1, wherein in a case where a focal length of the third lens is denoted by f3, a radius of curvature of a surface of the third lens close to the object side is denoted by R3f, and a radius of curvature of a surface of the third lens close to the image side is denoted by R3r, Conditional expressions (4) and (5) are satisfied, 2<f3/fb<5  (4) 0<(R3f+R3r)/(R3f−R3r)<5  (5). 4. The objective lens for an endoscope according to claim 1, wherein in a case where a radius of curvature of a surface of the first lens close to the object side is denoted by R1f and a radius of curvature of a surface of the first lens close to the image side is denoted by R1r, Conditional expression (6) is satisfied, 0.95<(R1f+R1r)/(R1f−R1r)<1.2  (6). 5. The objective lens for an endoscope according to claim 1, wherein a surface of the first lens close to the object side is a flat surface. 6. The objective lens for an endoscope according to claim 1, wherein in a case where an Abbe's number of the fourth lens with respect to a d line is denoted by vd4 and an Abbe's number of the fifth lens with respect to the d line is denoted by vd5, Conditional expression (7) is satisfied, 45<|vd4−vd5|<90  (7). 7. The objective lens for an endoscope according to claim 1, wherein the fourth lens has positive refractive power and the fifth lens has negative refractive power. 8. The objective lens for an endoscope according to claim 1, wherein Conditional expression (1-1) is satisfied, 1.2<f2/fb<1.6  (1-1). 9. The objective lens for an endoscope according to claim 1, wherein Conditional expression (2-1) is satisfied, 0.5<(R2f+R2r)/(R2f−R2r)<1.5  (2-1). 10. The objective lens for an endoscope according to claim 2, wherein Conditional expression (3-1) is satisfied, −0.7<fa/fb<−0.5  (3-1). 11. The objective lens for an endoscope according to claim 3, wherein Conditional expression (4-1) is satisfied, 2.4<f3/fb<3.2  (4-1). 12. The objective lens for an endoscope according to claim 3, wherein Conditional expression (5-1) is satisfied, 0.5<(R3f+R3r)/(R3f−R3r)<1.5  (5-1). 13. The objective lens for an endoscope according to claim 4, wherein Conditional expression (6-1) is satisfied, 1≤(R1f+R1r)/(R1f−R1r)<1.05  (6-1). 14. The objective lens for an endoscope according to claim 6, wherein Conditional expression (7-1) is satisfied, 55<|vd4−vd5|<80  (7-1). 15. An endoscope comprising: the objective lens for an endoscope according to claim 1.
3,700
340,113
16,801,106
2,874
Provided is a light guide plate for an image display device which uses lead-free glass, has excellent color reproducibility and a light weight, and may obtain a wide viewing angle. A light guide plate for an image display device, which guides image light inputted from an image display element and outputs the image light toward a user's pupil, is configured to be made of lead-free glass having a refractive index of 1.8 or more with respect to a wavelength of the image light, and to have internal transmittance of 0.6 or more with respect to a wavelength of 400 nm when a plate thickness is 10 mm.
1. A light guide plate for an image display device which guides image light inputted from an image display element and outputs the image light toward a user's pupil, wherein, the light guide plate is made of a lead-free glass having a refractive index of 1.8 or more with respect to a wavelength of the image light and containing SiO2 in an amount greater than zero mass % and less than or equal to 35 mass % and ZrO2 in an amount greater than zero mass % and less than or equal to 30 mass %, and the light guide plate has an internal transmittance of 0.6 or more with respect to a wavelength of 400 nm when a plate thickness is 10 mm. 2. The light guide plate of claim 1, wherein the light guide plate has a first surface and a second surface that face each other, and parallelism of the first surface and the second surface is 20 arc seconds or less. 3. The light guide plate of claim 2, wherein a difference between a maximum value and a minimum value of a distance from the first surface to the second surface is 5 μm or less. 4. The light guide plate of claim 1, wherein when transmitted light of a standard light source D65 when the plate thickness is 10 mm is represented by an x-y chromaticity diagram, chromaticity of x is 0.31 to 0.34, and chromaticity of y is 0.33 to 0.36. 5. The light guide plate of claim 1, wherein the plate thickness is 0.5 to 1.0 mm. 6. An image display device comprising: a light source which outputs illumination light; an image display element which receives the illumination light from the light source and outputs image light; and the light guide plate according to claim 1 which guides the image light inputted from the image display element and outputs the image light toward a user's pupil. 7. The light guide plate of claim 1, comprising: a first optical element which diffracts the guided image light and outputs the image light toward the user's pupil. 8. The light guide plate of claim 7, wherein the first optical element is made of a material having a refractive index higher than a refractive index of air. 9. The light guide plate of claim 7, wherein the first optical element is made of a material having a refractive index higher than a refractive index of the light guide plate. 10. The light guide plate of claim 7, comprising: a second optical element which diffracts the image light inputted from the image display element and inputs the image light to the light guide plate. 11. The light guide plate of claim 10, wherein the second optical element is made of a material having a refractive index higher than a refractive index of air. 12. The light guide plate of claim 10, wherein the second optical element is made of a material having a refractive index higher than a refractive index of the light guide plate. 13. An image display device comprising: a light source which outputs illumination light; an image display element which receives the illumination light from the light source and outputs image light; and the light guide plate according to claim 2 which guides the image light inputted from the image display element and outputs the image light toward a user's pupil. 14. An image display device comprising: a light source which outputs illumination light; an image display element which receives the illumination light from the light source and outputs image light; and the light guide plate according to claim 3 which guides the image light inputted from the image display element and outputs the image light toward a user's pupil. 15. An image display device comprising: a light source which outputs illumination light; an image display element which receives the illumination light from the light source and outputs image light; and the light guide plate according to claim 4 which guides the image light inputted from the image display element and outputs the image light toward a user's pupil. 16. The light guide plate of claim 1, wherein the light guide plate further containing ZnO in a range of 0 to 35 mass % and Y2O3 in a range of 0 to 40 mass %. 17. The light guide plate of claim 2, wherein the light guide plate contains SiO2 in a range of 1 mass % to 10 mass %, ZnO in a range of 0 mass % to 10 mass %, Y2O3 in a range of 0 mass % to 1 mass %, and ZrO2 in a range of 1 mass % to 10 mass %. 18. The light guide plate of claim 2, wherein the light guide plate contains: SiO2 in a range of 1 mass % to 10 mass %, ZnO in a range of 0 mass % to 1 mass %, Y2O3 in a range of 0 mass % to 1 mass %, ZrO2 in a range of 1 mass % to 10 mass %, and TiO2 in a range of 10 mass % to 20 mass %. 19. A light guide plate for an image display device which guides image light inputted from an image display element and outputs the image light toward a user's pupil, wherein, the light guide plate is made of a lead-free glass having a refractive index of 1.95 or more with respect to a wavelength of the image light, and the light guide plate has an internal transmittance of 0.6 or more with respect to a wavelength of 400 nm when a plate thickness is 10 mm. 20. The light guide plate of claim 19, wherein the light guide plate has a first surface and a second surface that face each other, and parallelism of the first surface and the second surface is 20 arc seconds or less.
Provided is a light guide plate for an image display device which uses lead-free glass, has excellent color reproducibility and a light weight, and may obtain a wide viewing angle. A light guide plate for an image display device, which guides image light inputted from an image display element and outputs the image light toward a user's pupil, is configured to be made of lead-free glass having a refractive index of 1.8 or more with respect to a wavelength of the image light, and to have internal transmittance of 0.6 or more with respect to a wavelength of 400 nm when a plate thickness is 10 mm.1. A light guide plate for an image display device which guides image light inputted from an image display element and outputs the image light toward a user's pupil, wherein, the light guide plate is made of a lead-free glass having a refractive index of 1.8 or more with respect to a wavelength of the image light and containing SiO2 in an amount greater than zero mass % and less than or equal to 35 mass % and ZrO2 in an amount greater than zero mass % and less than or equal to 30 mass %, and the light guide plate has an internal transmittance of 0.6 or more with respect to a wavelength of 400 nm when a plate thickness is 10 mm. 2. The light guide plate of claim 1, wherein the light guide plate has a first surface and a second surface that face each other, and parallelism of the first surface and the second surface is 20 arc seconds or less. 3. The light guide plate of claim 2, wherein a difference between a maximum value and a minimum value of a distance from the first surface to the second surface is 5 μm or less. 4. The light guide plate of claim 1, wherein when transmitted light of a standard light source D65 when the plate thickness is 10 mm is represented by an x-y chromaticity diagram, chromaticity of x is 0.31 to 0.34, and chromaticity of y is 0.33 to 0.36. 5. The light guide plate of claim 1, wherein the plate thickness is 0.5 to 1.0 mm. 6. An image display device comprising: a light source which outputs illumination light; an image display element which receives the illumination light from the light source and outputs image light; and the light guide plate according to claim 1 which guides the image light inputted from the image display element and outputs the image light toward a user's pupil. 7. The light guide plate of claim 1, comprising: a first optical element which diffracts the guided image light and outputs the image light toward the user's pupil. 8. The light guide plate of claim 7, wherein the first optical element is made of a material having a refractive index higher than a refractive index of air. 9. The light guide plate of claim 7, wherein the first optical element is made of a material having a refractive index higher than a refractive index of the light guide plate. 10. The light guide plate of claim 7, comprising: a second optical element which diffracts the image light inputted from the image display element and inputs the image light to the light guide plate. 11. The light guide plate of claim 10, wherein the second optical element is made of a material having a refractive index higher than a refractive index of air. 12. The light guide plate of claim 10, wherein the second optical element is made of a material having a refractive index higher than a refractive index of the light guide plate. 13. An image display device comprising: a light source which outputs illumination light; an image display element which receives the illumination light from the light source and outputs image light; and the light guide plate according to claim 2 which guides the image light inputted from the image display element and outputs the image light toward a user's pupil. 14. An image display device comprising: a light source which outputs illumination light; an image display element which receives the illumination light from the light source and outputs image light; and the light guide plate according to claim 3 which guides the image light inputted from the image display element and outputs the image light toward a user's pupil. 15. An image display device comprising: a light source which outputs illumination light; an image display element which receives the illumination light from the light source and outputs image light; and the light guide plate according to claim 4 which guides the image light inputted from the image display element and outputs the image light toward a user's pupil. 16. The light guide plate of claim 1, wherein the light guide plate further containing ZnO in a range of 0 to 35 mass % and Y2O3 in a range of 0 to 40 mass %. 17. The light guide plate of claim 2, wherein the light guide plate contains SiO2 in a range of 1 mass % to 10 mass %, ZnO in a range of 0 mass % to 10 mass %, Y2O3 in a range of 0 mass % to 1 mass %, and ZrO2 in a range of 1 mass % to 10 mass %. 18. The light guide plate of claim 2, wherein the light guide plate contains: SiO2 in a range of 1 mass % to 10 mass %, ZnO in a range of 0 mass % to 1 mass %, Y2O3 in a range of 0 mass % to 1 mass %, ZrO2 in a range of 1 mass % to 10 mass %, and TiO2 in a range of 10 mass % to 20 mass %. 19. A light guide plate for an image display device which guides image light inputted from an image display element and outputs the image light toward a user's pupil, wherein, the light guide plate is made of a lead-free glass having a refractive index of 1.95 or more with respect to a wavelength of the image light, and the light guide plate has an internal transmittance of 0.6 or more with respect to a wavelength of 400 nm when a plate thickness is 10 mm. 20. The light guide plate of claim 19, wherein the light guide plate has a first surface and a second surface that face each other, and parallelism of the first surface and the second surface is 20 arc seconds or less.
2,800
340,114
16,801,109
2,874
An electrical receptacle connector configured to be disposed on an electronic device is provided. The electrical receptacle connector includes an insulation body, a first terminal set, a second terminal set, and a shell. The first terminal set and the second terminal set are combined to the insulation body in an up-and-down manner. The shell has a body and at least one protrusion. The body covers the first terminal set, the second terminal set, and the insulation body, and the at least one protrusion extends from the body and away from the insulation body, the first terminal set, and the second terminal set and abuts against the electronic device.
1. An electrical receptacle connector configured to be disposed on an electronic device and comprising: an insulation body; a first terminal set and a second terminal set combined to the insulation body, wherein contact portions of the first terminal set are disposed on an upper surface of a tongue portion of the insulation body and contact portions of the second terminal set are disposed on a lower surface of a tongue portion of the insulation body; and a shell having a body and at least one protrusion, the body covering the first terminal set, the second terminal set, and the insulation body, the at least one protrusion extending from the body and away from the insulation body, the first terminal set, and the second terminal set and abutting against the electronic device. 2. The electrical receptacle connector according to claim 1, wherein the shell is electrically conductive, and the at least one protrusion is electrically connected to at least one conductive portion of the electronic device, so that the shell and the at least one conductive portion provide electromagnetic shielding, electrical grounding, or both. 3. The electrical receptacle connector according to claim 2, wherein the at least one conductive portion is a casing of the electronic device. 4. The electrical receptacle connector according to claim 2, wherein the electronic device comprises a circuit board, and the at least one conductive portion is a ground circuit of the circuit board. 5. The electrical receptacle connector according to claim 1, wherein the at least one protrusion is an elastic sheet structure bent outward away from the insulation body, the first terminal set, and the second terminal set from the shell. 6. The electrical receptacle connector according to claim 1, wherein the at least one protrusion is a pin extending from the shell. 7. The electrical receptacle connector according to claim 1, wherein the body comprises an outer shell and an inner shell, the inner shell surrounds the insulation body, the first terminal set, and the second terminal set, and the outer shell is stacked onto the inner shell. 8. The electrical receptacle connector according to claim 7, wherein the at least one protrusion is an elastic sheet structure extending from the outer shell in an outward manner away from the inner shell. 9. The electrical receptacle connector according to claim 7, wherein the at least one protrusion is a pin extending from the outer shell in an outward manner away from the inner shell. 10. The electrical receptacle connector according to claim 7, wherein the at least one protrusion is a bend extending from the inner shell in an outward manner away from the insulation body, the first terminal set, and the second terminal set. 11. The electrical receptacle connector according to claim 7, wherein the outer shell has a plurality of protrusions, parts of the protrusions are elastic sheet structures extending from the outer shell in an outward manner away from the inner shell, and the other parts of the protrusions are pins extending from the outer shell in an outward manner away from the inner shell. 12. The electrical receptacle connector according to claim 6, wherein the electronic device comprises a circuit board, the pin has a necking and is inserted into an opening of the circuit board, and the shell is soldered to the circuit board through filling the necking and the opening with a solder material. 13. The electrical receptacle connector according to claim 12, wherein the at least one conductive portion is a ground circuit of the circuit board, and the pin is electrically connected to the ground circuit. 14. The electrical receptacle connector according to claim 1, wherein the shell is a metallic shell. 15. The electrical receptacle connector according to claim 1, further comprising a mid-plate which is sandwiched between the first terminal set and the second terminal set. 16. The electrical receptacle connector according to claim 1, wherein the first terminal set disposed on the upper surface of the tongue portion of the insulation body and the second terminal set disposed on the lower surface of the tongue portion of the insulation body are in an up-and-down manner. 17. An electrical receptacle connector configured to be disposed on an electronic device and comprising: an insulation body; a first terminal set and a second terminal set combined to the insulation body, wherein contact portions of the first terminal set are disposed on an upper surface of a tongue portion of the insulation body and contact portions of the second terminal set are disposed on a lower surface of a tongue portion of the insulation body; a mid-plate sandwiched between the first terminal set and the second terminal set; an inner shell surrounding the insulation body, the first terminal set, and the second terminal set; and an outer shell stacking onto the inner shell, wherein the outer shell comprises at least one protrusion extending from the outer shell and away from the insulation body, the first terminal set, and the second terminal set and abutting against the electronic device. 18. The electrical receptacle connector according to claim 17, wherein the inner shell and the outer shell are electrically conductive, and the at least one protrusion is electrically connected to at least one conductive portion of the electronic device, so that the outer shell, the inner shell and the at least one conductive portion provide electromagnetic shielding, electrical grounding, or both. 19. The electrical receptacle connector according to claim 18, wherein the at least one conductive portion is a casing of the electronic device. 20. The electrical receptacle connector according to claim 18, wherein the electronic device comprises a circuit board, and the at least one conductive portion is a ground circuit of the circuit board.
An electrical receptacle connector configured to be disposed on an electronic device is provided. The electrical receptacle connector includes an insulation body, a first terminal set, a second terminal set, and a shell. The first terminal set and the second terminal set are combined to the insulation body in an up-and-down manner. The shell has a body and at least one protrusion. The body covers the first terminal set, the second terminal set, and the insulation body, and the at least one protrusion extends from the body and away from the insulation body, the first terminal set, and the second terminal set and abuts against the electronic device.1. An electrical receptacle connector configured to be disposed on an electronic device and comprising: an insulation body; a first terminal set and a second terminal set combined to the insulation body, wherein contact portions of the first terminal set are disposed on an upper surface of a tongue portion of the insulation body and contact portions of the second terminal set are disposed on a lower surface of a tongue portion of the insulation body; and a shell having a body and at least one protrusion, the body covering the first terminal set, the second terminal set, and the insulation body, the at least one protrusion extending from the body and away from the insulation body, the first terminal set, and the second terminal set and abutting against the electronic device. 2. The electrical receptacle connector according to claim 1, wherein the shell is electrically conductive, and the at least one protrusion is electrically connected to at least one conductive portion of the electronic device, so that the shell and the at least one conductive portion provide electromagnetic shielding, electrical grounding, or both. 3. The electrical receptacle connector according to claim 2, wherein the at least one conductive portion is a casing of the electronic device. 4. The electrical receptacle connector according to claim 2, wherein the electronic device comprises a circuit board, and the at least one conductive portion is a ground circuit of the circuit board. 5. The electrical receptacle connector according to claim 1, wherein the at least one protrusion is an elastic sheet structure bent outward away from the insulation body, the first terminal set, and the second terminal set from the shell. 6. The electrical receptacle connector according to claim 1, wherein the at least one protrusion is a pin extending from the shell. 7. The electrical receptacle connector according to claim 1, wherein the body comprises an outer shell and an inner shell, the inner shell surrounds the insulation body, the first terminal set, and the second terminal set, and the outer shell is stacked onto the inner shell. 8. The electrical receptacle connector according to claim 7, wherein the at least one protrusion is an elastic sheet structure extending from the outer shell in an outward manner away from the inner shell. 9. The electrical receptacle connector according to claim 7, wherein the at least one protrusion is a pin extending from the outer shell in an outward manner away from the inner shell. 10. The electrical receptacle connector according to claim 7, wherein the at least one protrusion is a bend extending from the inner shell in an outward manner away from the insulation body, the first terminal set, and the second terminal set. 11. The electrical receptacle connector according to claim 7, wherein the outer shell has a plurality of protrusions, parts of the protrusions are elastic sheet structures extending from the outer shell in an outward manner away from the inner shell, and the other parts of the protrusions are pins extending from the outer shell in an outward manner away from the inner shell. 12. The electrical receptacle connector according to claim 6, wherein the electronic device comprises a circuit board, the pin has a necking and is inserted into an opening of the circuit board, and the shell is soldered to the circuit board through filling the necking and the opening with a solder material. 13. The electrical receptacle connector according to claim 12, wherein the at least one conductive portion is a ground circuit of the circuit board, and the pin is electrically connected to the ground circuit. 14. The electrical receptacle connector according to claim 1, wherein the shell is a metallic shell. 15. The electrical receptacle connector according to claim 1, further comprising a mid-plate which is sandwiched between the first terminal set and the second terminal set. 16. The electrical receptacle connector according to claim 1, wherein the first terminal set disposed on the upper surface of the tongue portion of the insulation body and the second terminal set disposed on the lower surface of the tongue portion of the insulation body are in an up-and-down manner. 17. An electrical receptacle connector configured to be disposed on an electronic device and comprising: an insulation body; a first terminal set and a second terminal set combined to the insulation body, wherein contact portions of the first terminal set are disposed on an upper surface of a tongue portion of the insulation body and contact portions of the second terminal set are disposed on a lower surface of a tongue portion of the insulation body; a mid-plate sandwiched between the first terminal set and the second terminal set; an inner shell surrounding the insulation body, the first terminal set, and the second terminal set; and an outer shell stacking onto the inner shell, wherein the outer shell comprises at least one protrusion extending from the outer shell and away from the insulation body, the first terminal set, and the second terminal set and abutting against the electronic device. 18. The electrical receptacle connector according to claim 17, wherein the inner shell and the outer shell are electrically conductive, and the at least one protrusion is electrically connected to at least one conductive portion of the electronic device, so that the outer shell, the inner shell and the at least one conductive portion provide electromagnetic shielding, electrical grounding, or both. 19. The electrical receptacle connector according to claim 18, wherein the at least one conductive portion is a casing of the electronic device. 20. The electrical receptacle connector according to claim 18, wherein the electronic device comprises a circuit board, and the at least one conductive portion is a ground circuit of the circuit board.
2,800
340,115
16,801,079
2,874
Systems and methods to provide visual references to passengers in vehicles to prevent motion sickness. The system can include a controller and one or more projectors and/or displays. The controller can detect movement of a vehicle and project images within the vehicle that comport with the detected movement. The system can include a projector to project images on the interior of the vehicle. The system can include one or more displays to display images inside the vehicle. The controller can receive data from one or more cameras, accelerometers, navigation units, magnetometers, and other components to detect the motion of the vehicle. The system can display visual references on the dashboard, door panels, and other interior surfaces to complete the view of passengers, or provide other visual reference, to prevent motion sickness.
1. A system comprising: a display disposed in a passenger compartment of a vehicle; one or more processors; and memory storing computer-executable instructions that, when executed by the one or more processors, cause the system to: receive sensor data from one or more sensors associated with the vehicle; cause the display to present a visual reference on a surface of the passenger compartment of the vehicle based at least in part on the sensor data; detect, based at least in part on the sensor data, a motion of the vehicle in a first direction; and based at least in part on the motion of the vehicle, cause the display to alter the visual reference in a second direction. 2. The system of claim 1, wherein the motion of the vehicle is a rotational motion in the first direction, and the visual reference is altered by at least rotating the visual reference in the second direction opposite the rotational motion in the first direction. 3. The system of claim 1, wherein the one or more sensors comprise at least one of an accelerometer, gyroscope, or a magnetometer to detect the motion of the vehicle. 4. The system of claim 1, wherein the visual reference includes a representation of at least a portion of an object outside of the vehicle that, relative to a point inside the passenger compartment of the vehicle, is obscured by the vehicle. 5. The system of claim 4, wherein the representation of at least the portion of the object included in the visual reference is in front of the vehicle such that, relative to the point inside the passenger compartment of the vehicle, the at least the portion of the object is obscured by a dashboard or hood of the vehicle. 6. The system of claim 4, wherein the representation of at least the portion of the object included in the visual reference is beside the vehicle such that, relative to the point inside the passenger compartment of the vehicle, the at least the portion of the object is obscured by a door panel of the vehicle. 7. A method comprising: receiving sensor data from one or more sensors associated with a vehicle; causing a display to present a visual reference on a surface of a passenger compartment of the vehicle based at least in part on the sensor data; detecting, based at least in part on the sensor data, a motion of the vehicle in a first direction; and based at least in part on the motion of the vehicle, causing the display to alter the visual reference in a second direction relative to the passenger compartment of the vehicle. 8. The method of claim 7, wherein the one or more sensors comprise one or more external cameras mounted on the vehicle and the sensor data is first sensor data received at a first time, the method further comprising: receiving, from the one or more external cameras, second sensor data at a second time after the first time; and updating the visual reference based at least in part on receiving the second sensor data from the one or more external cameras. 9. The method of claim 7, wherein the display comprises one or more of a projector or a flexible display. 10. The method of claim 7, further comprising: detecting, by the one or more sensors, a location of a passenger inside of the passenger compartment of the vehicle, wherein causing the display to present the visual reference on the surface of the passenger compartment of the vehicle is further based on the location of the passenger. 11. The method of claim 7, further comprising: determining that the vehicle has reached a destination; and responsive to determining that the vehicle has reached the destination: ceasing to present the visual reference on the display; and causing the display to present marketing materials. 12. The method of claim 7, further comprising: detecting, by the one or more sensors, a speed of the vehicle, wherein causing the display to alter the visual reference is further based on the speed of the vehicle. 13. The method of claim 7, wherein the display is a dashboard display, the vehicle further comprises a door panel display, and the visual reference is a first visual reference, the method further comprising: causing the door panel display to present a second visual reference based at least in part on the sensor data; detecting, by the one or more sensors, translational motion of the vehicle in a forward direction; and based at least in part on the translational motion of the vehicle being in the forward direction, causing the door panel display to alter the second visual reference such that the second visual reference appears to move past the vehicle, wherein causing the dashboard display to alter the first visual reference comprises causing the first visual reference to appear to grow larger. 14. The method of claim 7, wherein the second direction is a different direction than the first direction. 15. One or more computer-readable media storing instructions that, when executed by one or more processors, cause the one or more processors to perform operations comprising: receiving sensor data from one or more sensors associated with a vehicle; causing a display to present a visual reference on a surface of a passenger compartment of the vehicle based at least in part on the sensor data; detecting, based at least in part on the sensor data, a motion of the vehicle in a first direction; and based at least in part on the motion of the vehicle, causing the display to alter the visual reference in a second direction relative to a point inside the passenger compartment of the vehicle. 16. The one or more computer-readable media of claim 15, wherein the motion of the vehicle is a rotational motion in the first direction, and the visual reference is altered by at least rotating the visual reference in the second direction opposite the rotational motion in the first direction. 17. The one or more computer-readable media of claim 15, wherein the visual reference includes a representation of at least a portion of an object outside of the vehicle that, relative to a point inside the passenger compartment of the vehicle, is obscured by the vehicle. 18. The one or more computer-readable media of claim 15, wherein the one or more sensors comprise one or more external cameras mounted on the vehicle and the sensor data is first sensor data received at a first time, the operations further comprising: receiving, from the one or more external cameras, second sensor data at a second time after the first time; and updating the visual reference based at least in part on receiving the second sensor data from the one or more external cameras. 19. The one or more computer-readable media of claim 15, the operations further comprising: detecting, by the one or more sensors, a location of a passenger inside of the passenger compartment of the vehicle, wherein causing the display to present the visual reference on the surface of the passenger compartment of the vehicle is further based on a perspective corresponding to the location of the passenger. 20. The one or more computer-readable media of claim 15, the operations further comprising: detecting, by the one or more sensors, a speed of the vehicle, wherein causing the display to alter the visual reference is further based on the speed of the vehicle.
Systems and methods to provide visual references to passengers in vehicles to prevent motion sickness. The system can include a controller and one or more projectors and/or displays. The controller can detect movement of a vehicle and project images within the vehicle that comport with the detected movement. The system can include a projector to project images on the interior of the vehicle. The system can include one or more displays to display images inside the vehicle. The controller can receive data from one or more cameras, accelerometers, navigation units, magnetometers, and other components to detect the motion of the vehicle. The system can display visual references on the dashboard, door panels, and other interior surfaces to complete the view of passengers, or provide other visual reference, to prevent motion sickness.1. A system comprising: a display disposed in a passenger compartment of a vehicle; one or more processors; and memory storing computer-executable instructions that, when executed by the one or more processors, cause the system to: receive sensor data from one or more sensors associated with the vehicle; cause the display to present a visual reference on a surface of the passenger compartment of the vehicle based at least in part on the sensor data; detect, based at least in part on the sensor data, a motion of the vehicle in a first direction; and based at least in part on the motion of the vehicle, cause the display to alter the visual reference in a second direction. 2. The system of claim 1, wherein the motion of the vehicle is a rotational motion in the first direction, and the visual reference is altered by at least rotating the visual reference in the second direction opposite the rotational motion in the first direction. 3. The system of claim 1, wherein the one or more sensors comprise at least one of an accelerometer, gyroscope, or a magnetometer to detect the motion of the vehicle. 4. The system of claim 1, wherein the visual reference includes a representation of at least a portion of an object outside of the vehicle that, relative to a point inside the passenger compartment of the vehicle, is obscured by the vehicle. 5. The system of claim 4, wherein the representation of at least the portion of the object included in the visual reference is in front of the vehicle such that, relative to the point inside the passenger compartment of the vehicle, the at least the portion of the object is obscured by a dashboard or hood of the vehicle. 6. The system of claim 4, wherein the representation of at least the portion of the object included in the visual reference is beside the vehicle such that, relative to the point inside the passenger compartment of the vehicle, the at least the portion of the object is obscured by a door panel of the vehicle. 7. A method comprising: receiving sensor data from one or more sensors associated with a vehicle; causing a display to present a visual reference on a surface of a passenger compartment of the vehicle based at least in part on the sensor data; detecting, based at least in part on the sensor data, a motion of the vehicle in a first direction; and based at least in part on the motion of the vehicle, causing the display to alter the visual reference in a second direction relative to the passenger compartment of the vehicle. 8. The method of claim 7, wherein the one or more sensors comprise one or more external cameras mounted on the vehicle and the sensor data is first sensor data received at a first time, the method further comprising: receiving, from the one or more external cameras, second sensor data at a second time after the first time; and updating the visual reference based at least in part on receiving the second sensor data from the one or more external cameras. 9. The method of claim 7, wherein the display comprises one or more of a projector or a flexible display. 10. The method of claim 7, further comprising: detecting, by the one or more sensors, a location of a passenger inside of the passenger compartment of the vehicle, wherein causing the display to present the visual reference on the surface of the passenger compartment of the vehicle is further based on the location of the passenger. 11. The method of claim 7, further comprising: determining that the vehicle has reached a destination; and responsive to determining that the vehicle has reached the destination: ceasing to present the visual reference on the display; and causing the display to present marketing materials. 12. The method of claim 7, further comprising: detecting, by the one or more sensors, a speed of the vehicle, wherein causing the display to alter the visual reference is further based on the speed of the vehicle. 13. The method of claim 7, wherein the display is a dashboard display, the vehicle further comprises a door panel display, and the visual reference is a first visual reference, the method further comprising: causing the door panel display to present a second visual reference based at least in part on the sensor data; detecting, by the one or more sensors, translational motion of the vehicle in a forward direction; and based at least in part on the translational motion of the vehicle being in the forward direction, causing the door panel display to alter the second visual reference such that the second visual reference appears to move past the vehicle, wherein causing the dashboard display to alter the first visual reference comprises causing the first visual reference to appear to grow larger. 14. The method of claim 7, wherein the second direction is a different direction than the first direction. 15. One or more computer-readable media storing instructions that, when executed by one or more processors, cause the one or more processors to perform operations comprising: receiving sensor data from one or more sensors associated with a vehicle; causing a display to present a visual reference on a surface of a passenger compartment of the vehicle based at least in part on the sensor data; detecting, based at least in part on the sensor data, a motion of the vehicle in a first direction; and based at least in part on the motion of the vehicle, causing the display to alter the visual reference in a second direction relative to a point inside the passenger compartment of the vehicle. 16. The one or more computer-readable media of claim 15, wherein the motion of the vehicle is a rotational motion in the first direction, and the visual reference is altered by at least rotating the visual reference in the second direction opposite the rotational motion in the first direction. 17. The one or more computer-readable media of claim 15, wherein the visual reference includes a representation of at least a portion of an object outside of the vehicle that, relative to a point inside the passenger compartment of the vehicle, is obscured by the vehicle. 18. The one or more computer-readable media of claim 15, wherein the one or more sensors comprise one or more external cameras mounted on the vehicle and the sensor data is first sensor data received at a first time, the operations further comprising: receiving, from the one or more external cameras, second sensor data at a second time after the first time; and updating the visual reference based at least in part on receiving the second sensor data from the one or more external cameras. 19. The one or more computer-readable media of claim 15, the operations further comprising: detecting, by the one or more sensors, a location of a passenger inside of the passenger compartment of the vehicle, wherein causing the display to present the visual reference on the surface of the passenger compartment of the vehicle is further based on a perspective corresponding to the location of the passenger. 20. The one or more computer-readable media of claim 15, the operations further comprising: detecting, by the one or more sensors, a speed of the vehicle, wherein causing the display to alter the visual reference is further based on the speed of the vehicle.
2,800
340,116
16,801,105
2,874
A semiconductor structure for a DRAM is described having multiple layers of arrays of thyristor memory cells and associated peripheral circuitry. Memory cells in a vertical string extending through the layers have an electrical connection to one terminal of the memory cells in that string. Word lines couple the strings together. Each layer of the array also includes bit line connections to memory cells on that layer. Methods of fabricating the array are described.
1. A multi-layer random access thyristor memory comprising: a semiconductor substrate; z layers of thyristors, each of the z layers including an array of x rows by y columns of thyristors; a first set of electrical connections connecting strings of thyristors, each string including one thyristor from each of the z layers in the array connected together; an array of x by y first electrical connections connecting a first terminal of each thyristor in each string to the thyristors above it and the thyristor below it in that string; a first set of word line connections extending in parallel to connect rows of the strings together; a first set of bit line connections extending in parallel on each layer to connect together columns of thyristors on each layer, the first set of bit line connections on each layer extending outward on each layer away from the array further than the second set of electrical connections on the layer immediately above it so as to form a stair-step arrangement of electrical connections; and peripheral circuitry connected to the first set of electrical connections, the first set of word line connections, and the first set of bit line connections for providing control signals to the first set of electrical connections, the first set of word line connections, and the first set of bit line connections. 2. The multi-layer random access thyristor memory of claim 1 wherein the peripheral circuitry being formed in a layer of semiconductor material on the semiconductor substrate and co-planar with upper layers of the z layers of memory cells. 3. The multi-layer random access thyristor memory of claim 1 wherein the peripheral circuitry being formed in a layer of semiconductor material on the semiconductor substrate and co-planar with lower layers of the z layers of memory cells. 4. A semiconductor fabrication process comprising: depositing a stack of alternating layers of insulating material and first material on a first portion of a semiconductor substrate; depositing dielectric material on a second portion of the semiconductor substrate; etching trenches through the stack of alternating layers, and in the same process, etching away the dielectric material from a peripheral circuit region of the second portion at a level coplanar with predetermined layers of the stack of alternating layers of insulating material and first material on the first portion; providing epitaxial semiconductor material on the peripheral circuit region and in selected locations over the first portion of the semiconductor substrate; removing selected regions of the epitaxial semiconductor material from the peripheral circuit region and filling those selected regions with dielectric to thereby define electrically isolated pockets for transistors; and forming transistors in the electrically isolated pockets. 5. The semiconductor fabrication process wherein the step of etching trenches comprises etching away the dielectric material from a peripheral circuit region of the second portion at a level coplanar with upper layers of the stack of alternating layers of insulating material and first material on the first portion. 6. The semiconductor fabrication process wherein the step of etching trenches comprises etching away the dielectric material from a peripheral circuit region of the second portion at a level coplanar with lower layers of the stack of alternating layers of insulating material and first material on the first portion.
A semiconductor structure for a DRAM is described having multiple layers of arrays of thyristor memory cells and associated peripheral circuitry. Memory cells in a vertical string extending through the layers have an electrical connection to one terminal of the memory cells in that string. Word lines couple the strings together. Each layer of the array also includes bit line connections to memory cells on that layer. Methods of fabricating the array are described.1. A multi-layer random access thyristor memory comprising: a semiconductor substrate; z layers of thyristors, each of the z layers including an array of x rows by y columns of thyristors; a first set of electrical connections connecting strings of thyristors, each string including one thyristor from each of the z layers in the array connected together; an array of x by y first electrical connections connecting a first terminal of each thyristor in each string to the thyristors above it and the thyristor below it in that string; a first set of word line connections extending in parallel to connect rows of the strings together; a first set of bit line connections extending in parallel on each layer to connect together columns of thyristors on each layer, the first set of bit line connections on each layer extending outward on each layer away from the array further than the second set of electrical connections on the layer immediately above it so as to form a stair-step arrangement of electrical connections; and peripheral circuitry connected to the first set of electrical connections, the first set of word line connections, and the first set of bit line connections for providing control signals to the first set of electrical connections, the first set of word line connections, and the first set of bit line connections. 2. The multi-layer random access thyristor memory of claim 1 wherein the peripheral circuitry being formed in a layer of semiconductor material on the semiconductor substrate and co-planar with upper layers of the z layers of memory cells. 3. The multi-layer random access thyristor memory of claim 1 wherein the peripheral circuitry being formed in a layer of semiconductor material on the semiconductor substrate and co-planar with lower layers of the z layers of memory cells. 4. A semiconductor fabrication process comprising: depositing a stack of alternating layers of insulating material and first material on a first portion of a semiconductor substrate; depositing dielectric material on a second portion of the semiconductor substrate; etching trenches through the stack of alternating layers, and in the same process, etching away the dielectric material from a peripheral circuit region of the second portion at a level coplanar with predetermined layers of the stack of alternating layers of insulating material and first material on the first portion; providing epitaxial semiconductor material on the peripheral circuit region and in selected locations over the first portion of the semiconductor substrate; removing selected regions of the epitaxial semiconductor material from the peripheral circuit region and filling those selected regions with dielectric to thereby define electrically isolated pockets for transistors; and forming transistors in the electrically isolated pockets. 5. The semiconductor fabrication process wherein the step of etching trenches comprises etching away the dielectric material from a peripheral circuit region of the second portion at a level coplanar with upper layers of the stack of alternating layers of insulating material and first material on the first portion. 6. The semiconductor fabrication process wherein the step of etching trenches comprises etching away the dielectric material from a peripheral circuit region of the second portion at a level coplanar with lower layers of the stack of alternating layers of insulating material and first material on the first portion.
2,800
340,117
16,801,073
2,874
Techniques for processing comment information are disclosed herein. The disclosed techniques include collecting first voice information from a user in response to receiving a request for inputting voice information while the user is watching a video comprising a plurality of segments; obtaining a timestamp corresponding to a segment among the plurality of segments of the video; processing the first voice information and obtaining second voice information; and generating bullet screen information based at least in part on the timestamp and the second voice information.
1. A computer-implemented method for processing comment information, comprising: collecting first voice information from a user in response to receiving a request for inputting voice information while the user is watching a video, wherein the video comprises a plurality of segments, and the first voice information is associated with a segment among the plurality of segments; obtaining a timestamp corresponding to the segment among the plurality of segments; processing the first voice information and obtaining second voice information; and generating bullet screen information based at least in part on the timestamp and the second voice information, wherein a bullet screen corresponding to the generated bullet screen information is to be presented relative to the video. 2. The computer-implemented method of claim 1, wherein the first voice information is collected after a sound volume of the video is adjusted to a predetermined value. 3. The computer-implemented method of claim 1, further comprising: performing a noise reduction processing on the first voice information; and identifying and removing sensitive information from the first voice information. 4. The computer-implemented method of claim 1, further comprising: performing a high-fidelity compression on the first voice information. 5. The computer-implemented method of claim 1, further comprising: converting the first voice information into text comment information; and identifying and removing sensitive information from the text comment information. 6. The computer-implemented method of claim 6, further comprising: generating and presenting a first interface comprising the text comment information, the text comment information is to be edited by the user via the interface. 7. The computer-implemented method of claim 6, further comprising: modifying the text comment information using network terms based on a context of the text comment information. 8. The computer-implemented method of claim 1, wherein the bullet screen information comprises at least one of the text comment information or voice comment information. 9. The method of claim 8, further comprising: receiving the voice comment information; generating a second interface associated with the voice comment information by which the user selects to play the voice comment information; presenting the second interface at a time corresponding to the segment of the video based on the timestamp; and playing the voice comment information in response to receiving a request via the second interface. 10. The computer-implemented method of claim 9, further comprising: playing the voice comment information after a sound volume of the video is adjusted to a predetermined value. 11. The computer-implemented method of claim 10, further comprising: playing the voice comment information according to at least one of a predetermined volume or a predetermined tone. 12. A computing system of processing comment information, comprising: at least one processor; and at least one memory communicatively coupled to the at least one processor to configure the at least one processor to: collect first voice information from a user in response to receiving a request for inputting voice information while the user is watching a video, wherein the video comprises a plurality of segments, and the first voice information is associated with a segment among the plurality of segments; obtain a timestamp corresponding to the segment among the plurality of segments; process the first voice information and obtain second voice information; and generate bullet screen information based at least in part on the timestamp and the second voice information, wherein a bullet screen corresponding to the generated bullet screen information is to be presented relative to the video 13. The computing system of claim 12, the at least one memory further configuring the at least one processor to: perform a noise reduction processing on the first voice information; and identify and remove sensitive information from the first voice information. 14. The computing system of claim 12, the at least one memory further configuring the at least one processor to: convert the first voice information into text comment information; and identify and remove sensitive information from the text comment information. 15. The computing system of claim 14, the at least one memory further configuring the at least one processor to: modify the text comment information using network terms based on a context of the text comment information. 16. The computing system of claim 14, wherein the bullet screen information comprises at least one of the text comment information or voice comment information. 17. The computing system of claim 16, the at least one memory further configuring the at least one processor to: receive the voice comment information; generate an interface associated with the voice comment information by which the user selects to play the voice comment information; present the interface at a time corresponding to the segment of the video based on the timestamp; and play the voice comment information in response to receiving a request via the interface. 18. A non-transitory storage medium, storing computer-readable instructions that upon execution on a computing device cause the computing device at least to: collect first voice information from a user in response to receiving a request for inputting voice information while the user is watching a video, wherein the video comprises a plurality of segments, and the first voice information is associated with a segment among the plurality of segments; obtain a timestamp corresponding to the segment among the plurality of segments; process the first voice information and obtain second voice information; and generate bullet screen information based at least in part on the timestamp and the second voice information, wherein a bullet screen corresponding to the generated bullet screen information is to be presented relative to the video. 19. The non-transitory storage medium of claim 17, further storing computer-readable instructions that upon execution on the computing device cause the computing device at least to: perform a noise reduction processing on the first voice information; identify and removing sensitive information from the first voice information. 20. The non-transitory storage medium of claim 17, further storing computer-readable instructions that upon execution on the computing device cause the computing device at least to: receive the bullet screen information; generate an interface associated with the bullet screen information by which the user selects to play the bullet screen information; present the interface at a time corresponding to the segment of the video based on the timestamp; and play the bullet screen information in response to receiving a request via the interface.
Techniques for processing comment information are disclosed herein. The disclosed techniques include collecting first voice information from a user in response to receiving a request for inputting voice information while the user is watching a video comprising a plurality of segments; obtaining a timestamp corresponding to a segment among the plurality of segments of the video; processing the first voice information and obtaining second voice information; and generating bullet screen information based at least in part on the timestamp and the second voice information.1. A computer-implemented method for processing comment information, comprising: collecting first voice information from a user in response to receiving a request for inputting voice information while the user is watching a video, wherein the video comprises a plurality of segments, and the first voice information is associated with a segment among the plurality of segments; obtaining a timestamp corresponding to the segment among the plurality of segments; processing the first voice information and obtaining second voice information; and generating bullet screen information based at least in part on the timestamp and the second voice information, wherein a bullet screen corresponding to the generated bullet screen information is to be presented relative to the video. 2. The computer-implemented method of claim 1, wherein the first voice information is collected after a sound volume of the video is adjusted to a predetermined value. 3. The computer-implemented method of claim 1, further comprising: performing a noise reduction processing on the first voice information; and identifying and removing sensitive information from the first voice information. 4. The computer-implemented method of claim 1, further comprising: performing a high-fidelity compression on the first voice information. 5. The computer-implemented method of claim 1, further comprising: converting the first voice information into text comment information; and identifying and removing sensitive information from the text comment information. 6. The computer-implemented method of claim 6, further comprising: generating and presenting a first interface comprising the text comment information, the text comment information is to be edited by the user via the interface. 7. The computer-implemented method of claim 6, further comprising: modifying the text comment information using network terms based on a context of the text comment information. 8. The computer-implemented method of claim 1, wherein the bullet screen information comprises at least one of the text comment information or voice comment information. 9. The method of claim 8, further comprising: receiving the voice comment information; generating a second interface associated with the voice comment information by which the user selects to play the voice comment information; presenting the second interface at a time corresponding to the segment of the video based on the timestamp; and playing the voice comment information in response to receiving a request via the second interface. 10. The computer-implemented method of claim 9, further comprising: playing the voice comment information after a sound volume of the video is adjusted to a predetermined value. 11. The computer-implemented method of claim 10, further comprising: playing the voice comment information according to at least one of a predetermined volume or a predetermined tone. 12. A computing system of processing comment information, comprising: at least one processor; and at least one memory communicatively coupled to the at least one processor to configure the at least one processor to: collect first voice information from a user in response to receiving a request for inputting voice information while the user is watching a video, wherein the video comprises a plurality of segments, and the first voice information is associated with a segment among the plurality of segments; obtain a timestamp corresponding to the segment among the plurality of segments; process the first voice information and obtain second voice information; and generate bullet screen information based at least in part on the timestamp and the second voice information, wherein a bullet screen corresponding to the generated bullet screen information is to be presented relative to the video 13. The computing system of claim 12, the at least one memory further configuring the at least one processor to: perform a noise reduction processing on the first voice information; and identify and remove sensitive information from the first voice information. 14. The computing system of claim 12, the at least one memory further configuring the at least one processor to: convert the first voice information into text comment information; and identify and remove sensitive information from the text comment information. 15. The computing system of claim 14, the at least one memory further configuring the at least one processor to: modify the text comment information using network terms based on a context of the text comment information. 16. The computing system of claim 14, wherein the bullet screen information comprises at least one of the text comment information or voice comment information. 17. The computing system of claim 16, the at least one memory further configuring the at least one processor to: receive the voice comment information; generate an interface associated with the voice comment information by which the user selects to play the voice comment information; present the interface at a time corresponding to the segment of the video based on the timestamp; and play the voice comment information in response to receiving a request via the interface. 18. A non-transitory storage medium, storing computer-readable instructions that upon execution on a computing device cause the computing device at least to: collect first voice information from a user in response to receiving a request for inputting voice information while the user is watching a video, wherein the video comprises a plurality of segments, and the first voice information is associated with a segment among the plurality of segments; obtain a timestamp corresponding to the segment among the plurality of segments; process the first voice information and obtain second voice information; and generate bullet screen information based at least in part on the timestamp and the second voice information, wherein a bullet screen corresponding to the generated bullet screen information is to be presented relative to the video. 19. The non-transitory storage medium of claim 17, further storing computer-readable instructions that upon execution on the computing device cause the computing device at least to: perform a noise reduction processing on the first voice information; identify and removing sensitive information from the first voice information. 20. The non-transitory storage medium of claim 17, further storing computer-readable instructions that upon execution on the computing device cause the computing device at least to: receive the bullet screen information; generate an interface associated with the bullet screen information by which the user selects to play the bullet screen information; present the interface at a time corresponding to the segment of the video based on the timestamp; and play the bullet screen information in response to receiving a request via the interface.
2,800
340,118
16,801,114
2,874
Methods, systems, apparatuses, and computer readable mediums storing processor-executable process steps for verifying a requested credential of a credential owner and/or issuing a new credential through one or more credential service providers. A method for verifying and issuing credential, includes providing, by a first credential management system of a first credential service provider, a sharing credential token and a service endpoint to a requesting device of the credential owner, upon a request; receiving, by a second credential management system of a second credential service provider, from a verifying device of a verifier through the requesting device, the sharing credential token and the service endpoint; sending, by the second credential management system, a proof request to the first credential management system based on the service endpoint; generating, by the first credential management system, a proof based on the proof request; and verifying, by the second credential management system, the proof based on credential cryptography information retrieved from a distributed ledger.
1. A method for verifying a requested credential of a credential owner, comprising: (a) providing, by a first credential management system of a first credential service provider, a sharing credential token and a service endpoint to a requesting device of the credential owner, upon a request; (b) receiving, by a second credential management system of a second credential service provider, from a verifying device of a verifier through the requesting device of the credential owner, the sharing credential token and the service endpoint; (c) sending, by the second credential management system of the second credential service provider, a proof request to the first credential management system of the first credential service provider based on the service endpoint; (d) generating, by the first credential management system of the first credential service provider, a proof based on the proof request; and (e) verifying, by the second credential management system of the second credential service provider, the proof based on credential cryptography information retrieved from a distributed ledger. 2. The method of claim 1, wherein step (a) further comprises authenticating, by the first credential service provider, the requesting device of the credential owner based on an ID of the requesting device. 3. The method of claim 2, wherein the requesting device is a mobile phone and the ID is an International Mobile Equipment Identity. 4. The method of claim 1, wherein the request comprises a verification requirement document originally from the verifier. 5. The method of claim 4, wherein the verification requirement document comprises one or more attributes and one or more credentials where each of the attributes can be selected from. 6. The method of claim 1, wherein the request comprises a credential request identification and the first credential management system obtains, from a database or a distributed ledger, corresponding one or more attributes and one or more credentials where each of the attributes can be selected from, based on the credential request identification. 7. The method of claim 6, wherein the credential request identification comprises a verification requirement document ID. 8. The method of claim 1, wherein step (c) comprises sending, by the second credential management system of the second credential service provider, a proof request and a verification requirement document ID to the first credential management system of the first credential service provider based on the service endpoint. 9. The method of claim 1, wherein the proof request comprises sharing credential token. 10. The method of claim 9, wherein the sharing credential token comprises a globally unique ID generated based on the timestamp. 11. The method of claim 1, wherein the first credential management system provides the sharing credential token and the service endpoint in a format of QR code. 12. The method of claim 1, wherein step (d) comprises: (d1) authenticating the sharing credential token; (d1) selecting one or more attributes respectively from one or more credentials based on a verification requirement document; (d2) generate a revealed or predicate attribute for each selected attribute with zero knowledge proof algorithm to generate a proof by the first credential management system of the first credential service provider. 13. The method of claim 1, wherein the proof comprises either a factual data of an attribute or a predicate of the attribute based on a verification requirement document. 14. The method of claim 1, wherein the credential cryptography information comprises a credential schema, a credential definition, a credential owner's public key, and an issuer's public key. 15. The method of claim 1, wherein the first credential service provider and the second credential service provider are telecommunication carriers. 16. The method of claim 1, wherein the first credential service provider is the same as the second credential service provider. 17. The method of claim 16, wherein the first credential management system is the same as the second credential management system. 18. The method of claim 1, further comprising: (f) receiving, by the first credential management system from the second credential management system, a credential offer; (g) generating, by the first credential management system, a credential request based on the credential offer; and (h) generating, by the second credential management system, a new credential based on the credential request received from the first credential management system. 19. The method of claim 18, further comprising: (i) receiving and storing, by the first credential management system or the requesting device, the new credential. 20. The method of claim 18, wherein at step (g), the credential request is generated by signing the credential offer with a credential owner's private key. 21. The method of claim 18, wherein at step (h), the new credential is generated by signing the credential request with an issuer's private key.
Methods, systems, apparatuses, and computer readable mediums storing processor-executable process steps for verifying a requested credential of a credential owner and/or issuing a new credential through one or more credential service providers. A method for verifying and issuing credential, includes providing, by a first credential management system of a first credential service provider, a sharing credential token and a service endpoint to a requesting device of the credential owner, upon a request; receiving, by a second credential management system of a second credential service provider, from a verifying device of a verifier through the requesting device, the sharing credential token and the service endpoint; sending, by the second credential management system, a proof request to the first credential management system based on the service endpoint; generating, by the first credential management system, a proof based on the proof request; and verifying, by the second credential management system, the proof based on credential cryptography information retrieved from a distributed ledger.1. A method for verifying a requested credential of a credential owner, comprising: (a) providing, by a first credential management system of a first credential service provider, a sharing credential token and a service endpoint to a requesting device of the credential owner, upon a request; (b) receiving, by a second credential management system of a second credential service provider, from a verifying device of a verifier through the requesting device of the credential owner, the sharing credential token and the service endpoint; (c) sending, by the second credential management system of the second credential service provider, a proof request to the first credential management system of the first credential service provider based on the service endpoint; (d) generating, by the first credential management system of the first credential service provider, a proof based on the proof request; and (e) verifying, by the second credential management system of the second credential service provider, the proof based on credential cryptography information retrieved from a distributed ledger. 2. The method of claim 1, wherein step (a) further comprises authenticating, by the first credential service provider, the requesting device of the credential owner based on an ID of the requesting device. 3. The method of claim 2, wherein the requesting device is a mobile phone and the ID is an International Mobile Equipment Identity. 4. The method of claim 1, wherein the request comprises a verification requirement document originally from the verifier. 5. The method of claim 4, wherein the verification requirement document comprises one or more attributes and one or more credentials where each of the attributes can be selected from. 6. The method of claim 1, wherein the request comprises a credential request identification and the first credential management system obtains, from a database or a distributed ledger, corresponding one or more attributes and one or more credentials where each of the attributes can be selected from, based on the credential request identification. 7. The method of claim 6, wherein the credential request identification comprises a verification requirement document ID. 8. The method of claim 1, wherein step (c) comprises sending, by the second credential management system of the second credential service provider, a proof request and a verification requirement document ID to the first credential management system of the first credential service provider based on the service endpoint. 9. The method of claim 1, wherein the proof request comprises sharing credential token. 10. The method of claim 9, wherein the sharing credential token comprises a globally unique ID generated based on the timestamp. 11. The method of claim 1, wherein the first credential management system provides the sharing credential token and the service endpoint in a format of QR code. 12. The method of claim 1, wherein step (d) comprises: (d1) authenticating the sharing credential token; (d1) selecting one or more attributes respectively from one or more credentials based on a verification requirement document; (d2) generate a revealed or predicate attribute for each selected attribute with zero knowledge proof algorithm to generate a proof by the first credential management system of the first credential service provider. 13. The method of claim 1, wherein the proof comprises either a factual data of an attribute or a predicate of the attribute based on a verification requirement document. 14. The method of claim 1, wherein the credential cryptography information comprises a credential schema, a credential definition, a credential owner's public key, and an issuer's public key. 15. The method of claim 1, wherein the first credential service provider and the second credential service provider are telecommunication carriers. 16. The method of claim 1, wherein the first credential service provider is the same as the second credential service provider. 17. The method of claim 16, wherein the first credential management system is the same as the second credential management system. 18. The method of claim 1, further comprising: (f) receiving, by the first credential management system from the second credential management system, a credential offer; (g) generating, by the first credential management system, a credential request based on the credential offer; and (h) generating, by the second credential management system, a new credential based on the credential request received from the first credential management system. 19. The method of claim 18, further comprising: (i) receiving and storing, by the first credential management system or the requesting device, the new credential. 20. The method of claim 18, wherein at step (g), the credential request is generated by signing the credential offer with a credential owner's private key. 21. The method of claim 18, wherein at step (h), the new credential is generated by signing the credential request with an issuer's private key.
2,800
340,119
16,801,110
1,662
Methods, systems, apparatuses, and computer readable mediums storing processor-executable process steps for verifying a requested credential of a credential owner and/or issuing a new credential through one or more credential service providers. A method for verifying and issuing credential, includes providing, by a first credential management system of a first credential service provider, a sharing credential token and a service endpoint to a requesting device of the credential owner, upon a request; receiving, by a second credential management system of a second credential service provider, from a verifying device of a verifier through the requesting device, the sharing credential token and the service endpoint; sending, by the second credential management system, a proof request to the first credential management system based on the service endpoint; generating, by the first credential management system, a proof based on the proof request; and verifying, by the second credential management system, the proof based on credential cryptography information retrieved from a distributed ledger.
1. A method for verifying a requested credential of a credential owner, comprising: (a) providing, by a first credential management system of a first credential service provider, a sharing credential token and a service endpoint to a requesting device of the credential owner, upon a request; (b) receiving, by a second credential management system of a second credential service provider, from a verifying device of a verifier through the requesting device of the credential owner, the sharing credential token and the service endpoint; (c) sending, by the second credential management system of the second credential service provider, a proof request to the first credential management system of the first credential service provider based on the service endpoint; (d) generating, by the first credential management system of the first credential service provider, a proof based on the proof request; and (e) verifying, by the second credential management system of the second credential service provider, the proof based on credential cryptography information retrieved from a distributed ledger. 2. The method of claim 1, wherein step (a) further comprises authenticating, by the first credential service provider, the requesting device of the credential owner based on an ID of the requesting device. 3. The method of claim 2, wherein the requesting device is a mobile phone and the ID is an International Mobile Equipment Identity. 4. The method of claim 1, wherein the request comprises a verification requirement document originally from the verifier. 5. The method of claim 4, wherein the verification requirement document comprises one or more attributes and one or more credentials where each of the attributes can be selected from. 6. The method of claim 1, wherein the request comprises a credential request identification and the first credential management system obtains, from a database or a distributed ledger, corresponding one or more attributes and one or more credentials where each of the attributes can be selected from, based on the credential request identification. 7. The method of claim 6, wherein the credential request identification comprises a verification requirement document ID. 8. The method of claim 1, wherein step (c) comprises sending, by the second credential management system of the second credential service provider, a proof request and a verification requirement document ID to the first credential management system of the first credential service provider based on the service endpoint. 9. The method of claim 1, wherein the proof request comprises sharing credential token. 10. The method of claim 9, wherein the sharing credential token comprises a globally unique ID generated based on the timestamp. 11. The method of claim 1, wherein the first credential management system provides the sharing credential token and the service endpoint in a format of QR code. 12. The method of claim 1, wherein step (d) comprises: (d1) authenticating the sharing credential token; (d1) selecting one or more attributes respectively from one or more credentials based on a verification requirement document; (d2) generate a revealed or predicate attribute for each selected attribute with zero knowledge proof algorithm to generate a proof by the first credential management system of the first credential service provider. 13. The method of claim 1, wherein the proof comprises either a factual data of an attribute or a predicate of the attribute based on a verification requirement document. 14. The method of claim 1, wherein the credential cryptography information comprises a credential schema, a credential definition, a credential owner's public key, and an issuer's public key. 15. The method of claim 1, wherein the first credential service provider and the second credential service provider are telecommunication carriers. 16. The method of claim 1, wherein the first credential service provider is the same as the second credential service provider. 17. The method of claim 16, wherein the first credential management system is the same as the second credential management system. 18. The method of claim 1, further comprising: (f) receiving, by the first credential management system from the second credential management system, a credential offer; (g) generating, by the first credential management system, a credential request based on the credential offer; and (h) generating, by the second credential management system, a new credential based on the credential request received from the first credential management system. 19. The method of claim 18, further comprising: (i) receiving and storing, by the first credential management system or the requesting device, the new credential. 20. The method of claim 18, wherein at step (g), the credential request is generated by signing the credential offer with a credential owner's private key. 21. The method of claim 18, wherein at step (h), the new credential is generated by signing the credential request with an issuer's private key.
Methods, systems, apparatuses, and computer readable mediums storing processor-executable process steps for verifying a requested credential of a credential owner and/or issuing a new credential through one or more credential service providers. A method for verifying and issuing credential, includes providing, by a first credential management system of a first credential service provider, a sharing credential token and a service endpoint to a requesting device of the credential owner, upon a request; receiving, by a second credential management system of a second credential service provider, from a verifying device of a verifier through the requesting device, the sharing credential token and the service endpoint; sending, by the second credential management system, a proof request to the first credential management system based on the service endpoint; generating, by the first credential management system, a proof based on the proof request; and verifying, by the second credential management system, the proof based on credential cryptography information retrieved from a distributed ledger.1. A method for verifying a requested credential of a credential owner, comprising: (a) providing, by a first credential management system of a first credential service provider, a sharing credential token and a service endpoint to a requesting device of the credential owner, upon a request; (b) receiving, by a second credential management system of a second credential service provider, from a verifying device of a verifier through the requesting device of the credential owner, the sharing credential token and the service endpoint; (c) sending, by the second credential management system of the second credential service provider, a proof request to the first credential management system of the first credential service provider based on the service endpoint; (d) generating, by the first credential management system of the first credential service provider, a proof based on the proof request; and (e) verifying, by the second credential management system of the second credential service provider, the proof based on credential cryptography information retrieved from a distributed ledger. 2. The method of claim 1, wherein step (a) further comprises authenticating, by the first credential service provider, the requesting device of the credential owner based on an ID of the requesting device. 3. The method of claim 2, wherein the requesting device is a mobile phone and the ID is an International Mobile Equipment Identity. 4. The method of claim 1, wherein the request comprises a verification requirement document originally from the verifier. 5. The method of claim 4, wherein the verification requirement document comprises one or more attributes and one or more credentials where each of the attributes can be selected from. 6. The method of claim 1, wherein the request comprises a credential request identification and the first credential management system obtains, from a database or a distributed ledger, corresponding one or more attributes and one or more credentials where each of the attributes can be selected from, based on the credential request identification. 7. The method of claim 6, wherein the credential request identification comprises a verification requirement document ID. 8. The method of claim 1, wherein step (c) comprises sending, by the second credential management system of the second credential service provider, a proof request and a verification requirement document ID to the first credential management system of the first credential service provider based on the service endpoint. 9. The method of claim 1, wherein the proof request comprises sharing credential token. 10. The method of claim 9, wherein the sharing credential token comprises a globally unique ID generated based on the timestamp. 11. The method of claim 1, wherein the first credential management system provides the sharing credential token and the service endpoint in a format of QR code. 12. The method of claim 1, wherein step (d) comprises: (d1) authenticating the sharing credential token; (d1) selecting one or more attributes respectively from one or more credentials based on a verification requirement document; (d2) generate a revealed or predicate attribute for each selected attribute with zero knowledge proof algorithm to generate a proof by the first credential management system of the first credential service provider. 13. The method of claim 1, wherein the proof comprises either a factual data of an attribute or a predicate of the attribute based on a verification requirement document. 14. The method of claim 1, wherein the credential cryptography information comprises a credential schema, a credential definition, a credential owner's public key, and an issuer's public key. 15. The method of claim 1, wherein the first credential service provider and the second credential service provider are telecommunication carriers. 16. The method of claim 1, wherein the first credential service provider is the same as the second credential service provider. 17. The method of claim 16, wherein the first credential management system is the same as the second credential management system. 18. The method of claim 1, further comprising: (f) receiving, by the first credential management system from the second credential management system, a credential offer; (g) generating, by the first credential management system, a credential request based on the credential offer; and (h) generating, by the second credential management system, a new credential based on the credential request received from the first credential management system. 19. The method of claim 18, further comprising: (i) receiving and storing, by the first credential management system or the requesting device, the new credential. 20. The method of claim 18, wherein at step (g), the credential request is generated by signing the credential offer with a credential owner's private key. 21. The method of claim 18, wherein at step (h), the new credential is generated by signing the credential request with an issuer's private key.
1,600
340,120
16,801,127
2,861
The invention discloses a rotatable windproof satellite pot, which includes a support base, a working cavity is arranged in the support base, a load-bearing block is provided on the upper side of the support base, and a satellite pot is provided on the upper side of the load-bearing block An intermittent motion mechanism is arranged in the working chamber, a lower end wall of the intermittent motion mechanism is rotatably provided with a transmission shaft whose upper end penetrates the upper end wall of the working chamber, and a hexagonal groove wheel is fixed on the transmission shaft in the working chamber. The device can automatically detect the wind direction.
1. A rotatable windproof satellite pot, comprising a support base, characterized in that a working cavity is provided in the support base, a load-bearing block is provided on the upper side of the support base, and an upper side of the load-bearing block is provided In a satellite pot, an intermittent motion mechanism is provided in the working cavity, and a lower end wall of the intermittent motion mechanism is rotatably provided with a transmission shaft whose upper end penetrates the upper end wall of the working cavity, and the transmission shaft in the working cavity is fixedly provided with Hexagonal sheave, a locking arc matching the hexagonal sheave is provided on the right side of the hexagonal sheave, and a cylindrical pin is provided on the lower side of the locking arc, and the locking arc can block the hexagonal sheave from actively Rotating, through the cooperation of the locking arc and the hexagonal sheave, rotating the cylindrical pin 180 degrees can drive the hexagonal sheave to rotate 60 degrees, and the satellite pot can follow the hexagonal sheave Turn sixty degrees the load-bearing block is provided with a wind detection mechanism. The wind-detection mechanism includes a pressure sensor embedded in the load-bearing block. The pressure sensor is symmetrically provided with pressing blocks on the left and right sides. A wind deflector is provided, and the wind deflector moves toward the pressure sensor under the action of wind. The pressing block moves with the wind deflector. When the pressing block gives the pressure sensor pressure, The pressure sensor can drive the cylindrical pin to rotate; an adjustment mechanism is provided on the upper side of the wind detection mechanism, and the adjustment mechanism is used to repeatedly adjust the satellite pot angle in a small range. 2. The rotatable windproof satellite pot according to claim 1, wherein the intermittent motion mechanism further comprises a power motor fixedly connected to the lower end wall of the working chamber, and the power motor is located on the transmission On the right side of the shaft, a driving shaft is provided on the upper end surface of the power motor for rotation. A bottom rod and the locking arc are fixed on the driving shaft, and the cylindrical pin is fixed on the right side of the upper end surface of the bottom rod. 3. The rotatable windproof satellite pot according to claim 1, wherein the wind detection mechanism further comprises two storage cavities which are symmetrically arranged in the load-bearing block, and the openings of the storage cavities are far away from each other. In the pressure sensor, the upper and lower end walls of the storage cavity are symmetrically provided with a moving slot opening toward the storage cavity, and the end wall of the moving slot away from the pressure sensor is fixed with a moving spring, and the moving spring is close to the one end of the pressure sensor is fixedly provided with a moving block slidingly connected to the moving groove, and a support rod penetrating the storage cavity at one end away from the pressure sensor is fixed between the two moving blocks. The end surface of the support rod near the pressure sensor is fixedly connected, the windshield is fixedly connected with the end surface of the support rod away from the pressure sensor, and the upper end wall of the moving groove on the upper side is provided with a top cavity communicating with external space. 4. The rotatable windproof satellite pot according to claim 1, wherein the adjustment mechanism further comprises an adjustment motor fixedly connected to the right side of the upper end surface of the load-bearing block, and the left end surface of the adjustment motor rotates A power shaft is provided. A fan-shaped bevel gear is fixed at the left end of the power shaft. An extension rod is symmetrically fixed on the upper end surface of the load bearing block. A positioning rod is fixed on the front surface of the extension rod. A spring rod is provided to rotate, and the upper end of the transmission shaft is fixedly connected to the pressure sensor. A top rod fixedly connected to the load-bearing block is fixed on the upper end surface of the pressure sensor, and an opening is provided in the upper end surface of the top rod. The pressure chamber is upward, the lower end wall of the pressure chamber is rotated by a pressure spring, and a connecting shaft having an upper end penetrating the upper end wall of the pressure chamber is provided. The upper end of the connecting shaft is fixedly connected to the satellite pot, and the connecting shaft is in external space. The right end surface is provided with a movement slot opening to the right, a movement spring is fixed on the upper end wall of the movement groove, and a sliding connection with the movement groove is fixed on the lower end of the movement spring. A moving rod, the right end of the moving rod penetrates the right end wall of the moving groove and is fixed with a transmission bevel gear. The lower end face of the transmission bevel gear is symmetrically fixed with a connecting rod. The lower ends of two connecting rods are fixed with a ring shape. Piece. 5. A rotatable windproof satellite pot according to claim 4, characterized in that the fan-shaped bevel gear can be engaged with the transmission bevel gear after rotating. 6. The rotatable windproof satellite pot according to claim 1, wherein four weight blocks are evenly connected to the support base, and the weight blocks are used to stabilize the support base.
The invention discloses a rotatable windproof satellite pot, which includes a support base, a working cavity is arranged in the support base, a load-bearing block is provided on the upper side of the support base, and a satellite pot is provided on the upper side of the load-bearing block An intermittent motion mechanism is arranged in the working chamber, a lower end wall of the intermittent motion mechanism is rotatably provided with a transmission shaft whose upper end penetrates the upper end wall of the working chamber, and a hexagonal groove wheel is fixed on the transmission shaft in the working chamber. The device can automatically detect the wind direction.1. A rotatable windproof satellite pot, comprising a support base, characterized in that a working cavity is provided in the support base, a load-bearing block is provided on the upper side of the support base, and an upper side of the load-bearing block is provided In a satellite pot, an intermittent motion mechanism is provided in the working cavity, and a lower end wall of the intermittent motion mechanism is rotatably provided with a transmission shaft whose upper end penetrates the upper end wall of the working cavity, and the transmission shaft in the working cavity is fixedly provided with Hexagonal sheave, a locking arc matching the hexagonal sheave is provided on the right side of the hexagonal sheave, and a cylindrical pin is provided on the lower side of the locking arc, and the locking arc can block the hexagonal sheave from actively Rotating, through the cooperation of the locking arc and the hexagonal sheave, rotating the cylindrical pin 180 degrees can drive the hexagonal sheave to rotate 60 degrees, and the satellite pot can follow the hexagonal sheave Turn sixty degrees the load-bearing block is provided with a wind detection mechanism. The wind-detection mechanism includes a pressure sensor embedded in the load-bearing block. The pressure sensor is symmetrically provided with pressing blocks on the left and right sides. A wind deflector is provided, and the wind deflector moves toward the pressure sensor under the action of wind. The pressing block moves with the wind deflector. When the pressing block gives the pressure sensor pressure, The pressure sensor can drive the cylindrical pin to rotate; an adjustment mechanism is provided on the upper side of the wind detection mechanism, and the adjustment mechanism is used to repeatedly adjust the satellite pot angle in a small range. 2. The rotatable windproof satellite pot according to claim 1, wherein the intermittent motion mechanism further comprises a power motor fixedly connected to the lower end wall of the working chamber, and the power motor is located on the transmission On the right side of the shaft, a driving shaft is provided on the upper end surface of the power motor for rotation. A bottom rod and the locking arc are fixed on the driving shaft, and the cylindrical pin is fixed on the right side of the upper end surface of the bottom rod. 3. The rotatable windproof satellite pot according to claim 1, wherein the wind detection mechanism further comprises two storage cavities which are symmetrically arranged in the load-bearing block, and the openings of the storage cavities are far away from each other. In the pressure sensor, the upper and lower end walls of the storage cavity are symmetrically provided with a moving slot opening toward the storage cavity, and the end wall of the moving slot away from the pressure sensor is fixed with a moving spring, and the moving spring is close to the one end of the pressure sensor is fixedly provided with a moving block slidingly connected to the moving groove, and a support rod penetrating the storage cavity at one end away from the pressure sensor is fixed between the two moving blocks. The end surface of the support rod near the pressure sensor is fixedly connected, the windshield is fixedly connected with the end surface of the support rod away from the pressure sensor, and the upper end wall of the moving groove on the upper side is provided with a top cavity communicating with external space. 4. The rotatable windproof satellite pot according to claim 1, wherein the adjustment mechanism further comprises an adjustment motor fixedly connected to the right side of the upper end surface of the load-bearing block, and the left end surface of the adjustment motor rotates A power shaft is provided. A fan-shaped bevel gear is fixed at the left end of the power shaft. An extension rod is symmetrically fixed on the upper end surface of the load bearing block. A positioning rod is fixed on the front surface of the extension rod. A spring rod is provided to rotate, and the upper end of the transmission shaft is fixedly connected to the pressure sensor. A top rod fixedly connected to the load-bearing block is fixed on the upper end surface of the pressure sensor, and an opening is provided in the upper end surface of the top rod. The pressure chamber is upward, the lower end wall of the pressure chamber is rotated by a pressure spring, and a connecting shaft having an upper end penetrating the upper end wall of the pressure chamber is provided. The upper end of the connecting shaft is fixedly connected to the satellite pot, and the connecting shaft is in external space. The right end surface is provided with a movement slot opening to the right, a movement spring is fixed on the upper end wall of the movement groove, and a sliding connection with the movement groove is fixed on the lower end of the movement spring. A moving rod, the right end of the moving rod penetrates the right end wall of the moving groove and is fixed with a transmission bevel gear. The lower end face of the transmission bevel gear is symmetrically fixed with a connecting rod. The lower ends of two connecting rods are fixed with a ring shape. Piece. 5. A rotatable windproof satellite pot according to claim 4, characterized in that the fan-shaped bevel gear can be engaged with the transmission bevel gear after rotating. 6. The rotatable windproof satellite pot according to claim 1, wherein four weight blocks are evenly connected to the support base, and the weight blocks are used to stabilize the support base.
2,800
340,121
16,801,116
2,861
A manufacturing method of a microneedle array includes: an adjustment step of positioning and adjusting a mold having a first surface and a second surface, which oppose each other, and a plurality of needle-like recessed portions in the first surface, and an ejection nozzle which ejects a drug solution in a first direction; a relative movement step of moving the mold and the ejection nozzle relative to each other to cause a position of the needle-like recessed portion and a position of the ejection nozzle to coincide with each other in a plan view in the first direction; an ejection step of ejecting the drug solution from the ejection nozzle toward the needle-like recessed portion; a vibration step of vibrating the mold to move the drug solution toward the needle-like recessed portion and close the needle-like recessed portion with the drug solution after the ejection step; and a suction step of suctioning the second surface of the mold.
1. A manufacturing method of a microneedle array comprising: an adjustment step of positioning and adjusting a mold having a first surface and a second surface, which oppose each other, and a plurality of needle-like recessed portions in the first surface, and an ejection nozzle which ejects a drug solution in a first direction; a relative movement step of moving the mold and the ejection nozzle relative to each other to cause a position of the needle-like recessed portion and a position of the ejection nozzle to coincide with each other in a plan view in the first direction; an ejection step of ejecting the drug solution from the ejection nozzle toward the needle-like recessed portion; a vibration step of vibrating the mold to move the drug solution toward the needle-like recessed portion and close the needle-like recessed portion with the drug solution after the ejection step; and a suction step of suctioning the second surface of the mold. 2. The manufacturing method of a microneedle array according to claim 1, wherein the vibration in the vibration step is a horizontal reciprocating motion. 3. The manufacturing method of a microneedle array according to claim 2, wherein a movement direction of the drug solution and a direction of the horizontal reciprocating motion are the same direction. 4. The manufacturing method of a microneedle array according to claim 1, wherein the vibration in the vibration step is a horizontal circular motion. 5. The manufacturing method of a microneedle array according to claim 1, wherein the vibration in the vibration step is a vertical reciprocating motion. 6. The manufacturing method of a microneedle array according to claim 2, wherein the vibration in the vibration step further includes a vertical reciprocating motion. 7. The manufacturing method of a microneedle array according to claim 4, wherein the vibration in the vibration step further includes a vertical reciprocating motion. 8. The manufacturing method of a microneedle array according to claim 1, wherein the needle-like recessed portion comprises: a cup portion provided in the first surface of the mold; and a distal end recessed portion which is connected to the cup portion and has a tapered shape in a depth direction of the mold, an edge portion of an opening of the needle-like recessed portion is chamfered, and a chamfer of the edge portion has a radius of curvature of 30 μm or more and 300 μm or less. 9. The manufacturing method of a microneedle array according to claim 1, wherein the vibration in the vibration step has an amplitude of 1 mm or more and 10 mm or less, a frequency of 15 Hz or higher and 100 Hz or lower, and a time of 1 second or longer and 180 seconds or shorter. 10. The manufacturing method of a microneedle array according to claim 1, further comprising: after the suction step, a drug solution drying step of drying the drug solution filling the needle-like recessed portion; after the drug solution drying step, a base material solution filling step of filling the mold with a base material solution; and a base material solution drying step of drying the filled base material solution.
A manufacturing method of a microneedle array includes: an adjustment step of positioning and adjusting a mold having a first surface and a second surface, which oppose each other, and a plurality of needle-like recessed portions in the first surface, and an ejection nozzle which ejects a drug solution in a first direction; a relative movement step of moving the mold and the ejection nozzle relative to each other to cause a position of the needle-like recessed portion and a position of the ejection nozzle to coincide with each other in a plan view in the first direction; an ejection step of ejecting the drug solution from the ejection nozzle toward the needle-like recessed portion; a vibration step of vibrating the mold to move the drug solution toward the needle-like recessed portion and close the needle-like recessed portion with the drug solution after the ejection step; and a suction step of suctioning the second surface of the mold.1. A manufacturing method of a microneedle array comprising: an adjustment step of positioning and adjusting a mold having a first surface and a second surface, which oppose each other, and a plurality of needle-like recessed portions in the first surface, and an ejection nozzle which ejects a drug solution in a first direction; a relative movement step of moving the mold and the ejection nozzle relative to each other to cause a position of the needle-like recessed portion and a position of the ejection nozzle to coincide with each other in a plan view in the first direction; an ejection step of ejecting the drug solution from the ejection nozzle toward the needle-like recessed portion; a vibration step of vibrating the mold to move the drug solution toward the needle-like recessed portion and close the needle-like recessed portion with the drug solution after the ejection step; and a suction step of suctioning the second surface of the mold. 2. The manufacturing method of a microneedle array according to claim 1, wherein the vibration in the vibration step is a horizontal reciprocating motion. 3. The manufacturing method of a microneedle array according to claim 2, wherein a movement direction of the drug solution and a direction of the horizontal reciprocating motion are the same direction. 4. The manufacturing method of a microneedle array according to claim 1, wherein the vibration in the vibration step is a horizontal circular motion. 5. The manufacturing method of a microneedle array according to claim 1, wherein the vibration in the vibration step is a vertical reciprocating motion. 6. The manufacturing method of a microneedle array according to claim 2, wherein the vibration in the vibration step further includes a vertical reciprocating motion. 7. The manufacturing method of a microneedle array according to claim 4, wherein the vibration in the vibration step further includes a vertical reciprocating motion. 8. The manufacturing method of a microneedle array according to claim 1, wherein the needle-like recessed portion comprises: a cup portion provided in the first surface of the mold; and a distal end recessed portion which is connected to the cup portion and has a tapered shape in a depth direction of the mold, an edge portion of an opening of the needle-like recessed portion is chamfered, and a chamfer of the edge portion has a radius of curvature of 30 μm or more and 300 μm or less. 9. The manufacturing method of a microneedle array according to claim 1, wherein the vibration in the vibration step has an amplitude of 1 mm or more and 10 mm or less, a frequency of 15 Hz or higher and 100 Hz or lower, and a time of 1 second or longer and 180 seconds or shorter. 10. The manufacturing method of a microneedle array according to claim 1, further comprising: after the suction step, a drug solution drying step of drying the drug solution filling the needle-like recessed portion; after the drug solution drying step, a base material solution filling step of filling the mold with a base material solution; and a base material solution drying step of drying the filled base material solution.
2,800
340,122
16,801,102
2,861
An apparatus for precise positioning of a template and method for precise positioning of the template may be used in a brachytherapy procedure. Several different embodiments of the precise positioning apparatus may be used.
1. An apparatus, comprising: a precise positioning device capable of precisely positioning a template at a position, the template having a plurality of holes configured to pass one or more fiducial needles and one or more radioactive source needles through the template; the precise positioning device further comprising: a linear adjustment device that adjusts a horizontal position and a vertical position of the template; a rotational adjustment device that adjusts an angular position of the template; and a lock that locks the position of the template after it is positioned. 2. The apparatus of claim 1, wherein the linear adjustment device further comprises a coarse adjustment component configured to initially adjust the position of the template and a fine adjustment component to perform fine position adjustments of the template. 3. The apparatus of claim 2, wherein the rotational adjustment device further comprises an angle device that is capable of changing a rotational position of the template. 4. The apparatus of claim 3, wherein the lock further comprises one or more knobs that lock the position of the template. 5. The apparatus of claim 4 further comprising a leveling device configured to horizontally level the template. 6. The apparatus of claim 1, wherein the linear adjustment device further comprises an arm that changes the horizontal and vertical position of the template and a computer controller that controls the position of the arm. 7. The apparatus of claim 6, wherein the rotational adjustment device further comprises an angle device that is capable of changing a rotational position of the template. 8. The apparatus of claim 7, wherein the lock further comprises one or more knobs that lock the position of the template. 9. The apparatus of claim 8 further comprising a leveling device configured to horizontally level the template. 10. The apparatus of claim 1, wherein the linear adjustment device has a motor and the rotational adjustment device has a motor and wherein the apparatus further comprises a controller connected to the motors of the linear and rotational adjustment devices that generates control signals to each of the motors of the linear and rotational adjustment devices to move the linear and rotational adjustment devices. 11. The apparatus of claim 10, wherein the controller further comprises a processor and a treatment plan comprising a plurality of lines of instructions wherein the processor of the controller is configured to move the linear and rotational adjustment devices based on the treatment plan. 12. The apparatus of claim 1 further comprising a fixation device that secures the precise positioning device to a fixed frame of reference. 13. A method for positioning a brachytherapy template, comprising: securing a precise positioning brachytherapy template device on a fixed frame of reference; securing a brachytherapy template on a distal end of the precise positioning brachytherapy template device; adjusting a vertical position and a horizontal position of the brachytherapy template using the precise positioning brachytherapy template device relative to a treatment region of a patient; leveling the brachytherapy template relative to the treatment region of the patient using a leveling device; and locking the brachytherapy template into a precise position related to the treatment region of the patient. 14. The method of claim 13, wherein adjusting the vertical and horizontal positions of the brachytherapy template further comprises operating a coarse adjustment component to position the brachytherapy template near the treatment region and operating a fine adjustment component to precisely position the template adjacent the treatment region. 15. The method of claim 14 further comprising operating an angle component to rotate the template at an angle relative to the treatment region of the patient. 16. The method of claim 14, wherein operating the coarse and fine adjustment components further comprises programmatically controlling the position of the coarse and fine adjustment components using a controller. 17. The method of claim 16, wherein operating the coarse and fine adjustment components further comprises generating, by the controller using a treatment plan for the patient, a command to adjust the coarse and fine adjustment components and sending the command to a motor in each of the coarse and fine adjustment components to adjust the positions of the coarse and fine adjustment components. 18. The method of claim 13, wherein securing the precise positioning brachytherapy template device on a fixed frame of reference further comprising securing the precise positioning brachytherapy template device to an operating room table on which the patient rests. 19. A method for treatment, comprising: providing an operating table with a patient having a treatment site lying of the operating table and a precise positioning apparatus attached to the operating table; attaching a brachytherapy template to the precise positioning apparatus; precisely adjusting a position of the brachytherapy template relative to the treatment site using the precise positioning apparatus; locking a position of the brachytherapy template relative to the treatment site; inserting one or more fiducial needles, guided by medical imaging, through the template and locking the one or more fiducial needles; and inserting one or more brachytherapy needles through the template and into the treatment site to place one or more radioactive seeds into the treatment site. 20. The method of claim 19, wherein precisely adjusting the position of the brachytherapy template further comprises operating a coarse adjustment component and a fine adjustment component to precisely position template at the treatment site. 21. The method of claim 20, wherein precisely adjusting the position of the brachytherapy template further comprises adjusting a vertical position and a horizontal position of the brachytherapy template relative to a treatment region of a patient. 22. The method of claim 21, wherein precisely adjusting the position of the brachytherapy template further comprises leveling the brachytherapy template relative to the treatment region of the patient using a leveling device. 23. The method of claim 22, wherein precisely adjusting the position of the brachytherapy template further comprises operating an angle component to rotate the template at an angle relative to the treatment region of the patient. 24. The method of claim 21, wherein adjusting a vertical position and a horizontal position of the brachytherapy template further comprises programmatically controlling the horizontal and vertical positions of the brachytherapy template using a controller. 25. The method of claim 24, wherein adjusting a vertical position and a horizontal position of the brachytherapy template further comprises generating, by the controller using a treatment plan for the patient, a command to adjust the vertical and horizontal positions of the brachytherapy template and sending the commands to a motor to adjust the vertical and horizontal positions of the brachytherapy template.
An apparatus for precise positioning of a template and method for precise positioning of the template may be used in a brachytherapy procedure. Several different embodiments of the precise positioning apparatus may be used.1. An apparatus, comprising: a precise positioning device capable of precisely positioning a template at a position, the template having a plurality of holes configured to pass one or more fiducial needles and one or more radioactive source needles through the template; the precise positioning device further comprising: a linear adjustment device that adjusts a horizontal position and a vertical position of the template; a rotational adjustment device that adjusts an angular position of the template; and a lock that locks the position of the template after it is positioned. 2. The apparatus of claim 1, wherein the linear adjustment device further comprises a coarse adjustment component configured to initially adjust the position of the template and a fine adjustment component to perform fine position adjustments of the template. 3. The apparatus of claim 2, wherein the rotational adjustment device further comprises an angle device that is capable of changing a rotational position of the template. 4. The apparatus of claim 3, wherein the lock further comprises one or more knobs that lock the position of the template. 5. The apparatus of claim 4 further comprising a leveling device configured to horizontally level the template. 6. The apparatus of claim 1, wherein the linear adjustment device further comprises an arm that changes the horizontal and vertical position of the template and a computer controller that controls the position of the arm. 7. The apparatus of claim 6, wherein the rotational adjustment device further comprises an angle device that is capable of changing a rotational position of the template. 8. The apparatus of claim 7, wherein the lock further comprises one or more knobs that lock the position of the template. 9. The apparatus of claim 8 further comprising a leveling device configured to horizontally level the template. 10. The apparatus of claim 1, wherein the linear adjustment device has a motor and the rotational adjustment device has a motor and wherein the apparatus further comprises a controller connected to the motors of the linear and rotational adjustment devices that generates control signals to each of the motors of the linear and rotational adjustment devices to move the linear and rotational adjustment devices. 11. The apparatus of claim 10, wherein the controller further comprises a processor and a treatment plan comprising a plurality of lines of instructions wherein the processor of the controller is configured to move the linear and rotational adjustment devices based on the treatment plan. 12. The apparatus of claim 1 further comprising a fixation device that secures the precise positioning device to a fixed frame of reference. 13. A method for positioning a brachytherapy template, comprising: securing a precise positioning brachytherapy template device on a fixed frame of reference; securing a brachytherapy template on a distal end of the precise positioning brachytherapy template device; adjusting a vertical position and a horizontal position of the brachytherapy template using the precise positioning brachytherapy template device relative to a treatment region of a patient; leveling the brachytherapy template relative to the treatment region of the patient using a leveling device; and locking the brachytherapy template into a precise position related to the treatment region of the patient. 14. The method of claim 13, wherein adjusting the vertical and horizontal positions of the brachytherapy template further comprises operating a coarse adjustment component to position the brachytherapy template near the treatment region and operating a fine adjustment component to precisely position the template adjacent the treatment region. 15. The method of claim 14 further comprising operating an angle component to rotate the template at an angle relative to the treatment region of the patient. 16. The method of claim 14, wherein operating the coarse and fine adjustment components further comprises programmatically controlling the position of the coarse and fine adjustment components using a controller. 17. The method of claim 16, wherein operating the coarse and fine adjustment components further comprises generating, by the controller using a treatment plan for the patient, a command to adjust the coarse and fine adjustment components and sending the command to a motor in each of the coarse and fine adjustment components to adjust the positions of the coarse and fine adjustment components. 18. The method of claim 13, wherein securing the precise positioning brachytherapy template device on a fixed frame of reference further comprising securing the precise positioning brachytherapy template device to an operating room table on which the patient rests. 19. A method for treatment, comprising: providing an operating table with a patient having a treatment site lying of the operating table and a precise positioning apparatus attached to the operating table; attaching a brachytherapy template to the precise positioning apparatus; precisely adjusting a position of the brachytherapy template relative to the treatment site using the precise positioning apparatus; locking a position of the brachytherapy template relative to the treatment site; inserting one or more fiducial needles, guided by medical imaging, through the template and locking the one or more fiducial needles; and inserting one or more brachytherapy needles through the template and into the treatment site to place one or more radioactive seeds into the treatment site. 20. The method of claim 19, wherein precisely adjusting the position of the brachytherapy template further comprises operating a coarse adjustment component and a fine adjustment component to precisely position template at the treatment site. 21. The method of claim 20, wherein precisely adjusting the position of the brachytherapy template further comprises adjusting a vertical position and a horizontal position of the brachytherapy template relative to a treatment region of a patient. 22. The method of claim 21, wherein precisely adjusting the position of the brachytherapy template further comprises leveling the brachytherapy template relative to the treatment region of the patient using a leveling device. 23. The method of claim 22, wherein precisely adjusting the position of the brachytherapy template further comprises operating an angle component to rotate the template at an angle relative to the treatment region of the patient. 24. The method of claim 21, wherein adjusting a vertical position and a horizontal position of the brachytherapy template further comprises programmatically controlling the horizontal and vertical positions of the brachytherapy template using a controller. 25. The method of claim 24, wherein adjusting a vertical position and a horizontal position of the brachytherapy template further comprises generating, by the controller using a treatment plan for the patient, a command to adjust the vertical and horizontal positions of the brachytherapy template and sending the commands to a motor to adjust the vertical and horizontal positions of the brachytherapy template.
2,800
340,123
16,801,107
2,861
A rotational intravascular ultrasound probe for insertion into a vasculature and a method of manufacturing the same. The rotational intravascular ultrasound probe comprises an elongate catheter having a flexible body and an elongate transducer shaft disposed within the flexible body. The transducer shaft comprises a proximal end portion, a distal end portion, a drive shaft extending from the proximal end portion to the distal end portion, an ultrasonic transducer disposed near the distal end portion for obtaining a circumferential image through rotation, and a transducer housing molded to the drive shaft and the ultrasonic transducer.
1. A rotational intravascular ultrasound probe, comprising: a catheter configured to be positioned within a blood vessel of a patient; a drive cable disposed within the catheter and configured to rotate, wherein the drive cable comprises a longitudinal axis, a proximal portion, and a distal portion; a housing disposed at the distal portion of the drive cable; and an ultrasonic transducer disposed within the housing and configured to obtain a circumferential image of the blood vessel during rotation of the drive cable, wherein the ultrasonic transducer comprises a stack of layers extending perpendicular to the longitudinal axis, and wherein the housing physically contacts one or more of the stack of layers of the ultrasonic transducer. 2. The rotational intravascular ultrasound probe of claim 1, wherein the housing has at least one of a cylindrical shape, a linear shape, or a domed shape. 3. The rotational intravascular ultrasound probe of claim 1, wherein the ultrasonic transducer comprises a single ultrasonic transducer. 4. The rotational intravascular ultrasound probe of claim 1, further comprising a second ultrasonic transducer, wherein the ultrasonic transducer comprises a first ultrasonic transducer, wherein the second ultrasonic transducer is diametrically opposed to the first ultrasonic transducer. 5. The rotational intravascular ultrasound probe of claim 4, wherein the first ultrasonic transducer and the second ultrasonic transducer are configured to operate at different frequencies. 6. The rotational intravascular ultrasound probe of claim 1, further comprising a second ultrasonic transducer and a third ultrasonic transducer, wherein the ultrasonic transducer comprises a first ultrasonic transducer, wherein the first ultrasonic transducer, the second ultrasonic transducer, and the third ultrasonic transducer are circumferentially positioned 120° from one another. 7. The rotational intravascular ultrasound probe of claim 6, wherein the first ultrasonic transducer, the second ultrasonic transducer, and the third ultrasonic transducer are configured to operate at different frequencies. 8. The rotational intravascular ultrasound probe of claim 1, further comprising an electrical cable in communication with the ultrasonic transducer. 9. The rotational intravascular ultrasound probe of claim 8, further comprising a connector disposed at the proximal portion of the catheter. 10. The rotational intravascular ultrasound probe of claim 1, wherein the housing comprises an injection molded polymer. 11. The rotational intravascular ultrasound probe of claim 10, wherein the injection molded polymer is at least one of a high-acoustic-impedance polymer, a high acoustic attenuation polymer, or a high-electron-density polymer. 12. The rotational intravascular ultrasound probe of claim 10, wherein the injection molded polymer comprises at least one of absorbers, scatterers, metal oxide particles, or hollow microspheres. 13. The rotational intravascular ultrasound probe of claim 1, wherein the housing comprises channels or receptacles configured to deliver or receive material within the blood vessel of the patient. 14. The rotational intravascular ultrasound probe of claim 1, wherein a front surface of the ultrasonic transducer is oriented in a plane that is 30 degrees, 45 degrees, or 60 degrees relative to a plane extending radially from a rotational axis of the ultrasonic transducer.
A rotational intravascular ultrasound probe for insertion into a vasculature and a method of manufacturing the same. The rotational intravascular ultrasound probe comprises an elongate catheter having a flexible body and an elongate transducer shaft disposed within the flexible body. The transducer shaft comprises a proximal end portion, a distal end portion, a drive shaft extending from the proximal end portion to the distal end portion, an ultrasonic transducer disposed near the distal end portion for obtaining a circumferential image through rotation, and a transducer housing molded to the drive shaft and the ultrasonic transducer.1. A rotational intravascular ultrasound probe, comprising: a catheter configured to be positioned within a blood vessel of a patient; a drive cable disposed within the catheter and configured to rotate, wherein the drive cable comprises a longitudinal axis, a proximal portion, and a distal portion; a housing disposed at the distal portion of the drive cable; and an ultrasonic transducer disposed within the housing and configured to obtain a circumferential image of the blood vessel during rotation of the drive cable, wherein the ultrasonic transducer comprises a stack of layers extending perpendicular to the longitudinal axis, and wherein the housing physically contacts one or more of the stack of layers of the ultrasonic transducer. 2. The rotational intravascular ultrasound probe of claim 1, wherein the housing has at least one of a cylindrical shape, a linear shape, or a domed shape. 3. The rotational intravascular ultrasound probe of claim 1, wherein the ultrasonic transducer comprises a single ultrasonic transducer. 4. The rotational intravascular ultrasound probe of claim 1, further comprising a second ultrasonic transducer, wherein the ultrasonic transducer comprises a first ultrasonic transducer, wherein the second ultrasonic transducer is diametrically opposed to the first ultrasonic transducer. 5. The rotational intravascular ultrasound probe of claim 4, wherein the first ultrasonic transducer and the second ultrasonic transducer are configured to operate at different frequencies. 6. The rotational intravascular ultrasound probe of claim 1, further comprising a second ultrasonic transducer and a third ultrasonic transducer, wherein the ultrasonic transducer comprises a first ultrasonic transducer, wherein the first ultrasonic transducer, the second ultrasonic transducer, and the third ultrasonic transducer are circumferentially positioned 120° from one another. 7. The rotational intravascular ultrasound probe of claim 6, wherein the first ultrasonic transducer, the second ultrasonic transducer, and the third ultrasonic transducer are configured to operate at different frequencies. 8. The rotational intravascular ultrasound probe of claim 1, further comprising an electrical cable in communication with the ultrasonic transducer. 9. The rotational intravascular ultrasound probe of claim 8, further comprising a connector disposed at the proximal portion of the catheter. 10. The rotational intravascular ultrasound probe of claim 1, wherein the housing comprises an injection molded polymer. 11. The rotational intravascular ultrasound probe of claim 10, wherein the injection molded polymer is at least one of a high-acoustic-impedance polymer, a high acoustic attenuation polymer, or a high-electron-density polymer. 12. The rotational intravascular ultrasound probe of claim 10, wherein the injection molded polymer comprises at least one of absorbers, scatterers, metal oxide particles, or hollow microspheres. 13. The rotational intravascular ultrasound probe of claim 1, wherein the housing comprises channels or receptacles configured to deliver or receive material within the blood vessel of the patient. 14. The rotational intravascular ultrasound probe of claim 1, wherein a front surface of the ultrasonic transducer is oriented in a plane that is 30 degrees, 45 degrees, or 60 degrees relative to a plane extending radially from a rotational axis of the ultrasonic transducer.
2,800
340,124
16,801,108
3,732
An article of clothing for use as swimwear comprising: an outer layer configured to display an artwork; an inner layer configured to obscure light, wherein the outer layer and inner layer are oriented in a manner to enhance appearance of the artwork on the outer layer and wherein the outer layer is made of fabric adapted to display the artwork wherein the artwork is drawn on the outer layer by a user.
1. An article of clothing for use as swimwear comprising: an outer layer configured to display an artwork; an inner layer configured to obscure light, wherein the outer layer and inner layer are oriented in a manner to enhance appearance of the artwork on the outer layer and wherein the outer layer is made of fabric adapted to display the artwork wherein the artwork is drawn on the outer layer by a user. 2. The swimwear as claimed in claim 1 wherein the outer layer is of white colour. 3. The swimwear as claimed in claim 2, wherein the inner layer is in the form of a lining made of fabric which obscures light from passing through the inner layer and wherein the inner later is of black colour. 4. The swimwear as claimed in claim 1, wherein the ink used to draw the artwork is water soluble. 5. The swimwear as claimed in claim 4 wherein the artwork can be removed by agitating the ink while immersed in water. 6. The swimwear as claimed in claim 1 wherein the ink used to draw the artwork is permanent ink. 7. A method of customising an article of clothing for use as swimwear, the method comprising the steps of: providing the swimwear having an outer layer and an inner layer; and drawing an artwork on the outer layer of the swimwear to thereby affix the artwork on the outer layer of the swimwear, wherein the step of providing comprises a step of arranging the outer layer and the inner layer of the swimwear in a predetermined orientation to enhance appearance of the artwork on the outer layer of the swimwear and wherein the outer layer is made of fabric adapted to display the artwork and wherein the inner layer is in the form of a lining and is made of fabric which obscures light from passing through the inner layer. 8. The method as claimed in claim 7 wherein the inner lanner is of black colour and the outer layer is of white colour. 9. An article of clothing comprising: an outer layer made of fabric adapted to display an artwork drawn thereon by a user; an inner layer made of light obscuring fabric sewn to the outer later, the inner layer and the outer layer being configured so as to enhance appearance of the artwork on the outer layer by substantially preventing light from passing through the inner layer. 10. Swimwear according to claim 9 wherein the outer layer fabric is substantially white. 11. Swimwear according to claim 9 wherein the inner layer fabric is substantially black.
An article of clothing for use as swimwear comprising: an outer layer configured to display an artwork; an inner layer configured to obscure light, wherein the outer layer and inner layer are oriented in a manner to enhance appearance of the artwork on the outer layer and wherein the outer layer is made of fabric adapted to display the artwork wherein the artwork is drawn on the outer layer by a user.1. An article of clothing for use as swimwear comprising: an outer layer configured to display an artwork; an inner layer configured to obscure light, wherein the outer layer and inner layer are oriented in a manner to enhance appearance of the artwork on the outer layer and wherein the outer layer is made of fabric adapted to display the artwork wherein the artwork is drawn on the outer layer by a user. 2. The swimwear as claimed in claim 1 wherein the outer layer is of white colour. 3. The swimwear as claimed in claim 2, wherein the inner layer is in the form of a lining made of fabric which obscures light from passing through the inner layer and wherein the inner later is of black colour. 4. The swimwear as claimed in claim 1, wherein the ink used to draw the artwork is water soluble. 5. The swimwear as claimed in claim 4 wherein the artwork can be removed by agitating the ink while immersed in water. 6. The swimwear as claimed in claim 1 wherein the ink used to draw the artwork is permanent ink. 7. A method of customising an article of clothing for use as swimwear, the method comprising the steps of: providing the swimwear having an outer layer and an inner layer; and drawing an artwork on the outer layer of the swimwear to thereby affix the artwork on the outer layer of the swimwear, wherein the step of providing comprises a step of arranging the outer layer and the inner layer of the swimwear in a predetermined orientation to enhance appearance of the artwork on the outer layer of the swimwear and wherein the outer layer is made of fabric adapted to display the artwork and wherein the inner layer is in the form of a lining and is made of fabric which obscures light from passing through the inner layer. 8. The method as claimed in claim 7 wherein the inner lanner is of black colour and the outer layer is of white colour. 9. An article of clothing comprising: an outer layer made of fabric adapted to display an artwork drawn thereon by a user; an inner layer made of light obscuring fabric sewn to the outer later, the inner layer and the outer layer being configured so as to enhance appearance of the artwork on the outer layer by substantially preventing light from passing through the inner layer. 10. Swimwear according to claim 9 wherein the outer layer fabric is substantially white. 11. Swimwear according to claim 9 wherein the inner layer fabric is substantially black.
3,700
340,125
16,801,095
3,732
Provided is a defect occurrence prediction system for a machine tool that makes it possible to identify the factors causing the occurrence of defects efficiently and effectively, and predict the occurrence of the defects accurately with good precision. A defect occurrence prediction system includes an information data accumulation unit that accumulates various types of information and various types of data relating to a machining operation of the machine tool; a defective product occurrence information data extraction unit that extracts from the information data accumulation unit the various types of information and the various types of data when the defective product is produced in the machined products; and a defect occurrence prediction unit that performs a defect occurrence prediction on a basis of the various types of information and the various types of data extracted by the defective product occurrence information data extraction unit and various types of information and various types of data relating to a machining operation of the machine tool obtained in real time.
1. A defect occurrence prediction system of a machine tool which predicts an occurrence of a defective product in machined products by the machine tool, the defect occurrence prediction system comprising: an information data accumulation unit that accumulates various types of information and various types of data relating to a machining operation of the machine tool; a defective product occurrence information data extraction unit that extracts from the information data accumulation unit the various types of information and the various types of data when the defective product is produced in the machined products; and a defect occurrence prediction unit that performs a defect occurrence prediction on a basis of the various types of information and the various types of data extracted by the defective product occurrence information data extraction unit and various types of information and various types of data relating to a machining operation of the machine tool obtained in real time, wherein the various types of data include measurement data of at least one of vibration and sound during machining of the machine tool, and wherein the defect occurrence prediction unit is configured to predict a defect occurrence by performing statistical processing for the measurement data. 2. A defect occurrence prediction system of a machine tool which predicts an occurrence of a defective product in machined products by the machine tool, the defect occurrence prediction system comprising: an information data accumulation unit that accumulates various types of information and various types of data relating to a machining operation of the machine tool; a defective product occurrence information data extraction unit that extracts from the information data accumulation unit the various types of information and the various types of data when the defective product is produced in the machined products; and a defect occurrence prediction unit that performs a defect occurrence prediction on a basis of the various types of information and the various types of data extracted by the defective product occurrence information data extraction unit and various types of information and various types of data relating to a machining operation of the machine tool obtained in real time, wherein the various types of data include measurement data of at least one of a spindle motor and a servomotor during machining of the machine tool, and wherein the defect occurrence prediction unit is configured to predict a defect occurrence by performing statistical processing for the measurement data. 3. A defect occurrence prediction system of a machine tool which predicts an occurrence of a defective product in machined products by the machine tool, the defect occurrence prediction system comprising: an information data accumulation unit that accumulates various types of information and various types of data relating to a machining operation of the machine tool; a defective product occurrence information data extraction unit that extracts from the information data accumulation unit the various types of information and the various types of data when the defective product is produced in the machined products; and a defect occurrence prediction unit that performs a defect occurrence prediction on a basis of the various types of information and the various types of data extracted by the defective product occurrence information data extraction unit and various types of information and various types of data relating to a machining operation of the machine tool obtained in real time, wherein the various types of data include image data of at least one of a machined part and a tool during machining of the machine tool, and wherein the defect occurrence prediction unit is configured to predict a defect occurrence by using at least one of machine learning, threshold determination, and statistical processing on the image data. 4. A defect occurrence prediction system of a machine tool which predicts an occurrence of a defective product in machined products by the machine tool, the defect occurrence prediction system comprising: an information data accumulation unit that accumulates various types of information and various types of data relating to a machining operation of the machine tool; a defective product occurrence information data extraction unit that extracts from the information data accumulation unit the various types of information and the various types of data when the defective product is produced in the machined products; and a defect occurrence prediction unit that performs a defect occurrence prediction on a basis of the various types of information and the various types of data extracted by the defective product occurrence information data extraction unit and various types of information and various types of data relating to a machining operation of the machine tool obtained in real time, wherein the various types of data include measured data detected by an environmental sensor that measures, among air flow, temperature, humidity, pressure, illuminance, and air pollution which are environmental elements in a factory where the machine tool is installed, the environmental elements including at least the air flow, and wherein the defect occurrence prediction unit is configured to predict a defect occurrence by using at least one of machine learning, threshold determination, and statistical processing for the measurement data.
Provided is a defect occurrence prediction system for a machine tool that makes it possible to identify the factors causing the occurrence of defects efficiently and effectively, and predict the occurrence of the defects accurately with good precision. A defect occurrence prediction system includes an information data accumulation unit that accumulates various types of information and various types of data relating to a machining operation of the machine tool; a defective product occurrence information data extraction unit that extracts from the information data accumulation unit the various types of information and the various types of data when the defective product is produced in the machined products; and a defect occurrence prediction unit that performs a defect occurrence prediction on a basis of the various types of information and the various types of data extracted by the defective product occurrence information data extraction unit and various types of information and various types of data relating to a machining operation of the machine tool obtained in real time.1. A defect occurrence prediction system of a machine tool which predicts an occurrence of a defective product in machined products by the machine tool, the defect occurrence prediction system comprising: an information data accumulation unit that accumulates various types of information and various types of data relating to a machining operation of the machine tool; a defective product occurrence information data extraction unit that extracts from the information data accumulation unit the various types of information and the various types of data when the defective product is produced in the machined products; and a defect occurrence prediction unit that performs a defect occurrence prediction on a basis of the various types of information and the various types of data extracted by the defective product occurrence information data extraction unit and various types of information and various types of data relating to a machining operation of the machine tool obtained in real time, wherein the various types of data include measurement data of at least one of vibration and sound during machining of the machine tool, and wherein the defect occurrence prediction unit is configured to predict a defect occurrence by performing statistical processing for the measurement data. 2. A defect occurrence prediction system of a machine tool which predicts an occurrence of a defective product in machined products by the machine tool, the defect occurrence prediction system comprising: an information data accumulation unit that accumulates various types of information and various types of data relating to a machining operation of the machine tool; a defective product occurrence information data extraction unit that extracts from the information data accumulation unit the various types of information and the various types of data when the defective product is produced in the machined products; and a defect occurrence prediction unit that performs a defect occurrence prediction on a basis of the various types of information and the various types of data extracted by the defective product occurrence information data extraction unit and various types of information and various types of data relating to a machining operation of the machine tool obtained in real time, wherein the various types of data include measurement data of at least one of a spindle motor and a servomotor during machining of the machine tool, and wherein the defect occurrence prediction unit is configured to predict a defect occurrence by performing statistical processing for the measurement data. 3. A defect occurrence prediction system of a machine tool which predicts an occurrence of a defective product in machined products by the machine tool, the defect occurrence prediction system comprising: an information data accumulation unit that accumulates various types of information and various types of data relating to a machining operation of the machine tool; a defective product occurrence information data extraction unit that extracts from the information data accumulation unit the various types of information and the various types of data when the defective product is produced in the machined products; and a defect occurrence prediction unit that performs a defect occurrence prediction on a basis of the various types of information and the various types of data extracted by the defective product occurrence information data extraction unit and various types of information and various types of data relating to a machining operation of the machine tool obtained in real time, wherein the various types of data include image data of at least one of a machined part and a tool during machining of the machine tool, and wherein the defect occurrence prediction unit is configured to predict a defect occurrence by using at least one of machine learning, threshold determination, and statistical processing on the image data. 4. A defect occurrence prediction system of a machine tool which predicts an occurrence of a defective product in machined products by the machine tool, the defect occurrence prediction system comprising: an information data accumulation unit that accumulates various types of information and various types of data relating to a machining operation of the machine tool; a defective product occurrence information data extraction unit that extracts from the information data accumulation unit the various types of information and the various types of data when the defective product is produced in the machined products; and a defect occurrence prediction unit that performs a defect occurrence prediction on a basis of the various types of information and the various types of data extracted by the defective product occurrence information data extraction unit and various types of information and various types of data relating to a machining operation of the machine tool obtained in real time, wherein the various types of data include measured data detected by an environmental sensor that measures, among air flow, temperature, humidity, pressure, illuminance, and air pollution which are environmental elements in a factory where the machine tool is installed, the environmental elements including at least the air flow, and wherein the defect occurrence prediction unit is configured to predict a defect occurrence by using at least one of machine learning, threshold determination, and statistical processing for the measurement data.
3,700
340,126
16,801,080
3,732
A system includes a support structure that is configured to be positioned at a fixed location relative to a component of a mineral extraction system. The system also includes a drive assembly having a drive motor and a valve attachment, and the drive assembly is configured to move about the support structure and to actuate multiple valves of the component of the mineral extraction system.
1-20. (canceled) 21. A system, comprising: an actuation system configured to selectively actuate at least first and second valves, wherein the actuation system comprises: a track extending between at least first and second positions; an arm coupled to the track, wherein the arm is configured to move along the track between the first and second positions, and the arm is configured to rotate about at least one rotational joint; and a valve attachment coupled to the arm, wherein the valve attachment is configured to selectively actuate each of the first and second valves. 22. The system of claim 21, comprising at least one drive configured to move the arm along the track and to rotate the arm about the at least one rotational joint. 23. The system of claim 22, wherein the at least one drive comprises one or more electric drives. 24. The system of claim 21, comprising at least one drive configured to move the valve attachment along one or more paths of travel to selectively actuate each of the first and second valves. 25. The system of claim 24, wherein the at least one drive comprises one or more electric drives. 26. The system of claim 24, wherein the one or more paths of travel comprise a linear path of travel. 27. The system of claim 24, wherein the one or more paths of travel comprise a rotational path of travel. 28. The system of claim 21, wherein the track is configured to mount in a fixed position relative to the first and second valves. 29. The system of claim 21, wherein the first and second valves are part of a mineral extraction system. 30. The system of claim 29, wherein the first and second valves are disposed on a common Christmas tree of the mineral extraction system, and the track is configured to extend between the first and second valves on the common Christmas tree. 31. The system of claim 29, wherein the first valve is disposed on a first Christmas tree and the second valve is disposed on a second Christmas tree of the mineral extraction system, and the track is configured to extend between the first and second Christmas trees. 32. The system of claim 29, comprising the mineral extraction system having the first and second valves. 33. The system of claim 21, comprising a controller coupled to one or more drives configured to move the arm along the track, rotate the arm about the at least one rotational joint, and move the valve attachment to selectively actuate each of the first and second valves. 34. The system of claim 33, comprise a remote user interface coupled to the controller. 35. The system of claim 33, comprising one or more sensors configured to monitor one or more parameters of a system having the first and second valves, wherein the controller is responsive to feedback from the one or more sensors to selectively actuate at least one of the first valve or the second valve. 36. The system of claim 33, wherein the controller is configured to selectively actuate the first and second valves in a predetermined sequence. 37. The system of claim 21, wherein the at least one rotational joint comprises a plurality of rotational joints. 38. The system of claim 21, wherein the arm comprises a platform coupled to the track, a head having the valve attachment, and one or more arm sections disposed between the platform and the head, wherein the at least one rotational joint comprises a first rotational joint between the platform and the one or more arm sections and a second rotational joint between the head and the one or more arm sections. 39. A system, comprising: an actuation system configured to selectively actuate at least first and second components of a mineral extraction system, wherein the actuation system comprises: a track extending between at least first and second positions; an arm coupled to the track, wherein the arm is configured to move along the track between the first and second positions, and the arm is configured to rotate about at least one rotational joint; and an attachment coupled to the arm, wherein the attachment is configured to selectively actuate each of the first and second components of the mineral extraction system. 40. A method, comprising: controlling an actuation system to selectively actuate at least first and second components of a mineral extraction system, wherein controlling the actuation system comprises: driving an arm to move along a track between first and second positions; driving the arm to rotate about at least one rotational joint; and actuating one of the first and second components via an attachment coupled to the arm.
A system includes a support structure that is configured to be positioned at a fixed location relative to a component of a mineral extraction system. The system also includes a drive assembly having a drive motor and a valve attachment, and the drive assembly is configured to move about the support structure and to actuate multiple valves of the component of the mineral extraction system.1-20. (canceled) 21. A system, comprising: an actuation system configured to selectively actuate at least first and second valves, wherein the actuation system comprises: a track extending between at least first and second positions; an arm coupled to the track, wherein the arm is configured to move along the track between the first and second positions, and the arm is configured to rotate about at least one rotational joint; and a valve attachment coupled to the arm, wherein the valve attachment is configured to selectively actuate each of the first and second valves. 22. The system of claim 21, comprising at least one drive configured to move the arm along the track and to rotate the arm about the at least one rotational joint. 23. The system of claim 22, wherein the at least one drive comprises one or more electric drives. 24. The system of claim 21, comprising at least one drive configured to move the valve attachment along one or more paths of travel to selectively actuate each of the first and second valves. 25. The system of claim 24, wherein the at least one drive comprises one or more electric drives. 26. The system of claim 24, wherein the one or more paths of travel comprise a linear path of travel. 27. The system of claim 24, wherein the one or more paths of travel comprise a rotational path of travel. 28. The system of claim 21, wherein the track is configured to mount in a fixed position relative to the first and second valves. 29. The system of claim 21, wherein the first and second valves are part of a mineral extraction system. 30. The system of claim 29, wherein the first and second valves are disposed on a common Christmas tree of the mineral extraction system, and the track is configured to extend between the first and second valves on the common Christmas tree. 31. The system of claim 29, wherein the first valve is disposed on a first Christmas tree and the second valve is disposed on a second Christmas tree of the mineral extraction system, and the track is configured to extend between the first and second Christmas trees. 32. The system of claim 29, comprising the mineral extraction system having the first and second valves. 33. The system of claim 21, comprising a controller coupled to one or more drives configured to move the arm along the track, rotate the arm about the at least one rotational joint, and move the valve attachment to selectively actuate each of the first and second valves. 34. The system of claim 33, comprise a remote user interface coupled to the controller. 35. The system of claim 33, comprising one or more sensors configured to monitor one or more parameters of a system having the first and second valves, wherein the controller is responsive to feedback from the one or more sensors to selectively actuate at least one of the first valve or the second valve. 36. The system of claim 33, wherein the controller is configured to selectively actuate the first and second valves in a predetermined sequence. 37. The system of claim 21, wherein the at least one rotational joint comprises a plurality of rotational joints. 38. The system of claim 21, wherein the arm comprises a platform coupled to the track, a head having the valve attachment, and one or more arm sections disposed between the platform and the head, wherein the at least one rotational joint comprises a first rotational joint between the platform and the one or more arm sections and a second rotational joint between the head and the one or more arm sections. 39. A system, comprising: an actuation system configured to selectively actuate at least first and second components of a mineral extraction system, wherein the actuation system comprises: a track extending between at least first and second positions; an arm coupled to the track, wherein the arm is configured to move along the track between the first and second positions, and the arm is configured to rotate about at least one rotational joint; and an attachment coupled to the arm, wherein the attachment is configured to selectively actuate each of the first and second components of the mineral extraction system. 40. A method, comprising: controlling an actuation system to selectively actuate at least first and second components of a mineral extraction system, wherein controlling the actuation system comprises: driving an arm to move along a track between first and second positions; driving the arm to rotate about at least one rotational joint; and actuating one of the first and second components via an attachment coupled to the arm.
3,700
340,127
16,800,988
3,732
The invention provides for delivery, engineering and optimization of systems, methods, and compositions for manipulation of sequences and/or activities of target sequences. Provided are delivery systems and tissues of organ which are targeted as sites for delivery. Also provided are vectors and vector systems some of which encode one or more components of a CRISPR complex, as well as methods for the design and use of such vectors. Also provide dare methods of directing CRISPR complex formation in eukaryotic cells to ensure enhanced specificity for target recognition and avoidance of toxicity and to edit or modify a target site in a genomic locus of interest to alter or improve the status of a disease or a condition.
1.-55. (canceled) 56. A method of modifying a mammalian subject by editing in vivo a DNA target sequence in a genomic locus of interest of a hepatic cell in the mammalian subject, said method comprising in vivo delivering to the hepatic cell a single dose of a composition comprising or encoding a CRISPR-Cas system, wherein the CRISPR-Cas system comprises: I. a CRISPR-Cas system RNA comprising a guide sequence that hybridizes to the DNA target sequence, and II. a Cas9 comprising at least one nuclear localization sequence (NLS), 57. The method of claim 56, wherein the delivering results in greater than 20% indel formation in the genomic locus of interest of the hepatic cell. 58. The method of claim 56, wherein the composition comprises a lipid particle comprising or encoding the CRISPR-Cas system. 59. The method of claim 56, wherein the Cas9 is S. pyogenes Cas9. 60. The method of claim 56, wherein the Cas9 is S. aureus Cas9. 61. The method of claim 56, wherein the CRISPR-Cas system RNA is a chimeric RNA (chiRNA) comprising the guide sequence fused to a tracr-mate sequence and a tracr-sequence. 62. The method of claim 56, wherein the DNA target sequence is adjacent to a protospacer adjacent motif (PAM). 63. The method of claim 62, wherein the PAM is 5′-NRG. 64. The method of claim 62, wherein the PAM is 5′-NNGRR. 65. The method of claim 56, wherein the composition comprises the CRISPR-Cas system RNA and the Cas9. 66. The method of claim 56, wherein the composition comprises the CRISPR-Cas system RNA and the mRNA encoding the Cas9. 67. The method of claim 56, wherein the composition comprises two or more CRISPR-Cas system RNAs each hybridizing to a different DNA target sequence. 68. The method of claim 56, wherein the DNA target sequence is associated with a liver disease or disorder. 69. The method of claim 56, wherein the DNA target sequence is associated with expression of proprotein convertase subtilisin kexin 9 (PCSK9), Alpha-1 Antitrypsin (A1AT), Hmgcr, G6PC, transthyretin (TTR), Apolipoprotein B (ApoB), or low density lipoprotein receptor (LDL-R). 70. The method of claim 56, wherein the DNA target sequence is associated with AAT deficiency, TTR amyloidosis, or glycogen storage disease. 71. The method of claim 58, wherein the lipid particle is a stable nucleic acid-lipid particle (SNALP). 72. The method of claim 56, wherein the delivering comprises injecting the composition into the mammalian subject. 73. The method of claim 71, wherein injecting comprises intravenous injection, stereotactic injection, or intramuscular injection. 74. The method of claim 56, wherein the mammalian subject is a human subject.
The invention provides for delivery, engineering and optimization of systems, methods, and compositions for manipulation of sequences and/or activities of target sequences. Provided are delivery systems and tissues of organ which are targeted as sites for delivery. Also provided are vectors and vector systems some of which encode one or more components of a CRISPR complex, as well as methods for the design and use of such vectors. Also provide dare methods of directing CRISPR complex formation in eukaryotic cells to ensure enhanced specificity for target recognition and avoidance of toxicity and to edit or modify a target site in a genomic locus of interest to alter or improve the status of a disease or a condition.1.-55. (canceled) 56. A method of modifying a mammalian subject by editing in vivo a DNA target sequence in a genomic locus of interest of a hepatic cell in the mammalian subject, said method comprising in vivo delivering to the hepatic cell a single dose of a composition comprising or encoding a CRISPR-Cas system, wherein the CRISPR-Cas system comprises: I. a CRISPR-Cas system RNA comprising a guide sequence that hybridizes to the DNA target sequence, and II. a Cas9 comprising at least one nuclear localization sequence (NLS), 57. The method of claim 56, wherein the delivering results in greater than 20% indel formation in the genomic locus of interest of the hepatic cell. 58. The method of claim 56, wherein the composition comprises a lipid particle comprising or encoding the CRISPR-Cas system. 59. The method of claim 56, wherein the Cas9 is S. pyogenes Cas9. 60. The method of claim 56, wherein the Cas9 is S. aureus Cas9. 61. The method of claim 56, wherein the CRISPR-Cas system RNA is a chimeric RNA (chiRNA) comprising the guide sequence fused to a tracr-mate sequence and a tracr-sequence. 62. The method of claim 56, wherein the DNA target sequence is adjacent to a protospacer adjacent motif (PAM). 63. The method of claim 62, wherein the PAM is 5′-NRG. 64. The method of claim 62, wherein the PAM is 5′-NNGRR. 65. The method of claim 56, wherein the composition comprises the CRISPR-Cas system RNA and the Cas9. 66. The method of claim 56, wherein the composition comprises the CRISPR-Cas system RNA and the mRNA encoding the Cas9. 67. The method of claim 56, wherein the composition comprises two or more CRISPR-Cas system RNAs each hybridizing to a different DNA target sequence. 68. The method of claim 56, wherein the DNA target sequence is associated with a liver disease or disorder. 69. The method of claim 56, wherein the DNA target sequence is associated with expression of proprotein convertase subtilisin kexin 9 (PCSK9), Alpha-1 Antitrypsin (A1AT), Hmgcr, G6PC, transthyretin (TTR), Apolipoprotein B (ApoB), or low density lipoprotein receptor (LDL-R). 70. The method of claim 56, wherein the DNA target sequence is associated with AAT deficiency, TTR amyloidosis, or glycogen storage disease. 71. The method of claim 58, wherein the lipid particle is a stable nucleic acid-lipid particle (SNALP). 72. The method of claim 56, wherein the delivering comprises injecting the composition into the mammalian subject. 73. The method of claim 71, wherein injecting comprises intravenous injection, stereotactic injection, or intramuscular injection. 74. The method of claim 56, wherein the mammalian subject is a human subject.
3,700
340,128
16,801,096
3,732
System and method for providing fault tolerance in virtualized computer systems use a first guest and a second guest running on virtualization software to produce outputs, which are produced when a workload is executed on the first and second guests. An output of the second guest is compared with an output of the first guest to determine if there is an output match. If there is no output match, the first guest is paused and a resynchronization of the second guest is executed to restore a checkpointed state of the first guest on the second guest. After the resynchronization of the second guest, the paused first guest is caused to resume operation.
1. A computer-implemented method for providing fault tolerance in virtualized computer systems, the method comprising: executing a workload on a first guest and a second guest running on virtualization software that involves producing at least one output; comparing an output of the second guest with an output of the first guest to determine if there is an output match; pausing the first guest and subsequently executing a resynchronization of the second guest to restore a checkpointed state of the first guest on the second guest in response to a determination that the output of the second guest does not match the output of the first guest; and after the resynchronization of the second guest, causing the paused first guest to resume operation. 2. The method of claim 1, wherein each of the first and second guests is a virtualization of a physical computer system. 3. The method of claim 2, wherein each of the first and second guests is a virtual machine. 4. The method of claim 1, further comprising: recording predetermined operations of the first guest to log entries and communicating the log entries to the second guest; and replaying the log entries at the second guest to detect the output of the second guest to be compared with the output of the first guest. 5. The method of claim 1, wherein executing the resynchronization of the second guest comprises: stopping I/O completions from being posted to the first guest and stopping guest operating system instructions from being executed at the first guest; serializing an emulation state of the first guest in a serialized file; and restoring execution of the first guest on the second guest based on the serialized state of the first guest stored in the serialized filed. 6. The method of claim 5, wherein executing the resynchronization of the second guest further comprises reissuing pending I/O operations at the second guest or forwarding I/O completions from the first guest to the second guest as the I/O completions occur. 7. The method of claim 1, further comprising reducing occurrences of the output of the second guest diverging from the output of the first guest, including: recording virtual non-determinism of the first guest except memory access by different virtual processors of the first guest to log entries, for replay of the log entries by the second guest. 8. The method of claim 1, further comprising reducing occurrences of the output of the second guest diverging from the output of the first guest, including: allowing the second guest to continue replay of log entries from the first guest even after control divergence in network packets between the first and second guests, until a physical output packet diverges between the first guest and the second guest. 9. The method of claim 1, further comprising reducing occurrences of the output of the second guest diverging from the output of the first guest, including: suppressing the output from the second guest; and allowing I/O operation from non-external sources to be performed at the second guest, until physical outputs divergence between the first guest and the second guest. 10. The method of claim 1, further comprising reducing occurrences of the output of the second guest diverging from the output of the first guest, including: allowing I/O operations to continue in the second guest even if I/O packets diverge between the first guest and the second guest, until actual payload data in the I/O packets diverge between the first guest and the second guest. 11. The method of claim 1, further comprising reducing occurrences of the output of the second guest diverging from the output of the first guest, including: scheduling virtual processors of the first guest accessing a shared memory region at different times, for replay of log entries, including a scheduling plan of the virtual processors by the second guest. 12. The method of claim 1, further comprising reducing occurrences of the output of the second guest diverging from the output of the first guest, including: tracking access by a virtual processor of the first guest to a memory page not belonging to the virtual processor, for replay of log entries including the tracked access by the second guest. 13. The method of claim 1, further comprising reducing occurrences of the output of the second guest diverging from the output of the first guest, including: adding read values from access to a shared memory region by virtual processors not corresponding to the first guest to log entries, for replay of the read values at the second guest based on the log entries. 14. The method of claim 1, further comprising reducing occurrences of the output of the second guest diverging from the output of the first guest, including: adding an order of lock acquisition by a guest operating system of the first guest to log entries, for replay of the order of lock acquisitions at the second guest based on the log entries. 15. A non-transitory computer-readable storage medium containing program instructions for method for providing fault tolerance in virtualized computer systems, wherein execution of the program instructions by one or more processors of a computer system causes the one or more processors to perform steps comprising: executing a workload on a first guest and a second guest running on virtualization software that involves producing at least one output; comparing an output of the second guest with an output of the first guest to determine if there is an output match; pausing the first guest and subsequently executing a resynchronization of the second guest to restore a checkpointed state of the first guest on the second guest in response to a determination that the output of the second guest does not match the output of the first guest; and after the resynchronization of the second guest, causing the paused first guest to resume operation. 16. The non-transitory computer-readable storage medium of claim 15, wherein each of the first and second guests is a virtualization of a physical computer system. 17. The non-transitory computer-readable storage medium of claim 15, wherein the steps further comprise: recording predetermined operations of the first guest to log entries and communicating the log entries to the second guest; and replaying the log entries at the second guest to detect the output of the second guest to be compared with the output of the first guest. 18. The non-transitory computer-readable storage medium of claim 15, wherein executing the resynchronization of the second guest comprises: stopping I/O completions from being posted to the first guest and stopping guest operating system instructions from being executed at the first guest; serializing an emulation state of the first guest in a serialized file; and restoring execution of the first guest on the second guest based on the serialized state of the first guest stored in the serialized filed. 19. A computer system comprising: memory; and at least one processor configured to: execute a workload on a first guest and a second guest running on virtualization software that involves producing at least one output; compare an output of the second guest with an output of the first guest to determine if there is an output match; pause the first guest and subsequently execute a resynchronization of the second guest to restore a checkpointed state of the first guest on the second guest in response to a determination that the output of the second guest does not match the output of the first guest; and after the resynchronization of the second guest, cause the paused first guest to resume operation. 20. The computer system of claim 19, wherein the at least one processor is further configured to: stop I/O completions from being posted to the first guest and stop guest operating system instructions from being executed at the first guest; serialize an emulation state of the first guest in a serialized file; and restore execution of the first guest on the second guest based on the serialized state of the first guest stored in the serialized filed.
System and method for providing fault tolerance in virtualized computer systems use a first guest and a second guest running on virtualization software to produce outputs, which are produced when a workload is executed on the first and second guests. An output of the second guest is compared with an output of the first guest to determine if there is an output match. If there is no output match, the first guest is paused and a resynchronization of the second guest is executed to restore a checkpointed state of the first guest on the second guest. After the resynchronization of the second guest, the paused first guest is caused to resume operation.1. A computer-implemented method for providing fault tolerance in virtualized computer systems, the method comprising: executing a workload on a first guest and a second guest running on virtualization software that involves producing at least one output; comparing an output of the second guest with an output of the first guest to determine if there is an output match; pausing the first guest and subsequently executing a resynchronization of the second guest to restore a checkpointed state of the first guest on the second guest in response to a determination that the output of the second guest does not match the output of the first guest; and after the resynchronization of the second guest, causing the paused first guest to resume operation. 2. The method of claim 1, wherein each of the first and second guests is a virtualization of a physical computer system. 3. The method of claim 2, wherein each of the first and second guests is a virtual machine. 4. The method of claim 1, further comprising: recording predetermined operations of the first guest to log entries and communicating the log entries to the second guest; and replaying the log entries at the second guest to detect the output of the second guest to be compared with the output of the first guest. 5. The method of claim 1, wherein executing the resynchronization of the second guest comprises: stopping I/O completions from being posted to the first guest and stopping guest operating system instructions from being executed at the first guest; serializing an emulation state of the first guest in a serialized file; and restoring execution of the first guest on the second guest based on the serialized state of the first guest stored in the serialized filed. 6. The method of claim 5, wherein executing the resynchronization of the second guest further comprises reissuing pending I/O operations at the second guest or forwarding I/O completions from the first guest to the second guest as the I/O completions occur. 7. The method of claim 1, further comprising reducing occurrences of the output of the second guest diverging from the output of the first guest, including: recording virtual non-determinism of the first guest except memory access by different virtual processors of the first guest to log entries, for replay of the log entries by the second guest. 8. The method of claim 1, further comprising reducing occurrences of the output of the second guest diverging from the output of the first guest, including: allowing the second guest to continue replay of log entries from the first guest even after control divergence in network packets between the first and second guests, until a physical output packet diverges between the first guest and the second guest. 9. The method of claim 1, further comprising reducing occurrences of the output of the second guest diverging from the output of the first guest, including: suppressing the output from the second guest; and allowing I/O operation from non-external sources to be performed at the second guest, until physical outputs divergence between the first guest and the second guest. 10. The method of claim 1, further comprising reducing occurrences of the output of the second guest diverging from the output of the first guest, including: allowing I/O operations to continue in the second guest even if I/O packets diverge between the first guest and the second guest, until actual payload data in the I/O packets diverge between the first guest and the second guest. 11. The method of claim 1, further comprising reducing occurrences of the output of the second guest diverging from the output of the first guest, including: scheduling virtual processors of the first guest accessing a shared memory region at different times, for replay of log entries, including a scheduling plan of the virtual processors by the second guest. 12. The method of claim 1, further comprising reducing occurrences of the output of the second guest diverging from the output of the first guest, including: tracking access by a virtual processor of the first guest to a memory page not belonging to the virtual processor, for replay of log entries including the tracked access by the second guest. 13. The method of claim 1, further comprising reducing occurrences of the output of the second guest diverging from the output of the first guest, including: adding read values from access to a shared memory region by virtual processors not corresponding to the first guest to log entries, for replay of the read values at the second guest based on the log entries. 14. The method of claim 1, further comprising reducing occurrences of the output of the second guest diverging from the output of the first guest, including: adding an order of lock acquisition by a guest operating system of the first guest to log entries, for replay of the order of lock acquisitions at the second guest based on the log entries. 15. A non-transitory computer-readable storage medium containing program instructions for method for providing fault tolerance in virtualized computer systems, wherein execution of the program instructions by one or more processors of a computer system causes the one or more processors to perform steps comprising: executing a workload on a first guest and a second guest running on virtualization software that involves producing at least one output; comparing an output of the second guest with an output of the first guest to determine if there is an output match; pausing the first guest and subsequently executing a resynchronization of the second guest to restore a checkpointed state of the first guest on the second guest in response to a determination that the output of the second guest does not match the output of the first guest; and after the resynchronization of the second guest, causing the paused first guest to resume operation. 16. The non-transitory computer-readable storage medium of claim 15, wherein each of the first and second guests is a virtualization of a physical computer system. 17. The non-transitory computer-readable storage medium of claim 15, wherein the steps further comprise: recording predetermined operations of the first guest to log entries and communicating the log entries to the second guest; and replaying the log entries at the second guest to detect the output of the second guest to be compared with the output of the first guest. 18. The non-transitory computer-readable storage medium of claim 15, wherein executing the resynchronization of the second guest comprises: stopping I/O completions from being posted to the first guest and stopping guest operating system instructions from being executed at the first guest; serializing an emulation state of the first guest in a serialized file; and restoring execution of the first guest on the second guest based on the serialized state of the first guest stored in the serialized filed. 19. A computer system comprising: memory; and at least one processor configured to: execute a workload on a first guest and a second guest running on virtualization software that involves producing at least one output; compare an output of the second guest with an output of the first guest to determine if there is an output match; pause the first guest and subsequently execute a resynchronization of the second guest to restore a checkpointed state of the first guest on the second guest in response to a determination that the output of the second guest does not match the output of the first guest; and after the resynchronization of the second guest, cause the paused first guest to resume operation. 20. The computer system of claim 19, wherein the at least one processor is further configured to: stop I/O completions from being posted to the first guest and stop guest operating system instructions from being executed at the first guest; serialize an emulation state of the first guest in a serialized file; and restore execution of the first guest on the second guest based on the serialized state of the first guest stored in the serialized filed.
3,700
340,129
16,801,097
3,634
A window covering for natural illumination of building interiors by redirecting the incident daylight at angles that promote its deeper penetration into the interior space. The window covering comprises an optically transmissive, flexible polymeric sheet having a layered structure with a light diffusing output surface and a number of total internal reflection surfaces incorporated into its material. The total internal reflection surfaces are dimensioned such that the multi-layer sheet diffusely redirect at least a portion of light towards a direction which is generally not coincident with the incidence direction.
1. A light redirecting window covering, comprising: a flexible translucent sheet of a non-woven plastic material having a first broad-area surface and an opposing second broad-area surface extending parallel to the first broad-area surface; a plurality of random surface microstructures formed in the first broad-area surface and configured for randomizing light propagation directions; a parallel array of truncated linear prismatic structures formed on the second broad-area surface and extending parallel to an edge of the flexible translucent sheet, wherein each of the prismatic structures has a tapered shape and comprises a first curved side wall forming a first non-zero angle with respect to a normal to the second broad-area surface, a second curved side wall extending at a different non-zero angle with respect to the normal, and a terminal surface facing away from the flexible translucent sheet and connecting the first and second curved side walls; and a flexible optically transmissive sheet bonded to the terminal surfaces of the truncated linear prismatic structures using an optically transmissive adhesive so as to form a single layered flexible film structure adapted for being retained in a planar form and further adapted for being retained in a form of a roll, wherein at least one of the first and second curved side walls is configured for reflecting light using a total internal reflection, and wherein at least one of the first and second curved side walls is configured for deflecting light using refraction. 2. The light redirecting window covering of claim 1, wherein the flexible translucent sheet is configured to diffusely redirect incident light generally towards a direction that is not coincident with an incident propagation direction. 3. The light redirecting window covering of claim 1, further comprising a roller, wherein an end of at least one of the flexible translucent sheet and flexible optically transmissive sheet is windingly received around the roller. 4. The light redirecting window covering of claim 1, further comprising a roller, wherein an end of at least one of the flexible translucent sheet and flexible optically transmissive sheet is windingly received around the roller, and wherein at least one the truncated linear prismatic structures is parallel to a rotation axis of the roller. 5. The light redirecting window covering of claim 1, wherein each of the truncated linear prismatic structures is configured to be operable in horizontal orientation. 6. The light redirecting window covering of claim 1, wherein a portion of at least one of the first and second curved side walls is disposed in contact with an optically transmissive material. 7. The light redirecting window covering of claim 1, wherein a portion of at least one of the first and second curved side walls is disposed in contact with an optically transmissive material having a different refractive index than the material of the truncated linear prismatic structures. 8. The light redirecting window covering of claim 1, wherein the layered flexible film structure is configured to appreciably distort or blur images viewable through the layered flexible film structure. 9. The light redirecting window covering of claim 1, wherein a root mean square surface profile roughness parameter of at least a portion of the first or second curved side walls is less than 60 nanometers at a sampling length of between 20 and 100 micrometers. 10. The light redirecting window covering of claim 1, wherein the layered flexible film structure comprises an elastomeric material. 11. The light redirecting window covering of claim 1, comprising an optically transmissive protective layer bonded to a surface of the layered flexible film structure. 12. The light redirecting window covering of claim 1, wherein the truncated linear prismatic structures define a plurality of voids in the layered flexible film structure. 13. The light redirecting window covering of claim 1, wherein a thickness of the layered flexible film structure is between 200 micrometers and 2 millimeters. 14. The light redirecting window covering of claim 1, wherein the layered flexible film structure has two or more sections having different optical transparency. 15. The light redirecting window covering of claim 1, wherein the layered flexible film structure has two or more sections having different light redirecting properties. 16. The light redirecting window covering of claim 1, wherein a terminal end of at least one of the truncated linear prismatic structures has a triangular shape in a cross-section. 17. The light redirecting window covering of claim 1, wherein the parallel array of truncated linear prismatic structures defines a plurality of voids filled with air. 18. A light redirecting window covering, comprising: a flexible translucent sheet of a non-woven plastic material having a first broad-area surface and an opposing second broad-area surface extending parallel to the first broad-area surface; a plurality of random surface microstructures formed in the first broad-area surface and configured for randomizing light propagation directions; a parallel array of linear prismatic structures formed on the second broad-area surface and tapering away from the second broad-area surface in a perpendicular direction, wherein each of the linear prismatic structures has a first curved side wall forming a first non-zero angle with respect to a normal to the second broad-area surface, a second curved side wall forming a different non-zero angle with respect to the normal, and a terminal surface facing away from the flexible translucent sheet and connecting the first and second curved side walls; and a flexible optically transmissive sheet bonded to the terminal surfaces of the linear prismatic structures using an optically transmissive adhesive so as to form a single layered flexible film structure adapted for being retained in a planar form and further adapted for being retained in a form of a roll, wherein at least one of the first and second curved side walls is configured for reflecting light using a total internal reflection, and wherein at least one of the first and second curved side walls is configured for deflecting light using refraction. 19. A method of making a light redirecting window covering, comprising: providing a flexible translucent sheet of a non-woven plastic material having a first broad-area surface and an opposing second broad-area surface extending parallel to the first broad-area surface, wherein the first broad-area surface has a plurality of random surface microstructures configured for randomizing light propagation directions; forming a layer of optically transmissive material on the flexible translucent sheet; forming a plurality of linear total internal reflection channels in the layer of optically transmissive material, wherein each of the plurality of linear total internal reflection channels has a tapered shape and defines a first curved side wall forming a first non-zero angle with respect to a normal to the second broad-area surface and a second curved side wall extending at a different non-zero angle with respect to the normal; and bonding a flexible optically transmissive sheet to the layer of optically transmissive material using an optically transmissive adhesive so as to form a single layered flexible film structure, which is adapted for being retained in a planar form and is further adapted for being retained in the form of a roll. 20. The method of making a light redirecting window covering of claim 1, comprising forming air-filled voids in the layered flexible film structure.
A window covering for natural illumination of building interiors by redirecting the incident daylight at angles that promote its deeper penetration into the interior space. The window covering comprises an optically transmissive, flexible polymeric sheet having a layered structure with a light diffusing output surface and a number of total internal reflection surfaces incorporated into its material. The total internal reflection surfaces are dimensioned such that the multi-layer sheet diffusely redirect at least a portion of light towards a direction which is generally not coincident with the incidence direction.1. A light redirecting window covering, comprising: a flexible translucent sheet of a non-woven plastic material having a first broad-area surface and an opposing second broad-area surface extending parallel to the first broad-area surface; a plurality of random surface microstructures formed in the first broad-area surface and configured for randomizing light propagation directions; a parallel array of truncated linear prismatic structures formed on the second broad-area surface and extending parallel to an edge of the flexible translucent sheet, wherein each of the prismatic structures has a tapered shape and comprises a first curved side wall forming a first non-zero angle with respect to a normal to the second broad-area surface, a second curved side wall extending at a different non-zero angle with respect to the normal, and a terminal surface facing away from the flexible translucent sheet and connecting the first and second curved side walls; and a flexible optically transmissive sheet bonded to the terminal surfaces of the truncated linear prismatic structures using an optically transmissive adhesive so as to form a single layered flexible film structure adapted for being retained in a planar form and further adapted for being retained in a form of a roll, wherein at least one of the first and second curved side walls is configured for reflecting light using a total internal reflection, and wherein at least one of the first and second curved side walls is configured for deflecting light using refraction. 2. The light redirecting window covering of claim 1, wherein the flexible translucent sheet is configured to diffusely redirect incident light generally towards a direction that is not coincident with an incident propagation direction. 3. The light redirecting window covering of claim 1, further comprising a roller, wherein an end of at least one of the flexible translucent sheet and flexible optically transmissive sheet is windingly received around the roller. 4. The light redirecting window covering of claim 1, further comprising a roller, wherein an end of at least one of the flexible translucent sheet and flexible optically transmissive sheet is windingly received around the roller, and wherein at least one the truncated linear prismatic structures is parallel to a rotation axis of the roller. 5. The light redirecting window covering of claim 1, wherein each of the truncated linear prismatic structures is configured to be operable in horizontal orientation. 6. The light redirecting window covering of claim 1, wherein a portion of at least one of the first and second curved side walls is disposed in contact with an optically transmissive material. 7. The light redirecting window covering of claim 1, wherein a portion of at least one of the first and second curved side walls is disposed in contact with an optically transmissive material having a different refractive index than the material of the truncated linear prismatic structures. 8. The light redirecting window covering of claim 1, wherein the layered flexible film structure is configured to appreciably distort or blur images viewable through the layered flexible film structure. 9. The light redirecting window covering of claim 1, wherein a root mean square surface profile roughness parameter of at least a portion of the first or second curved side walls is less than 60 nanometers at a sampling length of between 20 and 100 micrometers. 10. The light redirecting window covering of claim 1, wherein the layered flexible film structure comprises an elastomeric material. 11. The light redirecting window covering of claim 1, comprising an optically transmissive protective layer bonded to a surface of the layered flexible film structure. 12. The light redirecting window covering of claim 1, wherein the truncated linear prismatic structures define a plurality of voids in the layered flexible film structure. 13. The light redirecting window covering of claim 1, wherein a thickness of the layered flexible film structure is between 200 micrometers and 2 millimeters. 14. The light redirecting window covering of claim 1, wherein the layered flexible film structure has two or more sections having different optical transparency. 15. The light redirecting window covering of claim 1, wherein the layered flexible film structure has two or more sections having different light redirecting properties. 16. The light redirecting window covering of claim 1, wherein a terminal end of at least one of the truncated linear prismatic structures has a triangular shape in a cross-section. 17. The light redirecting window covering of claim 1, wherein the parallel array of truncated linear prismatic structures defines a plurality of voids filled with air. 18. A light redirecting window covering, comprising: a flexible translucent sheet of a non-woven plastic material having a first broad-area surface and an opposing second broad-area surface extending parallel to the first broad-area surface; a plurality of random surface microstructures formed in the first broad-area surface and configured for randomizing light propagation directions; a parallel array of linear prismatic structures formed on the second broad-area surface and tapering away from the second broad-area surface in a perpendicular direction, wherein each of the linear prismatic structures has a first curved side wall forming a first non-zero angle with respect to a normal to the second broad-area surface, a second curved side wall forming a different non-zero angle with respect to the normal, and a terminal surface facing away from the flexible translucent sheet and connecting the first and second curved side walls; and a flexible optically transmissive sheet bonded to the terminal surfaces of the linear prismatic structures using an optically transmissive adhesive so as to form a single layered flexible film structure adapted for being retained in a planar form and further adapted for being retained in a form of a roll, wherein at least one of the first and second curved side walls is configured for reflecting light using a total internal reflection, and wherein at least one of the first and second curved side walls is configured for deflecting light using refraction. 19. A method of making a light redirecting window covering, comprising: providing a flexible translucent sheet of a non-woven plastic material having a first broad-area surface and an opposing second broad-area surface extending parallel to the first broad-area surface, wherein the first broad-area surface has a plurality of random surface microstructures configured for randomizing light propagation directions; forming a layer of optically transmissive material on the flexible translucent sheet; forming a plurality of linear total internal reflection channels in the layer of optically transmissive material, wherein each of the plurality of linear total internal reflection channels has a tapered shape and defines a first curved side wall forming a first non-zero angle with respect to a normal to the second broad-area surface and a second curved side wall extending at a different non-zero angle with respect to the normal; and bonding a flexible optically transmissive sheet to the layer of optically transmissive material using an optically transmissive adhesive so as to form a single layered flexible film structure, which is adapted for being retained in a planar form and is further adapted for being retained in the form of a roll. 20. The method of making a light redirecting window covering of claim 1, comprising forming air-filled voids in the layered flexible film structure.
3,600
340,130
16,801,091
3,634
A window covering for natural illumination of building interiors by redirecting the incident daylight at angles that promote its deeper penetration into the interior space. The window covering comprises an optically transmissive, flexible polymeric sheet having a layered structure with a light diffusing output surface and a number of total internal reflection surfaces incorporated into its material. The total internal reflection surfaces are dimensioned such that the multi-layer sheet diffusely redirect at least a portion of light towards a direction which is generally not coincident with the incidence direction.
1. A light redirecting window covering, comprising: a flexible translucent sheet of a non-woven plastic material having a first broad-area surface and an opposing second broad-area surface extending parallel to the first broad-area surface; a plurality of random surface microstructures formed in the first broad-area surface and configured for randomizing light propagation directions; a parallel array of truncated linear prismatic structures formed on the second broad-area surface and extending parallel to an edge of the flexible translucent sheet, wherein each of the prismatic structures has a tapered shape and comprises a first curved side wall forming a first non-zero angle with respect to a normal to the second broad-area surface, a second curved side wall extending at a different non-zero angle with respect to the normal, and a terminal surface facing away from the flexible translucent sheet and connecting the first and second curved side walls; and a flexible optically transmissive sheet bonded to the terminal surfaces of the truncated linear prismatic structures using an optically transmissive adhesive so as to form a single layered flexible film structure adapted for being retained in a planar form and further adapted for being retained in a form of a roll, wherein at least one of the first and second curved side walls is configured for reflecting light using a total internal reflection, and wherein at least one of the first and second curved side walls is configured for deflecting light using refraction. 2. The light redirecting window covering of claim 1, wherein the flexible translucent sheet is configured to diffusely redirect incident light generally towards a direction that is not coincident with an incident propagation direction. 3. The light redirecting window covering of claim 1, further comprising a roller, wherein an end of at least one of the flexible translucent sheet and flexible optically transmissive sheet is windingly received around the roller. 4. The light redirecting window covering of claim 1, further comprising a roller, wherein an end of at least one of the flexible translucent sheet and flexible optically transmissive sheet is windingly received around the roller, and wherein at least one the truncated linear prismatic structures is parallel to a rotation axis of the roller. 5. The light redirecting window covering of claim 1, wherein each of the truncated linear prismatic structures is configured to be operable in horizontal orientation. 6. The light redirecting window covering of claim 1, wherein a portion of at least one of the first and second curved side walls is disposed in contact with an optically transmissive material. 7. The light redirecting window covering of claim 1, wherein a portion of at least one of the first and second curved side walls is disposed in contact with an optically transmissive material having a different refractive index than the material of the truncated linear prismatic structures. 8. The light redirecting window covering of claim 1, wherein the layered flexible film structure is configured to appreciably distort or blur images viewable through the layered flexible film structure. 9. The light redirecting window covering of claim 1, wherein a root mean square surface profile roughness parameter of at least a portion of the first or second curved side walls is less than 60 nanometers at a sampling length of between 20 and 100 micrometers. 10. The light redirecting window covering of claim 1, wherein the layered flexible film structure comprises an elastomeric material. 11. The light redirecting window covering of claim 1, comprising an optically transmissive protective layer bonded to a surface of the layered flexible film structure. 12. The light redirecting window covering of claim 1, wherein the truncated linear prismatic structures define a plurality of voids in the layered flexible film structure. 13. The light redirecting window covering of claim 1, wherein a thickness of the layered flexible film structure is between 200 micrometers and 2 millimeters. 14. The light redirecting window covering of claim 1, wherein the layered flexible film structure has two or more sections having different optical transparency. 15. The light redirecting window covering of claim 1, wherein the layered flexible film structure has two or more sections having different light redirecting properties. 16. The light redirecting window covering of claim 1, wherein a terminal end of at least one of the truncated linear prismatic structures has a triangular shape in a cross-section. 17. The light redirecting window covering of claim 1, wherein the parallel array of truncated linear prismatic structures defines a plurality of voids filled with air. 18. A light redirecting window covering, comprising: a flexible translucent sheet of a non-woven plastic material having a first broad-area surface and an opposing second broad-area surface extending parallel to the first broad-area surface; a plurality of random surface microstructures formed in the first broad-area surface and configured for randomizing light propagation directions; a parallel array of linear prismatic structures formed on the second broad-area surface and tapering away from the second broad-area surface in a perpendicular direction, wherein each of the linear prismatic structures has a first curved side wall forming a first non-zero angle with respect to a normal to the second broad-area surface, a second curved side wall forming a different non-zero angle with respect to the normal, and a terminal surface facing away from the flexible translucent sheet and connecting the first and second curved side walls; and a flexible optically transmissive sheet bonded to the terminal surfaces of the linear prismatic structures using an optically transmissive adhesive so as to form a single layered flexible film structure adapted for being retained in a planar form and further adapted for being retained in a form of a roll, wherein at least one of the first and second curved side walls is configured for reflecting light using a total internal reflection, and wherein at least one of the first and second curved side walls is configured for deflecting light using refraction. 19. A method of making a light redirecting window covering, comprising: providing a flexible translucent sheet of a non-woven plastic material having a first broad-area surface and an opposing second broad-area surface extending parallel to the first broad-area surface, wherein the first broad-area surface has a plurality of random surface microstructures configured for randomizing light propagation directions; forming a layer of optically transmissive material on the flexible translucent sheet; forming a plurality of linear total internal reflection channels in the layer of optically transmissive material, wherein each of the plurality of linear total internal reflection channels has a tapered shape and defines a first curved side wall forming a first non-zero angle with respect to a normal to the second broad-area surface and a second curved side wall extending at a different non-zero angle with respect to the normal; and bonding a flexible optically transmissive sheet to the layer of optically transmissive material using an optically transmissive adhesive so as to form a single layered flexible film structure, which is adapted for being retained in a planar form and is further adapted for being retained in the form of a roll. 20. The method of making a light redirecting window covering of claim 1, comprising forming air-filled voids in the layered flexible film structure.
A window covering for natural illumination of building interiors by redirecting the incident daylight at angles that promote its deeper penetration into the interior space. The window covering comprises an optically transmissive, flexible polymeric sheet having a layered structure with a light diffusing output surface and a number of total internal reflection surfaces incorporated into its material. The total internal reflection surfaces are dimensioned such that the multi-layer sheet diffusely redirect at least a portion of light towards a direction which is generally not coincident with the incidence direction.1. A light redirecting window covering, comprising: a flexible translucent sheet of a non-woven plastic material having a first broad-area surface and an opposing second broad-area surface extending parallel to the first broad-area surface; a plurality of random surface microstructures formed in the first broad-area surface and configured for randomizing light propagation directions; a parallel array of truncated linear prismatic structures formed on the second broad-area surface and extending parallel to an edge of the flexible translucent sheet, wherein each of the prismatic structures has a tapered shape and comprises a first curved side wall forming a first non-zero angle with respect to a normal to the second broad-area surface, a second curved side wall extending at a different non-zero angle with respect to the normal, and a terminal surface facing away from the flexible translucent sheet and connecting the first and second curved side walls; and a flexible optically transmissive sheet bonded to the terminal surfaces of the truncated linear prismatic structures using an optically transmissive adhesive so as to form a single layered flexible film structure adapted for being retained in a planar form and further adapted for being retained in a form of a roll, wherein at least one of the first and second curved side walls is configured for reflecting light using a total internal reflection, and wherein at least one of the first and second curved side walls is configured for deflecting light using refraction. 2. The light redirecting window covering of claim 1, wherein the flexible translucent sheet is configured to diffusely redirect incident light generally towards a direction that is not coincident with an incident propagation direction. 3. The light redirecting window covering of claim 1, further comprising a roller, wherein an end of at least one of the flexible translucent sheet and flexible optically transmissive sheet is windingly received around the roller. 4. The light redirecting window covering of claim 1, further comprising a roller, wherein an end of at least one of the flexible translucent sheet and flexible optically transmissive sheet is windingly received around the roller, and wherein at least one the truncated linear prismatic structures is parallel to a rotation axis of the roller. 5. The light redirecting window covering of claim 1, wherein each of the truncated linear prismatic structures is configured to be operable in horizontal orientation. 6. The light redirecting window covering of claim 1, wherein a portion of at least one of the first and second curved side walls is disposed in contact with an optically transmissive material. 7. The light redirecting window covering of claim 1, wherein a portion of at least one of the first and second curved side walls is disposed in contact with an optically transmissive material having a different refractive index than the material of the truncated linear prismatic structures. 8. The light redirecting window covering of claim 1, wherein the layered flexible film structure is configured to appreciably distort or blur images viewable through the layered flexible film structure. 9. The light redirecting window covering of claim 1, wherein a root mean square surface profile roughness parameter of at least a portion of the first or second curved side walls is less than 60 nanometers at a sampling length of between 20 and 100 micrometers. 10. The light redirecting window covering of claim 1, wherein the layered flexible film structure comprises an elastomeric material. 11. The light redirecting window covering of claim 1, comprising an optically transmissive protective layer bonded to a surface of the layered flexible film structure. 12. The light redirecting window covering of claim 1, wherein the truncated linear prismatic structures define a plurality of voids in the layered flexible film structure. 13. The light redirecting window covering of claim 1, wherein a thickness of the layered flexible film structure is between 200 micrometers and 2 millimeters. 14. The light redirecting window covering of claim 1, wherein the layered flexible film structure has two or more sections having different optical transparency. 15. The light redirecting window covering of claim 1, wherein the layered flexible film structure has two or more sections having different light redirecting properties. 16. The light redirecting window covering of claim 1, wherein a terminal end of at least one of the truncated linear prismatic structures has a triangular shape in a cross-section. 17. The light redirecting window covering of claim 1, wherein the parallel array of truncated linear prismatic structures defines a plurality of voids filled with air. 18. A light redirecting window covering, comprising: a flexible translucent sheet of a non-woven plastic material having a first broad-area surface and an opposing second broad-area surface extending parallel to the first broad-area surface; a plurality of random surface microstructures formed in the first broad-area surface and configured for randomizing light propagation directions; a parallel array of linear prismatic structures formed on the second broad-area surface and tapering away from the second broad-area surface in a perpendicular direction, wherein each of the linear prismatic structures has a first curved side wall forming a first non-zero angle with respect to a normal to the second broad-area surface, a second curved side wall forming a different non-zero angle with respect to the normal, and a terminal surface facing away from the flexible translucent sheet and connecting the first and second curved side walls; and a flexible optically transmissive sheet bonded to the terminal surfaces of the linear prismatic structures using an optically transmissive adhesive so as to form a single layered flexible film structure adapted for being retained in a planar form and further adapted for being retained in a form of a roll, wherein at least one of the first and second curved side walls is configured for reflecting light using a total internal reflection, and wherein at least one of the first and second curved side walls is configured for deflecting light using refraction. 19. A method of making a light redirecting window covering, comprising: providing a flexible translucent sheet of a non-woven plastic material having a first broad-area surface and an opposing second broad-area surface extending parallel to the first broad-area surface, wherein the first broad-area surface has a plurality of random surface microstructures configured for randomizing light propagation directions; forming a layer of optically transmissive material on the flexible translucent sheet; forming a plurality of linear total internal reflection channels in the layer of optically transmissive material, wherein each of the plurality of linear total internal reflection channels has a tapered shape and defines a first curved side wall forming a first non-zero angle with respect to a normal to the second broad-area surface and a second curved side wall extending at a different non-zero angle with respect to the normal; and bonding a flexible optically transmissive sheet to the layer of optically transmissive material using an optically transmissive adhesive so as to form a single layered flexible film structure, which is adapted for being retained in a planar form and is further adapted for being retained in the form of a roll. 20. The method of making a light redirecting window covering of claim 1, comprising forming air-filled voids in the layered flexible film structure.
3,600
340,131
16,801,098
2,875
A multifunction lighting apparatus includes a light body, an adjustment bracket, and a frame. More than one optical unit may be selected to be installed to the multifunction lighting apparatus. In addition, the light body may be moved with respect to the adjustment bracket to provide more flexible light effect.
1. A multifunction lighting apparatus, comprising: a light body for emitting a light; an adjustment bracket, the light body being fixed to the adjustment bracket and being movable with respect to the adjustment bracket; a frame for supporting and fixing the adjustment bracket; and a first optical unit being detachable to be replaced with a second optical unit, the first optical unit and the second unit guides the light with different manners. 2. The multifunction lighting apparatus of claim 1, wherein there is a rotation structure for connecting the adjustment bracket and the light body so that the light body is rotatable with respect to the adjustment bracket for changing an output direction of the light. 3. The multifunction lighting apparatus of claim 1, wherein there is a shift structure for connecting the adjustment bracket and the light body so that the light body is shifted with respect to the adjustment bracket for changing a relative distance of the light to the frame. 4. The multifunction lighting apparatus of claim 3, wherein when the light body is shifted with respect to the adjustment bracket, a beam angle of an output light is changed accordingly. 5. The multifunction lighting apparatus of claim 1, wherein the frame is selectively to dispose a first pair of elastic structure and a second pair of elastic structure respectively corresponding to a standard U.S. installation base and to a standard European installation base. 6. The multifunction lighting apparatus of claim 5, wherein the first pair of elastic structure are disposed opposite to each other, two adjacent elastic structures of the first pair of elastic structure and the second pair of elastic structure are spaced with substantially 90 degrees. 7. The multifunction lighting apparatus of claim 5, wherein the frame is selectively to dispose a third pair of fixing structure for a frameless installation base. 8. The multifunction lighting apparatus of claim 1, wherein the first optical unit comprises a downlight reflector, and the second optical unit comprises a wall grazer reflector. 9. The multifunction lighting apparatus of claim 8, wherein the second optical unit further comprises a polarizing lens. 10. The multifunction lighting apparatus of claim 9, wherein the polarizing lens has a plurality of teardrop shape lens. 11. The multifunction lighting apparatus of claim 1, wherein the first optical unit is detachably fixed to the adjustment bracket with a detachable connector, and the second optical unit is detachably fixed to the adjustment bracket with the detachable connector. 12. The multifunction lighting apparatus of claim 11, wherein the frame is arranged between the adjustment bracket and the first optical unit. 13. The multifunction lighting apparatus of claim 1, wherein the first optical unit is detachably fixed to the light body with a detachable connector, and the second optical unit is also detachably fixed to the light body with the detachable connector. 14. The multifunction lighting apparatus of claim 1, wherein the light body has a metal housing, a light source and a light body lens. 15. The multifunction lighting apparatus of claim 14, wherein the metal housing carries heat of the light source away from the light source. 16. The multifunction lighting apparatus of claim 14, wherein the light body comprises a first body and a second part, a relative distance between the first body and the second part is adjustable for changing a relative position of the light source to the light body lens for outputting different light patterns. 17. The multifunction lighting apparatus of claim 14, wherein the light body has a manual switch for selecting one from multiple modes of the light source. 18. The multifunction lighting apparatus of claim 1, further comprising a driver box containing a driver for converting an indoor power to a driving current to the light source, wherein the driver box is made of metal material. 19. The multifunction lighting apparatus of claim 18, wherein the driver box is kept with no direct contact with a metal housing of the light body. 20. The multifunction lighting apparatus of claim 18, wherein the driver box contacts a metal housing of the light body for helping heat dissipation of the light source.
A multifunction lighting apparatus includes a light body, an adjustment bracket, and a frame. More than one optical unit may be selected to be installed to the multifunction lighting apparatus. In addition, the light body may be moved with respect to the adjustment bracket to provide more flexible light effect.1. A multifunction lighting apparatus, comprising: a light body for emitting a light; an adjustment bracket, the light body being fixed to the adjustment bracket and being movable with respect to the adjustment bracket; a frame for supporting and fixing the adjustment bracket; and a first optical unit being detachable to be replaced with a second optical unit, the first optical unit and the second unit guides the light with different manners. 2. The multifunction lighting apparatus of claim 1, wherein there is a rotation structure for connecting the adjustment bracket and the light body so that the light body is rotatable with respect to the adjustment bracket for changing an output direction of the light. 3. The multifunction lighting apparatus of claim 1, wherein there is a shift structure for connecting the adjustment bracket and the light body so that the light body is shifted with respect to the adjustment bracket for changing a relative distance of the light to the frame. 4. The multifunction lighting apparatus of claim 3, wherein when the light body is shifted with respect to the adjustment bracket, a beam angle of an output light is changed accordingly. 5. The multifunction lighting apparatus of claim 1, wherein the frame is selectively to dispose a first pair of elastic structure and a second pair of elastic structure respectively corresponding to a standard U.S. installation base and to a standard European installation base. 6. The multifunction lighting apparatus of claim 5, wherein the first pair of elastic structure are disposed opposite to each other, two adjacent elastic structures of the first pair of elastic structure and the second pair of elastic structure are spaced with substantially 90 degrees. 7. The multifunction lighting apparatus of claim 5, wherein the frame is selectively to dispose a third pair of fixing structure for a frameless installation base. 8. The multifunction lighting apparatus of claim 1, wherein the first optical unit comprises a downlight reflector, and the second optical unit comprises a wall grazer reflector. 9. The multifunction lighting apparatus of claim 8, wherein the second optical unit further comprises a polarizing lens. 10. The multifunction lighting apparatus of claim 9, wherein the polarizing lens has a plurality of teardrop shape lens. 11. The multifunction lighting apparatus of claim 1, wherein the first optical unit is detachably fixed to the adjustment bracket with a detachable connector, and the second optical unit is detachably fixed to the adjustment bracket with the detachable connector. 12. The multifunction lighting apparatus of claim 11, wherein the frame is arranged between the adjustment bracket and the first optical unit. 13. The multifunction lighting apparatus of claim 1, wherein the first optical unit is detachably fixed to the light body with a detachable connector, and the second optical unit is also detachably fixed to the light body with the detachable connector. 14. The multifunction lighting apparatus of claim 1, wherein the light body has a metal housing, a light source and a light body lens. 15. The multifunction lighting apparatus of claim 14, wherein the metal housing carries heat of the light source away from the light source. 16. The multifunction lighting apparatus of claim 14, wherein the light body comprises a first body and a second part, a relative distance between the first body and the second part is adjustable for changing a relative position of the light source to the light body lens for outputting different light patterns. 17. The multifunction lighting apparatus of claim 14, wherein the light body has a manual switch for selecting one from multiple modes of the light source. 18. The multifunction lighting apparatus of claim 1, further comprising a driver box containing a driver for converting an indoor power to a driving current to the light source, wherein the driver box is made of metal material. 19. The multifunction lighting apparatus of claim 18, wherein the driver box is kept with no direct contact with a metal housing of the light body. 20. The multifunction lighting apparatus of claim 18, wherein the driver box contacts a metal housing of the light body for helping heat dissipation of the light source.
2,800
340,132
16,873,190
2,875
A method of reducing anxiety in a non-human mammal by increasing brain serotonin levels, includes: down regulating in vivo levels of indigenous inflammatory cytokines in the nasal cavity of said non-human mammal by delivering an effective amount of an anti-inflammatory formula to said nasal cavity, which formula includes: at least one lipid-soluble antioxidant (which also functions as an anti-inflammatory agent) (the lipid-soluble antioxidant may be selected from the group consisting of alpha lipoic acid, aloe vera, omega 3 oil, N-acetylcysteine, cannabidiol, civet, oxytocin and combinations thereof); melatonin; tryptophan; and at least one essential oil. The most preferred antioxidant is N-acetylcysteine and the preferred essential oil is combination of chamomile, lavender and lemon oil.
1. A method of reducing anxiety in a non-human mammal by increasing brain serotonin levels, which comprises: down regulating in vivo levels of indigenous inflammatory cytokines in the nasal cavity of said non-human mammal by delivering an effective amount of an anti-inflammatory formula to said nasal cavity, which formula includes: a) at least one lipid soluble antioxidant; b) melatonin; c) tryptophan; and d) at least one essential oil. 2. The method of claim 1 wherein said at least one essential oil is selected from the group consisting of chamomile, lavender and lemon oil. 3. The method of claim 1 wherein said at least one essential is a combination of chamomile, lavender and lemon oil. 4. The method of claim 1 wherein said delivering is delivery by a spray device selected from the group consisting of a nebulizer diffuser, an aerosol sprayer and a spray mechanism. 5. The method of claim 1 wherein said formula includes a liquid carrier selected from the group consisting of aqueous, aqueous-oil and oil liquid carriers. 6. The method of claim 1 wherein said lipid-soluble antioxidant is selected from the group consisting of alpha lipoic acid, aloe vera, omega 3 oil, cannabidiol, civet, oxytocin and combinations thereof. 7. The method of claim 1 wherein said lipid-soluble antioxidant is selected from the group consisting of vitamin A, vitamin B, vitamin C, carotene, tocopherol, salts thereof and mixtures thereof. 8. The method of claim 1 wherein said lipid-soluble antioxidant is a form of tocopherol selected from the group consisting of vitamin E, vitamin E esters, vitamin E salts, N-acetylcysteine and combinations thereof. 9. The method of claim 1 wherein said lipid-soluble antioxidant is selected from the group consisting of vitamin E, vitamin E acetate and N-acetylcysteine. 10. The method of claim 9 wherein said lipid-soluble antioxidant is N-acetylcysteine in an emulsion. 11. The method of claim 1 wherein said antioxidant is within the range of about 0.1% to about 5% by weight of said formula. 12. The method of claim 1 wherein said antioxidant is within the range of about 0.2% to about 2% by weight of said formula. 13. The method of claim 1 wherein said melatonin is within the range of about 0.1% to about 5% by weight of said formula. 14. The method of claim 1 wherein said melatonin is within the range of about 0.2% to about 2% by weight of said formula. 15. The method of claim 1 wherein said tryptophan is within the range of about 0.1% to about 5% by weight of said formula. 16. The method of claim 1 wherein said tryptophan is within the range of about 0.2% to about 2% by weight of said formula. 17. The method of claim 1 wherein said cannabidiol is within the range of about 2% to about 20% by weight of said formula. 18. The method of claim 1 wherein said cannabidiol is within the range of about 5% to about 10% by weight of said formula. 19. The method of claim 1 wherein said at least one essential oil is within the range of about 65% to about 97.5% by weight of said formula. 20. The method of claim 1 wherein said at least one essential oil is within the range of about 84% to about 94.5% by weight of said formula.
A method of reducing anxiety in a non-human mammal by increasing brain serotonin levels, includes: down regulating in vivo levels of indigenous inflammatory cytokines in the nasal cavity of said non-human mammal by delivering an effective amount of an anti-inflammatory formula to said nasal cavity, which formula includes: at least one lipid-soluble antioxidant (which also functions as an anti-inflammatory agent) (the lipid-soluble antioxidant may be selected from the group consisting of alpha lipoic acid, aloe vera, omega 3 oil, N-acetylcysteine, cannabidiol, civet, oxytocin and combinations thereof); melatonin; tryptophan; and at least one essential oil. The most preferred antioxidant is N-acetylcysteine and the preferred essential oil is combination of chamomile, lavender and lemon oil.1. A method of reducing anxiety in a non-human mammal by increasing brain serotonin levels, which comprises: down regulating in vivo levels of indigenous inflammatory cytokines in the nasal cavity of said non-human mammal by delivering an effective amount of an anti-inflammatory formula to said nasal cavity, which formula includes: a) at least one lipid soluble antioxidant; b) melatonin; c) tryptophan; and d) at least one essential oil. 2. The method of claim 1 wherein said at least one essential oil is selected from the group consisting of chamomile, lavender and lemon oil. 3. The method of claim 1 wherein said at least one essential is a combination of chamomile, lavender and lemon oil. 4. The method of claim 1 wherein said delivering is delivery by a spray device selected from the group consisting of a nebulizer diffuser, an aerosol sprayer and a spray mechanism. 5. The method of claim 1 wherein said formula includes a liquid carrier selected from the group consisting of aqueous, aqueous-oil and oil liquid carriers. 6. The method of claim 1 wherein said lipid-soluble antioxidant is selected from the group consisting of alpha lipoic acid, aloe vera, omega 3 oil, cannabidiol, civet, oxytocin and combinations thereof. 7. The method of claim 1 wherein said lipid-soluble antioxidant is selected from the group consisting of vitamin A, vitamin B, vitamin C, carotene, tocopherol, salts thereof and mixtures thereof. 8. The method of claim 1 wherein said lipid-soluble antioxidant is a form of tocopherol selected from the group consisting of vitamin E, vitamin E esters, vitamin E salts, N-acetylcysteine and combinations thereof. 9. The method of claim 1 wherein said lipid-soluble antioxidant is selected from the group consisting of vitamin E, vitamin E acetate and N-acetylcysteine. 10. The method of claim 9 wherein said lipid-soluble antioxidant is N-acetylcysteine in an emulsion. 11. The method of claim 1 wherein said antioxidant is within the range of about 0.1% to about 5% by weight of said formula. 12. The method of claim 1 wherein said antioxidant is within the range of about 0.2% to about 2% by weight of said formula. 13. The method of claim 1 wherein said melatonin is within the range of about 0.1% to about 5% by weight of said formula. 14. The method of claim 1 wherein said melatonin is within the range of about 0.2% to about 2% by weight of said formula. 15. The method of claim 1 wherein said tryptophan is within the range of about 0.1% to about 5% by weight of said formula. 16. The method of claim 1 wherein said tryptophan is within the range of about 0.2% to about 2% by weight of said formula. 17. The method of claim 1 wherein said cannabidiol is within the range of about 2% to about 20% by weight of said formula. 18. The method of claim 1 wherein said cannabidiol is within the range of about 5% to about 10% by weight of said formula. 19. The method of claim 1 wherein said at least one essential oil is within the range of about 65% to about 97.5% by weight of said formula. 20. The method of claim 1 wherein said at least one essential oil is within the range of about 84% to about 94.5% by weight of said formula.
2,800
340,133
16,801,121
2,875
A method of reducing anxiety in a non-human mammal by increasing brain serotonin levels, includes: down regulating in vivo levels of indigenous inflammatory cytokines in the nasal cavity of said non-human mammal by delivering an effective amount of an anti-inflammatory formula to said nasal cavity, which formula includes: at least one lipid-soluble antioxidant (which also functions as an anti-inflammatory agent) (the lipid-soluble antioxidant may be selected from the group consisting of alpha lipoic acid, aloe vera, omega 3 oil, N-acetylcysteine, cannabidiol, civet, oxytocin and combinations thereof); melatonin; tryptophan; and at least one essential oil. The most preferred antioxidant is N-acetylcysteine and the preferred essential oil is combination of chamomile, lavender and lemon oil.
1. A method of reducing anxiety in a non-human mammal by increasing brain serotonin levels, which comprises: down regulating in vivo levels of indigenous inflammatory cytokines in the nasal cavity of said non-human mammal by delivering an effective amount of an anti-inflammatory formula to said nasal cavity, which formula includes: a) at least one lipid soluble antioxidant; b) melatonin; c) tryptophan; and d) at least one essential oil. 2. The method of claim 1 wherein said at least one essential oil is selected from the group consisting of chamomile, lavender and lemon oil. 3. The method of claim 1 wherein said at least one essential is a combination of chamomile, lavender and lemon oil. 4. The method of claim 1 wherein said delivering is delivery by a spray device selected from the group consisting of a nebulizer diffuser, an aerosol sprayer and a spray mechanism. 5. The method of claim 1 wherein said formula includes a liquid carrier selected from the group consisting of aqueous, aqueous-oil and oil liquid carriers. 6. The method of claim 1 wherein said lipid-soluble antioxidant is selected from the group consisting of alpha lipoic acid, aloe vera, omega 3 oil, cannabidiol, civet, oxytocin and combinations thereof. 7. The method of claim 1 wherein said lipid-soluble antioxidant is selected from the group consisting of vitamin A, vitamin B, vitamin C, carotene, tocopherol, salts thereof and mixtures thereof. 8. The method of claim 1 wherein said lipid-soluble antioxidant is a form of tocopherol selected from the group consisting of vitamin E, vitamin E esters, vitamin E salts, N-acetylcysteine and combinations thereof. 9. The method of claim 1 wherein said lipid-soluble antioxidant is selected from the group consisting of vitamin E, vitamin E acetate and N-acetylcysteine. 10. The method of claim 9 wherein said lipid-soluble antioxidant is N-acetylcysteine in an emulsion. 11. The method of claim 1 wherein said antioxidant is within the range of about 0.1% to about 5% by weight of said formula. 12. The method of claim 1 wherein said antioxidant is within the range of about 0.2% to about 2% by weight of said formula. 13. The method of claim 1 wherein said melatonin is within the range of about 0.1% to about 5% by weight of said formula. 14. The method of claim 1 wherein said melatonin is within the range of about 0.2% to about 2% by weight of said formula. 15. The method of claim 1 wherein said tryptophan is within the range of about 0.1% to about 5% by weight of said formula. 16. The method of claim 1 wherein said tryptophan is within the range of about 0.2% to about 2% by weight of said formula. 17. The method of claim 1 wherein said cannabidiol is within the range of about 2% to about 20% by weight of said formula. 18. The method of claim 1 wherein said cannabidiol is within the range of about 5% to about 10% by weight of said formula. 19. The method of claim 1 wherein said at least one essential oil is within the range of about 65% to about 97.5% by weight of said formula. 20. The method of claim 1 wherein said at least one essential oil is within the range of about 84% to about 94.5% by weight of said formula.
A method of reducing anxiety in a non-human mammal by increasing brain serotonin levels, includes: down regulating in vivo levels of indigenous inflammatory cytokines in the nasal cavity of said non-human mammal by delivering an effective amount of an anti-inflammatory formula to said nasal cavity, which formula includes: at least one lipid-soluble antioxidant (which also functions as an anti-inflammatory agent) (the lipid-soluble antioxidant may be selected from the group consisting of alpha lipoic acid, aloe vera, omega 3 oil, N-acetylcysteine, cannabidiol, civet, oxytocin and combinations thereof); melatonin; tryptophan; and at least one essential oil. The most preferred antioxidant is N-acetylcysteine and the preferred essential oil is combination of chamomile, lavender and lemon oil.1. A method of reducing anxiety in a non-human mammal by increasing brain serotonin levels, which comprises: down regulating in vivo levels of indigenous inflammatory cytokines in the nasal cavity of said non-human mammal by delivering an effective amount of an anti-inflammatory formula to said nasal cavity, which formula includes: a) at least one lipid soluble antioxidant; b) melatonin; c) tryptophan; and d) at least one essential oil. 2. The method of claim 1 wherein said at least one essential oil is selected from the group consisting of chamomile, lavender and lemon oil. 3. The method of claim 1 wherein said at least one essential is a combination of chamomile, lavender and lemon oil. 4. The method of claim 1 wherein said delivering is delivery by a spray device selected from the group consisting of a nebulizer diffuser, an aerosol sprayer and a spray mechanism. 5. The method of claim 1 wherein said formula includes a liquid carrier selected from the group consisting of aqueous, aqueous-oil and oil liquid carriers. 6. The method of claim 1 wherein said lipid-soluble antioxidant is selected from the group consisting of alpha lipoic acid, aloe vera, omega 3 oil, cannabidiol, civet, oxytocin and combinations thereof. 7. The method of claim 1 wherein said lipid-soluble antioxidant is selected from the group consisting of vitamin A, vitamin B, vitamin C, carotene, tocopherol, salts thereof and mixtures thereof. 8. The method of claim 1 wherein said lipid-soluble antioxidant is a form of tocopherol selected from the group consisting of vitamin E, vitamin E esters, vitamin E salts, N-acetylcysteine and combinations thereof. 9. The method of claim 1 wherein said lipid-soluble antioxidant is selected from the group consisting of vitamin E, vitamin E acetate and N-acetylcysteine. 10. The method of claim 9 wherein said lipid-soluble antioxidant is N-acetylcysteine in an emulsion. 11. The method of claim 1 wherein said antioxidant is within the range of about 0.1% to about 5% by weight of said formula. 12. The method of claim 1 wherein said antioxidant is within the range of about 0.2% to about 2% by weight of said formula. 13. The method of claim 1 wherein said melatonin is within the range of about 0.1% to about 5% by weight of said formula. 14. The method of claim 1 wherein said melatonin is within the range of about 0.2% to about 2% by weight of said formula. 15. The method of claim 1 wherein said tryptophan is within the range of about 0.1% to about 5% by weight of said formula. 16. The method of claim 1 wherein said tryptophan is within the range of about 0.2% to about 2% by weight of said formula. 17. The method of claim 1 wherein said cannabidiol is within the range of about 2% to about 20% by weight of said formula. 18. The method of claim 1 wherein said cannabidiol is within the range of about 5% to about 10% by weight of said formula. 19. The method of claim 1 wherein said at least one essential oil is within the range of about 65% to about 97.5% by weight of said formula. 20. The method of claim 1 wherein said at least one essential oil is within the range of about 84% to about 94.5% by weight of said formula.
2,800
340,134
16,801,120
2,875
Provided is a conveying type washing device capable of achieving both maintainability and productivity. This conveying type washing device develops a flexographic printing plate precursor after imagewise exposure using a washing solution. The conveying type washing device has a conveying unit that conveys the flexographic printing plate precursor through a conveying path including a curved conveying path, and a development unit that develops the flexographic printing plate precursor in a state in which the flexographic printing plate precursor is immersed in the washing solution by the conveying unit and conveyed.
1. A conveying type washing device that develops a flexographic printing plate precursor after imagewise exposure using a washing solution, the device comprising: a conveying unit that conveys the flexographic printing plate precursor through a conveying path including a curved conveying path; and a development unit that develops the flexographic printing plate precursor in a state in which the flexographic printing plate precursor is immersed in the washing solution by the conveying unit and conveyed, wherein the development unit has a brush used for development and a support that is provided at a position opposite to the brush with the flexographic printing plate precursor interposed therebetween and supports the flexographic printing plate precursor, and wherein the brush is arranged in the washing solution, and the development is performed by removing an unexposed portion of the flexographic printing plate precursor by the brush. 2. A conveying type washing device that develops a flexographic printing plate precursor after imagewise exposure using a washing solution, the device comprising: a conveying unit that conveys the flexographic printing plate precursor through a conveying path including a curved conveying path; a development unit that develops the flexographic printing plate precursor in a state in which the flexographic printing plate precursor is immersed in the washing solution by the conveying unit and conveyed; and a processing unit having a separation membrane that removes solids in a development fatigue liquid, the solids being generated by removing an unexposed portion of the flexographic printing plate precursor by the development using the washing solution. 3. The conveying type washing device according to claim 2, further comprising, on a downstream side of the development unit, a rinsing unit that supplies the development fatigue liquid processed by the separation membrane to a front surface of the flexographic printing plate precursor. 4. A conveying type washing device that develops a flexographic printing plate precursor after imagewise exposure using a washing solution, the device comprising: a conveying unit that conveys the flexographic printing plate precursor through a conveying path including a curved conveying path; and a development unit that develops the flexographic printing plate precursor in a state in which the flexographic printing plate precursor is immersed in the washing solution by the conveying unit and conveyed, wherein the development unit has a flat brush used for development, the flat brush being arranged to be thoroughly immersed in the washing solution, and the development is performed by removing an unexposed portion of the flexographic printing plate precursor by the flat brush. 5. The conveying type washing device according to claim 1, wherein the washing solution is an aqueous developer. 6. The conveying type washing device according to claim 2, wherein the washing solution is an aqueous developer. 7. The conveying type washing device according to claim 3, wherein the washing solution is an aqueous developer. 8. The conveying type washing device according to claim 4, wherein the washing solution is an aqueous developer. 9. The conveying type washing device according to claim 1, wherein the conveying unit adopts at least one of a belt conveying system, a roller conveying system, a gear conveying system, or a guide conveying system. 10. The conveying type washing device according to claim 2, wherein the conveying unit adopts at least one of a belt conveying system, a roller conveying system, a gear conveying system, or a guide conveying system. 11. The conveying type washing device according to claim 3, wherein the conveying unit adopts at least one of a belt conveying system, a roller conveying system, a gear conveying system, or a guide conveying system. 12. The conveying type washing device according to claim 4, wherein the conveying unit adopts at least one of a belt conveying system, a roller conveying system, a gear conveying system, or a guide conveying system. 13. The conveying type washing device according to claim 5, wherein the conveying unit adopts at least one of a belt conveying system, a roller conveying system, a gear conveying system, or a guide conveying system. 14. The conveying type washing device according to claim 1, further comprising: a processing unit that removes solids that are generated by removing an unexposed portion of the flexographic printing plate precursor by the development using the washing solution in a development fatigue liquid including the solids. 15. The conveying type washing device according to claim 4, further comprising: a processing unit that removes solids that are generated by removing an unexposed portion of the flexographic printing plate precursor by the development using the washing solution in a development fatigue liquid including the solids. 16. The conveying type washing device according to claim 5, further comprising: a processing unit that removes solids that are generated by removing an unexposed portion of the flexographic printing plate precursor by the development using the washing solution in a development fatigue liquid including the solids. 17. The conveying type washing device according to claim 14, wherein the processing unit has at least one of a centrifuge or a separation membrane for removing the solids in the development fatigue liquid. 18. The conveying type washing device according to claim 15, wherein the processing unit has at least one of a centrifuge or a separation membrane for removing the solids in the development fatigue liquid. 19. The conveying type washing device according to claim 14, further comprising, on a downstream side of the development unit, a rinsing unit that supplies the development fatigue liquid processed by the processing unit to a front surface of a flexographic printing plate comprising the flexographic printing plate precursor from which the unexposed portion thereof has been removed. 20. The conveying type washing device according to claim 17, further comprising, on a downstream side of the development unit, a rinsing unit that supplies the development fatigue liquid processed by the processing unit to a front surface of a flexographic printing plate comprising the flexographic printing plate precursor from which the unexposed portion thereof has been removed.
Provided is a conveying type washing device capable of achieving both maintainability and productivity. This conveying type washing device develops a flexographic printing plate precursor after imagewise exposure using a washing solution. The conveying type washing device has a conveying unit that conveys the flexographic printing plate precursor through a conveying path including a curved conveying path, and a development unit that develops the flexographic printing plate precursor in a state in which the flexographic printing plate precursor is immersed in the washing solution by the conveying unit and conveyed.1. A conveying type washing device that develops a flexographic printing plate precursor after imagewise exposure using a washing solution, the device comprising: a conveying unit that conveys the flexographic printing plate precursor through a conveying path including a curved conveying path; and a development unit that develops the flexographic printing plate precursor in a state in which the flexographic printing plate precursor is immersed in the washing solution by the conveying unit and conveyed, wherein the development unit has a brush used for development and a support that is provided at a position opposite to the brush with the flexographic printing plate precursor interposed therebetween and supports the flexographic printing plate precursor, and wherein the brush is arranged in the washing solution, and the development is performed by removing an unexposed portion of the flexographic printing plate precursor by the brush. 2. A conveying type washing device that develops a flexographic printing plate precursor after imagewise exposure using a washing solution, the device comprising: a conveying unit that conveys the flexographic printing plate precursor through a conveying path including a curved conveying path; a development unit that develops the flexographic printing plate precursor in a state in which the flexographic printing plate precursor is immersed in the washing solution by the conveying unit and conveyed; and a processing unit having a separation membrane that removes solids in a development fatigue liquid, the solids being generated by removing an unexposed portion of the flexographic printing plate precursor by the development using the washing solution. 3. The conveying type washing device according to claim 2, further comprising, on a downstream side of the development unit, a rinsing unit that supplies the development fatigue liquid processed by the separation membrane to a front surface of the flexographic printing plate precursor. 4. A conveying type washing device that develops a flexographic printing plate precursor after imagewise exposure using a washing solution, the device comprising: a conveying unit that conveys the flexographic printing plate precursor through a conveying path including a curved conveying path; and a development unit that develops the flexographic printing plate precursor in a state in which the flexographic printing plate precursor is immersed in the washing solution by the conveying unit and conveyed, wherein the development unit has a flat brush used for development, the flat brush being arranged to be thoroughly immersed in the washing solution, and the development is performed by removing an unexposed portion of the flexographic printing plate precursor by the flat brush. 5. The conveying type washing device according to claim 1, wherein the washing solution is an aqueous developer. 6. The conveying type washing device according to claim 2, wherein the washing solution is an aqueous developer. 7. The conveying type washing device according to claim 3, wherein the washing solution is an aqueous developer. 8. The conveying type washing device according to claim 4, wherein the washing solution is an aqueous developer. 9. The conveying type washing device according to claim 1, wherein the conveying unit adopts at least one of a belt conveying system, a roller conveying system, a gear conveying system, or a guide conveying system. 10. The conveying type washing device according to claim 2, wherein the conveying unit adopts at least one of a belt conveying system, a roller conveying system, a gear conveying system, or a guide conveying system. 11. The conveying type washing device according to claim 3, wherein the conveying unit adopts at least one of a belt conveying system, a roller conveying system, a gear conveying system, or a guide conveying system. 12. The conveying type washing device according to claim 4, wherein the conveying unit adopts at least one of a belt conveying system, a roller conveying system, a gear conveying system, or a guide conveying system. 13. The conveying type washing device according to claim 5, wherein the conveying unit adopts at least one of a belt conveying system, a roller conveying system, a gear conveying system, or a guide conveying system. 14. The conveying type washing device according to claim 1, further comprising: a processing unit that removes solids that are generated by removing an unexposed portion of the flexographic printing plate precursor by the development using the washing solution in a development fatigue liquid including the solids. 15. The conveying type washing device according to claim 4, further comprising: a processing unit that removes solids that are generated by removing an unexposed portion of the flexographic printing plate precursor by the development using the washing solution in a development fatigue liquid including the solids. 16. The conveying type washing device according to claim 5, further comprising: a processing unit that removes solids that are generated by removing an unexposed portion of the flexographic printing plate precursor by the development using the washing solution in a development fatigue liquid including the solids. 17. The conveying type washing device according to claim 14, wherein the processing unit has at least one of a centrifuge or a separation membrane for removing the solids in the development fatigue liquid. 18. The conveying type washing device according to claim 15, wherein the processing unit has at least one of a centrifuge or a separation membrane for removing the solids in the development fatigue liquid. 19. The conveying type washing device according to claim 14, further comprising, on a downstream side of the development unit, a rinsing unit that supplies the development fatigue liquid processed by the processing unit to a front surface of a flexographic printing plate comprising the flexographic printing plate precursor from which the unexposed portion thereof has been removed. 20. The conveying type washing device according to claim 17, further comprising, on a downstream side of the development unit, a rinsing unit that supplies the development fatigue liquid processed by the processing unit to a front surface of a flexographic printing plate comprising the flexographic printing plate precursor from which the unexposed portion thereof has been removed.
2,800
340,135
16,873,194
1,661
Provided is a conveying type washing device capable of achieving both maintainability and productivity. This conveying type washing device develops a flexographic printing plate precursor after imagewise exposure using a washing solution. The conveying type washing device has a conveying unit that conveys the flexographic printing plate precursor through a conveying path including a curved conveying path, and a development unit that develops the flexographic printing plate precursor in a state in which the flexographic printing plate precursor is immersed in the washing solution by the conveying unit and conveyed.
1. A conveying type washing device that develops a flexographic printing plate precursor after imagewise exposure using a washing solution, the device comprising: a conveying unit that conveys the flexographic printing plate precursor through a conveying path including a curved conveying path; and a development unit that develops the flexographic printing plate precursor in a state in which the flexographic printing plate precursor is immersed in the washing solution by the conveying unit and conveyed, wherein the development unit has a brush used for development and a support that is provided at a position opposite to the brush with the flexographic printing plate precursor interposed therebetween and supports the flexographic printing plate precursor, and wherein the brush is arranged in the washing solution, and the development is performed by removing an unexposed portion of the flexographic printing plate precursor by the brush. 2. A conveying type washing device that develops a flexographic printing plate precursor after imagewise exposure using a washing solution, the device comprising: a conveying unit that conveys the flexographic printing plate precursor through a conveying path including a curved conveying path; a development unit that develops the flexographic printing plate precursor in a state in which the flexographic printing plate precursor is immersed in the washing solution by the conveying unit and conveyed; and a processing unit having a separation membrane that removes solids in a development fatigue liquid, the solids being generated by removing an unexposed portion of the flexographic printing plate precursor by the development using the washing solution. 3. The conveying type washing device according to claim 2, further comprising, on a downstream side of the development unit, a rinsing unit that supplies the development fatigue liquid processed by the separation membrane to a front surface of the flexographic printing plate precursor. 4. A conveying type washing device that develops a flexographic printing plate precursor after imagewise exposure using a washing solution, the device comprising: a conveying unit that conveys the flexographic printing plate precursor through a conveying path including a curved conveying path; and a development unit that develops the flexographic printing plate precursor in a state in which the flexographic printing plate precursor is immersed in the washing solution by the conveying unit and conveyed, wherein the development unit has a flat brush used for development, the flat brush being arranged to be thoroughly immersed in the washing solution, and the development is performed by removing an unexposed portion of the flexographic printing plate precursor by the flat brush. 5. The conveying type washing device according to claim 1, wherein the washing solution is an aqueous developer. 6. The conveying type washing device according to claim 2, wherein the washing solution is an aqueous developer. 7. The conveying type washing device according to claim 3, wherein the washing solution is an aqueous developer. 8. The conveying type washing device according to claim 4, wherein the washing solution is an aqueous developer. 9. The conveying type washing device according to claim 1, wherein the conveying unit adopts at least one of a belt conveying system, a roller conveying system, a gear conveying system, or a guide conveying system. 10. The conveying type washing device according to claim 2, wherein the conveying unit adopts at least one of a belt conveying system, a roller conveying system, a gear conveying system, or a guide conveying system. 11. The conveying type washing device according to claim 3, wherein the conveying unit adopts at least one of a belt conveying system, a roller conveying system, a gear conveying system, or a guide conveying system. 12. The conveying type washing device according to claim 4, wherein the conveying unit adopts at least one of a belt conveying system, a roller conveying system, a gear conveying system, or a guide conveying system. 13. The conveying type washing device according to claim 5, wherein the conveying unit adopts at least one of a belt conveying system, a roller conveying system, a gear conveying system, or a guide conveying system. 14. The conveying type washing device according to claim 1, further comprising: a processing unit that removes solids that are generated by removing an unexposed portion of the flexographic printing plate precursor by the development using the washing solution in a development fatigue liquid including the solids. 15. The conveying type washing device according to claim 4, further comprising: a processing unit that removes solids that are generated by removing an unexposed portion of the flexographic printing plate precursor by the development using the washing solution in a development fatigue liquid including the solids. 16. The conveying type washing device according to claim 5, further comprising: a processing unit that removes solids that are generated by removing an unexposed portion of the flexographic printing plate precursor by the development using the washing solution in a development fatigue liquid including the solids. 17. The conveying type washing device according to claim 14, wherein the processing unit has at least one of a centrifuge or a separation membrane for removing the solids in the development fatigue liquid. 18. The conveying type washing device according to claim 15, wherein the processing unit has at least one of a centrifuge or a separation membrane for removing the solids in the development fatigue liquid. 19. The conveying type washing device according to claim 14, further comprising, on a downstream side of the development unit, a rinsing unit that supplies the development fatigue liquid processed by the processing unit to a front surface of a flexographic printing plate comprising the flexographic printing plate precursor from which the unexposed portion thereof has been removed. 20. The conveying type washing device according to claim 17, further comprising, on a downstream side of the development unit, a rinsing unit that supplies the development fatigue liquid processed by the processing unit to a front surface of a flexographic printing plate comprising the flexographic printing plate precursor from which the unexposed portion thereof has been removed.
Provided is a conveying type washing device capable of achieving both maintainability and productivity. This conveying type washing device develops a flexographic printing plate precursor after imagewise exposure using a washing solution. The conveying type washing device has a conveying unit that conveys the flexographic printing plate precursor through a conveying path including a curved conveying path, and a development unit that develops the flexographic printing plate precursor in a state in which the flexographic printing plate precursor is immersed in the washing solution by the conveying unit and conveyed.1. A conveying type washing device that develops a flexographic printing plate precursor after imagewise exposure using a washing solution, the device comprising: a conveying unit that conveys the flexographic printing plate precursor through a conveying path including a curved conveying path; and a development unit that develops the flexographic printing plate precursor in a state in which the flexographic printing plate precursor is immersed in the washing solution by the conveying unit and conveyed, wherein the development unit has a brush used for development and a support that is provided at a position opposite to the brush with the flexographic printing plate precursor interposed therebetween and supports the flexographic printing plate precursor, and wherein the brush is arranged in the washing solution, and the development is performed by removing an unexposed portion of the flexographic printing plate precursor by the brush. 2. A conveying type washing device that develops a flexographic printing plate precursor after imagewise exposure using a washing solution, the device comprising: a conveying unit that conveys the flexographic printing plate precursor through a conveying path including a curved conveying path; a development unit that develops the flexographic printing plate precursor in a state in which the flexographic printing plate precursor is immersed in the washing solution by the conveying unit and conveyed; and a processing unit having a separation membrane that removes solids in a development fatigue liquid, the solids being generated by removing an unexposed portion of the flexographic printing plate precursor by the development using the washing solution. 3. The conveying type washing device according to claim 2, further comprising, on a downstream side of the development unit, a rinsing unit that supplies the development fatigue liquid processed by the separation membrane to a front surface of the flexographic printing plate precursor. 4. A conveying type washing device that develops a flexographic printing plate precursor after imagewise exposure using a washing solution, the device comprising: a conveying unit that conveys the flexographic printing plate precursor through a conveying path including a curved conveying path; and a development unit that develops the flexographic printing plate precursor in a state in which the flexographic printing plate precursor is immersed in the washing solution by the conveying unit and conveyed, wherein the development unit has a flat brush used for development, the flat brush being arranged to be thoroughly immersed in the washing solution, and the development is performed by removing an unexposed portion of the flexographic printing plate precursor by the flat brush. 5. The conveying type washing device according to claim 1, wherein the washing solution is an aqueous developer. 6. The conveying type washing device according to claim 2, wherein the washing solution is an aqueous developer. 7. The conveying type washing device according to claim 3, wherein the washing solution is an aqueous developer. 8. The conveying type washing device according to claim 4, wherein the washing solution is an aqueous developer. 9. The conveying type washing device according to claim 1, wherein the conveying unit adopts at least one of a belt conveying system, a roller conveying system, a gear conveying system, or a guide conveying system. 10. The conveying type washing device according to claim 2, wherein the conveying unit adopts at least one of a belt conveying system, a roller conveying system, a gear conveying system, or a guide conveying system. 11. The conveying type washing device according to claim 3, wherein the conveying unit adopts at least one of a belt conveying system, a roller conveying system, a gear conveying system, or a guide conveying system. 12. The conveying type washing device according to claim 4, wherein the conveying unit adopts at least one of a belt conveying system, a roller conveying system, a gear conveying system, or a guide conveying system. 13. The conveying type washing device according to claim 5, wherein the conveying unit adopts at least one of a belt conveying system, a roller conveying system, a gear conveying system, or a guide conveying system. 14. The conveying type washing device according to claim 1, further comprising: a processing unit that removes solids that are generated by removing an unexposed portion of the flexographic printing plate precursor by the development using the washing solution in a development fatigue liquid including the solids. 15. The conveying type washing device according to claim 4, further comprising: a processing unit that removes solids that are generated by removing an unexposed portion of the flexographic printing plate precursor by the development using the washing solution in a development fatigue liquid including the solids. 16. The conveying type washing device according to claim 5, further comprising: a processing unit that removes solids that are generated by removing an unexposed portion of the flexographic printing plate precursor by the development using the washing solution in a development fatigue liquid including the solids. 17. The conveying type washing device according to claim 14, wherein the processing unit has at least one of a centrifuge or a separation membrane for removing the solids in the development fatigue liquid. 18. The conveying type washing device according to claim 15, wherein the processing unit has at least one of a centrifuge or a separation membrane for removing the solids in the development fatigue liquid. 19. The conveying type washing device according to claim 14, further comprising, on a downstream side of the development unit, a rinsing unit that supplies the development fatigue liquid processed by the processing unit to a front surface of a flexographic printing plate comprising the flexographic printing plate precursor from which the unexposed portion thereof has been removed. 20. The conveying type washing device according to claim 17, further comprising, on a downstream side of the development unit, a rinsing unit that supplies the development fatigue liquid processed by the processing unit to a front surface of a flexographic printing plate comprising the flexographic printing plate precursor from which the unexposed portion thereof has been removed.
1,600
340,136
16,801,093
1,661
The present disclosure relates to integrated circuits which include various structural elements designed to reduce the impact of strain on the electronic components of the circuit. In particular, a combination of trenches and cavities are used to mechanically isolate the integrated circuit from the surrounding substrate. The trenches may be formed such that they surround the integrated circuit, and the cavities may be formed under the integrated circuit. As such, the integrated circuit may be formed on a portion of the substrate that forms a platform. In order that the platform does not move, it may be tethered to the surrounding substrate. By including such mechanical elements, variation in the electrical characteristics of the integrated circuit are reduced.
1. An integrated circuit, comprising: an integrated circuit die having one or more stress-sensitive circuits including active circuit components formed on or adjacent to a first surface of the integrated circuit die; one or more trenches formed around the one or more stress-sensitive circuits; and one or more cavities, formed underneath the one or more stress-sensitive circuits. 2. The integrated circuit of claim 1, wherein the one or more cavities are physically coupled to the one or more trenches. 3. The integrated circuit of claim 1, wherein the one or more cavities extend underneath the one or more trenches. 4. The integrated circuit of claim 1, wherein the one or more trenches and the one or more cavities are configured to form a circuit platform, in the integrated circuit die, the one or more stress-sensitive circuits being formed on the circuit platform. 5. The integrated circuit of claim 4, wherein the one or more trenches and the one or more cavities are configured to form one or more tethers, each tether physically coupling the circuit platform to the surrounding integrated circuit die. 6. The integrated circuit of claim 5, wherein each tether couples a respective first point on the circuit platform to a respective second point on the surrounding integrated circuit die, the first and second points being at different circumferential locations. 7. The integrated circuit of claim 6, wherein the circuit platform and the surrounding integrated circuit die have a plurality of corners, the corners of the circuit platform aligned with respective corners of the integrated circuit die, and wherein each of the one or more tethers is coupled between a corner of the circuit platform and a corner of the integrated circuit die which is not aligned with the respective corner of the circuit platform. 8. The integrated circuit of claim 7, wherein each tether includes a major arm member which is arranged to be substantially parallel to a respective side of the circuit platform. 9. The integrated circuit of claim 5, further comprising one or more conductive tracks, formed along one or more of the tethers, for coupling the one or more stress-sensitive circuits to external connections. 10. The integrated circuit of claim 4, wherein the one or more trenches are L-shaped; and a corner of each L-shaped trench is aligned with a corner of the circuit platform. 11. The integrated circuit of claim 4, wherein a pedestal is formed underneath the circuit platform, coupling the circuit platform to the integrated circuit die. 12. The integrated circuit of claim 1, wherein the one or more stress-sensitive circuits include passive circuit components, and the active or the passive circuit components are stress-sensitive. 13. The integrated circuit of claim 1, wherein the active circuit components comprise one or more of: a transistor, a diode, variable capacitor, a varactor, a light-emitting diode, and a thyristor; and the stress-sensitive circuits include one or more of: an amplifier, a reference circuit, an oscillator circuit, or a digital-to-analog converter. 14. The integrated circuit of claim 1, wherein the one or more stress-sensitive circuits includes two or more transistors arranged in a differential arrangement. 15. The integrated circuit of claim 1, further comprising a microelectromechanical systems (MEMS) cap, formed over the one or more stress-sensitive circuits. 16-20. (canceled) 21. An integrated circuit, comprising: an integrated circuit die having an active circuit component; a trench formed through a portion of the integrated circuit die adjacent the active circuit component; and a cavity formed in the integrated circuit die underneath at least a portion of the active circuit component. 22. The integrated circuit of claim 21, wherein the cavity is physically coupled to the trench. 23. The integrated circuit of claim 21, wherein the trench separates the active circuit component from a neighboring area of the integrated circuit die, wherein the integrated circuit further comprises a tether physically coupling the neighboring area of the integrated circuit die to the active circuit component. 24. The integrated circuit of claim 21, further comprising a pedestal formed on the integrated circuit die and supporting the active integrated circuit, wherein the pedestal extends through the cavity. 25. The integrated circuit of claim 21, wherein at least a portion of a perimeter of the cavity is rounded.
The present disclosure relates to integrated circuits which include various structural elements designed to reduce the impact of strain on the electronic components of the circuit. In particular, a combination of trenches and cavities are used to mechanically isolate the integrated circuit from the surrounding substrate. The trenches may be formed such that they surround the integrated circuit, and the cavities may be formed under the integrated circuit. As such, the integrated circuit may be formed on a portion of the substrate that forms a platform. In order that the platform does not move, it may be tethered to the surrounding substrate. By including such mechanical elements, variation in the electrical characteristics of the integrated circuit are reduced.1. An integrated circuit, comprising: an integrated circuit die having one or more stress-sensitive circuits including active circuit components formed on or adjacent to a first surface of the integrated circuit die; one or more trenches formed around the one or more stress-sensitive circuits; and one or more cavities, formed underneath the one or more stress-sensitive circuits. 2. The integrated circuit of claim 1, wherein the one or more cavities are physically coupled to the one or more trenches. 3. The integrated circuit of claim 1, wherein the one or more cavities extend underneath the one or more trenches. 4. The integrated circuit of claim 1, wherein the one or more trenches and the one or more cavities are configured to form a circuit platform, in the integrated circuit die, the one or more stress-sensitive circuits being formed on the circuit platform. 5. The integrated circuit of claim 4, wherein the one or more trenches and the one or more cavities are configured to form one or more tethers, each tether physically coupling the circuit platform to the surrounding integrated circuit die. 6. The integrated circuit of claim 5, wherein each tether couples a respective first point on the circuit platform to a respective second point on the surrounding integrated circuit die, the first and second points being at different circumferential locations. 7. The integrated circuit of claim 6, wherein the circuit platform and the surrounding integrated circuit die have a plurality of corners, the corners of the circuit platform aligned with respective corners of the integrated circuit die, and wherein each of the one or more tethers is coupled between a corner of the circuit platform and a corner of the integrated circuit die which is not aligned with the respective corner of the circuit platform. 8. The integrated circuit of claim 7, wherein each tether includes a major arm member which is arranged to be substantially parallel to a respective side of the circuit platform. 9. The integrated circuit of claim 5, further comprising one or more conductive tracks, formed along one or more of the tethers, for coupling the one or more stress-sensitive circuits to external connections. 10. The integrated circuit of claim 4, wherein the one or more trenches are L-shaped; and a corner of each L-shaped trench is aligned with a corner of the circuit platform. 11. The integrated circuit of claim 4, wherein a pedestal is formed underneath the circuit platform, coupling the circuit platform to the integrated circuit die. 12. The integrated circuit of claim 1, wherein the one or more stress-sensitive circuits include passive circuit components, and the active or the passive circuit components are stress-sensitive. 13. The integrated circuit of claim 1, wherein the active circuit components comprise one or more of: a transistor, a diode, variable capacitor, a varactor, a light-emitting diode, and a thyristor; and the stress-sensitive circuits include one or more of: an amplifier, a reference circuit, an oscillator circuit, or a digital-to-analog converter. 14. The integrated circuit of claim 1, wherein the one or more stress-sensitive circuits includes two or more transistors arranged in a differential arrangement. 15. The integrated circuit of claim 1, further comprising a microelectromechanical systems (MEMS) cap, formed over the one or more stress-sensitive circuits. 16-20. (canceled) 21. An integrated circuit, comprising: an integrated circuit die having an active circuit component; a trench formed through a portion of the integrated circuit die adjacent the active circuit component; and a cavity formed in the integrated circuit die underneath at least a portion of the active circuit component. 22. The integrated circuit of claim 21, wherein the cavity is physically coupled to the trench. 23. The integrated circuit of claim 21, wherein the trench separates the active circuit component from a neighboring area of the integrated circuit die, wherein the integrated circuit further comprises a tether physically coupling the neighboring area of the integrated circuit die to the active circuit component. 24. The integrated circuit of claim 21, further comprising a pedestal formed on the integrated circuit die and supporting the active integrated circuit, wherein the pedestal extends through the cavity. 25. The integrated circuit of claim 21, wherein at least a portion of a perimeter of the cavity is rounded.
1,600
340,137
16,801,103
1,661
A brachytherapy needle guidance device is a device that facilitates the placement of a brachytherapy needle into a treatment region in tissue. This tissue may a breast tissue and the brachytherapy needle may be a fiducial needle. The brachytherapy needle guidance device may have an anchoring feature that anchors the brachytherapy needle guidance device into the tissue once it is properly positioned. The brachytherapy needle guidance device is used by software for treatment planning.
1. A brachytherapy needle guidance device, comprising: a body portion having a distal end and a proximal end; an anchoring feature that is capable of anchoring the brachytherapy needle guidance device into tissue; an imaging feature that is capable of being used by a treatment planning software; a feature at the distal end of the body portion that is capable of penetrating the tissue in order to insert the brachytherapy needle guidance device into the tissue; and wherein a brachytherapy needle is guided into the tissue once the brachytherapy needle guidance device is anchored in the tissue. 2. The device of claim 1, wherein the anchoring feature is one of a set of holes for suturing, a set of hooks, a button, and an inflatable balloon. 3. The device of claim 1, wherein the feature that is capable of penetrating the tissue further comprises one of a sharpened tip at a distal end of the body portion and a trocar with an open end. 4. The device of claim 1, wherein the body portion further comprises one of a hollow tube, a guidewire that can be used with a hollow needle and a balloon catheter. 5. The device of claim 1 further comprising a brachytherapy template attached to a proximal end of the body portion. 6. The device of claim 3, wherein the body portion is a catheter that is inserted into the tissue using the trocar. 7. A method for guiding a brachytherapy needle, the method comprising: providing a needle guidance device having a body portion having a distal end and a proximal end, an anchoring feature that is capable of anchoring the brachytherapy needle guidance device into tissue and a feature at the distal end of the body portion that is capable of penetrating the tissue in order to insert the brachytherapy needle guidance device into the tissue; imaging the needle guidance device and using a treatment planning software to plan a set of characteristics of insertion of a brachytherapy needle into the treatment region; inserting the needle guidance device into a treatment region in the tissue; and anchoring, by the anchoring feature of the needle guidance device, the needle guidance device at the treatment region. 8. The method of claim 7, wherein providing the needle guidance anchoring feature further comprising providing one of a set of holes for suturing, a set of hooks and an inflatable balloon. 9. The method of claim 7, wherein providing the needle guidance feature that is capable of penetrating the tissue further comprises providing one of a sharpened tip at a distal end of the body portion and a trocar with an open end. 10. The method of claim 7, wherein providing the needle guidance body portion further comprises providing one of a hollow tube, a guidewire that can be used with a hollow needle and a balloon catheter. 11. A brachytherapy treatment method using needle guidance, the method comprising: installing a needle guidance device into a treatment region in a tissue; anchoring the needle guidance device at the treatment region; imaging the needle guidance device for use with a treatment planning software to plan a set of characteristics for an insertion of the brachytherapy device into the treatment region; inserting a brachytherapy device using the needle guidance device without imaging into the treatment region; and placing one or more radioactive seeds into the treatment region. 12. The method of claim 11 further comprising attaching a brachytherapy template onto the needle guidance device and wherein inserting the brachytherapy device further comprises inserting the brachytherapy device through the brachytherapy template into the treatment region. 13. The method of 12, wherein the brachytherapy device further comprises a brachytherapy fiducial needle. 14. The method of claim 11, wherein installing the needle guidance device further comprises penetrating the tissue using a sharpened tip at a distal end of the needle guidance device. 15. The method of claim 11, wherein installing the needle guidance device further comprises using a trocar to install the needle guidance device. 16. The method of claim 12, wherein anchoring the needle guidance device further comprises suturing the needle guidance device once installed into the treatment region. 17. The method of claim 12, wherein anchoring the needle guidance device further comprises deploying one or more hooks once installed into the treatment region. 18. The method of claim 11, wherein placing one or more radioactive seeds into the treatment region further comprises placing the one or more radioactive seeds into a lumpectomy cavity in breast tissue. 19. The method of claim 15, wherein installing the needle guidance device further comprises inserting a catheter into the tissue using the trocar.
A brachytherapy needle guidance device is a device that facilitates the placement of a brachytherapy needle into a treatment region in tissue. This tissue may a breast tissue and the brachytherapy needle may be a fiducial needle. The brachytherapy needle guidance device may have an anchoring feature that anchors the brachytherapy needle guidance device into the tissue once it is properly positioned. The brachytherapy needle guidance device is used by software for treatment planning.1. A brachytherapy needle guidance device, comprising: a body portion having a distal end and a proximal end; an anchoring feature that is capable of anchoring the brachytherapy needle guidance device into tissue; an imaging feature that is capable of being used by a treatment planning software; a feature at the distal end of the body portion that is capable of penetrating the tissue in order to insert the brachytherapy needle guidance device into the tissue; and wherein a brachytherapy needle is guided into the tissue once the brachytherapy needle guidance device is anchored in the tissue. 2. The device of claim 1, wherein the anchoring feature is one of a set of holes for suturing, a set of hooks, a button, and an inflatable balloon. 3. The device of claim 1, wherein the feature that is capable of penetrating the tissue further comprises one of a sharpened tip at a distal end of the body portion and a trocar with an open end. 4. The device of claim 1, wherein the body portion further comprises one of a hollow tube, a guidewire that can be used with a hollow needle and a balloon catheter. 5. The device of claim 1 further comprising a brachytherapy template attached to a proximal end of the body portion. 6. The device of claim 3, wherein the body portion is a catheter that is inserted into the tissue using the trocar. 7. A method for guiding a brachytherapy needle, the method comprising: providing a needle guidance device having a body portion having a distal end and a proximal end, an anchoring feature that is capable of anchoring the brachytherapy needle guidance device into tissue and a feature at the distal end of the body portion that is capable of penetrating the tissue in order to insert the brachytherapy needle guidance device into the tissue; imaging the needle guidance device and using a treatment planning software to plan a set of characteristics of insertion of a brachytherapy needle into the treatment region; inserting the needle guidance device into a treatment region in the tissue; and anchoring, by the anchoring feature of the needle guidance device, the needle guidance device at the treatment region. 8. The method of claim 7, wherein providing the needle guidance anchoring feature further comprising providing one of a set of holes for suturing, a set of hooks and an inflatable balloon. 9. The method of claim 7, wherein providing the needle guidance feature that is capable of penetrating the tissue further comprises providing one of a sharpened tip at a distal end of the body portion and a trocar with an open end. 10. The method of claim 7, wherein providing the needle guidance body portion further comprises providing one of a hollow tube, a guidewire that can be used with a hollow needle and a balloon catheter. 11. A brachytherapy treatment method using needle guidance, the method comprising: installing a needle guidance device into a treatment region in a tissue; anchoring the needle guidance device at the treatment region; imaging the needle guidance device for use with a treatment planning software to plan a set of characteristics for an insertion of the brachytherapy device into the treatment region; inserting a brachytherapy device using the needle guidance device without imaging into the treatment region; and placing one or more radioactive seeds into the treatment region. 12. The method of claim 11 further comprising attaching a brachytherapy template onto the needle guidance device and wherein inserting the brachytherapy device further comprises inserting the brachytherapy device through the brachytherapy template into the treatment region. 13. The method of 12, wherein the brachytherapy device further comprises a brachytherapy fiducial needle. 14. The method of claim 11, wherein installing the needle guidance device further comprises penetrating the tissue using a sharpened tip at a distal end of the needle guidance device. 15. The method of claim 11, wherein installing the needle guidance device further comprises using a trocar to install the needle guidance device. 16. The method of claim 12, wherein anchoring the needle guidance device further comprises suturing the needle guidance device once installed into the treatment region. 17. The method of claim 12, wherein anchoring the needle guidance device further comprises deploying one or more hooks once installed into the treatment region. 18. The method of claim 11, wherein placing one or more radioactive seeds into the treatment region further comprises placing the one or more radioactive seeds into a lumpectomy cavity in breast tissue. 19. The method of claim 15, wherein installing the needle guidance device further comprises inserting a catheter into the tissue using the trocar.
1,600
340,138
16,801,126
1,661
A recording system may use the information stored in a list to determine whether to receive and/or respond to messages transmitted by notice systems. The source of the information for the list includes a server and/or the recording system itself. A server that provides the list may use data provided by an agency to determine a relationship between a people, recording devices and notice systems. The associations between people, recording devices and notice devices may be used to determine what information is in the list. A recording device that forms the list may receive messages from any notice system, detect the session identifier, store the session identifiers from received messages, and receive and/or respond to messages in accordance with the list formed by the recording system.
1. A method performed by a recording system for filtering messages broadcast from provided notice systems, the method comprising: storing a first data of a list in a non-transitory computer-readable storage medium of the recording system, wherein the first data of the list includes at least one of a first system type, a first notice system identifier, and a first data mask; receiving a first broadcast message of the messages broadcast from the provided notice systems, wherein the first broadcast message is received via a wireless network interface of the recording system using a short-range wireless communication protocol, and wherein the first broadcast message comprises a second system type, a second notice system identifier, and a second data mask; determining the first data of the list is equal to a first subset of one or more of the second system type, the second notice system identifier, and the second data mask, wherein determining the first data of the list is equal to the first subset excludes a second subset of at least one of the second system type, the second notice system identifier, and the second data mask, and wherein the first subset is different from the second subset; and accepting the first broadcast message in accordance with determining the first data of the list is equal to the first subset, wherein accepting the first broadcast message includes performing a function of the recording system. 2. The method of claim 1, wherein the first data of the list includes the first system type, and wherein the first subset includes the second system type, and wherein the second subset includes the second notice system identifier and the second data mask. 3. The method of claim 1, wherein the first data of the list includes the first notice system identifier, and wherein the first subset includes the second notice system identifier, and wherein the second subset includes the second system type and the second data mask. 4. The method of claim 1, wherein the first data of the list includes the first system type and the first data mask, and wherein the first subset includes the second system type and the second data mask, and wherein the second subset includes the second notice system identifier. 5. The method of claim 1, further comprising: receiving a second broadcast message of the messages broadcast from the provided notice systems, wherein the second broadcast message is received via the wireless network interface of the recording system using the short-range wireless communication protocol, and wherein the second broadcast message comprises a third system type, a third notice system identifier, and a third data mask; determining the first data of the list is not equal to a third subset of one or more of the third system type, the third notice system identifier, and the third data mask, wherein determining the first data of the list is not equal to the third subset excludes a fourth subset of at least one of the third system type, the third notice system identifier, and the third data mask, and wherein the third subset is different from the fourth subset; and ignoring the second broadcast message in accordance with determining the first data of the list is not equal to the third subset, wherein ignoring the second broadcast message includes omitting performing the function of the recording system. 6. The method of claim 5, wherein determining the first data of the list is equal to the first subset includes applying a rule between the first data of the list and the first subset, and wherein determining the first data of the list is not equal to the third subset includes applying the rule between the first data of the list and the third subset. 7. The method of claim 5, wherein the second system type is equal to the third system type and the second data mask is equal to the third data mask. 8. The method of claim 5, wherein the second system identifier is equal to the third system identifier and the second system type is equal to the third system type. 9. The method of claim 5, wherein the first data of the list includes the first system type and the first system type identifies one of a holster for a firearm, an in-vehicle monitor, and a conducted electrical weapon. 10. The method of claim 5, further comprising: receiving, via a second network interface of the recording system configured to communicate with an evidence management system over a network, the first data of the list from the evidence management system over the network; and storing the first data of the list in the non-transitory computer-readable storage medium after receiving the first data of the list from the evidence management system over the network. 11. The method of claim 10, wherein the second network interface comprises a wired network interface. 12. The method of claim 5, wherein the recording system is a wearable camera. 13. The method of claim 12, wherein the function includes recording video data. 14. The method of claim 5 wherein the first broadcast message comprises a first BLUETOOTH Low Energy advertisement and the second broadcast message comprises a second BLUETOOTH Low Energy advertisement. 15. A digital camera for filtering messages broadcast from provided notice systems, the digital camera comprising: a processing circuit; a network interface configured to: communicate with the provided notice systems using a short-range wireless communication protocol; and communicate with an evidence management system using at least one of a long-range wireless communication protocol and a wired communication protocol; and a non-transitory computer-readable storage medium configured to store a first data of a list, wherein the first data of the list includes at least one of a first system type, a first notice system identifier, and a first data mask; and wherein the processing circuit is configured to: receive, via the network interface, a first broadcast message of the messages broadcast from the provided notice systems, wherein the first broadcast message comprises a second system type, a second notice system identifier, and a second data mask; determine the first data of the list is equal to a first subset of one or more of the second system type, the second notice system identifier, and the second data mask, wherein the first data of the list is determined equal to the first subset independent of a second subset of at least one of the second system type, the second notice system identifier, and the second data mask, and wherein the first subset is different from the second subset; accept the first broadcast message in accordance with determining the first data of the list is equal to the first subset, wherein accepting the first broadcast message includes starting recording video data; and transmit, via the network interface, the video data to the evidence management system, wherein the video data is transmitted using the at least one of the long-range wireless communication protocol and the wired communication protocol. 16. The digital camera of claim 15, wherein the processing circuit is further configured to: receive, via the network interface, a second broadcast message of the messages broadcast from the provided notice systems, wherein the second broadcast message comprises a third system type, a third notice system identifier, and a third data mask; determine the first data of the list is not equal to a third subset of one or more of the third system type, the third notice system identifier, and the third data mask, wherein the first data of the list is determined not equal to the third subset independent of a fourth subset of at least one of the third system type, the third notice system identifier, and the third data mask, and wherein the third subset is different from the fourth subset; and ignore the second broadcast message in accordance with determining the first data of the list is not equal to the third subset, wherein ignoring the second broadcast message includes not recording second video data, and wherein the video data is different from the second video data. 17. The digital camera of claim 16, wherein the first data of the list includes the first system type and the first system type identifies one of a holster for a firearm, an in-vehicle monitor, and a conducted electrical weapon. 18. The digital camera of claim 17, wherein the processing circuit is further configured to: receive the first data of the list from the evidence management system via the network interface prior to receiving the first broadcast message; and store the first data of the list in the non-transitory computer-readable storage medium after receiving the first data of the list from the evidence management system. 19. A system for filtering messages, comprising: a first notice system, comprising: a sensor configured to report first data regarding a physical property of one of a holster for a firearm, a vehicle, and a conducted electrical weapon; a wireless network interface configured to broadcast a first broadcast message using a short-range wireless communication protocol; and a processing circuit configured to receive the first data from the sensor, use the first data to detect a change in state of the first notice system, generate a first data mask in accordance with the change in state of the first notice system, and broadcast the first broadcast message via the wireless network interface in accordance with the change in state of the notice system, wherein the first broadcast message includes the first data mask, a first notice system identifier identifying the first notice system, and a first system type identifying a type of the first notice system; and a recording device for recording video data, comprising: a second processing circuit; a second wireless network interface configured to receive the first broadcast message using the short-range wireless communication protocol; and a non-transitory computer-readable storage medium configured to store a second data of a list, wherein the second data of the list includes at least one of a second system type, a second notice system identifier, and a second data mask; and wherein the second processing circuit is configured to: extract the first system type, the first notice system identifier, and the first data mask from the first broadcast message; determine the second data of the list is equal to a first subset of one or more of the first system type, the first notice system identifier, and the first data mask, wherein determining the second data of the list is equal to the first subset includes applying a rule between the second data of the list and the first subset; and accept the first broadcast message in accordance with determining the second data of the list is equal to the first subset, wherein accepting the first broadcast message includes recording the video data, and wherein applying the rule between the second data of the list and the first subset excludes considering a second subset of at least one of the first system type, the first notice system identifier, and the first data mask, and wherein the first subset is different from the second subset. 20. The system of claim 19, further comprising: a second notice system, comprising a second sensor configured to report third data regarding a second physical property of one of a second holster for a second firearm, a second vehicle, and a second conducted electrical weapon; a third wireless network interface configured to broadcast a second broadcast message using the short-range wireless communication protocol; and a third processing circuit configured to receive the third data from the second sensor, use the third data to detect a second change in state of the second notice system, generate a second data mask in accordance with the second change in state of the second notice system, and broadcast the second broadcast message via the third wireless network interface in accordance with the second change in state of the second notice system, wherein the second broadcast message includes the third data mask, a third notice system identifier identifying the second notice system, and a second system type identifying a second type of the second notice system; and wherein: the second wireless network interface is configured to receive the second broadcast message using the short-range wireless communication protocol; and the second processing circuit is further configured to: extract the third system type, the third notice system identifier, and the third data mask from the second broadcast message; determine the second data of the list is not equal to a third subset of one or more of the third system type, the third notice system identifier, and the third data mask, wherein determining the second data of the list is not equal to the first subset includes applying the rule between the second data of the list and the third subset; and ignore the second broadcast message in accordance with determining the second data of the list is not equal to the third subset, wherein ignoring the second broadcast message includes not recording the video data responsive to the second broadcast message, and wherein applying the rule between the second data of the list and the third subset excludes considering a fourth subset of at least one of the third system type, the third notice system identifier, and the third data mask, and wherein the third subset is different from the fourth subset.
A recording system may use the information stored in a list to determine whether to receive and/or respond to messages transmitted by notice systems. The source of the information for the list includes a server and/or the recording system itself. A server that provides the list may use data provided by an agency to determine a relationship between a people, recording devices and notice systems. The associations between people, recording devices and notice devices may be used to determine what information is in the list. A recording device that forms the list may receive messages from any notice system, detect the session identifier, store the session identifiers from received messages, and receive and/or respond to messages in accordance with the list formed by the recording system.1. A method performed by a recording system for filtering messages broadcast from provided notice systems, the method comprising: storing a first data of a list in a non-transitory computer-readable storage medium of the recording system, wherein the first data of the list includes at least one of a first system type, a first notice system identifier, and a first data mask; receiving a first broadcast message of the messages broadcast from the provided notice systems, wherein the first broadcast message is received via a wireless network interface of the recording system using a short-range wireless communication protocol, and wherein the first broadcast message comprises a second system type, a second notice system identifier, and a second data mask; determining the first data of the list is equal to a first subset of one or more of the second system type, the second notice system identifier, and the second data mask, wherein determining the first data of the list is equal to the first subset excludes a second subset of at least one of the second system type, the second notice system identifier, and the second data mask, and wherein the first subset is different from the second subset; and accepting the first broadcast message in accordance with determining the first data of the list is equal to the first subset, wherein accepting the first broadcast message includes performing a function of the recording system. 2. The method of claim 1, wherein the first data of the list includes the first system type, and wherein the first subset includes the second system type, and wherein the second subset includes the second notice system identifier and the second data mask. 3. The method of claim 1, wherein the first data of the list includes the first notice system identifier, and wherein the first subset includes the second notice system identifier, and wherein the second subset includes the second system type and the second data mask. 4. The method of claim 1, wherein the first data of the list includes the first system type and the first data mask, and wherein the first subset includes the second system type and the second data mask, and wherein the second subset includes the second notice system identifier. 5. The method of claim 1, further comprising: receiving a second broadcast message of the messages broadcast from the provided notice systems, wherein the second broadcast message is received via the wireless network interface of the recording system using the short-range wireless communication protocol, and wherein the second broadcast message comprises a third system type, a third notice system identifier, and a third data mask; determining the first data of the list is not equal to a third subset of one or more of the third system type, the third notice system identifier, and the third data mask, wherein determining the first data of the list is not equal to the third subset excludes a fourth subset of at least one of the third system type, the third notice system identifier, and the third data mask, and wherein the third subset is different from the fourth subset; and ignoring the second broadcast message in accordance with determining the first data of the list is not equal to the third subset, wherein ignoring the second broadcast message includes omitting performing the function of the recording system. 6. The method of claim 5, wherein determining the first data of the list is equal to the first subset includes applying a rule between the first data of the list and the first subset, and wherein determining the first data of the list is not equal to the third subset includes applying the rule between the first data of the list and the third subset. 7. The method of claim 5, wherein the second system type is equal to the third system type and the second data mask is equal to the third data mask. 8. The method of claim 5, wherein the second system identifier is equal to the third system identifier and the second system type is equal to the third system type. 9. The method of claim 5, wherein the first data of the list includes the first system type and the first system type identifies one of a holster for a firearm, an in-vehicle monitor, and a conducted electrical weapon. 10. The method of claim 5, further comprising: receiving, via a second network interface of the recording system configured to communicate with an evidence management system over a network, the first data of the list from the evidence management system over the network; and storing the first data of the list in the non-transitory computer-readable storage medium after receiving the first data of the list from the evidence management system over the network. 11. The method of claim 10, wherein the second network interface comprises a wired network interface. 12. The method of claim 5, wherein the recording system is a wearable camera. 13. The method of claim 12, wherein the function includes recording video data. 14. The method of claim 5 wherein the first broadcast message comprises a first BLUETOOTH Low Energy advertisement and the second broadcast message comprises a second BLUETOOTH Low Energy advertisement. 15. A digital camera for filtering messages broadcast from provided notice systems, the digital camera comprising: a processing circuit; a network interface configured to: communicate with the provided notice systems using a short-range wireless communication protocol; and communicate with an evidence management system using at least one of a long-range wireless communication protocol and a wired communication protocol; and a non-transitory computer-readable storage medium configured to store a first data of a list, wherein the first data of the list includes at least one of a first system type, a first notice system identifier, and a first data mask; and wherein the processing circuit is configured to: receive, via the network interface, a first broadcast message of the messages broadcast from the provided notice systems, wherein the first broadcast message comprises a second system type, a second notice system identifier, and a second data mask; determine the first data of the list is equal to a first subset of one or more of the second system type, the second notice system identifier, and the second data mask, wherein the first data of the list is determined equal to the first subset independent of a second subset of at least one of the second system type, the second notice system identifier, and the second data mask, and wherein the first subset is different from the second subset; accept the first broadcast message in accordance with determining the first data of the list is equal to the first subset, wherein accepting the first broadcast message includes starting recording video data; and transmit, via the network interface, the video data to the evidence management system, wherein the video data is transmitted using the at least one of the long-range wireless communication protocol and the wired communication protocol. 16. The digital camera of claim 15, wherein the processing circuit is further configured to: receive, via the network interface, a second broadcast message of the messages broadcast from the provided notice systems, wherein the second broadcast message comprises a third system type, a third notice system identifier, and a third data mask; determine the first data of the list is not equal to a third subset of one or more of the third system type, the third notice system identifier, and the third data mask, wherein the first data of the list is determined not equal to the third subset independent of a fourth subset of at least one of the third system type, the third notice system identifier, and the third data mask, and wherein the third subset is different from the fourth subset; and ignore the second broadcast message in accordance with determining the first data of the list is not equal to the third subset, wherein ignoring the second broadcast message includes not recording second video data, and wherein the video data is different from the second video data. 17. The digital camera of claim 16, wherein the first data of the list includes the first system type and the first system type identifies one of a holster for a firearm, an in-vehicle monitor, and a conducted electrical weapon. 18. The digital camera of claim 17, wherein the processing circuit is further configured to: receive the first data of the list from the evidence management system via the network interface prior to receiving the first broadcast message; and store the first data of the list in the non-transitory computer-readable storage medium after receiving the first data of the list from the evidence management system. 19. A system for filtering messages, comprising: a first notice system, comprising: a sensor configured to report first data regarding a physical property of one of a holster for a firearm, a vehicle, and a conducted electrical weapon; a wireless network interface configured to broadcast a first broadcast message using a short-range wireless communication protocol; and a processing circuit configured to receive the first data from the sensor, use the first data to detect a change in state of the first notice system, generate a first data mask in accordance with the change in state of the first notice system, and broadcast the first broadcast message via the wireless network interface in accordance with the change in state of the notice system, wherein the first broadcast message includes the first data mask, a first notice system identifier identifying the first notice system, and a first system type identifying a type of the first notice system; and a recording device for recording video data, comprising: a second processing circuit; a second wireless network interface configured to receive the first broadcast message using the short-range wireless communication protocol; and a non-transitory computer-readable storage medium configured to store a second data of a list, wherein the second data of the list includes at least one of a second system type, a second notice system identifier, and a second data mask; and wherein the second processing circuit is configured to: extract the first system type, the first notice system identifier, and the first data mask from the first broadcast message; determine the second data of the list is equal to a first subset of one or more of the first system type, the first notice system identifier, and the first data mask, wherein determining the second data of the list is equal to the first subset includes applying a rule between the second data of the list and the first subset; and accept the first broadcast message in accordance with determining the second data of the list is equal to the first subset, wherein accepting the first broadcast message includes recording the video data, and wherein applying the rule between the second data of the list and the first subset excludes considering a second subset of at least one of the first system type, the first notice system identifier, and the first data mask, and wherein the first subset is different from the second subset. 20. The system of claim 19, further comprising: a second notice system, comprising a second sensor configured to report third data regarding a second physical property of one of a second holster for a second firearm, a second vehicle, and a second conducted electrical weapon; a third wireless network interface configured to broadcast a second broadcast message using the short-range wireless communication protocol; and a third processing circuit configured to receive the third data from the second sensor, use the third data to detect a second change in state of the second notice system, generate a second data mask in accordance with the second change in state of the second notice system, and broadcast the second broadcast message via the third wireless network interface in accordance with the second change in state of the second notice system, wherein the second broadcast message includes the third data mask, a third notice system identifier identifying the second notice system, and a second system type identifying a second type of the second notice system; and wherein: the second wireless network interface is configured to receive the second broadcast message using the short-range wireless communication protocol; and the second processing circuit is further configured to: extract the third system type, the third notice system identifier, and the third data mask from the second broadcast message; determine the second data of the list is not equal to a third subset of one or more of the third system type, the third notice system identifier, and the third data mask, wherein determining the second data of the list is not equal to the first subset includes applying the rule between the second data of the list and the third subset; and ignore the second broadcast message in accordance with determining the second data of the list is not equal to the third subset, wherein ignoring the second broadcast message includes not recording the video data responsive to the second broadcast message, and wherein applying the rule between the second data of the list and the third subset excludes considering a fourth subset of at least one of the third system type, the third notice system identifier, and the third data mask, and wherein the third subset is different from the fourth subset.
1,600
340,139
16,801,112
1,661
where K is a constant, and range of the constant of K is 360˜450; range of value of a is 0.001˜0.01, range of value of b is 0.05˜0.3, and range of value of c is 5˜20.
1. An LED (light emitting diode) lamp comprising: a lamp shell including a lamp head, a lamp neck and a sleeve, the lamp head connects to the lamp neck which connects to the sleeve; a passive heat dissipating element having a heat sink connected to the lamp shell, wherein the heat sink comprises fins and a base, the sleeve of the lamp shell is located in the heat sink, the lamp neck projects from the heat sink, height of the lamp neck is at least 80% of height of the heat sink; a power source having a first portion and a second portion, wherein the first portion of the power source is disposed in both the lamp neck and the lamp head of the lamp shell, and the second portion of the power source is disposed in the heat sink of the passive heat dissipating element; a light emitting surface connected to the heat sink of the passive heat dissipating element and comprising LED chips electrically connected to the power source, wherein the light emitting surface and the heat sink are connected to form a heat transferring path from the LED chips to the passive heat dissipating element; a first heat dissipating channel formed in a first chamber of the lamp shell for dissipating heat generated from the power source while the LED lamp is working, and the first chamber is located between bottom of the LED lamp and an upper portion of the lamp neck; and a second heat dissipating channel formed in the heat sink and between the fins and the base of the heat sink for dissipating the heat generated from the LED chips and transferred to the heat sink; wherein the first heat dissipating channel comprises a first end on the light emitting surface to allow air flowing from outside of the LED lamp into the first chamber, and a second end on the upper portion of the lamp neck of the lamp shell to allow air flowing from inside of the first chamber out to the LED lamp; wherein the second heat dissipating channel comprises a third end on the light emitting surface to allow air flowing from outside of the LED lamp into the second heat dissipating channel, and flowing out from spaces between every adjacent two of the fins; wherein a third aperture is located in a central region of the light emitting surface, and the third aperture forms an air intake of both the first heat dissipating channel and the second heat dissipating channel; wherein a lateral outline of the LED lamp detours around an axis of the LED lamp 360 degrees to turn around to form an contour of the LED lamp, any point on the outline meets a formula as follows: y=−ax 3 +bx 2 −cx+K; where K is a constant, and range of the constant of K is 360˜450; range of value of a is 0.001˜0.01, range of value of b is 0.05˜0.3, and range of value of c is 5˜20; wherein the ratio of power of the LED lamp to heat dissipating area of the heat sink is 1:20˜30. 2. The LED lamp of claim 1, wherein the values of a, b and c are to meet a relation of follows: y=−0.0012x 3+0.2235x 2−14.608x+K. 3. The LED lamp of claim 2, wherein the heat sink includes a lower portion and an upper portion, the lower portion of the heat sink has large width and heat dissipating area than the upper portion. 4. The LED lamp of claim 3, wherein cross-sectional area of the lamp neck axially upward tapers off. 5. The LED lamp of claim 4, wherein the outline of the LED lamp is a substantially S-shaped curve including a curve on the lamp neck and a curve on the heat sink. 6. The LED lamp of claim 5 further comprising a lamp cover with a light output surface and an end surface, wherein the end surface is formed with a vent to let air flowing from outside of the LED lamp into both the first channel and the second channel through the vent. 7. The LED lamp of claim 6, wherein the first end is projected onto the end surface in the axis of the LED lamp to occupy an area on the end surface, which is defined as a first portion, another area on the end surface is defined as a second portion, and the vent in the first portion is greater than the vent in the second portion in area. 8. The LED lamp of claim 7, wherein the heat sink comprises first fins and second fins, bottoms of both the first fins and the second fins in the axis of the LED lamp connect to the base, the first fins interlace with the second fins at regular intervals, and one of the second fins includes a third portion and two fourth portions, the two fourth portions are symmetrical about the third portion. 9. The LED lamp of claim 8, wherein each of the first fins is divided into two portions in a radial direction of the LED lamp, the two portions are divided with a gap portion, the third portion is connected to the fourth portion through a transition portion, the transition portion has a buffer section and a guide section, a direction of any tangent of the guide section is separate from the gap portion. 10. The LED lamp of claim 9, wherein the second end on the upper portion of the lamp neck of the lamp shell is formed with a venting hole, the lamp shell has an airflow limiting surface which extends radially outwardly and is located away from the venting hole, the airflow limiting surface cloaks at least part of the fins. 11. The LED lamp of claim 10, wherein upper portions of at least part of the fins in the axial direction of the LED lamp correspond to the airflow limiting surface. 12. The LED lamp of claim 11, wherein the sleeve has an upper portion and a lower portion, the upper portion is connected to the lower portion through an air guiding surface, a diameter of cross-section of the air guiding surface downward tapers off along the axis of the LED lamp. 13. The LED lamp of claim 12, wherein the sleeve includes a first portion and a second portion in the axial direction, the second portion is a part of the sleeve below the air guiding surface, electronic components of the power source, which are located in the second portion of the sleeve, include electrolytic capacitors. 14. The LED lamp of claim 13, wherein the power source includes a heat-generating element, the heat-generating element is in contact with the lamp head through a thermal conductor and the heat-generating element is fastened to the lamp head through the thermal conductor. 15. The LED lamp of claim 14, wherein the lamp head includes a metal portion, at least part of an inner side of the metal portion constitutes a wall of the inner chamber of the lamp shell to make the thermal conductor directly connecting with the metal portion and performing heat dissipation by the metal portion.
where K is a constant, and range of the constant of K is 360˜450; range of value of a is 0.001˜0.01, range of value of b is 0.05˜0.3, and range of value of c is 5˜20.1. An LED (light emitting diode) lamp comprising: a lamp shell including a lamp head, a lamp neck and a sleeve, the lamp head connects to the lamp neck which connects to the sleeve; a passive heat dissipating element having a heat sink connected to the lamp shell, wherein the heat sink comprises fins and a base, the sleeve of the lamp shell is located in the heat sink, the lamp neck projects from the heat sink, height of the lamp neck is at least 80% of height of the heat sink; a power source having a first portion and a second portion, wherein the first portion of the power source is disposed in both the lamp neck and the lamp head of the lamp shell, and the second portion of the power source is disposed in the heat sink of the passive heat dissipating element; a light emitting surface connected to the heat sink of the passive heat dissipating element and comprising LED chips electrically connected to the power source, wherein the light emitting surface and the heat sink are connected to form a heat transferring path from the LED chips to the passive heat dissipating element; a first heat dissipating channel formed in a first chamber of the lamp shell for dissipating heat generated from the power source while the LED lamp is working, and the first chamber is located between bottom of the LED lamp and an upper portion of the lamp neck; and a second heat dissipating channel formed in the heat sink and between the fins and the base of the heat sink for dissipating the heat generated from the LED chips and transferred to the heat sink; wherein the first heat dissipating channel comprises a first end on the light emitting surface to allow air flowing from outside of the LED lamp into the first chamber, and a second end on the upper portion of the lamp neck of the lamp shell to allow air flowing from inside of the first chamber out to the LED lamp; wherein the second heat dissipating channel comprises a third end on the light emitting surface to allow air flowing from outside of the LED lamp into the second heat dissipating channel, and flowing out from spaces between every adjacent two of the fins; wherein a third aperture is located in a central region of the light emitting surface, and the third aperture forms an air intake of both the first heat dissipating channel and the second heat dissipating channel; wherein a lateral outline of the LED lamp detours around an axis of the LED lamp 360 degrees to turn around to form an contour of the LED lamp, any point on the outline meets a formula as follows: y=−ax 3 +bx 2 −cx+K; where K is a constant, and range of the constant of K is 360˜450; range of value of a is 0.001˜0.01, range of value of b is 0.05˜0.3, and range of value of c is 5˜20; wherein the ratio of power of the LED lamp to heat dissipating area of the heat sink is 1:20˜30. 2. The LED lamp of claim 1, wherein the values of a, b and c are to meet a relation of follows: y=−0.0012x 3+0.2235x 2−14.608x+K. 3. The LED lamp of claim 2, wherein the heat sink includes a lower portion and an upper portion, the lower portion of the heat sink has large width and heat dissipating area than the upper portion. 4. The LED lamp of claim 3, wherein cross-sectional area of the lamp neck axially upward tapers off. 5. The LED lamp of claim 4, wherein the outline of the LED lamp is a substantially S-shaped curve including a curve on the lamp neck and a curve on the heat sink. 6. The LED lamp of claim 5 further comprising a lamp cover with a light output surface and an end surface, wherein the end surface is formed with a vent to let air flowing from outside of the LED lamp into both the first channel and the second channel through the vent. 7. The LED lamp of claim 6, wherein the first end is projected onto the end surface in the axis of the LED lamp to occupy an area on the end surface, which is defined as a first portion, another area on the end surface is defined as a second portion, and the vent in the first portion is greater than the vent in the second portion in area. 8. The LED lamp of claim 7, wherein the heat sink comprises first fins and second fins, bottoms of both the first fins and the second fins in the axis of the LED lamp connect to the base, the first fins interlace with the second fins at regular intervals, and one of the second fins includes a third portion and two fourth portions, the two fourth portions are symmetrical about the third portion. 9. The LED lamp of claim 8, wherein each of the first fins is divided into two portions in a radial direction of the LED lamp, the two portions are divided with a gap portion, the third portion is connected to the fourth portion through a transition portion, the transition portion has a buffer section and a guide section, a direction of any tangent of the guide section is separate from the gap portion. 10. The LED lamp of claim 9, wherein the second end on the upper portion of the lamp neck of the lamp shell is formed with a venting hole, the lamp shell has an airflow limiting surface which extends radially outwardly and is located away from the venting hole, the airflow limiting surface cloaks at least part of the fins. 11. The LED lamp of claim 10, wherein upper portions of at least part of the fins in the axial direction of the LED lamp correspond to the airflow limiting surface. 12. The LED lamp of claim 11, wherein the sleeve has an upper portion and a lower portion, the upper portion is connected to the lower portion through an air guiding surface, a diameter of cross-section of the air guiding surface downward tapers off along the axis of the LED lamp. 13. The LED lamp of claim 12, wherein the sleeve includes a first portion and a second portion in the axial direction, the second portion is a part of the sleeve below the air guiding surface, electronic components of the power source, which are located in the second portion of the sleeve, include electrolytic capacitors. 14. The LED lamp of claim 13, wherein the power source includes a heat-generating element, the heat-generating element is in contact with the lamp head through a thermal conductor and the heat-generating element is fastened to the lamp head through the thermal conductor. 15. The LED lamp of claim 14, wherein the lamp head includes a metal portion, at least part of an inner side of the metal portion constitutes a wall of the inner chamber of the lamp shell to make the thermal conductor directly connecting with the metal portion and performing heat dissipation by the metal portion.
1,600
340,140
16,801,117
1,661
A deflectable medical device (1) includes a shape memory alloy wire (15) integrated into a flexible elongated body (11). The shape memory alloy wire (15) is arranged to shorten upon receiving energy from an energy supply (2,4), thereby deflecting the medical device (1). A rod (18) positioned in a lumen (14) of the flexible elongated body (11) and compressed between a fixture (16) in the proximal end (12) of the elongated body (11) and the distal end (13) of the elongated body (11) is responsible for the shape memory alloy wire (15) recovering its initial length upon discontinuation of energy supply.
1. A deflectable medical device comprising: a flexible elongated body comprising a longitudinal axis; a shape memory alloy wire disposed within the flexible elongated body eccentric to the longitudinal axis, wherein the shape memory alloy wire is configured to shorten in an axial direction in response to receiving energy from an energy supply such that the flexible elongated body is deflected; and a rod disposed within the flexible elongated body, wherein the rod is configured to provide a force in the axial direction to lengthen the shape memory alloy wire when the energy supply discontinues providing the energy to the shape memory alloy wire. 2. The device of claim 1, wherein the energy supply is connected electrically to the shape memory alloy wire, and wherein the shape memory alloy wire is configured to convert electrical energy provided by the energy supply into heat through electrical resistance. 3. The device of claim 1, wherein the energy supply is connected electrically to a resistor disposed: proximate to the shape memory alloy wire; or coaxial with the shape memory alloy wire; or as a coating surrounding the shape memory alloy wire; or as windings of a material around the shape memory alloy wire. 4. The device of claim 3, wherein the resistor heats the shape memory alloy wire when energized with energy from the energy supply. 5. The device of claim 1, wherein the energy supply provides alternating current to a coil surrounding the shape memory alloy wire, and wherein the coil heats the shape memory alloy wire through induction when energized by the alternating current. 6. The device of claim 1, wherein the energy supply is a pump for providing fluid flow proximate to at least a portion of the shape memory alloy wire. 7. The device of claim 6, wherein the fluid flow is hotter than the shape memory alloy wire and provides heat energy to the shape memory alloy wire. 8. The device of claim 6, wherein the fluid flow is cooler than the shape memory alloy wire and removes heat energy from the shape memory alloy wire, such that the shape memory alloy wire is induced to lengthen in the axial direction in response to the fluid flow. 9. The device of claim 1, wherein a control unit controls a quantity of energy received from the energy supply by the shape memory alloy wire. 10. The device of claim 1, further comprising a handgrip on a proximal end of the device. 11. The device of claim 1, wherein the shape memory alloy wire comprises an alloy of Ni—Ti, Cu—Al—Ni, Cu—Zn, or Ni—Ti—Pd. 12. The device of claim 1, wherein the shape memory alloy wire comprises a diameter of between about 50 micrometers and about 200 micrometers. 13. The device of claim 1, wherein the flexible elongated body comprises a polymer. 14. The device of claim 13, wherein the polymer comprises a thermoplastic elastomer. 15. The device of claim 14, wherein the thermoplastic elastomer comprises PEBAX. 16. The device of claim 1, wherein the shape memory alloy wire is incorporated into the flexible elongated body by overmolding. 17. The device of claim 1, wherein the flexible elongated body includes through-holes in a distal portion for dispensing fluid into a surrounding of the distal portion. 18. The device of claim 1, wherein a distal portion of the flexible elongated body further comprises a metallic tip for providing treatment energy to a surrounding of the distal portion.
A deflectable medical device (1) includes a shape memory alloy wire (15) integrated into a flexible elongated body (11). The shape memory alloy wire (15) is arranged to shorten upon receiving energy from an energy supply (2,4), thereby deflecting the medical device (1). A rod (18) positioned in a lumen (14) of the flexible elongated body (11) and compressed between a fixture (16) in the proximal end (12) of the elongated body (11) and the distal end (13) of the elongated body (11) is responsible for the shape memory alloy wire (15) recovering its initial length upon discontinuation of energy supply.1. A deflectable medical device comprising: a flexible elongated body comprising a longitudinal axis; a shape memory alloy wire disposed within the flexible elongated body eccentric to the longitudinal axis, wherein the shape memory alloy wire is configured to shorten in an axial direction in response to receiving energy from an energy supply such that the flexible elongated body is deflected; and a rod disposed within the flexible elongated body, wherein the rod is configured to provide a force in the axial direction to lengthen the shape memory alloy wire when the energy supply discontinues providing the energy to the shape memory alloy wire. 2. The device of claim 1, wherein the energy supply is connected electrically to the shape memory alloy wire, and wherein the shape memory alloy wire is configured to convert electrical energy provided by the energy supply into heat through electrical resistance. 3. The device of claim 1, wherein the energy supply is connected electrically to a resistor disposed: proximate to the shape memory alloy wire; or coaxial with the shape memory alloy wire; or as a coating surrounding the shape memory alloy wire; or as windings of a material around the shape memory alloy wire. 4. The device of claim 3, wherein the resistor heats the shape memory alloy wire when energized with energy from the energy supply. 5. The device of claim 1, wherein the energy supply provides alternating current to a coil surrounding the shape memory alloy wire, and wherein the coil heats the shape memory alloy wire through induction when energized by the alternating current. 6. The device of claim 1, wherein the energy supply is a pump for providing fluid flow proximate to at least a portion of the shape memory alloy wire. 7. The device of claim 6, wherein the fluid flow is hotter than the shape memory alloy wire and provides heat energy to the shape memory alloy wire. 8. The device of claim 6, wherein the fluid flow is cooler than the shape memory alloy wire and removes heat energy from the shape memory alloy wire, such that the shape memory alloy wire is induced to lengthen in the axial direction in response to the fluid flow. 9. The device of claim 1, wherein a control unit controls a quantity of energy received from the energy supply by the shape memory alloy wire. 10. The device of claim 1, further comprising a handgrip on a proximal end of the device. 11. The device of claim 1, wherein the shape memory alloy wire comprises an alloy of Ni—Ti, Cu—Al—Ni, Cu—Zn, or Ni—Ti—Pd. 12. The device of claim 1, wherein the shape memory alloy wire comprises a diameter of between about 50 micrometers and about 200 micrometers. 13. The device of claim 1, wherein the flexible elongated body comprises a polymer. 14. The device of claim 13, wherein the polymer comprises a thermoplastic elastomer. 15. The device of claim 14, wherein the thermoplastic elastomer comprises PEBAX. 16. The device of claim 1, wherein the shape memory alloy wire is incorporated into the flexible elongated body by overmolding. 17. The device of claim 1, wherein the flexible elongated body includes through-holes in a distal portion for dispensing fluid into a surrounding of the distal portion. 18. The device of claim 1, wherein a distal portion of the flexible elongated body further comprises a metallic tip for providing treatment energy to a surrounding of the distal portion.
1,600
340,141
16,801,060
1,661
An exemplary tissue detection and location identification apparatus can include, for example, a first electrically conductive layer at least partially (e.g., circumferentially) surrounding a lumen, an insulating layer at least partially (e.g., circumferentially) surrounding the first electrically conductive layer, and a second electrically conductive layer circumferentially surrounding the insulating layer, where the insulating layer can electrically isolate the first electrically conductive layer from the second electrically conductive layer. A further insulating layer can be included which can at least partially surrounding the second electrically conductive layer. The first electrically conductive layer, the insulating layer, and the second electrically conductive layer can form a structure which has a first side and a second side disposed opposite to the first side with respect to the lumen, where the first side can be longer than the second side thereby forming a sharp pointed end via the first side at a distal-most portion. The exemplary configuration can be used for (a) determination/detection of a tissue type using impendence of the electrically conductive layers, and/or (ii) determination of a location of at least one portion of the insertion device/apparatus.
1. An insertion apparatus, comprising: a first electrically conductive layer circumferentially surrounding a lumen; an insulating layer at least partially surrounding the first electrically conductive layer; and a second electrically conductive layer at least partially surrounding the insulating layer, wherein the insulating layer electrically isolates the first electrically conductive layer from the second electrically conductive layer. 2. The insertion apparatus of claim 1, further comprising a further insulating layer at least partially surrounding the second electrically conductive layer. 3. The insertion apparatus of claim 1, wherein the first electrically conductive layer, the insulating layer, and the second electrically conductive layer form a structure which has a first side and a second side disposed opposite to the first side with respect to the lumen, and wherein the first side is longer than the second side thereby forming a sharp pointed end via the first side at a distal-most portion of the needle. 4. The insertion apparatus of claim 1, wherein the first electrically conductive layer, the insulating layer, and the second electrically conductive layer form a structure that is beveled to form a sharp pointed end at a distal-most portion of the needle. 5. The insertion apparatus of claim 1, wherein the first electrically conductive layer, the insulating layer, and the second electrically conductive layer form a shaft of the needle. 6. The insertion apparatus of claim 5, further comprising a hub, wherein the first electrically conductive layer, the insulating layer, and the second electrically conductive layer form a structure that extends distally from the hub. 7. The insertion apparatus of claim 6, further comprising: a barrel connected to the hub; and a plunger configured to be inserted into the barrel. 8. The insertion apparatus of claim 1, wherein the first electrically conductive layer is configured to obtain a first electrical signal, and the second electrically conductive layer is configured to obtain a second electrical signal, and further comprising at least one communication device configured transmit information related to the first and second electrical signals. 9. The insertion apparatus of claim 8, wherein the at least one communication device is embedded in one of (i) a hub of the needle, or (ii) a barrel of the needle. 10. The insertion apparatus of claim 1, wherein the first electrically conductive layer is configured to obtain a first electrical signal, and the second electrically conductive layer is configured to obtain a second electrical signal, further comprising a hardware processing arrangement configured to: receive information related to the first and second electrical signals; determine an impedance based on the information; and determine a tissue type based on the impedance. 11. The insertion apparatus of claim 10, further comprising at least one audible arrangement configured to emit a sound based on the determined tissue type. 12. The insertion apparatus of claim 10, wherein the processing arrangement is embedded in one of (i) a hub of the needle or (ii) a barrel of the needle. 13. The insertion apparatus of claim 1, wherein the lumen is configured to at least one of (i) have a pharmacological agent injected therethrough, or (ii) have a biopsy obtained therethrough. 14. The insertion apparatus of claim 10, wherein, upon the determination of the tissue type of a specific tissue that is of interest, at least one current is provided to at least one of the first electrically conductive layer or the second electrically conductive layer so as to generate an energy field detectable by signals detectors which transmit location information at least one portion of the insertion apparatus to the computer hardware arrangement. 15. The insertion apparatus of claim 14, wherein the signal detectors include at least two antennas. 16. The insertion apparatus of claim 14, wherein the computer hardware arrangement is further configured to determine a three-dimensional location of the at least one portion of the insertion apparatus at or in a body based on the location information. 17. The insertion apparatus of claim 14, wherein the computer hardware arrangement is further configured to generate an image on a display of the at least one portion of the insertion apparatus at or in a body in a three-dimensional space based on the location information. 18. An insertion apparatus, comprising: a hub; and a shaft extending from the hub and surrounding a lumen, wherein the shaft includes an outer surface having at least one electrode formed thereon or therein, and wherein the at least one electrode extends for more than half of an external circumference of the shaft. 19. The insertion apparatus of claim 18, further comprising: a barrel connected to the hub; and a plunger configured to be inserted into the barrel. 20. A method for determining information regarding at least one tissue of a subject or an orifice of the at least one tissue using an insertion arrangement, comprising: introducing the insertion arrangement into at least one target site of the subject to reach the at least one tissue; transmitting an electrical signal using a first electrically conductive layer that at least partially surrounds a lumen of the insertion arrangement; receiving the electrical signal using a second electrically conductive layer that at least partially surrounds the first electrically conductive layer; and determining an impedance based on the electrical signal, thereby determining the information regarding the at least one tissue or the orifice of the at least one tissue of the subject. 21. The method of claim 20, further comprising isolating the first electrically conductive layer from the second electrically conductive layer using at least one insulating layer. 22. The method of claim 20, further comprising at least one of (i) administering a pharmacological agent to the subject through the lumen, or (ii) obtaining a biopsy sample from the subject through the lumen. 23. The method of claim 20, wherein the impedance value is the magnitude of the impedance. 24. The method of claim 20, wherein the at least one tissue is muscle or fat. 25. The method of claim 20, wherein the orifice contains blood or synovial fluid. 26. The method of claim 20, further comprising determining whether a particular type or an orifice of at least one tissue has been reached based on the impedance. 27. The method of claim 26, further comprising, based on the determination of whether the type or the orifice of the at least one tissue has been reached, providing at least one current to at least one of the first electrically conductive layer or the second electrically conductive layer so as to generate an energy field detectable by signals detectors which transmit location information at least one portion of the insertion apparatus to a computer hardware arrangement. 28. The method of claim 27, further comprising determining a three-dimensional location of the at least one portion of the insertion apparatus at or in a body based on the location information. 29. The method of claim 27, further comprising generating an image on a display of the at least one portion of the insertion apparatus at or in a body in a three-dimensional space based on the location information.
An exemplary tissue detection and location identification apparatus can include, for example, a first electrically conductive layer at least partially (e.g., circumferentially) surrounding a lumen, an insulating layer at least partially (e.g., circumferentially) surrounding the first electrically conductive layer, and a second electrically conductive layer circumferentially surrounding the insulating layer, where the insulating layer can electrically isolate the first electrically conductive layer from the second electrically conductive layer. A further insulating layer can be included which can at least partially surrounding the second electrically conductive layer. The first electrically conductive layer, the insulating layer, and the second electrically conductive layer can form a structure which has a first side and a second side disposed opposite to the first side with respect to the lumen, where the first side can be longer than the second side thereby forming a sharp pointed end via the first side at a distal-most portion. The exemplary configuration can be used for (a) determination/detection of a tissue type using impendence of the electrically conductive layers, and/or (ii) determination of a location of at least one portion of the insertion device/apparatus.1. An insertion apparatus, comprising: a first electrically conductive layer circumferentially surrounding a lumen; an insulating layer at least partially surrounding the first electrically conductive layer; and a second electrically conductive layer at least partially surrounding the insulating layer, wherein the insulating layer electrically isolates the first electrically conductive layer from the second electrically conductive layer. 2. The insertion apparatus of claim 1, further comprising a further insulating layer at least partially surrounding the second electrically conductive layer. 3. The insertion apparatus of claim 1, wherein the first electrically conductive layer, the insulating layer, and the second electrically conductive layer form a structure which has a first side and a second side disposed opposite to the first side with respect to the lumen, and wherein the first side is longer than the second side thereby forming a sharp pointed end via the first side at a distal-most portion of the needle. 4. The insertion apparatus of claim 1, wherein the first electrically conductive layer, the insulating layer, and the second electrically conductive layer form a structure that is beveled to form a sharp pointed end at a distal-most portion of the needle. 5. The insertion apparatus of claim 1, wherein the first electrically conductive layer, the insulating layer, and the second electrically conductive layer form a shaft of the needle. 6. The insertion apparatus of claim 5, further comprising a hub, wherein the first electrically conductive layer, the insulating layer, and the second electrically conductive layer form a structure that extends distally from the hub. 7. The insertion apparatus of claim 6, further comprising: a barrel connected to the hub; and a plunger configured to be inserted into the barrel. 8. The insertion apparatus of claim 1, wherein the first electrically conductive layer is configured to obtain a first electrical signal, and the second electrically conductive layer is configured to obtain a second electrical signal, and further comprising at least one communication device configured transmit information related to the first and second electrical signals. 9. The insertion apparatus of claim 8, wherein the at least one communication device is embedded in one of (i) a hub of the needle, or (ii) a barrel of the needle. 10. The insertion apparatus of claim 1, wherein the first electrically conductive layer is configured to obtain a first electrical signal, and the second electrically conductive layer is configured to obtain a second electrical signal, further comprising a hardware processing arrangement configured to: receive information related to the first and second electrical signals; determine an impedance based on the information; and determine a tissue type based on the impedance. 11. The insertion apparatus of claim 10, further comprising at least one audible arrangement configured to emit a sound based on the determined tissue type. 12. The insertion apparatus of claim 10, wherein the processing arrangement is embedded in one of (i) a hub of the needle or (ii) a barrel of the needle. 13. The insertion apparatus of claim 1, wherein the lumen is configured to at least one of (i) have a pharmacological agent injected therethrough, or (ii) have a biopsy obtained therethrough. 14. The insertion apparatus of claim 10, wherein, upon the determination of the tissue type of a specific tissue that is of interest, at least one current is provided to at least one of the first electrically conductive layer or the second electrically conductive layer so as to generate an energy field detectable by signals detectors which transmit location information at least one portion of the insertion apparatus to the computer hardware arrangement. 15. The insertion apparatus of claim 14, wherein the signal detectors include at least two antennas. 16. The insertion apparatus of claim 14, wherein the computer hardware arrangement is further configured to determine a three-dimensional location of the at least one portion of the insertion apparatus at or in a body based on the location information. 17. The insertion apparatus of claim 14, wherein the computer hardware arrangement is further configured to generate an image on a display of the at least one portion of the insertion apparatus at or in a body in a three-dimensional space based on the location information. 18. An insertion apparatus, comprising: a hub; and a shaft extending from the hub and surrounding a lumen, wherein the shaft includes an outer surface having at least one electrode formed thereon or therein, and wherein the at least one electrode extends for more than half of an external circumference of the shaft. 19. The insertion apparatus of claim 18, further comprising: a barrel connected to the hub; and a plunger configured to be inserted into the barrel. 20. A method for determining information regarding at least one tissue of a subject or an orifice of the at least one tissue using an insertion arrangement, comprising: introducing the insertion arrangement into at least one target site of the subject to reach the at least one tissue; transmitting an electrical signal using a first electrically conductive layer that at least partially surrounds a lumen of the insertion arrangement; receiving the electrical signal using a second electrically conductive layer that at least partially surrounds the first electrically conductive layer; and determining an impedance based on the electrical signal, thereby determining the information regarding the at least one tissue or the orifice of the at least one tissue of the subject. 21. The method of claim 20, further comprising isolating the first electrically conductive layer from the second electrically conductive layer using at least one insulating layer. 22. The method of claim 20, further comprising at least one of (i) administering a pharmacological agent to the subject through the lumen, or (ii) obtaining a biopsy sample from the subject through the lumen. 23. The method of claim 20, wherein the impedance value is the magnitude of the impedance. 24. The method of claim 20, wherein the at least one tissue is muscle or fat. 25. The method of claim 20, wherein the orifice contains blood or synovial fluid. 26. The method of claim 20, further comprising determining whether a particular type or an orifice of at least one tissue has been reached based on the impedance. 27. The method of claim 26, further comprising, based on the determination of whether the type or the orifice of the at least one tissue has been reached, providing at least one current to at least one of the first electrically conductive layer or the second electrically conductive layer so as to generate an energy field detectable by signals detectors which transmit location information at least one portion of the insertion apparatus to a computer hardware arrangement. 28. The method of claim 27, further comprising determining a three-dimensional location of the at least one portion of the insertion apparatus at or in a body based on the location information. 29. The method of claim 27, further comprising generating an image on a display of the at least one portion of the insertion apparatus at or in a body in a three-dimensional space based on the location information.
1,600
340,142
16,801,135
2,855
A sensor arrangement for measuring liquid height in a tank can include a housing, a transducer, and a couplant. The housing can have an interior and an aperture, the aperture placing the interior of the housing in communication with the environment external to the housing. The transducer can be seated within the aperture. The couplant can be mechanically connected to the transducer and can have a compressible couplant body. The couplant body can extend between the transducer and the external environment for transmitting an acoustic pulse from the transducer to a tank bottom for measuring height of a liquid overlaying the transducer.
1. A sensor arrangement for measuring liquid height in a tank, comprising: a housing having an interior and an aperture, the aperture placing the housing interior in communication with the environment external to the housing; a transducer seated within the aperture; and a couplant in mechanically connected to the transducer, the couplant including a compressible couplant body extending between the transducer and the external environment to transmit an acoustic pulse from the transducer to a tank bottom for measuring height of a liquid overlaying the transducer. 2. The sensor arrangement of claim 1, wherein the couplant body extends from the transducer to a location in the external environment beyond an external surface of the housing. 3. The sensor arrangement of claim 1, wherein an external surface of the couplant body opposite the transducer is tacky. 4. The sensor arrangement of claim 1, wherein couplant body includes a material with hardness that is between about 20 Shore OO and about 40 Shore OO. 5. The sensor arrangement of claim 1, wherein the housing defines a magnet seat offset from the aperture, and further comprising a magnet captive in the magnet seat. 6. The sensor arrangement of claim 7, wherein the magnet has an attractive force that exceeds a compressive strength of the couplant body. 7. The sensor arrangement of claim 1, wherein the aperture defines a transducer lip adjacent the housing interior and a couplant lip disposed between the transducer lip and external environment, the couplant lip extending about the transducer lip. 8. The sensor arrangement of claim 7, wherein the couplant body is sealably seated about the coupling lip and overlays the transducer, wherein the transducer has a center and a periphery extending about the center, wherein the periphery begin supported by the transducer lip and the center being free to vibrate relative to the housing, wherein the transducer lip comprises a plurality of lip segments circumferentially arranged about the aperture. 9. The sensor arrangement as recited in claim 1, further comprising a controller disposed within the housing and operatively connected to the transducer. 10. The sensor arrangement as recited in claim 9, further comprising one of more leads disposed within the aperture and connecting the transducer with the controller. 11. The sensor arrangement as recited in claim 9, further comprising a coin cell battery disposed within the housing interior and connected to the controller. 12. The sensor arrangement as recited in claim 9, further comprising a wireless module disposed within the housing and operatively connected to the controller for communication with an external display module. 13. The sensor arrangement as recited in claim 9, further comprising a display module remote from the housing and in wireless communication with the controller. 14. The sensor arrangement as recited in claim 9, wherein the controller is in communication with a non-transitory machine-readable memory with instructions recorded thereon that cause the controller to: generate an acoustic pulse with the transducer; receive a reflected acoustic pulse with the transducer; and provide an advertisement packet to a display module wirelessly connected to the controller indicative of a time interval between generation of the acoustic pulse and receipt of the reflected acoustic pulse. 15. The sensor arrangement as recited in claim 1, further comprising at least one elastomeric foot with a slot, the slot being configured to receive a foot ring for a liquefied propane gas (LPG) tank foot ring. 16. A sensor system, comprising: a sensor arrangement as recited in claim 1; a controller disposed within the housing and operatively connected to the transducer; a wireless module disposed within the housing and connected to the controller for communication with an external display module; and a display module remote from the housing and in wireless communication with the controller, wherein the controller is in communication with a non-transitory machine-readable memory with instructions recorded thereon that cause the controller to: generate an acoustic pulse with the transducer; receive a reflected acoustic pulse with the transducer; and provide an advertisement packet to a display module indicative of a time interval between generation of the acoustic pulse and receipt of the reflected acoustic pulse. 17. A method of determining height of liquid overlaying a transducer, comprising: acoustically coupling a transducer to a tank bottom; generating an acoustic pulse with a transducer; communicating the acoustic pulse into liquid overlaying the tank bottom; reflecting the acoustic pulse from a surface of the liquid overlaying the tank bottom; receiving the reflected acoustic pulse at the transducer; calculating a time interval between generating the acoustic pulse and receiving the reflected acoustic pulse; and determining height of the liquid overlaying the tank bottom based on the calculated time interval. 18. The method as recited in claim 17, further comprising providing indication of the determined height to a user interface remote from the transducer. 19. The method as recited in claim 17, further comprising: recording acoustic pulses received at the transducer within a predetermined time period as a waveform; and compressing the waveform by (a) identifying one or more peaks in the waveform appearing within the predetermined time period, (b) packaging the peaks in an advertisement package, and (c) wirelessly transmitting the advertisement package to a display module. 20. The method as recited in claim 19, further comprising converting the one or more peaks in the waveform into the height of liquid at the display module.
A sensor arrangement for measuring liquid height in a tank can include a housing, a transducer, and a couplant. The housing can have an interior and an aperture, the aperture placing the interior of the housing in communication with the environment external to the housing. The transducer can be seated within the aperture. The couplant can be mechanically connected to the transducer and can have a compressible couplant body. The couplant body can extend between the transducer and the external environment for transmitting an acoustic pulse from the transducer to a tank bottom for measuring height of a liquid overlaying the transducer.1. A sensor arrangement for measuring liquid height in a tank, comprising: a housing having an interior and an aperture, the aperture placing the housing interior in communication with the environment external to the housing; a transducer seated within the aperture; and a couplant in mechanically connected to the transducer, the couplant including a compressible couplant body extending between the transducer and the external environment to transmit an acoustic pulse from the transducer to a tank bottom for measuring height of a liquid overlaying the transducer. 2. The sensor arrangement of claim 1, wherein the couplant body extends from the transducer to a location in the external environment beyond an external surface of the housing. 3. The sensor arrangement of claim 1, wherein an external surface of the couplant body opposite the transducer is tacky. 4. The sensor arrangement of claim 1, wherein couplant body includes a material with hardness that is between about 20 Shore OO and about 40 Shore OO. 5. The sensor arrangement of claim 1, wherein the housing defines a magnet seat offset from the aperture, and further comprising a magnet captive in the magnet seat. 6. The sensor arrangement of claim 7, wherein the magnet has an attractive force that exceeds a compressive strength of the couplant body. 7. The sensor arrangement of claim 1, wherein the aperture defines a transducer lip adjacent the housing interior and a couplant lip disposed between the transducer lip and external environment, the couplant lip extending about the transducer lip. 8. The sensor arrangement of claim 7, wherein the couplant body is sealably seated about the coupling lip and overlays the transducer, wherein the transducer has a center and a periphery extending about the center, wherein the periphery begin supported by the transducer lip and the center being free to vibrate relative to the housing, wherein the transducer lip comprises a plurality of lip segments circumferentially arranged about the aperture. 9. The sensor arrangement as recited in claim 1, further comprising a controller disposed within the housing and operatively connected to the transducer. 10. The sensor arrangement as recited in claim 9, further comprising one of more leads disposed within the aperture and connecting the transducer with the controller. 11. The sensor arrangement as recited in claim 9, further comprising a coin cell battery disposed within the housing interior and connected to the controller. 12. The sensor arrangement as recited in claim 9, further comprising a wireless module disposed within the housing and operatively connected to the controller for communication with an external display module. 13. The sensor arrangement as recited in claim 9, further comprising a display module remote from the housing and in wireless communication with the controller. 14. The sensor arrangement as recited in claim 9, wherein the controller is in communication with a non-transitory machine-readable memory with instructions recorded thereon that cause the controller to: generate an acoustic pulse with the transducer; receive a reflected acoustic pulse with the transducer; and provide an advertisement packet to a display module wirelessly connected to the controller indicative of a time interval between generation of the acoustic pulse and receipt of the reflected acoustic pulse. 15. The sensor arrangement as recited in claim 1, further comprising at least one elastomeric foot with a slot, the slot being configured to receive a foot ring for a liquefied propane gas (LPG) tank foot ring. 16. A sensor system, comprising: a sensor arrangement as recited in claim 1; a controller disposed within the housing and operatively connected to the transducer; a wireless module disposed within the housing and connected to the controller for communication with an external display module; and a display module remote from the housing and in wireless communication with the controller, wherein the controller is in communication with a non-transitory machine-readable memory with instructions recorded thereon that cause the controller to: generate an acoustic pulse with the transducer; receive a reflected acoustic pulse with the transducer; and provide an advertisement packet to a display module indicative of a time interval between generation of the acoustic pulse and receipt of the reflected acoustic pulse. 17. A method of determining height of liquid overlaying a transducer, comprising: acoustically coupling a transducer to a tank bottom; generating an acoustic pulse with a transducer; communicating the acoustic pulse into liquid overlaying the tank bottom; reflecting the acoustic pulse from a surface of the liquid overlaying the tank bottom; receiving the reflected acoustic pulse at the transducer; calculating a time interval between generating the acoustic pulse and receiving the reflected acoustic pulse; and determining height of the liquid overlaying the tank bottom based on the calculated time interval. 18. The method as recited in claim 17, further comprising providing indication of the determined height to a user interface remote from the transducer. 19. The method as recited in claim 17, further comprising: recording acoustic pulses received at the transducer within a predetermined time period as a waveform; and compressing the waveform by (a) identifying one or more peaks in the waveform appearing within the predetermined time period, (b) packaging the peaks in an advertisement package, and (c) wirelessly transmitting the advertisement package to a display module. 20. The method as recited in claim 19, further comprising converting the one or more peaks in the waveform into the height of liquid at the display module.
2,800
340,143
16,801,141
3,668
The invention enables traffic controller to instruct autonomous vehicles in the event of emergencies or congestion. A vehicular external communication and control system includes a Traffic Control Module (TCM) based in a traffic control device such as a smart traffic light or and emergency services vehicle. The invention also includes a Traffic Control Electronic Control Unit (TCECU) installed in a vehicle that is communicatively linked to a TCM and to the vehicle computer bus. The TCM broadcasts to all TCECU-equipped vehicles within range. The TCECU-equipped vehicle provides status data to the traffic control device and the traffic control device issues instructions to the vehicle.
1. A distributed traffic information and control system comprising: a traffic control module that interoperates with traffic control devices such as traffic lights, smart lanes, traffic routing systems, and/or emergency vehicles and which includes: a traffic control interface unit that is communicatively linked to one or more traffic control devices, a vehicle communication interface that communicates with one or more vehicles, a processor for operation of the traffic control module, and a memory that is encoded with instructions for instructing the processor to communicate with traffic control devices and with vehicles. a vehicle control unit that includes: a processor for operation of the vehicle control unit, a memory that is encoded with instructions for instructing the processor to communicate with vehicles and with traffic control devices, a vehicle communication unit that communicates with computer systems of the vehicle, receives vehicle operating information therefrom, and sends vehicle operating information thereto, and an external communication unit that is communicatively linked to one or more traffic control modules. 2. The system of claim 1 where a vehicle modifies its speed, route, or other behavior in response to an instruction from a traffic control device. 3. The system of claim 1 where a traffic control device delivers general information to a plurality of vehicles within its operational control. 4. The system of claim 1 where a vehicle validate the credentials received from a traffic control device. 5. The system of claim 2 where a traffic control device coordinates the behaviors of one or more vehicles to optimize the flow of traffic through a specific area. 6. The system of claim 2 where a vehicle receives navigational instructions from a traffic control system. 7. The system of claim 4 where a vehicle validates the credentials of a traffic control device by referring to a local database. 8. The system of claim 4 where a vehicle validates the credentials of a traffic control device by referring to a remote database. 9. The system of claim 4 where a vehicle validates the credentials of a traffic control device by referring to a distributed-ledger system. 10. A method for controlling a plurality of vehicles from a traffic control device, comprising: A vehicle communicating its operating information to a traffic control device, A traffic control device receiving vehicle operating information, A traffic control device issuing operating instructions to a vehicle, and A vehicle modifying its operational state based on received instructions 11. The method of claim 10 wherein a traffic control device provides authentication information to a vehicle for the purpose of the vehicle enumerating permissions to be granted to said traffic control device, comprising: A traffic control device sending authentication information to a vehicle A vehicle validating authentication information sent from said traffic control device A vehicle determining permissions and authorities of said traffic control device 12. Method of claim 11 wherein a vehicle communicating its operating information to a traffic control device is carried out in accordance with the permissions granted to the traffic control device according to its authentication information. 13. Method of claim 11 wherein a vehicle modifying its operational state is carried out in accordance with the permissions granted to the traffic control device according to its authentication information.
The invention enables traffic controller to instruct autonomous vehicles in the event of emergencies or congestion. A vehicular external communication and control system includes a Traffic Control Module (TCM) based in a traffic control device such as a smart traffic light or and emergency services vehicle. The invention also includes a Traffic Control Electronic Control Unit (TCECU) installed in a vehicle that is communicatively linked to a TCM and to the vehicle computer bus. The TCM broadcasts to all TCECU-equipped vehicles within range. The TCECU-equipped vehicle provides status data to the traffic control device and the traffic control device issues instructions to the vehicle.1. A distributed traffic information and control system comprising: a traffic control module that interoperates with traffic control devices such as traffic lights, smart lanes, traffic routing systems, and/or emergency vehicles and which includes: a traffic control interface unit that is communicatively linked to one or more traffic control devices, a vehicle communication interface that communicates with one or more vehicles, a processor for operation of the traffic control module, and a memory that is encoded with instructions for instructing the processor to communicate with traffic control devices and with vehicles. a vehicle control unit that includes: a processor for operation of the vehicle control unit, a memory that is encoded with instructions for instructing the processor to communicate with vehicles and with traffic control devices, a vehicle communication unit that communicates with computer systems of the vehicle, receives vehicle operating information therefrom, and sends vehicle operating information thereto, and an external communication unit that is communicatively linked to one or more traffic control modules. 2. The system of claim 1 where a vehicle modifies its speed, route, or other behavior in response to an instruction from a traffic control device. 3. The system of claim 1 where a traffic control device delivers general information to a plurality of vehicles within its operational control. 4. The system of claim 1 where a vehicle validate the credentials received from a traffic control device. 5. The system of claim 2 where a traffic control device coordinates the behaviors of one or more vehicles to optimize the flow of traffic through a specific area. 6. The system of claim 2 where a vehicle receives navigational instructions from a traffic control system. 7. The system of claim 4 where a vehicle validates the credentials of a traffic control device by referring to a local database. 8. The system of claim 4 where a vehicle validates the credentials of a traffic control device by referring to a remote database. 9. The system of claim 4 where a vehicle validates the credentials of a traffic control device by referring to a distributed-ledger system. 10. A method for controlling a plurality of vehicles from a traffic control device, comprising: A vehicle communicating its operating information to a traffic control device, A traffic control device receiving vehicle operating information, A traffic control device issuing operating instructions to a vehicle, and A vehicle modifying its operational state based on received instructions 11. The method of claim 10 wherein a traffic control device provides authentication information to a vehicle for the purpose of the vehicle enumerating permissions to be granted to said traffic control device, comprising: A traffic control device sending authentication information to a vehicle A vehicle validating authentication information sent from said traffic control device A vehicle determining permissions and authorities of said traffic control device 12. Method of claim 11 wherein a vehicle communicating its operating information to a traffic control device is carried out in accordance with the permissions granted to the traffic control device according to its authentication information. 13. Method of claim 11 wherein a vehicle modifying its operational state is carried out in accordance with the permissions granted to the traffic control device according to its authentication information.
3,600
340,144
16,801,129
3,734
A detachable accessory carrier for a bicycle having a seat frame post, the detachable accessory carrier including an extension beam having a proximal end portion and an opposing distal end portion with a longitudinal axis spanning therebetween, also a structure for removable engagement to the seat post wherein the structure is disposed on the proximal end portion, a first base, a first surrounding sidewall having a first open slot with a rotationally engaged second base with a second surrounding sidewall having a second open slot, with a plurality of cantilever flexible tines disposed inside of the first surrounding sidewall to help retain the accessory, wherein the first and second open slots can be rotated to bring the accessory out in sideways movement from the tines.
1. A detachable article accessory carrier for a bicycle having a seat frame post, said detachable accessory carrier comprising: (a) an extension beam having an extension beam proximal end portion and an opposing extension beam distal end portion with a longitudinal axis spanning therebetween; (b) a means for removable engagement to the seat frame post wherein said means is disposed on said extension beam proximal end portion; (c) a first base; (d) a first surrounding sidewall that extends from said first base terminating in a first surrounding sidewall margin, said first surrounding sidewall is about a lengthwise axis defining a first interior with said first base, further said first surrounding sidewall includes a first open slot positioned parallel to said lengthwise axis, said first open slot runs from said first base to said first surrounding sidewall margin thereby exposing said first interior to an external environment from said first base to said first surrounding sidewall margin; (e) a second base; and (f) a second surrounding sidewall that extends from said second base terminating in a second surrounding sidewall margin, said second surrounding sidewall is about said lengthwise axis defining a second interior with said second base, further said second surrounding sidewall includes a second open slot positioned parallel to said lengthwise axis, said second open slot runs from said second base to said second surrounding sidewall margin thereby exposing said second interior to an external environment from said second base to said second surrounding sidewall margin, wherein said first base and said first surrounding sidewall are slidably nested with said second interior such that said first and second bases are in slidable contact with one another, further said second base to said second surrounding sidewall margin has a second length along said lengthwise axis that is less than a first length along said lengthwise axis from said first base to said first surrounding sidewall margin, wherein operationally said second open slot through rotational engagement of said second surrounding sidewall about said first surrounding sidewall can expose a portion of said first open slot or close off a portion of said first open slot to enable a selectably variable slot open area as between said first and second open slots. 2. A detachable accessory carrier according to claim 1 further comprising a cantilever flexible tine having a tine proximal end portion and an opposing tine distal end portion with a tine axis spanning therebetween, said proximal end portion extending from said first interior side of said first surrounding sidewall toward said lengthwise axis on said distal end portion such that said tine axis is arcuate and substantially parallel to said lengthwise axis, wherein operationally said cantilever flexible tine distal end portion contacts the article to actively help retain and hold the article within said first interior wherein said second surrounding sidewall is rotated about said first surrounding sidewall to expand said slot open area to facilitate the article exiting said first interior in a movement perpendicular to said lengthwise axis to allow said cantilever flexible tine distal end portion to release the article. 3. A detachable accessory carrier according to claim 2 further comprising a plurality of said cantilever flexible tines wherein each of said cantilever flexible tines are spaced about said lengthwise axis in an equidistant manner outside of said first open slot, being operational to help balance a circumferential loading upon the article from said cantilever flexible tine distal end portions. 4. A detachable accessory carrier according to claim 3 wherein said tine axes are angled toward one another in a converging manner in going from said tine proximal end portion to said tine distal end portion, such that said plurality of cantilever flexible tines form a frustoconical shape, that is operational to support and retain a multitude of different sized articles and further act to cushion the article from movement of the first surrounding sidewall and said first base via centering the article within said first interior to provide for substantially equidistant cushioning distance as between the article and the first surrounding sidewall. 5. A detachable accessory carrier according to claim 4 wherein each said cantilever flexible tine distal end portion further comprises a saw tooth surface that is angled from said proximal end portion to said distal end portion with each said saw tooth surface contacting the article, to resist movement of the article from the distal end portion to the proximal end portion, to operationally better secure the article from bouncing out into the external environment from said first surrounding sidewall margin from said first surrounding sidewall movement, wherein said first base secures the article from moving through said first interior from said first surrounding sidewall margin to said first base. 6. A detachable accessory carrier according to claim 5 further comprising a rotationally free fastener disposed between said first and second bases, wherein said fastener is positioned at said lengthwise axis, to operationally allow said second base and said second surrounding sidewall to rotate about said first base and said first surrounding sidewall while said first and second bases are rotationally engaged to one another. 7. A detachable accessory carrier according to claim 6 wherein said second surrounding sidewall margin has a stair step configuration such that a minimum stair step axial distance is on a primary side of said second open slot wherein said stair step configuration circumferentially continues to a secondary side of said second open slot while continuously increasing to a maximum stair step axial distance, to operationally accommodate the article in the form of a fishing rod and reel, wherein the reel rests against a single stair step for support with said varying stair steps facilitating multiple reels at different distances from said first base. 8. A detachable accessory carrier according to claim 7 wherein said stair step configuration has an even progression from said minimum stair step axial distance to said maximum axial stair step distance to accommodate a range of multiple reels at different distances from said first base.
A detachable accessory carrier for a bicycle having a seat frame post, the detachable accessory carrier including an extension beam having a proximal end portion and an opposing distal end portion with a longitudinal axis spanning therebetween, also a structure for removable engagement to the seat post wherein the structure is disposed on the proximal end portion, a first base, a first surrounding sidewall having a first open slot with a rotationally engaged second base with a second surrounding sidewall having a second open slot, with a plurality of cantilever flexible tines disposed inside of the first surrounding sidewall to help retain the accessory, wherein the first and second open slots can be rotated to bring the accessory out in sideways movement from the tines.1. A detachable article accessory carrier for a bicycle having a seat frame post, said detachable accessory carrier comprising: (a) an extension beam having an extension beam proximal end portion and an opposing extension beam distal end portion with a longitudinal axis spanning therebetween; (b) a means for removable engagement to the seat frame post wherein said means is disposed on said extension beam proximal end portion; (c) a first base; (d) a first surrounding sidewall that extends from said first base terminating in a first surrounding sidewall margin, said first surrounding sidewall is about a lengthwise axis defining a first interior with said first base, further said first surrounding sidewall includes a first open slot positioned parallel to said lengthwise axis, said first open slot runs from said first base to said first surrounding sidewall margin thereby exposing said first interior to an external environment from said first base to said first surrounding sidewall margin; (e) a second base; and (f) a second surrounding sidewall that extends from said second base terminating in a second surrounding sidewall margin, said second surrounding sidewall is about said lengthwise axis defining a second interior with said second base, further said second surrounding sidewall includes a second open slot positioned parallel to said lengthwise axis, said second open slot runs from said second base to said second surrounding sidewall margin thereby exposing said second interior to an external environment from said second base to said second surrounding sidewall margin, wherein said first base and said first surrounding sidewall are slidably nested with said second interior such that said first and second bases are in slidable contact with one another, further said second base to said second surrounding sidewall margin has a second length along said lengthwise axis that is less than a first length along said lengthwise axis from said first base to said first surrounding sidewall margin, wherein operationally said second open slot through rotational engagement of said second surrounding sidewall about said first surrounding sidewall can expose a portion of said first open slot or close off a portion of said first open slot to enable a selectably variable slot open area as between said first and second open slots. 2. A detachable accessory carrier according to claim 1 further comprising a cantilever flexible tine having a tine proximal end portion and an opposing tine distal end portion with a tine axis spanning therebetween, said proximal end portion extending from said first interior side of said first surrounding sidewall toward said lengthwise axis on said distal end portion such that said tine axis is arcuate and substantially parallel to said lengthwise axis, wherein operationally said cantilever flexible tine distal end portion contacts the article to actively help retain and hold the article within said first interior wherein said second surrounding sidewall is rotated about said first surrounding sidewall to expand said slot open area to facilitate the article exiting said first interior in a movement perpendicular to said lengthwise axis to allow said cantilever flexible tine distal end portion to release the article. 3. A detachable accessory carrier according to claim 2 further comprising a plurality of said cantilever flexible tines wherein each of said cantilever flexible tines are spaced about said lengthwise axis in an equidistant manner outside of said first open slot, being operational to help balance a circumferential loading upon the article from said cantilever flexible tine distal end portions. 4. A detachable accessory carrier according to claim 3 wherein said tine axes are angled toward one another in a converging manner in going from said tine proximal end portion to said tine distal end portion, such that said plurality of cantilever flexible tines form a frustoconical shape, that is operational to support and retain a multitude of different sized articles and further act to cushion the article from movement of the first surrounding sidewall and said first base via centering the article within said first interior to provide for substantially equidistant cushioning distance as between the article and the first surrounding sidewall. 5. A detachable accessory carrier according to claim 4 wherein each said cantilever flexible tine distal end portion further comprises a saw tooth surface that is angled from said proximal end portion to said distal end portion with each said saw tooth surface contacting the article, to resist movement of the article from the distal end portion to the proximal end portion, to operationally better secure the article from bouncing out into the external environment from said first surrounding sidewall margin from said first surrounding sidewall movement, wherein said first base secures the article from moving through said first interior from said first surrounding sidewall margin to said first base. 6. A detachable accessory carrier according to claim 5 further comprising a rotationally free fastener disposed between said first and second bases, wherein said fastener is positioned at said lengthwise axis, to operationally allow said second base and said second surrounding sidewall to rotate about said first base and said first surrounding sidewall while said first and second bases are rotationally engaged to one another. 7. A detachable accessory carrier according to claim 6 wherein said second surrounding sidewall margin has a stair step configuration such that a minimum stair step axial distance is on a primary side of said second open slot wherein said stair step configuration circumferentially continues to a secondary side of said second open slot while continuously increasing to a maximum stair step axial distance, to operationally accommodate the article in the form of a fishing rod and reel, wherein the reel rests against a single stair step for support with said varying stair steps facilitating multiple reels at different distances from said first base. 8. A detachable accessory carrier according to claim 7 wherein said stair step configuration has an even progression from said minimum stair step axial distance to said maximum axial stair step distance to accommodate a range of multiple reels at different distances from said first base.
3,700
340,145
16,801,134
2,422
The invention discloses a solar-powered satellite television receiver for personal use, which includes a body. The body is provided with a rotating cavity. A right side wall of the rotating cavity is provided with a worm wheel cavity. The body is provided with two rotating blocks on the left and right sides symmetrically mounted with a solar power generation board, and the threaded motor drives the threaded shaft to rotate, thereby driving the threaded block to move back and forth, thereby driving the slider. The cleaning cotton is moved back and forth, and at the same time, the pumping motor supplies water to the cleaning cotton through the water pipe, thereby cleaning the solar panel. The present invention periodically cleans the solar power generation board through a cleaning device, which reduces dust. The impact of solar panels has improved the power generation efficiency of solar panels, so it is worth promoting.
1. A solar-powered satellite television receiver for personal use includes a body, which is characterized in that: a rotating cavity is provided in the body, and a worm gear cavity is provided on the right wall of the rotating cavity, and the rotating cavity and the worm gear cavity A debugging device for debugging the angle of the present invention is provided between the two; the fixing block can be installed on the upper side of the rotating cavity, and a main shaft rotatably connected to the bottom wall of the rotating cavity is rotatably connected in the fixing block. A receiver is fixed on the upper side of the main shaft, and a receiver battery for supplying power to the receiver is fixed between the receiver and the main shaft. A first belt wheel and the worm gear are fixed on the lower side of the main shaft. A worm shaft is rotatably connected to the upper and lower side walls of the cavity, and a second pulley corresponding to the first pulley is fixed on the lower side of the worm shaft. A first belt is connected in between, a worm is fixed on the upper side of the worm shaft, a worm shaft is rotatably connected to the front and rear side walls of the worm wheel cavity, and the worm wheel axially extends through the rear side wall of the worm wheel cavity and communicates with the rear side of the body is rotationally connected. A grip is conveniently fixed on the side for controlling the rotation of the worm gear shaft, and a worm gear that is engaged with the worm is fixed on the worm gear shaft; a transmission cavity is provided on the bottom wall of the rotating cavity, and the body is symmetrical with left and right peripherals There are two rotating blocks on which solar power generation boards are installed, and a solar device capable of adjusting the angle according to the rising of the sun and the western setting is provided between the transmission cavity and the rotating block. The rotating cavity is provided with two water storage chambers symmetrically to the left and right, and a cleaning device capable of cleaning the solar panel is provided between the water storage chamber and the sliding chamber. 2. The solar-powered satellite television receiver for private use according to claim 1, wherein the solar device comprises a transmission motor fixedly installed on the bottom wall of the transmission cavity, and the right side of the transmission motor is fixed. There is a controller for controlling the rotation frequency of the rotating block, a motor shaft rotatably connected to the top wall of the transmission cavity is connected to the upper side of the transmission motor, and a pulley shaft is rotatably connected to the upper and lower side walls of the transmission cavity. A third pulley is fixed symmetrically on the left side of the pulley shaft and the motor shaft, a second belt is connected between the two third pulleys, and the right side of the pulley shaft is connected to the motor shaft. A fourth pulley is fixedly fixed to the left and right, and a third belt is connected between the two fourth pulleys. Each of the pulley shafts is fixed with a side wing battery mounted on the rotating block. A motor wire is connected between the side wing battery, the transmission motor and the controller, and a receiver connection line is connected between the right side wing battery and the receiver battery. 3. The solar-powered satellite television receiver for private use according to claim 1, wherein the cleaning device comprises a water pipe fixedly installed on a top wall of each of the water storage chambers, and each of the water pipes and A pumping motor is provided between the bottom wall of the water storage cavity, an opening cavity is provided on the rear side of each of the rotating blocks, and a threaded motor is fixed on the rear side wall of each of the opening cavities. Control wires are connected between the controllers, the front side of each of the threaded motors is dynamically connected with a threaded shaft that is rotationally connected to the front side wall of the opening cavity, and each of the threaded shafts is threaded with a threaded block, each A sliding block that is slidably connected to the sliding cavity is fixed on the thread block. Each of the sliding blocks is fixed with a cleaning cotton for cleaning the solar power generation board, and each of the cleaning cottons passes through the sliding block. A telescopic hose is connected to the water pipe. 4. The solar-powered satellite television receiver for private use according to claim 1, wherein a water inlet is provided on a top wall of each of the water storage chambers. 5. The solar-powered satellite television receiver for private use according to claim 1, characterized in that the worm gear mechanism composed of the worm shaft and the worm has self-locking performance.
The invention discloses a solar-powered satellite television receiver for personal use, which includes a body. The body is provided with a rotating cavity. A right side wall of the rotating cavity is provided with a worm wheel cavity. The body is provided with two rotating blocks on the left and right sides symmetrically mounted with a solar power generation board, and the threaded motor drives the threaded shaft to rotate, thereby driving the threaded block to move back and forth, thereby driving the slider. The cleaning cotton is moved back and forth, and at the same time, the pumping motor supplies water to the cleaning cotton through the water pipe, thereby cleaning the solar panel. The present invention periodically cleans the solar power generation board through a cleaning device, which reduces dust. The impact of solar panels has improved the power generation efficiency of solar panels, so it is worth promoting.1. A solar-powered satellite television receiver for personal use includes a body, which is characterized in that: a rotating cavity is provided in the body, and a worm gear cavity is provided on the right wall of the rotating cavity, and the rotating cavity and the worm gear cavity A debugging device for debugging the angle of the present invention is provided between the two; the fixing block can be installed on the upper side of the rotating cavity, and a main shaft rotatably connected to the bottom wall of the rotating cavity is rotatably connected in the fixing block. A receiver is fixed on the upper side of the main shaft, and a receiver battery for supplying power to the receiver is fixed between the receiver and the main shaft. A first belt wheel and the worm gear are fixed on the lower side of the main shaft. A worm shaft is rotatably connected to the upper and lower side walls of the cavity, and a second pulley corresponding to the first pulley is fixed on the lower side of the worm shaft. A first belt is connected in between, a worm is fixed on the upper side of the worm shaft, a worm shaft is rotatably connected to the front and rear side walls of the worm wheel cavity, and the worm wheel axially extends through the rear side wall of the worm wheel cavity and communicates with the rear side of the body is rotationally connected. A grip is conveniently fixed on the side for controlling the rotation of the worm gear shaft, and a worm gear that is engaged with the worm is fixed on the worm gear shaft; a transmission cavity is provided on the bottom wall of the rotating cavity, and the body is symmetrical with left and right peripherals There are two rotating blocks on which solar power generation boards are installed, and a solar device capable of adjusting the angle according to the rising of the sun and the western setting is provided between the transmission cavity and the rotating block. The rotating cavity is provided with two water storage chambers symmetrically to the left and right, and a cleaning device capable of cleaning the solar panel is provided between the water storage chamber and the sliding chamber. 2. The solar-powered satellite television receiver for private use according to claim 1, wherein the solar device comprises a transmission motor fixedly installed on the bottom wall of the transmission cavity, and the right side of the transmission motor is fixed. There is a controller for controlling the rotation frequency of the rotating block, a motor shaft rotatably connected to the top wall of the transmission cavity is connected to the upper side of the transmission motor, and a pulley shaft is rotatably connected to the upper and lower side walls of the transmission cavity. A third pulley is fixed symmetrically on the left side of the pulley shaft and the motor shaft, a second belt is connected between the two third pulleys, and the right side of the pulley shaft is connected to the motor shaft. A fourth pulley is fixedly fixed to the left and right, and a third belt is connected between the two fourth pulleys. Each of the pulley shafts is fixed with a side wing battery mounted on the rotating block. A motor wire is connected between the side wing battery, the transmission motor and the controller, and a receiver connection line is connected between the right side wing battery and the receiver battery. 3. The solar-powered satellite television receiver for private use according to claim 1, wherein the cleaning device comprises a water pipe fixedly installed on a top wall of each of the water storage chambers, and each of the water pipes and A pumping motor is provided between the bottom wall of the water storage cavity, an opening cavity is provided on the rear side of each of the rotating blocks, and a threaded motor is fixed on the rear side wall of each of the opening cavities. Control wires are connected between the controllers, the front side of each of the threaded motors is dynamically connected with a threaded shaft that is rotationally connected to the front side wall of the opening cavity, and each of the threaded shafts is threaded with a threaded block, each A sliding block that is slidably connected to the sliding cavity is fixed on the thread block. Each of the sliding blocks is fixed with a cleaning cotton for cleaning the solar power generation board, and each of the cleaning cottons passes through the sliding block. A telescopic hose is connected to the water pipe. 4. The solar-powered satellite television receiver for private use according to claim 1, wherein a water inlet is provided on a top wall of each of the water storage chambers. 5. The solar-powered satellite television receiver for private use according to claim 1, characterized in that the worm gear mechanism composed of the worm shaft and the worm has self-locking performance.
2,400
340,146
16,801,144
2,422
Systems, methods and computer software are disclosed for providing a virtual machine for 2G networks; wherein the virtual machine provide a plurality of virtualized network functions (VNFs).
1. A virtualized Hetnet Gateway (HNG) for a 2G network, comprising: a processor; and a memory coupled to the processor, the memory containing instructions which, when executed by the processor, cause the base station to provide a virtual machine for 2G networks; wherein the virtual machine provides a plurality of virtualized network functions (VNFs). 2. The virtualized HNG of claim 1, wherein a virtualized function comprises a Base Station Controller (BSC). 3. The virtualized HNG of claim 1, wherein a virtualized function comprises a Radio Network Controller (RNC). 4. The virtualized HNG of claim 1, wherein a virtualized function comprises a Self-Organizing Network (SON). 5. The virtualized HNG of claim 1, wherein the virtual machine operates with all G networks. 6. The virtualized HNG of claim 1, wherein the HNG throttles down a satellite backhaul link during non-peak hours. 7. The virtualized HNG of claim 4, wherein the SON gathers analytics of the network. 8. The virtualized HNG of claim 4, wherein the HNG provides at least one of handover, paging optimization, RTP localization., traffic concentration, and providing an OAM interface. 9. The virtualized HNG of 4, wherein the HNG provides at least one of SON based OAM, SON based power management, SON based frequency hopping and SON based channel allocation. 10. A method comprising: causing a processor to provide a virtual machine for 2G networks; wherein the virtual machine provide a plurality of virtualized network functions (VNFs). 11. The method of claim 10, wherein a virtualized function comprises a Base Station Controller (BSC). 12. The method of claim 10, wherein a virtualized function comprises a Radio Network Controller (RNC). 13. The method of claim lo, wherein a virtualized function comprises a Self-Organizing Network (SON). 14. The method of claim 10, wherein the virtual machine operates with all G networks. 15. The method of claim 10, wherein the HNG throttles down a satellite backhaul link during non-peak hours. 16. The method of claim 13, wherein the SON gathers analytics of the network. 17. The method of claim 13, wherein the HNG provides at least one of handover, paging optimization, RTP localization., traffic concentration, and providing an OAM interface. 18. The method of 13, wherein the HNG provides at least one of SON based OAM, SON based power management, SON based frequency hopping and SON based channel allocation. 19. A non-transitory computer-readable medium containing instructions which, when executed at a processor, causes the processor to perform steps comprising: providing a virtual machine for 2G networks; wherein the virtual machine provide a plurality of virtualized network functions (VNFs).
Systems, methods and computer software are disclosed for providing a virtual machine for 2G networks; wherein the virtual machine provide a plurality of virtualized network functions (VNFs).1. A virtualized Hetnet Gateway (HNG) for a 2G network, comprising: a processor; and a memory coupled to the processor, the memory containing instructions which, when executed by the processor, cause the base station to provide a virtual machine for 2G networks; wherein the virtual machine provides a plurality of virtualized network functions (VNFs). 2. The virtualized HNG of claim 1, wherein a virtualized function comprises a Base Station Controller (BSC). 3. The virtualized HNG of claim 1, wherein a virtualized function comprises a Radio Network Controller (RNC). 4. The virtualized HNG of claim 1, wherein a virtualized function comprises a Self-Organizing Network (SON). 5. The virtualized HNG of claim 1, wherein the virtual machine operates with all G networks. 6. The virtualized HNG of claim 1, wherein the HNG throttles down a satellite backhaul link during non-peak hours. 7. The virtualized HNG of claim 4, wherein the SON gathers analytics of the network. 8. The virtualized HNG of claim 4, wherein the HNG provides at least one of handover, paging optimization, RTP localization., traffic concentration, and providing an OAM interface. 9. The virtualized HNG of 4, wherein the HNG provides at least one of SON based OAM, SON based power management, SON based frequency hopping and SON based channel allocation. 10. A method comprising: causing a processor to provide a virtual machine for 2G networks; wherein the virtual machine provide a plurality of virtualized network functions (VNFs). 11. The method of claim 10, wherein a virtualized function comprises a Base Station Controller (BSC). 12. The method of claim 10, wherein a virtualized function comprises a Radio Network Controller (RNC). 13. The method of claim lo, wherein a virtualized function comprises a Self-Organizing Network (SON). 14. The method of claim 10, wherein the virtual machine operates with all G networks. 15. The method of claim 10, wherein the HNG throttles down a satellite backhaul link during non-peak hours. 16. The method of claim 13, wherein the SON gathers analytics of the network. 17. The method of claim 13, wherein the HNG provides at least one of handover, paging optimization, RTP localization., traffic concentration, and providing an OAM interface. 18. The method of 13, wherein the HNG provides at least one of SON based OAM, SON based power management, SON based frequency hopping and SON based channel allocation. 19. A non-transitory computer-readable medium containing instructions which, when executed at a processor, causes the processor to perform steps comprising: providing a virtual machine for 2G networks; wherein the virtual machine provide a plurality of virtualized network functions (VNFs).
2,400
340,147
16,801,113
2,894
Gate aligned contacts and methods of forming gate aligned contacts are described. For example, a method of fabricating a semiconductor structure includes forming a plurality of gate structures above an active region formed above a substrate. The gate structures each include a gate dielectric layer, a gate electrode, and sidewall spacers. A plurality of contact plugs is formed, each contact plug formed directly between the sidewall spacers of two adjacent gate structures of the plurality of gate structures. A plurality of contacts is formed, each contact formed directly between the sidewall spacers of two adjacent gate structures of the plurality of gate structures. The plurality of contacts and the plurality of gate structures are formed subsequent to forming the plurality of contact plugs.
1. (canceled) 2. An integrated circuit structure, comprising: a first fin comprising silicon, the first fin having a length along a first direction; a second fin comprising silicon, the second fin having a length along the first direction, and the second fin separated from the first fin by an isolation structure; a first conductive contact structure over the first fin and along a second direction orthogonal to the first direction; a second conductive contact structure over the first fin and along the second direction, the second conductive contact structure adjacent the first conductive contact structure, wherein one or both of the first conductive contact structure or the second conductive contact structure extends over the isolation structure and over the second fin; a first gate structure over the first fin and along the second direction, the first gate structure between the first conductive contact structure and the second conductive contact structure, the first gate structure comprising a gate dielectric layer, a metal gate, and sidewall spacers; a second gate structure over the second fin and aligned with the first gate structure along the second direction, the second gate structure comprising a gate dielectric layer, a metal gate, and sidewall spacers; and a plug between and in contact with the first gate structure and the second gate structure. 3. The integrated circuit structure of claim 2, further comprising: a third gate structure over the first fin and along the second direction, the third gate adjacent to the first conductive contact structure, the third gate structure comprising a gate dielectric layer, a metal gate, and sidewall spacers; a fourth gate structure over the second fin and aligned with the third gate structure along the second direction, the fourth gate structure comprising a gate dielectric layer, a metal gate, and sidewall spacers; and a second plug between and in contact with the third gate structure and the fourth gate structure. 4. The integrated circuit structure of claim 2, wherein the first gate structure further comprises a dielectric cap laterally adjacent to the sidewall spacers of the first gate structure, wherein the dielectric cap of the first gate structure has a top surface substantially co-planar with a top surface of the first conductive contact structure and with a top surface of the second conductive contact structure, wherein the first gate structure further comprises a dielectric cap laterally adjacent to the sidewall spacers of the second gate structure, and wherein the dielectric cap of the second gate structure has a top surface substantially co-planar with the top surface of the dielectric cap of the first gate structure. 5. The integrated circuit structure of claim 4, wherein the dielectric cap of each of the first gate structure and the second gate structure comprises silicon carbide. 6. The integrated circuit structure of claim 4, wherein the dielectric cap of each of the first gate structure and the second gate structure comprises a dielectric material different than a dielectric material of the sidewall spacers of each of the first gate structure and the second gate structure. 7. The integrated circuit structure of claim 2, wherein the gate dielectric layer of each of the first gate structure and the second gate structure comprises a high-K gate dielectric layer. 8. An integrated circuit structure, comprising: a first fin comprising silicon, the first fin having a length along a first direction; a second fin comprising silicon, the second fin having a length along the first direction, and the second fin separated from the first fin by an isolation structure; a first conductive contact structure over the first fin and along a second direction orthogonal to the first direction; a second conductive contact structure over the first fin and along the second direction, the second conductive contact structure adjacent the first conductive contact structure; a third conductive contact structure over the first fin and along the second direction, the third conductive contact structure adjacent the second conductive contact structure, wherein one or more of the first conductive contact structure, the second conductive contact structure, or the third conductive contact structure extends over the isolation structure and over the second fin; a first gate structure over the first fin and along the second direction, the first gate structure between the first conductive contact structure and the second conductive contact structure, the first gate structure comprising a gate dielectric layer, a metal gate, sidewall spacers, and a dielectric cap laterally adjacent to the sidewall spacers, wherein the dielectric cap of the first gate structure has a top surface substantially co-planar with a top surface of the first conductive contact structure and with a top surface of the second conductive contact structure; and a second gate structure over the first fin and along the second direction, the second gate structure between the second conductive contact structure and the third conductive contact structure, the second gate structure comprising a gate dielectric layer, a metal gate, sidewall spacers, and a dielectric cap laterally adjacent to the sidewall spacers, wherein the dielectric cap of the second gate structure has a top surface substantially co-planar with a top surface of the second conductive contact structure and with a top surface of the third conductive contact structure, and wherein the first gate structure and the second gate structure have substantially a same length along the second direction. 9. The integrated circuit structure of claim 8, wherein the dielectric cap of each of the first gate structure and the second gate structure comprises silicon carbide. 10. The integrated circuit structure of claim 8, wherein the dielectric cap of each of the first gate structure and the second gate structure comprises a dielectric material different than a dielectric material of the sidewall spacers of each of the first gate structure and the second gate structure. 11. The integrated circuit structure of claim 8, wherein the gate dielectric layer of each of the first gate structure and the second gate structure comprises a high-K gate dielectric layer. 12. The integrated circuit structure of claim 8, wherein the dielectric cap of the second gate structure has a top surface substantially co-planar with the top surface of the dielectric cap of the first gate structure. 13. A computing device, comprising: a board; and a component coupled to the board, the component including an integrated circuit structure, comprising: a first fin comprising silicon, the first fin having a length along a first direction; a second fin comprising silicon, the second fin having a length along the first direction, and the second fin separated from the first fin by an isolation structure; a first conductive contact structure over the first fin and along a second direction orthogonal to the first direction; a second conductive contact structure over the first fin and along the second direction, the second conductive contact structure adjacent the first conductive contact structure, wherein one or both of the first conductive contact structure or the second conductive contact structure extends over the isolation structure and over the second fin; a first gate structure over the first fin and along the second direction, the first gate structure between the first conductive contact structure and the second conductive contact structure, the first gate structure comprising a gate dielectric layer, a metal gate, and sidewall spacers; a second gate structure over the second fin and aligned with the first gate structure along the second direction, the second gate structure comprising a gate dielectric layer, a metal gate, and sidewall spacers; and a plug between and in contact with the first gate structure and the second gate structure. 14. The computing device of claim 13, further comprising: a memory coupled to the board. 15. The computing device of claim 13, further comprising: a communication chip coupled to the board. 16. The computing device of claim 13, further comprising: a camera coupled to the board. 17. The computing device of claim 13, further comprising: a battery coupled to the board. 18. The computing device of claim 13, further comprising: an antenna coupled to the board. 19. The computing device of claim 13, wherein the component is a packaged integrated circuit die. 20. The computing device of claim 13, wherein the component is selected from the group consisting of a processor, a communications chip, and a digital signal processor. 21. The computing device of claim 13, wherein the computing device is selected from the group consisting of a mobile phone, a laptop, a desk top computer, a server, and a set-top box.
Gate aligned contacts and methods of forming gate aligned contacts are described. For example, a method of fabricating a semiconductor structure includes forming a plurality of gate structures above an active region formed above a substrate. The gate structures each include a gate dielectric layer, a gate electrode, and sidewall spacers. A plurality of contact plugs is formed, each contact plug formed directly between the sidewall spacers of two adjacent gate structures of the plurality of gate structures. A plurality of contacts is formed, each contact formed directly between the sidewall spacers of two adjacent gate structures of the plurality of gate structures. The plurality of contacts and the plurality of gate structures are formed subsequent to forming the plurality of contact plugs.1. (canceled) 2. An integrated circuit structure, comprising: a first fin comprising silicon, the first fin having a length along a first direction; a second fin comprising silicon, the second fin having a length along the first direction, and the second fin separated from the first fin by an isolation structure; a first conductive contact structure over the first fin and along a second direction orthogonal to the first direction; a second conductive contact structure over the first fin and along the second direction, the second conductive contact structure adjacent the first conductive contact structure, wherein one or both of the first conductive contact structure or the second conductive contact structure extends over the isolation structure and over the second fin; a first gate structure over the first fin and along the second direction, the first gate structure between the first conductive contact structure and the second conductive contact structure, the first gate structure comprising a gate dielectric layer, a metal gate, and sidewall spacers; a second gate structure over the second fin and aligned with the first gate structure along the second direction, the second gate structure comprising a gate dielectric layer, a metal gate, and sidewall spacers; and a plug between and in contact with the first gate structure and the second gate structure. 3. The integrated circuit structure of claim 2, further comprising: a third gate structure over the first fin and along the second direction, the third gate adjacent to the first conductive contact structure, the third gate structure comprising a gate dielectric layer, a metal gate, and sidewall spacers; a fourth gate structure over the second fin and aligned with the third gate structure along the second direction, the fourth gate structure comprising a gate dielectric layer, a metal gate, and sidewall spacers; and a second plug between and in contact with the third gate structure and the fourth gate structure. 4. The integrated circuit structure of claim 2, wherein the first gate structure further comprises a dielectric cap laterally adjacent to the sidewall spacers of the first gate structure, wherein the dielectric cap of the first gate structure has a top surface substantially co-planar with a top surface of the first conductive contact structure and with a top surface of the second conductive contact structure, wherein the first gate structure further comprises a dielectric cap laterally adjacent to the sidewall spacers of the second gate structure, and wherein the dielectric cap of the second gate structure has a top surface substantially co-planar with the top surface of the dielectric cap of the first gate structure. 5. The integrated circuit structure of claim 4, wherein the dielectric cap of each of the first gate structure and the second gate structure comprises silicon carbide. 6. The integrated circuit structure of claim 4, wherein the dielectric cap of each of the first gate structure and the second gate structure comprises a dielectric material different than a dielectric material of the sidewall spacers of each of the first gate structure and the second gate structure. 7. The integrated circuit structure of claim 2, wherein the gate dielectric layer of each of the first gate structure and the second gate structure comprises a high-K gate dielectric layer. 8. An integrated circuit structure, comprising: a first fin comprising silicon, the first fin having a length along a first direction; a second fin comprising silicon, the second fin having a length along the first direction, and the second fin separated from the first fin by an isolation structure; a first conductive contact structure over the first fin and along a second direction orthogonal to the first direction; a second conductive contact structure over the first fin and along the second direction, the second conductive contact structure adjacent the first conductive contact structure; a third conductive contact structure over the first fin and along the second direction, the third conductive contact structure adjacent the second conductive contact structure, wherein one or more of the first conductive contact structure, the second conductive contact structure, or the third conductive contact structure extends over the isolation structure and over the second fin; a first gate structure over the first fin and along the second direction, the first gate structure between the first conductive contact structure and the second conductive contact structure, the first gate structure comprising a gate dielectric layer, a metal gate, sidewall spacers, and a dielectric cap laterally adjacent to the sidewall spacers, wherein the dielectric cap of the first gate structure has a top surface substantially co-planar with a top surface of the first conductive contact structure and with a top surface of the second conductive contact structure; and a second gate structure over the first fin and along the second direction, the second gate structure between the second conductive contact structure and the third conductive contact structure, the second gate structure comprising a gate dielectric layer, a metal gate, sidewall spacers, and a dielectric cap laterally adjacent to the sidewall spacers, wherein the dielectric cap of the second gate structure has a top surface substantially co-planar with a top surface of the second conductive contact structure and with a top surface of the third conductive contact structure, and wherein the first gate structure and the second gate structure have substantially a same length along the second direction. 9. The integrated circuit structure of claim 8, wherein the dielectric cap of each of the first gate structure and the second gate structure comprises silicon carbide. 10. The integrated circuit structure of claim 8, wherein the dielectric cap of each of the first gate structure and the second gate structure comprises a dielectric material different than a dielectric material of the sidewall spacers of each of the first gate structure and the second gate structure. 11. The integrated circuit structure of claim 8, wherein the gate dielectric layer of each of the first gate structure and the second gate structure comprises a high-K gate dielectric layer. 12. The integrated circuit structure of claim 8, wherein the dielectric cap of the second gate structure has a top surface substantially co-planar with the top surface of the dielectric cap of the first gate structure. 13. A computing device, comprising: a board; and a component coupled to the board, the component including an integrated circuit structure, comprising: a first fin comprising silicon, the first fin having a length along a first direction; a second fin comprising silicon, the second fin having a length along the first direction, and the second fin separated from the first fin by an isolation structure; a first conductive contact structure over the first fin and along a second direction orthogonal to the first direction; a second conductive contact structure over the first fin and along the second direction, the second conductive contact structure adjacent the first conductive contact structure, wherein one or both of the first conductive contact structure or the second conductive contact structure extends over the isolation structure and over the second fin; a first gate structure over the first fin and along the second direction, the first gate structure between the first conductive contact structure and the second conductive contact structure, the first gate structure comprising a gate dielectric layer, a metal gate, and sidewall spacers; a second gate structure over the second fin and aligned with the first gate structure along the second direction, the second gate structure comprising a gate dielectric layer, a metal gate, and sidewall spacers; and a plug between and in contact with the first gate structure and the second gate structure. 14. The computing device of claim 13, further comprising: a memory coupled to the board. 15. The computing device of claim 13, further comprising: a communication chip coupled to the board. 16. The computing device of claim 13, further comprising: a camera coupled to the board. 17. The computing device of claim 13, further comprising: a battery coupled to the board. 18. The computing device of claim 13, further comprising: an antenna coupled to the board. 19. The computing device of claim 13, wherein the component is a packaged integrated circuit die. 20. The computing device of claim 13, wherein the component is selected from the group consisting of a processor, a communications chip, and a digital signal processor. 21. The computing device of claim 13, wherein the computing device is selected from the group consisting of a mobile phone, a laptop, a desk top computer, a server, and a set-top box.
2,800
340,148
16,801,099
2,894
An efficient state-machine-based pattern matching technique processes tokens in an input queue and identifies patterns in the sequence of tokens that match one or more predetermined input patterns without backtracking. Tokens can include data or no data and a time component. The tokens can be a stream of data generated by a sensor, which transforms a physical property into a digital quantity. The pattern matching technique processes the input queue in a single direction, and does not examine any previously examined token. In an implementation, specific patterns to be matched are specified using a state machine, where the state machine is specified in a state table and operates using a state stack.
1. A system comprising: an input queue comprising first memory locations in a computer memory, wherein the input queue stores in the first memory locations a sequence of tokens to be processed where each token in the queue comprises data or no data and a time stamp indicating a time when the token entered the input queue, each token comprising data carries data to be analyzed and a time stamp, each token comprising no data represents a lapse event and carries no data to be analyzed and a time stamp, and the tokens are received by the input queue over a network; a driver component, coupled to the input queue, wherein the driver component processes the tokens in the input queue without backtracking and identifies patterns in the sequence of tokens that match one or more predetermined input patterns, and upon identifying a matched predetermined input pattern, generates an outgoing event output; an output queue, coupled to the driver component, comprising second memory locations in the computer memory, wherein the output queue stores in the second memory locations a sequence of the outgoing events generated by the driver component; a state table component, coupled to the driver component, wherein the state table component stores the predetermined input patterns in a state table format comprising rows, and each row represents a state of a plurality of states described by the state table component; and a state stack component, coupled to the driver component, comprising third memory locations in the computer memory, wherein the state stack component stores in the third memory locations a sequence of frames, and a frame comprises at least one of a translation state number, a symbol, or a deadline, and the translation state number corresponds to a state described by the state table component. 2. The system of claim 1 wherein the tokens are received at the input queue are generated by a hardware sensor that transforms a physical property into a digital quantity. 3. The system of claim 1 wherein an operation of the driver component comprises: examining a state referred to on a top frame of the state stack, examining a next input token in the input queue and determining its category based on the state stack, and performing an action indicated by the state table for a token of a category as indicated by the state table. 4. The system of claim 1 wherein the input queue stores the tokens in an ordered list based on a time received by the input queue, and a first direction in the queue is a time order from an earliest received token to a latest received token, and the driver component processes the tokens by examining the input queue in the first direction, and does not examine any previously examined token. 5. The system of claim 1 wherein the input queue stores the tokens in a list in a time order as received by the input queue, a first direction in the queue is a time order from an earliest received token to a latest received token, a second direction in the queue is a time order from the latest received token to the earliest received token, and the second direction is opposite to the first direction, and the driver component processes the tokens by examining the input queue in either the first direction or the second direction, and not both first and second directions. 6. The system of claim 1 wherein the driver reads each token of the input queue only once, and does not retain a read token in a buffer to read again later. 7. The system of claim 1 wherein a predetermined input pattern to be matched can have a number of tokens of indefinite length. 8. The system of claim 1 wherein the state table component specifies a state machine and comprises a plurality of rows, each row providing a translation state of the state machine comprising: a set of actions, which maps an input token category value or an input break category value to an action to be taken upon receiving an input token of that value, a set of transitions, which maps a derivative symbol type to a state to which the driver should change upon synthesizing a derivative symbol of that type, and a time out, which indicates an interval of time that the state machine will be allowed to remain in a particular state. 9. The system of claim 1 wherein the translation state number is a reference to a row in the state table, the symbol is a token or intermediate symbol derived from input tokens or other symbols, or a combination, and the deadline is a future moment in time by which the driver will pop the frame off the stack. 10. The system of claim 1 wherein the driver component and state table component are embodied in a programmable gate array. 11. The system of claim 1 wherein the driver component and state table component are embodied using a computer. 12. The system of claim 1 wherein the state table component specifies a state machine, and the driver component changes from a first state in the state machine to a second state of the state machine based on a passage of time where no tokens having stream data are received in the input queue. 13. The system of claim 1 wherein the state table component specifies a state machine, and the driver component changes from a first state in the state machine to a second state of the state machine based on a sequence of tokens having stream data received in the input queue during a first time period, and the driver component changes from a third state in the state machine to a fourth state of the state machine based on a sequence of tokens having stream data not being received in the input queue during a second time period. 14. A system comprising: an input queue comprising first memory locations in a computer memory, wherein the input queue stores in the first memory locations a sequence of tokens to be processed where each token in the queue comprises data or no data and a time stamp indicating a time when the token entered the input queue, each token comprising data carries data to be analyzed and a time stamp, each token comprising no data represents a lapse event and carries no data to be analyzed and a time stamp, and the tokens are received by the input queue over a network; a driver component, coupled to the input queue, wherein the driver component processes the tokens in the input queue and identifies patterns in the sequence of tokens that match one or more predetermined input patterns, and upon identifying a matched predetermined input pattern, generates an outgoing event output; an output queue, coupled to the driver component, comprising second memory locations in the computer memory, wherein the output queue stores in the second memory locations a sequence of the outgoing events generated by the driver component; a state table component, coupled to the driver component, wherein the state table component stores the predetermined input patterns in a state table format comprising rows, and each row represents a state of a plurality of states described by the state table component; and a state stack component, coupled to the driver component, comprising third memory locations in the computer memory, wherein the state stack component stores in the third memory locations a sequence of frames, and a frame comprises at least one of a translation state number, a symbol, or a deadline, and the translation state number corresponds to a state described by the state table component. 15. The system of claim 14 wherein the state table component specifies a state machine, and the driver component changes from a first state in the state machine to a second state of the state machine based on a sequence of tokens having stream data received in the input queue during a first time period. 16. The system of claim 14 wherein the state table component specifies a state machine, and the driver component changes from a first state in the state machine to a second state of the state machine based on a sequence of tokens having stream data not being received in the input queue during a first time period. 17. A method comprising: providing an input queue comprising first memory locations in a computer memory, wherein the input queue stores in the first memory locations a sequence of tokens to be processed and a time stamp associated with each token in the queue indicates a time when the associated token entered the input queue, and the tokens are received by the input queue over a network; providing a driver component, coupled to the input queue, wherein the driver component processes the tokens in the input queue without backtracking and identifies patterns in the sequence of tokens that match one or more predetermined input patterns, and upon identifying a matched predetermined input pattern, generates an outgoing event output; providing an output queue, coupled to the driver component, comprising second memory locations in the computer memory, wherein the output queue stores in the second memory locations a sequence of the outgoing events generated by the driver component; providing a state table component, coupled to the driver component, wherein the state table component stores the predetermined input patterns in a state table format; providing a state stack component, coupled to the driver component, comprising third memory locations in the computer memory, wherein the state stack component stores in the third memory locations a sequence of frames, and a frame comprises at least one of a translation state number, a symbol, or a deadline, and the translation state number corresponds to a state described by the state table component; and generating a state table for the state table component comprising: identifying a set of terminal symbols, wherein each symbol represents a category of input data; identifying a set of nonterminal symbols, wherein each nonterminal symbol represents a pattern of at least one of terminal or nonterminal symbols; identifying a set of grammar rules; identifying a top-level rule; identifying a set of attributes; computing a first set for each identified terminal and nonterminal symbol; computing a follow set for each identified terminal and nonterminal symbol; and generating a starting state from a closure of the top-level rule with each member of the members of a corresponding follow set, wherein the generating the state table comprises: generating a plurality of states reachable from the starting state by recursively generating a closure of each state for which a change-in-state transition exists from the starting state; optimizing the set of states by combination and reduction; and generating action, transition, and time out values for each state; and wherein the set of attributes comprises: each attribute takes a form α:T={A0→λ0, . . . An→λn}, wherein α is a name of the attribute, T is the type of the attribute, A is a nonterminal symbol, and λ is a function which is to be used to compute a value of the attribute for that symbol. 18. A method comprising: providing an input queue comprising first memory locations in a computer memory, wherein the input queue stores in the first memory locations a sequence of tokens to be processed and a time stamp associated with each token in the queue indicates a time when the associated token entered the input queue, and the tokens are received by the input queue over a network; providing a driver component, coupled to the input queue, wherein the driver component processes the tokens in the input queue without backtracking and identifies patterns in the sequence of tokens that match one or more predetermined input patterns, and upon identifying a matched predetermined input pattern, generates an outgoing event output; providing an output queue, coupled to the driver component, comprising second memory locations in the computer memory, wherein the output queue stores in the second memory locations a sequence of the outgoing events generated by the driver component; providing a state table component, coupled to the driver component, wherein the state table component stores the predetermined input patterns in a state table format; providing a state stack component, coupled to the driver component, comprising third memory locations in the computer memory, wherein the state stack component stores in the third memory locations a sequence of frames, and a frame comprises at least one of a translation state number, a symbol, or a deadline, and the translation state number corresponds to a state described by the state table component; and generating a state table for the state table component comprising: identifying a set of terminal symbols, wherein each symbol represents a category of input data; identifying a set of nonterminal symbols, wherein each nonterminal symbol represents a pattern of at least one of terminal or nonterminal symbols; identifying a set of grammar rules; identifying a top-level rule; identifying a set of attributes; computing a first set for each identified terminal and nonterminal symbol; computing a follow set for each identified terminal and nonterminal symbol; and generating a starting state from a closure of the top-level rule with each member of a corresponding follow set, wherein the generating the state table comprises: generating a plurality of states reachable from the starting state by recursively generating a closure of each state for which a change-in-state transition exists from the starting state; optimizing the set of states by combination and reduction; and generating action, transition, and time out values for each state; and wherein the set of grammar rules comprises: each nonempty rule takes the form of A→B0 . . . Bn, where A is a nonterminal symbol and B0 through Bn are each either terminal or nonterminal symbols; and each empty rule takes a form A→τ, where τ is either a finite amount of time, characterized in some useful unit of time, or else is infinity, indicating an unlimited amount of time. 19. A method comprising: providing an input queue comprising first memory locations in a computer memory, wherein the input queue stores in the first memory locations a sequence of tokens to be processed and a time stamp associated with each token in the queue indicates a time when the associated token entered the input queue, and the tokens are received by the input queue over a network; providing a driver component, coupled to the input queue, wherein the driver component processes the tokens in the input queue without backtracking and identifies patterns in the sequence of tokens that match one or more predetermined input patterns, and upon identifying a matched predetermined input pattern, generates an outgoing event output; providing an output queue, coupled to the driver component, comprising second memory locations in the computer memory, wherein the output queue stores in the second memory locations a sequence of the outgoing events generated by the driver component; providing a state table component, coupled to the driver component, wherein the state table component stores the predetermined input patterns in a state table format; providing a state stack component, coupled to the driver component, comprising third memory locations in the computer memory, wherein the state stack component stores in the third memory locations a sequence of frames, and a frame comprises at least one of a translation state number, a symbol, or a deadline, and the translation state number corresponds to a state described by the state table component; and generating a state table for the state table component comprising: identifying a set of terminal symbols, wherein each symbol represents a category of input data; identifying a set of nonterminal symbols, wherein each nonterminal symbol represents a pattern of at least one of terminal or nonterminal symbols; identifying a set of grammar rules; identifying a top-level rule; identifying a set of attributes; computing a first set for each identified terminal and nonterminal symbol; computing a follow set for each identified terminal and nonterminal symbol; and generating a starting state from a closure of the top-level rule with each member of a corresponding follow set, wherein the set of grammar rules comprises: each nonempty rule takes the form of A→B0 . . . Bn, where A is a nonterminal symbol and B0 through Bn are each either terminal or nonterminal symbols; and each empty rule takes a form A→τ, where τ is either a finite amount of time, characterized in some useful unit of time, or else is infinity, indicating an unlimited amount of time. 20. A method comprising: providing an input queue comprising first memory locations in a computer memory, wherein the input queue stores in the first memory locations a sequence of tokens to be processed and a time stamp associated with each token in the queue indicates a time when the associated token entered the input queue, and the tokens are received by the input queue over a network; providing a driver component, coupled to the input queue, wherein the driver component processes the tokens in the input queue without backtracking and identifies patterns in the sequence of tokens that match one or more predetermined input patterns, and upon identifying a matched predetermined input pattern, generates an outgoing event output; providing an output queue, coupled to the driver component, comprising second memory locations in the computer memory, wherein the output queue stores in the second memory locations a sequence of the outgoing events generated by the driver component; providing a state table component, coupled to the driver component, wherein the state table component stores the predetermined input patterns in a state table format; providing a state stack component, coupled to the driver component, comprising third memory locations in the computer memory, wherein the state stack component stores in the third memory locations a sequence of frames, and a frame comprises at least one of a translation state number, a symbol, or a deadline, and the translation state number corresponds to a state described by the state table component; and generating a state table for the state table component comprising: identifying a set of terminal symbols, wherein each symbol represents a category of input data; identifying a set of nonterminal symbols, wherein each nonterminal symbol represents a pattern of at least one of terminal or nonterminal symbols; identifying a set of grammar rules; identifying a top-level rule; identifying a set of attributes; computing a first set for each identified terminal and nonterminal symbol; computing a follow set for each identified terminal and nonterminal symbol; and generating a starting state from a closure of the top-level rule with each member of a corresponding follow set, wherein the set of attributes comprises: each attribute takes a form α:T={A0→λ0 . . . An→λn}, wherein α is a name of the attribute, T is the type of the attribute, A is a nonterminal symbol, and λ is a function which is to be used to compute a value of the attribute for that symbol. 21. The method of claim 17 wherein a top-level rule has a form comprising Ω→B, where B is either a terminal or nonterminal symbol. 22. The method of claim 18 wherein the set of attributes comprises: each attribute takes a form α:T={A0→λ0 . . . An→λn}, wherein α is a name of the attribute, T is the type of the attribute, A is a nonterminal symbol, and λ is a function which is to be used to compute a value of the attribute for that symbol. 23. The method of claim 19 wherein the set of attributes comprises: each attribute takes a form α:T={A0→λ0 . . . An→λn}, wherein α is a name of the attribute, T is the type of the attribute, A is a nonterminal symbol, and λ is a function which is to be used to compute a value of the attribute for that symbol. 24. The system of claim 1 wherein upon the occurrence of a lapse event, the driver component allows a current state to expire.
An efficient state-machine-based pattern matching technique processes tokens in an input queue and identifies patterns in the sequence of tokens that match one or more predetermined input patterns without backtracking. Tokens can include data or no data and a time component. The tokens can be a stream of data generated by a sensor, which transforms a physical property into a digital quantity. The pattern matching technique processes the input queue in a single direction, and does not examine any previously examined token. In an implementation, specific patterns to be matched are specified using a state machine, where the state machine is specified in a state table and operates using a state stack.1. A system comprising: an input queue comprising first memory locations in a computer memory, wherein the input queue stores in the first memory locations a sequence of tokens to be processed where each token in the queue comprises data or no data and a time stamp indicating a time when the token entered the input queue, each token comprising data carries data to be analyzed and a time stamp, each token comprising no data represents a lapse event and carries no data to be analyzed and a time stamp, and the tokens are received by the input queue over a network; a driver component, coupled to the input queue, wherein the driver component processes the tokens in the input queue without backtracking and identifies patterns in the sequence of tokens that match one or more predetermined input patterns, and upon identifying a matched predetermined input pattern, generates an outgoing event output; an output queue, coupled to the driver component, comprising second memory locations in the computer memory, wherein the output queue stores in the second memory locations a sequence of the outgoing events generated by the driver component; a state table component, coupled to the driver component, wherein the state table component stores the predetermined input patterns in a state table format comprising rows, and each row represents a state of a plurality of states described by the state table component; and a state stack component, coupled to the driver component, comprising third memory locations in the computer memory, wherein the state stack component stores in the third memory locations a sequence of frames, and a frame comprises at least one of a translation state number, a symbol, or a deadline, and the translation state number corresponds to a state described by the state table component. 2. The system of claim 1 wherein the tokens are received at the input queue are generated by a hardware sensor that transforms a physical property into a digital quantity. 3. The system of claim 1 wherein an operation of the driver component comprises: examining a state referred to on a top frame of the state stack, examining a next input token in the input queue and determining its category based on the state stack, and performing an action indicated by the state table for a token of a category as indicated by the state table. 4. The system of claim 1 wherein the input queue stores the tokens in an ordered list based on a time received by the input queue, and a first direction in the queue is a time order from an earliest received token to a latest received token, and the driver component processes the tokens by examining the input queue in the first direction, and does not examine any previously examined token. 5. The system of claim 1 wherein the input queue stores the tokens in a list in a time order as received by the input queue, a first direction in the queue is a time order from an earliest received token to a latest received token, a second direction in the queue is a time order from the latest received token to the earliest received token, and the second direction is opposite to the first direction, and the driver component processes the tokens by examining the input queue in either the first direction or the second direction, and not both first and second directions. 6. The system of claim 1 wherein the driver reads each token of the input queue only once, and does not retain a read token in a buffer to read again later. 7. The system of claim 1 wherein a predetermined input pattern to be matched can have a number of tokens of indefinite length. 8. The system of claim 1 wherein the state table component specifies a state machine and comprises a plurality of rows, each row providing a translation state of the state machine comprising: a set of actions, which maps an input token category value or an input break category value to an action to be taken upon receiving an input token of that value, a set of transitions, which maps a derivative symbol type to a state to which the driver should change upon synthesizing a derivative symbol of that type, and a time out, which indicates an interval of time that the state machine will be allowed to remain in a particular state. 9. The system of claim 1 wherein the translation state number is a reference to a row in the state table, the symbol is a token or intermediate symbol derived from input tokens or other symbols, or a combination, and the deadline is a future moment in time by which the driver will pop the frame off the stack. 10. The system of claim 1 wherein the driver component and state table component are embodied in a programmable gate array. 11. The system of claim 1 wherein the driver component and state table component are embodied using a computer. 12. The system of claim 1 wherein the state table component specifies a state machine, and the driver component changes from a first state in the state machine to a second state of the state machine based on a passage of time where no tokens having stream data are received in the input queue. 13. The system of claim 1 wherein the state table component specifies a state machine, and the driver component changes from a first state in the state machine to a second state of the state machine based on a sequence of tokens having stream data received in the input queue during a first time period, and the driver component changes from a third state in the state machine to a fourth state of the state machine based on a sequence of tokens having stream data not being received in the input queue during a second time period. 14. A system comprising: an input queue comprising first memory locations in a computer memory, wherein the input queue stores in the first memory locations a sequence of tokens to be processed where each token in the queue comprises data or no data and a time stamp indicating a time when the token entered the input queue, each token comprising data carries data to be analyzed and a time stamp, each token comprising no data represents a lapse event and carries no data to be analyzed and a time stamp, and the tokens are received by the input queue over a network; a driver component, coupled to the input queue, wherein the driver component processes the tokens in the input queue and identifies patterns in the sequence of tokens that match one or more predetermined input patterns, and upon identifying a matched predetermined input pattern, generates an outgoing event output; an output queue, coupled to the driver component, comprising second memory locations in the computer memory, wherein the output queue stores in the second memory locations a sequence of the outgoing events generated by the driver component; a state table component, coupled to the driver component, wherein the state table component stores the predetermined input patterns in a state table format comprising rows, and each row represents a state of a plurality of states described by the state table component; and a state stack component, coupled to the driver component, comprising third memory locations in the computer memory, wherein the state stack component stores in the third memory locations a sequence of frames, and a frame comprises at least one of a translation state number, a symbol, or a deadline, and the translation state number corresponds to a state described by the state table component. 15. The system of claim 14 wherein the state table component specifies a state machine, and the driver component changes from a first state in the state machine to a second state of the state machine based on a sequence of tokens having stream data received in the input queue during a first time period. 16. The system of claim 14 wherein the state table component specifies a state machine, and the driver component changes from a first state in the state machine to a second state of the state machine based on a sequence of tokens having stream data not being received in the input queue during a first time period. 17. A method comprising: providing an input queue comprising first memory locations in a computer memory, wherein the input queue stores in the first memory locations a sequence of tokens to be processed and a time stamp associated with each token in the queue indicates a time when the associated token entered the input queue, and the tokens are received by the input queue over a network; providing a driver component, coupled to the input queue, wherein the driver component processes the tokens in the input queue without backtracking and identifies patterns in the sequence of tokens that match one or more predetermined input patterns, and upon identifying a matched predetermined input pattern, generates an outgoing event output; providing an output queue, coupled to the driver component, comprising second memory locations in the computer memory, wherein the output queue stores in the second memory locations a sequence of the outgoing events generated by the driver component; providing a state table component, coupled to the driver component, wherein the state table component stores the predetermined input patterns in a state table format; providing a state stack component, coupled to the driver component, comprising third memory locations in the computer memory, wherein the state stack component stores in the third memory locations a sequence of frames, and a frame comprises at least one of a translation state number, a symbol, or a deadline, and the translation state number corresponds to a state described by the state table component; and generating a state table for the state table component comprising: identifying a set of terminal symbols, wherein each symbol represents a category of input data; identifying a set of nonterminal symbols, wherein each nonterminal symbol represents a pattern of at least one of terminal or nonterminal symbols; identifying a set of grammar rules; identifying a top-level rule; identifying a set of attributes; computing a first set for each identified terminal and nonterminal symbol; computing a follow set for each identified terminal and nonterminal symbol; and generating a starting state from a closure of the top-level rule with each member of the members of a corresponding follow set, wherein the generating the state table comprises: generating a plurality of states reachable from the starting state by recursively generating a closure of each state for which a change-in-state transition exists from the starting state; optimizing the set of states by combination and reduction; and generating action, transition, and time out values for each state; and wherein the set of attributes comprises: each attribute takes a form α:T={A0→λ0, . . . An→λn}, wherein α is a name of the attribute, T is the type of the attribute, A is a nonterminal symbol, and λ is a function which is to be used to compute a value of the attribute for that symbol. 18. A method comprising: providing an input queue comprising first memory locations in a computer memory, wherein the input queue stores in the first memory locations a sequence of tokens to be processed and a time stamp associated with each token in the queue indicates a time when the associated token entered the input queue, and the tokens are received by the input queue over a network; providing a driver component, coupled to the input queue, wherein the driver component processes the tokens in the input queue without backtracking and identifies patterns in the sequence of tokens that match one or more predetermined input patterns, and upon identifying a matched predetermined input pattern, generates an outgoing event output; providing an output queue, coupled to the driver component, comprising second memory locations in the computer memory, wherein the output queue stores in the second memory locations a sequence of the outgoing events generated by the driver component; providing a state table component, coupled to the driver component, wherein the state table component stores the predetermined input patterns in a state table format; providing a state stack component, coupled to the driver component, comprising third memory locations in the computer memory, wherein the state stack component stores in the third memory locations a sequence of frames, and a frame comprises at least one of a translation state number, a symbol, or a deadline, and the translation state number corresponds to a state described by the state table component; and generating a state table for the state table component comprising: identifying a set of terminal symbols, wherein each symbol represents a category of input data; identifying a set of nonterminal symbols, wherein each nonterminal symbol represents a pattern of at least one of terminal or nonterminal symbols; identifying a set of grammar rules; identifying a top-level rule; identifying a set of attributes; computing a first set for each identified terminal and nonterminal symbol; computing a follow set for each identified terminal and nonterminal symbol; and generating a starting state from a closure of the top-level rule with each member of a corresponding follow set, wherein the generating the state table comprises: generating a plurality of states reachable from the starting state by recursively generating a closure of each state for which a change-in-state transition exists from the starting state; optimizing the set of states by combination and reduction; and generating action, transition, and time out values for each state; and wherein the set of grammar rules comprises: each nonempty rule takes the form of A→B0 . . . Bn, where A is a nonterminal symbol and B0 through Bn are each either terminal or nonterminal symbols; and each empty rule takes a form A→τ, where τ is either a finite amount of time, characterized in some useful unit of time, or else is infinity, indicating an unlimited amount of time. 19. A method comprising: providing an input queue comprising first memory locations in a computer memory, wherein the input queue stores in the first memory locations a sequence of tokens to be processed and a time stamp associated with each token in the queue indicates a time when the associated token entered the input queue, and the tokens are received by the input queue over a network; providing a driver component, coupled to the input queue, wherein the driver component processes the tokens in the input queue without backtracking and identifies patterns in the sequence of tokens that match one or more predetermined input patterns, and upon identifying a matched predetermined input pattern, generates an outgoing event output; providing an output queue, coupled to the driver component, comprising second memory locations in the computer memory, wherein the output queue stores in the second memory locations a sequence of the outgoing events generated by the driver component; providing a state table component, coupled to the driver component, wherein the state table component stores the predetermined input patterns in a state table format; providing a state stack component, coupled to the driver component, comprising third memory locations in the computer memory, wherein the state stack component stores in the third memory locations a sequence of frames, and a frame comprises at least one of a translation state number, a symbol, or a deadline, and the translation state number corresponds to a state described by the state table component; and generating a state table for the state table component comprising: identifying a set of terminal symbols, wherein each symbol represents a category of input data; identifying a set of nonterminal symbols, wherein each nonterminal symbol represents a pattern of at least one of terminal or nonterminal symbols; identifying a set of grammar rules; identifying a top-level rule; identifying a set of attributes; computing a first set for each identified terminal and nonterminal symbol; computing a follow set for each identified terminal and nonterminal symbol; and generating a starting state from a closure of the top-level rule with each member of a corresponding follow set, wherein the set of grammar rules comprises: each nonempty rule takes the form of A→B0 . . . Bn, where A is a nonterminal symbol and B0 through Bn are each either terminal or nonterminal symbols; and each empty rule takes a form A→τ, where τ is either a finite amount of time, characterized in some useful unit of time, or else is infinity, indicating an unlimited amount of time. 20. A method comprising: providing an input queue comprising first memory locations in a computer memory, wherein the input queue stores in the first memory locations a sequence of tokens to be processed and a time stamp associated with each token in the queue indicates a time when the associated token entered the input queue, and the tokens are received by the input queue over a network; providing a driver component, coupled to the input queue, wherein the driver component processes the tokens in the input queue without backtracking and identifies patterns in the sequence of tokens that match one or more predetermined input patterns, and upon identifying a matched predetermined input pattern, generates an outgoing event output; providing an output queue, coupled to the driver component, comprising second memory locations in the computer memory, wherein the output queue stores in the second memory locations a sequence of the outgoing events generated by the driver component; providing a state table component, coupled to the driver component, wherein the state table component stores the predetermined input patterns in a state table format; providing a state stack component, coupled to the driver component, comprising third memory locations in the computer memory, wherein the state stack component stores in the third memory locations a sequence of frames, and a frame comprises at least one of a translation state number, a symbol, or a deadline, and the translation state number corresponds to a state described by the state table component; and generating a state table for the state table component comprising: identifying a set of terminal symbols, wherein each symbol represents a category of input data; identifying a set of nonterminal symbols, wherein each nonterminal symbol represents a pattern of at least one of terminal or nonterminal symbols; identifying a set of grammar rules; identifying a top-level rule; identifying a set of attributes; computing a first set for each identified terminal and nonterminal symbol; computing a follow set for each identified terminal and nonterminal symbol; and generating a starting state from a closure of the top-level rule with each member of a corresponding follow set, wherein the set of attributes comprises: each attribute takes a form α:T={A0→λ0 . . . An→λn}, wherein α is a name of the attribute, T is the type of the attribute, A is a nonterminal symbol, and λ is a function which is to be used to compute a value of the attribute for that symbol. 21. The method of claim 17 wherein a top-level rule has a form comprising Ω→B, where B is either a terminal or nonterminal symbol. 22. The method of claim 18 wherein the set of attributes comprises: each attribute takes a form α:T={A0→λ0 . . . An→λn}, wherein α is a name of the attribute, T is the type of the attribute, A is a nonterminal symbol, and λ is a function which is to be used to compute a value of the attribute for that symbol. 23. The method of claim 19 wherein the set of attributes comprises: each attribute takes a form α:T={A0→λ0 . . . An→λn}, wherein α is a name of the attribute, T is the type of the attribute, A is a nonterminal symbol, and λ is a function which is to be used to compute a value of the attribute for that symbol. 24. The system of claim 1 wherein upon the occurrence of a lapse event, the driver component allows a current state to expire.
2,800
340,149
16,801,131
3,793
An angiographic examination method for depicting a target region as an examination object using an angiography system includes capturing a volume data set of the target region with the examination object, registering the volume data set to a C-arm, and extracting information about an assumed course of the examination object in the volume data set. The method also includes generating a 2D projection image of a medical instrument in the target region, 2D/3D merging the 2D projection image and the registered volume data set for generating a 2D overlay image, and detecting the instrument in the 2D overlay image with a first projection matrix. The method includes generating a virtual 2D projection using a virtual projection matrix, 3D reconstructing the instrument, and distorting at least part of the reference image such that the current and the assumed course of vessels are made to be congruent.
1. An angiographic examination method for depicting a target region inside a patient with a vascular system as an examination object using an angiography system comprising an X-ray emitter and an X-ray image detector that are attached to ends of a C-arm, a patient positioning couch with a tabletop on which the patient is positioned, a processor, an image system, and a monitor, the angiographic examination method comprising: capturing a volume data set of the target region with the examination object; registering the volume data set to the C-arm; extracting information about an assumed course of the examination object in the volume data set inside the target region; generating at least one two-dimensional (2D) projection image of a medical instrument inserted in the target region; generating a 2D overlay image, the generating of the 2D overlay image comprising 2D/three-dimensional (3D) merging of the at least one 2D projection image and the registered volume data set; detecting the medical instrument inserted in the target region in the 2D overlay image with a first projection matrix; generating a virtual 2D projection of the medical instrument using a virtual projection matrix, wherein the virtual projection matrix is based on the first projection matrix; reconstructing the medical instrument in three dimensions, in which a 3D position of the medical instrument is determined based on the virtual 2D projection and the detected medical instrument in the 2D overlay image; and overlaying a reference image that shows a status before the insertion of the medical instrument, and the reconstructed medical instrument, the determined 3D position of the medical instrument, or the reconstructed medical instrument and the determined 3D position of the medical instrument, and displacing at least a part of the reference image such that a current course and the assumed course of the vessels are congruent. 2. The angiographic examination method of claim 1, wherein generating the virtual 2D projection of the medical instrument comprises: generating the virtual projection matrix, the generating of the virtual projection matrix comprising rotating the first projection matrix by an angle about an axis through the patient; generating the virtual 2D projection of the medical instrument using the virtual projection matrix; and approximating the medical instrument in the virtual 2D projection of the medical instrument, the approximating comprising estimating the position of the medical instrument from the virtual 2D projection of the medical instrument. 3. The angiographic examination method of claim 1, wherein capturing the volume data set comprises capturing a 3D volume based on a previously performed computed tomography (CT) angiography or a C-arm CT recorded during an intervention. 4. The angiographic examination method of claim 1, wherein the information about the assumed course of the examination object is obtained using a 3D segmentation over the course of the vessels. 5. The angiographic examination method of claim 4, wherein the information is center lines of the vessels, a course of vascular lumina, or the center lines of the vessels and the course of vascular lumina. 6. The angiographic examination method of claim 1, wherein detecting the medical instrument comprises generating a 2D polygon line that corresponds to the position of the instrument in the at least one 2D projection image. 7. The angiographic examination method of claim 2, wherein the angle is 90°. 8. The angiographic examination method of claim 2, wherein during the approximating of the medical instrument, a smoothing interpolation is used, such that the position of the medical instrument is determined, and wherein the smoothing interpolation is, depending on a level of inflexibility of the medical instrument, a linear, quadratic, or spline interpolation. 9. The angiographic examination method of claim 1, wherein reconstructing the medical instrument in three dimensions comprises a triangulation from the virtual 2D projection and the at least one 2D projection image of the medical instrument. 10. The angiographic examination method of claim 1, wherein the overlaying and distorting comprises positioning a part of the vessels corresponding to the course of the vessels so as to coincide with a relevant part of the inserted medical instrument for which 3D positions are available, and adjusting the overlay of the reference image and the reconstructed medical instrument depending on the position and a penetration depth of the medical instrument. 11. The angiographic examination method of claim 1, further comprising generating the reference image from the volume data set. 12. The angiographic examination method of claim 2, wherein capturing the volume data set comprises capturing a 3D volume based on a previously performed computed tomography (CT) angiography or a C-arm CT recorded during an intervention. 13. The angiographic examination method of claim 12, wherein the information about the assumed course of the examination object is obtained using a 3D segmentation over the course of the vessels. 14. The angiographic examination method of claim 13, wherein the information is center lines of the vessels, a course of vascular lumina, or the center lines of the vessels and the course of vascular lumina. 15. The angiographic examination method of claim 14, wherein detecting the medical instrument comprises generating a 2D polygon line that corresponds to the position of the instrument in the at least one 2D projection image. 16. The angiographic examination method of claim 15, wherein during the approximating of the medical instrument, a smoothing interpolation is used, such that the position of the medical instrument is determined, and wherein the smoothing interpolation is, depending on a level of inflexibility of the medical instrument, a linear, quadratic, or spline interpolation. 17. The angiographic examination method of claim 7, wherein reconstructing the medical instrument in three dimensions comprises a triangulation from the virtual 2D projection and the at least one 2D projection image of the medical instrument. 18. The angiographic examination method of claim 8, wherein reconstructing the medical instrument in three dimensions comprises a triangulation from the virtual 2D projection and the at least one 2D projection image of the medical instrument. 19. The angiographic examination method of claim 7, wherein the overlaying and distorting comprises positioning a part of the vessels corresponding to the course of the vessels so as to coincide with a relevant part of the inserted medical instrument for which 3D positions are available, and adjusting the overlay of the reference image and the reconstructed medical instrument depending on the position and a penetration depth of the medical instrument. 20. The angiographic examination method of claim 8, wherein the overlaying and distorting comprises positioning a part of the vessels corresponding to the course of the vessels so as to coincide with a relevant part of the inserted medical instrument for which 3D positions are available, and adjusting the overlay of the reference image and the reconstructed medical instrument depending on the position and a penetration depth of the medical instrument.
An angiographic examination method for depicting a target region as an examination object using an angiography system includes capturing a volume data set of the target region with the examination object, registering the volume data set to a C-arm, and extracting information about an assumed course of the examination object in the volume data set. The method also includes generating a 2D projection image of a medical instrument in the target region, 2D/3D merging the 2D projection image and the registered volume data set for generating a 2D overlay image, and detecting the instrument in the 2D overlay image with a first projection matrix. The method includes generating a virtual 2D projection using a virtual projection matrix, 3D reconstructing the instrument, and distorting at least part of the reference image such that the current and the assumed course of vessels are made to be congruent.1. An angiographic examination method for depicting a target region inside a patient with a vascular system as an examination object using an angiography system comprising an X-ray emitter and an X-ray image detector that are attached to ends of a C-arm, a patient positioning couch with a tabletop on which the patient is positioned, a processor, an image system, and a monitor, the angiographic examination method comprising: capturing a volume data set of the target region with the examination object; registering the volume data set to the C-arm; extracting information about an assumed course of the examination object in the volume data set inside the target region; generating at least one two-dimensional (2D) projection image of a medical instrument inserted in the target region; generating a 2D overlay image, the generating of the 2D overlay image comprising 2D/three-dimensional (3D) merging of the at least one 2D projection image and the registered volume data set; detecting the medical instrument inserted in the target region in the 2D overlay image with a first projection matrix; generating a virtual 2D projection of the medical instrument using a virtual projection matrix, wherein the virtual projection matrix is based on the first projection matrix; reconstructing the medical instrument in three dimensions, in which a 3D position of the medical instrument is determined based on the virtual 2D projection and the detected medical instrument in the 2D overlay image; and overlaying a reference image that shows a status before the insertion of the medical instrument, and the reconstructed medical instrument, the determined 3D position of the medical instrument, or the reconstructed medical instrument and the determined 3D position of the medical instrument, and displacing at least a part of the reference image such that a current course and the assumed course of the vessels are congruent. 2. The angiographic examination method of claim 1, wherein generating the virtual 2D projection of the medical instrument comprises: generating the virtual projection matrix, the generating of the virtual projection matrix comprising rotating the first projection matrix by an angle about an axis through the patient; generating the virtual 2D projection of the medical instrument using the virtual projection matrix; and approximating the medical instrument in the virtual 2D projection of the medical instrument, the approximating comprising estimating the position of the medical instrument from the virtual 2D projection of the medical instrument. 3. The angiographic examination method of claim 1, wherein capturing the volume data set comprises capturing a 3D volume based on a previously performed computed tomography (CT) angiography or a C-arm CT recorded during an intervention. 4. The angiographic examination method of claim 1, wherein the information about the assumed course of the examination object is obtained using a 3D segmentation over the course of the vessels. 5. The angiographic examination method of claim 4, wherein the information is center lines of the vessels, a course of vascular lumina, or the center lines of the vessels and the course of vascular lumina. 6. The angiographic examination method of claim 1, wherein detecting the medical instrument comprises generating a 2D polygon line that corresponds to the position of the instrument in the at least one 2D projection image. 7. The angiographic examination method of claim 2, wherein the angle is 90°. 8. The angiographic examination method of claim 2, wherein during the approximating of the medical instrument, a smoothing interpolation is used, such that the position of the medical instrument is determined, and wherein the smoothing interpolation is, depending on a level of inflexibility of the medical instrument, a linear, quadratic, or spline interpolation. 9. The angiographic examination method of claim 1, wherein reconstructing the medical instrument in three dimensions comprises a triangulation from the virtual 2D projection and the at least one 2D projection image of the medical instrument. 10. The angiographic examination method of claim 1, wherein the overlaying and distorting comprises positioning a part of the vessels corresponding to the course of the vessels so as to coincide with a relevant part of the inserted medical instrument for which 3D positions are available, and adjusting the overlay of the reference image and the reconstructed medical instrument depending on the position and a penetration depth of the medical instrument. 11. The angiographic examination method of claim 1, further comprising generating the reference image from the volume data set. 12. The angiographic examination method of claim 2, wherein capturing the volume data set comprises capturing a 3D volume based on a previously performed computed tomography (CT) angiography or a C-arm CT recorded during an intervention. 13. The angiographic examination method of claim 12, wherein the information about the assumed course of the examination object is obtained using a 3D segmentation over the course of the vessels. 14. The angiographic examination method of claim 13, wherein the information is center lines of the vessels, a course of vascular lumina, or the center lines of the vessels and the course of vascular lumina. 15. The angiographic examination method of claim 14, wherein detecting the medical instrument comprises generating a 2D polygon line that corresponds to the position of the instrument in the at least one 2D projection image. 16. The angiographic examination method of claim 15, wherein during the approximating of the medical instrument, a smoothing interpolation is used, such that the position of the medical instrument is determined, and wherein the smoothing interpolation is, depending on a level of inflexibility of the medical instrument, a linear, quadratic, or spline interpolation. 17. The angiographic examination method of claim 7, wherein reconstructing the medical instrument in three dimensions comprises a triangulation from the virtual 2D projection and the at least one 2D projection image of the medical instrument. 18. The angiographic examination method of claim 8, wherein reconstructing the medical instrument in three dimensions comprises a triangulation from the virtual 2D projection and the at least one 2D projection image of the medical instrument. 19. The angiographic examination method of claim 7, wherein the overlaying and distorting comprises positioning a part of the vessels corresponding to the course of the vessels so as to coincide with a relevant part of the inserted medical instrument for which 3D positions are available, and adjusting the overlay of the reference image and the reconstructed medical instrument depending on the position and a penetration depth of the medical instrument. 20. The angiographic examination method of claim 8, wherein the overlaying and distorting comprises positioning a part of the vessels corresponding to the course of the vessels so as to coincide with a relevant part of the inserted medical instrument for which 3D positions are available, and adjusting the overlay of the reference image and the reconstructed medical instrument depending on the position and a penetration depth of the medical instrument.
3,700
340,150
16,801,136
3,793
A method for Xx/Xn interface communication is disclosed, comprising: at an Xx/Xn gateway for communicating with, and coupled to, a first and a second radio access network (RAN), receiving messages from the first RAN according to a first Xx/Xn protocol and mapping the received messages to a second Xx/Xn protocol for transmission to the second RAN; maintaining state of one of the first RAN or the second RAN at the Xx/Xn gateway; executing executable code received at an interpreter at the Xx/Xn gateway as part of the received messages; altering the maintained state based on the executed executable code; and receiving and decoding an initial Xx/Xn message from the first RAN; identifying specific strings in the initial Xx/Xn message; matching the identified specific strings in a database of stored scripts; and performing a transformation on the initial Xx/Xn message, the transformation being retrieved from the database for stored scripts, the stored scripts being transformations.
1. A method for Xx/Xn interface communication, comprising: at an Xx/Xn gateway for communicating with, and coupled to, a first and a second radio access network (RAN), receiving messages from the first RAN according to a first Xx/Xn protocol and mapping the received messages to a second Xx/Xn protocol for transmission to the second RAN, wherein at least one of the first RAN and the second RAN comprise a 5G RAN; maintaining operational state of at least one of the first RAN or the second RAN at the Xx/Xn gateway; executing, at an interpreter at the Xx/Xn gateway, an executable payload received as part of the received messages; updating the maintained operational state of the first RAN or the second RAN at the Xx/Xn gateway based on an effect of the executable payload; and interworking, at the Xx/Xn gateway, the first Xx/Xn message from the first Xx/Xn protocol to the second Xx/Xn protocol and associating the first Xx/Xn protocol with the first RAN and the second Xx/Xn protocol with the second RAN, based on a list of supported Xx/Xn protocol versions for the first RAN and the second RAN, wherein at least one of the supported Xx/Xn protocol versions is a list of supported individual information elements (IEs) and protocol commands, or an Xx/Xn protocol version number. 2. The method of claim 1, further comprising storing a plurality of rules in a database for performing mapping. 3. The method of claim 1, further comprising, at a regular expression pattern matcher at the Xx/Xn gateway, identifying patterns in the received messages that are present in the first Xx/Xn protocol but not present in the second Xx/Xn protocol. 4. The method of claim 1, further comprising sending a second Xx/Xn message to update an eNodeB state machine at the first RAN. 5. The method of claim 1, further comprising updating a gNodeB state machine at the Xx/Xn gateway based on the effect of the executed executable payload. 6. The method of claim 1, further comprising sending a filtered second Xx/Xn message to the second RAN. 7. The method of claim 1, further comprising providing code execution hooks for enabling the received messages according to the first Xx/Xn protocol to cause code execution at the Xx/Xn gateway. 8. The method of claim 1, further comprising providing code execution hooks for enabling code execution at the Xx/Xn gateway of the executable payload received via the received messages. 9. The method of claim 1, further comprising enabling new Xx/Xn protocol features via the executable code payload sent in an information element from the Xx/Xn gateway. 10. The method of claim 1, further comprising blocking transmission of executable code payloads from the Xx/Xn gateway to an incompatible RAN. 11. The method of claim 1, further comprising mapping a first unitless threshold value compatible with the first RAN to a second unitless threshold value compatible with the second RAN. 12. The method of claim 1, further comprising adding, deleting, or modifying information elements in the messages from the first RAN but not compatible with the second RAN to information elements compatible with the second RAN. 13. The method of claim 1, further comprising storing a plurality of rules in a database for performing mapping, the plurality of rules further comprising regular expression transformations of the received messages. 14. The method of claim 1, further comprising storing a plurality of rules in a database for performing mapping, the plurality of rules further comprising rules for interpretation by a scripting language message processor at the gateway server. 15. The method of claim 1, further comprising storing a plurality of rules in a database for performing mapping, the plurality of rules further comprising rules for interpretation by a scripting language message processor at the first RAN or the second RAN. 16. The method of claim 1, further comprising processing messages in Lua, Python, Ruby, Perl, or JavaScript. 17. The method of claim 1, further comprising handling Xx/Xn mobility management, load management, general error, Xx/Xn reset, Xx/Xn setup, Xx/Xn release, Xx/Xn removal, configuration update, mobility parameter management, mobility robustness optimization, or energy consumption management messages. 18. The method of claim 1, further comprising handling adjustment of inter-radio access technology (inter-RAT) or intra-radio access technology (intra-RAT) mobility thresholds. 19. The method of claim 1, further comprising: receiving and decoding an initial Xx/Xn message from the first RAN; identifying specific strings in the initial Xx/Xn message; matching the identified specific strings in a database of stored scripts; and performing a transformation on the initial Xx/Xn message, the transformation being retrieved from the database for stored scripts, the stored scripts being transformations.
A method for Xx/Xn interface communication is disclosed, comprising: at an Xx/Xn gateway for communicating with, and coupled to, a first and a second radio access network (RAN), receiving messages from the first RAN according to a first Xx/Xn protocol and mapping the received messages to a second Xx/Xn protocol for transmission to the second RAN; maintaining state of one of the first RAN or the second RAN at the Xx/Xn gateway; executing executable code received at an interpreter at the Xx/Xn gateway as part of the received messages; altering the maintained state based on the executed executable code; and receiving and decoding an initial Xx/Xn message from the first RAN; identifying specific strings in the initial Xx/Xn message; matching the identified specific strings in a database of stored scripts; and performing a transformation on the initial Xx/Xn message, the transformation being retrieved from the database for stored scripts, the stored scripts being transformations.1. A method for Xx/Xn interface communication, comprising: at an Xx/Xn gateway for communicating with, and coupled to, a first and a second radio access network (RAN), receiving messages from the first RAN according to a first Xx/Xn protocol and mapping the received messages to a second Xx/Xn protocol for transmission to the second RAN, wherein at least one of the first RAN and the second RAN comprise a 5G RAN; maintaining operational state of at least one of the first RAN or the second RAN at the Xx/Xn gateway; executing, at an interpreter at the Xx/Xn gateway, an executable payload received as part of the received messages; updating the maintained operational state of the first RAN or the second RAN at the Xx/Xn gateway based on an effect of the executable payload; and interworking, at the Xx/Xn gateway, the first Xx/Xn message from the first Xx/Xn protocol to the second Xx/Xn protocol and associating the first Xx/Xn protocol with the first RAN and the second Xx/Xn protocol with the second RAN, based on a list of supported Xx/Xn protocol versions for the first RAN and the second RAN, wherein at least one of the supported Xx/Xn protocol versions is a list of supported individual information elements (IEs) and protocol commands, or an Xx/Xn protocol version number. 2. The method of claim 1, further comprising storing a plurality of rules in a database for performing mapping. 3. The method of claim 1, further comprising, at a regular expression pattern matcher at the Xx/Xn gateway, identifying patterns in the received messages that are present in the first Xx/Xn protocol but not present in the second Xx/Xn protocol. 4. The method of claim 1, further comprising sending a second Xx/Xn message to update an eNodeB state machine at the first RAN. 5. The method of claim 1, further comprising updating a gNodeB state machine at the Xx/Xn gateway based on the effect of the executed executable payload. 6. The method of claim 1, further comprising sending a filtered second Xx/Xn message to the second RAN. 7. The method of claim 1, further comprising providing code execution hooks for enabling the received messages according to the first Xx/Xn protocol to cause code execution at the Xx/Xn gateway. 8. The method of claim 1, further comprising providing code execution hooks for enabling code execution at the Xx/Xn gateway of the executable payload received via the received messages. 9. The method of claim 1, further comprising enabling new Xx/Xn protocol features via the executable code payload sent in an information element from the Xx/Xn gateway. 10. The method of claim 1, further comprising blocking transmission of executable code payloads from the Xx/Xn gateway to an incompatible RAN. 11. The method of claim 1, further comprising mapping a first unitless threshold value compatible with the first RAN to a second unitless threshold value compatible with the second RAN. 12. The method of claim 1, further comprising adding, deleting, or modifying information elements in the messages from the first RAN but not compatible with the second RAN to information elements compatible with the second RAN. 13. The method of claim 1, further comprising storing a plurality of rules in a database for performing mapping, the plurality of rules further comprising regular expression transformations of the received messages. 14. The method of claim 1, further comprising storing a plurality of rules in a database for performing mapping, the plurality of rules further comprising rules for interpretation by a scripting language message processor at the gateway server. 15. The method of claim 1, further comprising storing a plurality of rules in a database for performing mapping, the plurality of rules further comprising rules for interpretation by a scripting language message processor at the first RAN or the second RAN. 16. The method of claim 1, further comprising processing messages in Lua, Python, Ruby, Perl, or JavaScript. 17. The method of claim 1, further comprising handling Xx/Xn mobility management, load management, general error, Xx/Xn reset, Xx/Xn setup, Xx/Xn release, Xx/Xn removal, configuration update, mobility parameter management, mobility robustness optimization, or energy consumption management messages. 18. The method of claim 1, further comprising handling adjustment of inter-radio access technology (inter-RAT) or intra-radio access technology (intra-RAT) mobility thresholds. 19. The method of claim 1, further comprising: receiving and decoding an initial Xx/Xn message from the first RAN; identifying specific strings in the initial Xx/Xn message; matching the identified specific strings in a database of stored scripts; and performing a transformation on the initial Xx/Xn message, the transformation being retrieved from the database for stored scripts, the stored scripts being transformations.
3,700
340,151
16,801,133
3,715
A satellite operation simulation device disclosed by the present invention includes a simulation box. The simulation box is provided with a simulation cavity, and an air suction pump is fixed in the inner wall on the right side of the simulation cavity. The air is drawn out and simulates the vacuum environment in space. The simulation cavity is provided with a simulation device. The simulation device generates a magnetic field through two magnetically opposite magnets, and the two magnets are connected through a magnetically conductive coil respectively. Hemispherical body, the device can perform human-computer interaction, thereby improving the personal experience of the person, and can artificially adjust the launch speed to simulate the operation of satellites at different launch speeds, and can emergency stop the device during operation to avoid accident occur.
1. A satellite operation simulation device includes a simulation box, which is characterized in that: a simulation cavity is provided in the simulation box, and an air suction pump is fixed in the inner wall on the right side of the simulation cavity; The air is drawn out and simulates the environment of vacuum space; the simulation cavity is provided with a simulation device, and the simulation device generates a magnetic field through two magnets with opposite magnetic properties, and the two magnets are connected to a hemisphere through a magnetically conductive coil A satellite is rotatably provided between the two hemispheres, and the ball simulates a satellite; a driving device is arranged in the right inner wall of the simulation cavity, and the driving device impacts the balls by driving an impact hammer. Then, the satellite launch situation is simulated; a buffer device is provided on the left inner wall of the simulation cavity, and the buffer device can buffer the impact hammer and prevent the impact hammer from rebounding; There is an emergency stop device inside, which can manually drive the emergency stop device and quickly stop the ball from rotating to avoid accidents; there is a connection between the inner walls of the left and right sides of the simulation cavity. The left and right ends are connected to said link means and said driving buffer device. 2. The satellite operation simulation device according to claim 1, wherein the driving device comprises a transmission cavity provided in an inner wall on the right side of the simulation cavity, and the transmission cavity is rotatable and slidable. There is a sliding gear, a motor shaft is splined inside the sliding gear, a motor is fixed in the lower inner wall of the transmission cavity, and the lower end of the motor shaft is dynamically connected to the motor; the upper end of the sliding gear is connected to the motor An electromagnetic spring is fixedly connected between the shafts; a fixed gear is rotatably provided on the left side of the sliding gear, the fixed gear can mesh with the sliding gear, and a transmission shaft is fixedly connected to the fixed gear; A storage cavity is arranged in the inner wall on the upper side of the cavity, and a reel is rotatably provided in the storage cavity, the reel is fixedly connected to the transmission shaft, and a pull wire is wound on the peripheral surface of the reel; A guide slider is slidably connected to the peripheral surface of the connecting rod, the impact hammer is fixed to the front end of the guide slider, the left end of the pull wire is fixed to the impact hammer, and the left inner wall of the simulation cavity is fixed to the impact hammer. With compression spring. 3. The satellite operation simulation device according to claim 2, wherein a reset torsion spring is fixedly connected between the upper end of the reel and the upper inner wall of the storage cavity. 4. The satellite operation simulation device according to claim 1, wherein the buffer device comprises a fixing block fixed on the left inner wall of the simulation cavity, and the fixing block is provided with a buffer opening to the right. The buffer groove is slidably provided with a buffer slider, and the buffer slider is slidably connected to the link; the upper and lower sides of the buffer groove are symmetrically arranged in the inner wall and the opening faces the simulation cavity. Check valve. 5. The satellite operation simulation device according to claim 1, wherein the simulation device comprises a cavity provided in the hemisphere with opposite openings, and the magnets on both sides are respectively fixed to the cavity. On the inner wall away from the center of symmetry, the magnetic coil is connected to the inner wall of the cavity; a connecting shaft is rotationally connected between the hemispheres, and the front and rear ends of the connecting shaft are connected to the emergency stop device; A rotation rod is rotatably provided between the hemispheres, the rotation rod is fixedly connected to the connecting shaft, a sealing cavity with an upward opening is provided in the rotation rod, and a telescopic rod is slidably provided in the sealing cavity. The upper end of the telescopic rod extends out of the sealed cavity. The telescopic rod is provided with a through hole penetrating back and forth, and the ball can roll in the through hole; the surface of the telescopic rod is fixed with protection pad. 6. The satellite operation simulation device according to claim 5, characterized in that the emergency stop device comprises gear chambers symmetrically arranged in the inner walls of the front and rear sides of the simulation chamber, and the gear chambers are rotatable. There is a blocking gear, the front and rear ends of the connecting shaft respectively extend into the gear cavity and are fixedly connected to the blocking gear; a groove is provided in the inner wall of the upper side of the gear cavity, and the groove is connected with each other. An internally rotatable barb bar is provided. The barb bar is fixedly connected with a torsion shaft. The front and back ends of the barb shaft are rotatably connected to the front and rear inner walls of the groove. Electromagnetic torsion springs are fixedly connected between the inner walls of the front and back sides of the groove.
A satellite operation simulation device disclosed by the present invention includes a simulation box. The simulation box is provided with a simulation cavity, and an air suction pump is fixed in the inner wall on the right side of the simulation cavity. The air is drawn out and simulates the vacuum environment in space. The simulation cavity is provided with a simulation device. The simulation device generates a magnetic field through two magnetically opposite magnets, and the two magnets are connected through a magnetically conductive coil respectively. Hemispherical body, the device can perform human-computer interaction, thereby improving the personal experience of the person, and can artificially adjust the launch speed to simulate the operation of satellites at different launch speeds, and can emergency stop the device during operation to avoid accident occur.1. A satellite operation simulation device includes a simulation box, which is characterized in that: a simulation cavity is provided in the simulation box, and an air suction pump is fixed in the inner wall on the right side of the simulation cavity; The air is drawn out and simulates the environment of vacuum space; the simulation cavity is provided with a simulation device, and the simulation device generates a magnetic field through two magnets with opposite magnetic properties, and the two magnets are connected to a hemisphere through a magnetically conductive coil A satellite is rotatably provided between the two hemispheres, and the ball simulates a satellite; a driving device is arranged in the right inner wall of the simulation cavity, and the driving device impacts the balls by driving an impact hammer. Then, the satellite launch situation is simulated; a buffer device is provided on the left inner wall of the simulation cavity, and the buffer device can buffer the impact hammer and prevent the impact hammer from rebounding; There is an emergency stop device inside, which can manually drive the emergency stop device and quickly stop the ball from rotating to avoid accidents; there is a connection between the inner walls of the left and right sides of the simulation cavity. The left and right ends are connected to said link means and said driving buffer device. 2. The satellite operation simulation device according to claim 1, wherein the driving device comprises a transmission cavity provided in an inner wall on the right side of the simulation cavity, and the transmission cavity is rotatable and slidable. There is a sliding gear, a motor shaft is splined inside the sliding gear, a motor is fixed in the lower inner wall of the transmission cavity, and the lower end of the motor shaft is dynamically connected to the motor; the upper end of the sliding gear is connected to the motor An electromagnetic spring is fixedly connected between the shafts; a fixed gear is rotatably provided on the left side of the sliding gear, the fixed gear can mesh with the sliding gear, and a transmission shaft is fixedly connected to the fixed gear; A storage cavity is arranged in the inner wall on the upper side of the cavity, and a reel is rotatably provided in the storage cavity, the reel is fixedly connected to the transmission shaft, and a pull wire is wound on the peripheral surface of the reel; A guide slider is slidably connected to the peripheral surface of the connecting rod, the impact hammer is fixed to the front end of the guide slider, the left end of the pull wire is fixed to the impact hammer, and the left inner wall of the simulation cavity is fixed to the impact hammer. With compression spring. 3. The satellite operation simulation device according to claim 2, wherein a reset torsion spring is fixedly connected between the upper end of the reel and the upper inner wall of the storage cavity. 4. The satellite operation simulation device according to claim 1, wherein the buffer device comprises a fixing block fixed on the left inner wall of the simulation cavity, and the fixing block is provided with a buffer opening to the right. The buffer groove is slidably provided with a buffer slider, and the buffer slider is slidably connected to the link; the upper and lower sides of the buffer groove are symmetrically arranged in the inner wall and the opening faces the simulation cavity. Check valve. 5. The satellite operation simulation device according to claim 1, wherein the simulation device comprises a cavity provided in the hemisphere with opposite openings, and the magnets on both sides are respectively fixed to the cavity. On the inner wall away from the center of symmetry, the magnetic coil is connected to the inner wall of the cavity; a connecting shaft is rotationally connected between the hemispheres, and the front and rear ends of the connecting shaft are connected to the emergency stop device; A rotation rod is rotatably provided between the hemispheres, the rotation rod is fixedly connected to the connecting shaft, a sealing cavity with an upward opening is provided in the rotation rod, and a telescopic rod is slidably provided in the sealing cavity. The upper end of the telescopic rod extends out of the sealed cavity. The telescopic rod is provided with a through hole penetrating back and forth, and the ball can roll in the through hole; the surface of the telescopic rod is fixed with protection pad. 6. The satellite operation simulation device according to claim 5, characterized in that the emergency stop device comprises gear chambers symmetrically arranged in the inner walls of the front and rear sides of the simulation chamber, and the gear chambers are rotatable. There is a blocking gear, the front and rear ends of the connecting shaft respectively extend into the gear cavity and are fixedly connected to the blocking gear; a groove is provided in the inner wall of the upper side of the gear cavity, and the groove is connected with each other. An internally rotatable barb bar is provided. The barb bar is fixedly connected with a torsion shaft. The front and back ends of the barb shaft are rotatably connected to the front and rear inner walls of the groove. Electromagnetic torsion springs are fixedly connected between the inner walls of the front and back sides of the groove.
3,700
340,152
16,801,115
3,715
Techniques are described herein that are capable of providing a recommendation of an admin change (i.e., an admin change recommendation) in an enterprise. A type of intended admin change that an administrator is to perform with regard to an enterprise is determined. The type is cross-referenced with information indicating admin changes made by administrator(s) in environment(s) of enterprise(s) and values of metrics resulting therefrom to identify subsets of the information to which the type corresponds. A causal relationship is inferred between admin change(s) made after an admin change of the type and an increase in value(s) of metric(s) that are indicated by information in the subsets. A recommended admin change is recommended to be performed by the administrator based at least in part on a causal relationship between the recommended admin change and an increase in at least one of the value(s) of at least one of the respective metric(s).
1. A system to provide an admin change recommendation, the system comprising: memory; and one or more processors coupled to the memory, the one or more processors configured to: collect information indicating admin changes made by administrators in environments of enterprises and further indicating values of metrics resulting from the admin changes; analyze and categorize the information into a plurality of categories based at least in part on one or more characteristics of the environments in which the admin changes are made; determine a type of intended admin change that an administrator is to perform with regard to an enterprise based at least in part on an operation performed by the administrator using an enterprise management tool; cross-reference the type of the intended admin change with the information to identify a plurality of subsets of the information to which the type corresponds; infer a causal relationship between one or more admin changes that were made after an admin change of the type, as indicated by the information that is in the subsets, and an increase in one or more values of one or more respective metrics that are indicated by the information that is in the subsets, by analyzing the subsets, based at least in part on cross-referencing the type of the intended admin change with the information that is in the subsets; and recommend a recommended admin change, which the information in at least one of the subsets indicates to have been made after an admin change of the type, to be performed by the administrator based at least in part on one or more categories into which the at least one of the subsets is categorized and further based at least in part on a causal relationship between the recommended admin change and an increase in at least one of the one or more values of at least one of the one or more respective metrics. 2. The system of claim 1, wherein the one or more processors are configured to: for each admin change that is indicated by the information, determine an amount that a measure of an attribute associated with at least one of a plurality of end users or a plurality of devices that are targeted by the admin change changes in response to the admin change; and recommend the recommended admin change to be performed by the administrator further based at least in part on the amount that the measure of the attribute for each admin change with which the information in the subsets pertains changes. 3. The system of claim 2, wherein the one or more processors are configured to: collect data regarding at least one of one or more regional events or one or more global events, each regional event impacting behavior of end users of the enterprise within a limited geographical region during a period of time in which the information is collected, each global event impacting behavior of end users of the enterprise worldwide during the period of time in which the information is collected; determine an extent to which the at least one of the one or more regional events or the one or more global events changes the amount that the measure of the attribute changes for each admin change; and recommend the recommended admin change to be performed by the administrator further based at least in part on the extent to which the at least one of the one or more regional events or the one or more global events changes the amount that the measure of the attribute changes for each admin change with which the information in the subsets pertains. 4. The system of claim 2, wherein the one or more processors are configured to: analyze historical data regarding the admin changes made by the administrators to determine that a subset of a plurality of parameters that are collected with regard to the admin changes is likely to contribute to changes in corresponding measures of the attribute; and limit the information that is collected to the subset of the plurality of parameters. 5. The system of claim 2, wherein the amount that the measure of the attribute associated with at least one of the plurality of end users or the plurality of devices that are targeted by the admin change changes comprises at least one of: an amount that a user experience score associated with at least one of the plurality of end users or the plurality of devices that are targeted by the admin change changes, the user experience score indicating a quality of a user experience associated with the at least one of the plurality of end users or the plurality of devices; an amount that end user productivity of the plurality of end users who are targeted by the admin change changes; or an extent to which security of the plurality of devices that are targeted by the admin change changes. 6. The system of claim 1, wherein the one or more processors are configured to: categorize the information in each category into a plurality of sub-categories corresponding to a plurality of respective tasks that are performed by the administrators in the environments; and recommend the recommended admin change to be performed by the administrator further based at least in part on the sub-categories into which the subsets are categorized. 7. The system of claim 1, wherein the one or more processors are configured to: determine whether a human has approved recommendation of the recommended admin change to be performed by the administrator; and recommend the recommended admin change to be performed by the administrator further based at least in part on a determination that the human has approved the recommendation of the recommended admin change to be performed by the administrator. 8. The system of claim 1, wherein the one or more processors are configured to: collect historical ratings data that indicates changes in ratings of applications, which result from updates to the applications, from a rating system that is external to the enterprise; and recommend the recommended admin change to be performed by the administrator further based at least in part on the historical ratings data. 9. The system of claim 1, wherein the one or more processors are configured to: collect feedback data that indicates ratings of previous recommended admin changes, each rating received from an administrator who received a recommendation to perform the respective previous recommended admin change, each rating indicating a quality of a user experience that resulted from performance of the respective previous recommended admin change in response to receipt of the recommendation; and recommend the recommended admin change to be performed by the administrator further based at least in part on the ratings of the previous recommended admin changes. 10. The system of claim 1, wherein the one or more processors are configured to: collect feedback data that indicates whether previous recommended admin changes were performed by administrators in response to receipt of recommendations to perform the previous recommended admin changes; and recommend the recommended admin change to be performed by the administrator further based at least in part on whether the previous recommended admin changes were performed by the administrators in response to receipt of the recommendations. 11. The system of claim 1, wherein the one or more processors are configured to: determine a proportion of the administrators, who have received recommendations to perform the recommended admin change, who have performed the recommended admin change; and notify the administrator of the proportion of the administrators who have performed the recommended admin change. 12. The system of claim 11, wherein the one or more processors are configured to: determine whether the proportion of the administrators who have performed the recommended admin change is greater than or equal to a threshold; and notify the administrator of the proportion of the administrators who have performed the recommended admin change based at least in part on a determination that the proportion is greater than or equal to the threshold. 13. The system of claim 1, wherein the one or more processors are configured to: analyze recommendations of recommended admin changes that are made to the administrators and intended admin changes and categories of information on which the recommendations of the recommended admin changes are based using a machine learning technique to determine the recommended admin change to be recommended. 14. The system of claim 1, wherein the one or more processors are configured to: collect user information regarding user changes made on respective client devices of respective end users in the enterprise based at least in part on instructions from the respective end users, each instruction indicating that the respective change is to be made on the respective client device; and analyze and categorize the user information into the plurality of categories based at least in part on one or more characteristics of the environment in which the user changes are made; and cross-reference the type of the intended admin change with the information and the user information to identify the plurality of subsets to which the type corresponds. 15. A method of providing an admin change recommendation, the method comprising: determining a type of intended admin change that an administrator is to perform with regard to an enterprise based at least in part on an operation performed by the administrator using an enterprise management tool; cross-referencing the type of the intended admin change with information indicating admin changes made by administrators in respective environments of respective enterprises and further indicating values of metrics resulting from the admin changes to identify a plurality of subsets of the information to which the type corresponds; inferring a causal relationship between one or more admin changes that were made after an admin change of the type, as indicated by the information that is in the subsets, and an increase in one or more values of one or more respective metrics that are indicated by the information that is in the subsets, by analyzing the subsets, based at least in part on cross-referencing the type of the intended admin change with the information that is in the subsets; and recommending a recommended admin change, which the information in at least one of the subsets indicates to have been made after an admin change of the type, to be performed by the administrator based at least in part on one or more categories into which the at least one of the subsets is categorized and further based at least in part on a causal relationship between the recommended admin change and an increase in at least one of the one or more values of at least one of the one or more respective metrics, wherein the information is categorized into a plurality of categories that includes the one or more categories based at least in part on one or more characteristics of the environments in which the admin changes are made. 16. The method of claim 15, wherein recommending the recommended admin change comprises: recommending the recommended admin change via an admin change recommendation service; and wherein the method further comprises: offering a discount on a cost of using the admin change recommendation service to the administrator, the discount contingent on the administrator allowing information regarding admin changes made by the administrator to be collected for purposes of contributing to the information regarding the admin changes made by the administrators in the respective environments of the respective enterprises. 17. The method of claim 15, further comprising: determining that the administrator initiates performance of the recommended admin change; and populating a plurality of fields that define a plurality of respective attributes of the recommended admin change in an electronic form based at least in part on a determination that the administrator initiates the performance of the recommended admin change. 18. The method of claim 17, further comprising: providing an inquiry to the administrator, the inquiry requesting confirmation that the recommended admin change is to be performed in accordance with the attributes that are defined by the respective fields; and performing the recommended admin change in accordance with the attributes that are defined by the respective fields based at least in part on receipt of the confirmation from the administrator. 19. The method of claim 15, further comprising: determining that a human has approved recommendation of the recommended admin change to be performed by the administrator; wherein recommending the recommended admin change comprises: recommending the recommended admin change to be performed by the administrator further based at least in part on a determination that the human has approved the recommendation of the recommended admin change to be performed by the administrator. 20. A computer program product comprising a computer-readable storage medium having instructions recorded thereon for enabling a processor-based system to perform operations to provide an admin change recommendation, the operations comprising: determine a type of intended admin change that an administrator is to perform with regard to an enterprise based at least in part on an operation performed by the administrator using an enterprise management tool; cross-reference the type of the intended admin change with information indicating admin changes made by administrators in respective environments of respective enterprises and further indicating values of metrics resulting from the admin changes to identify a plurality of subsets of the information to which the type corresponds; infer a causal relationship between one or more admin changes that were made after an admin change of the type, as indicated by the information that is in the subsets, and an increase in one or more values of one or more respective metrics that are indicated by the information that is in the subsets, by analyzing the subsets, based at least in part on cross-referencing the type of the intended admin change with the information that is in the subsets; and recommend a recommended admin change, which the information in at least one of the subsets indicates to have been made after an admin change of the type, to be performed by the administrator based at least in part on one or more categories into which the at least one of the subsets is categorized and further based at least in part on a causal relationship between the recommended admin change and an increase in at least one of the one or more values of at least one of the one or more respective metrics, wherein the information is categorized into a plurality of categories that includes the one or more categories based at least in part on one or more characteristics of the environments in which the admin changes are made.
Techniques are described herein that are capable of providing a recommendation of an admin change (i.e., an admin change recommendation) in an enterprise. A type of intended admin change that an administrator is to perform with regard to an enterprise is determined. The type is cross-referenced with information indicating admin changes made by administrator(s) in environment(s) of enterprise(s) and values of metrics resulting therefrom to identify subsets of the information to which the type corresponds. A causal relationship is inferred between admin change(s) made after an admin change of the type and an increase in value(s) of metric(s) that are indicated by information in the subsets. A recommended admin change is recommended to be performed by the administrator based at least in part on a causal relationship between the recommended admin change and an increase in at least one of the value(s) of at least one of the respective metric(s).1. A system to provide an admin change recommendation, the system comprising: memory; and one or more processors coupled to the memory, the one or more processors configured to: collect information indicating admin changes made by administrators in environments of enterprises and further indicating values of metrics resulting from the admin changes; analyze and categorize the information into a plurality of categories based at least in part on one or more characteristics of the environments in which the admin changes are made; determine a type of intended admin change that an administrator is to perform with regard to an enterprise based at least in part on an operation performed by the administrator using an enterprise management tool; cross-reference the type of the intended admin change with the information to identify a plurality of subsets of the information to which the type corresponds; infer a causal relationship between one or more admin changes that were made after an admin change of the type, as indicated by the information that is in the subsets, and an increase in one or more values of one or more respective metrics that are indicated by the information that is in the subsets, by analyzing the subsets, based at least in part on cross-referencing the type of the intended admin change with the information that is in the subsets; and recommend a recommended admin change, which the information in at least one of the subsets indicates to have been made after an admin change of the type, to be performed by the administrator based at least in part on one or more categories into which the at least one of the subsets is categorized and further based at least in part on a causal relationship between the recommended admin change and an increase in at least one of the one or more values of at least one of the one or more respective metrics. 2. The system of claim 1, wherein the one or more processors are configured to: for each admin change that is indicated by the information, determine an amount that a measure of an attribute associated with at least one of a plurality of end users or a plurality of devices that are targeted by the admin change changes in response to the admin change; and recommend the recommended admin change to be performed by the administrator further based at least in part on the amount that the measure of the attribute for each admin change with which the information in the subsets pertains changes. 3. The system of claim 2, wherein the one or more processors are configured to: collect data regarding at least one of one or more regional events or one or more global events, each regional event impacting behavior of end users of the enterprise within a limited geographical region during a period of time in which the information is collected, each global event impacting behavior of end users of the enterprise worldwide during the period of time in which the information is collected; determine an extent to which the at least one of the one or more regional events or the one or more global events changes the amount that the measure of the attribute changes for each admin change; and recommend the recommended admin change to be performed by the administrator further based at least in part on the extent to which the at least one of the one or more regional events or the one or more global events changes the amount that the measure of the attribute changes for each admin change with which the information in the subsets pertains. 4. The system of claim 2, wherein the one or more processors are configured to: analyze historical data regarding the admin changes made by the administrators to determine that a subset of a plurality of parameters that are collected with regard to the admin changes is likely to contribute to changes in corresponding measures of the attribute; and limit the information that is collected to the subset of the plurality of parameters. 5. The system of claim 2, wherein the amount that the measure of the attribute associated with at least one of the plurality of end users or the plurality of devices that are targeted by the admin change changes comprises at least one of: an amount that a user experience score associated with at least one of the plurality of end users or the plurality of devices that are targeted by the admin change changes, the user experience score indicating a quality of a user experience associated with the at least one of the plurality of end users or the plurality of devices; an amount that end user productivity of the plurality of end users who are targeted by the admin change changes; or an extent to which security of the plurality of devices that are targeted by the admin change changes. 6. The system of claim 1, wherein the one or more processors are configured to: categorize the information in each category into a plurality of sub-categories corresponding to a plurality of respective tasks that are performed by the administrators in the environments; and recommend the recommended admin change to be performed by the administrator further based at least in part on the sub-categories into which the subsets are categorized. 7. The system of claim 1, wherein the one or more processors are configured to: determine whether a human has approved recommendation of the recommended admin change to be performed by the administrator; and recommend the recommended admin change to be performed by the administrator further based at least in part on a determination that the human has approved the recommendation of the recommended admin change to be performed by the administrator. 8. The system of claim 1, wherein the one or more processors are configured to: collect historical ratings data that indicates changes in ratings of applications, which result from updates to the applications, from a rating system that is external to the enterprise; and recommend the recommended admin change to be performed by the administrator further based at least in part on the historical ratings data. 9. The system of claim 1, wherein the one or more processors are configured to: collect feedback data that indicates ratings of previous recommended admin changes, each rating received from an administrator who received a recommendation to perform the respective previous recommended admin change, each rating indicating a quality of a user experience that resulted from performance of the respective previous recommended admin change in response to receipt of the recommendation; and recommend the recommended admin change to be performed by the administrator further based at least in part on the ratings of the previous recommended admin changes. 10. The system of claim 1, wherein the one or more processors are configured to: collect feedback data that indicates whether previous recommended admin changes were performed by administrators in response to receipt of recommendations to perform the previous recommended admin changes; and recommend the recommended admin change to be performed by the administrator further based at least in part on whether the previous recommended admin changes were performed by the administrators in response to receipt of the recommendations. 11. The system of claim 1, wherein the one or more processors are configured to: determine a proportion of the administrators, who have received recommendations to perform the recommended admin change, who have performed the recommended admin change; and notify the administrator of the proportion of the administrators who have performed the recommended admin change. 12. The system of claim 11, wherein the one or more processors are configured to: determine whether the proportion of the administrators who have performed the recommended admin change is greater than or equal to a threshold; and notify the administrator of the proportion of the administrators who have performed the recommended admin change based at least in part on a determination that the proportion is greater than or equal to the threshold. 13. The system of claim 1, wherein the one or more processors are configured to: analyze recommendations of recommended admin changes that are made to the administrators and intended admin changes and categories of information on which the recommendations of the recommended admin changes are based using a machine learning technique to determine the recommended admin change to be recommended. 14. The system of claim 1, wherein the one or more processors are configured to: collect user information regarding user changes made on respective client devices of respective end users in the enterprise based at least in part on instructions from the respective end users, each instruction indicating that the respective change is to be made on the respective client device; and analyze and categorize the user information into the plurality of categories based at least in part on one or more characteristics of the environment in which the user changes are made; and cross-reference the type of the intended admin change with the information and the user information to identify the plurality of subsets to which the type corresponds. 15. A method of providing an admin change recommendation, the method comprising: determining a type of intended admin change that an administrator is to perform with regard to an enterprise based at least in part on an operation performed by the administrator using an enterprise management tool; cross-referencing the type of the intended admin change with information indicating admin changes made by administrators in respective environments of respective enterprises and further indicating values of metrics resulting from the admin changes to identify a plurality of subsets of the information to which the type corresponds; inferring a causal relationship between one or more admin changes that were made after an admin change of the type, as indicated by the information that is in the subsets, and an increase in one or more values of one or more respective metrics that are indicated by the information that is in the subsets, by analyzing the subsets, based at least in part on cross-referencing the type of the intended admin change with the information that is in the subsets; and recommending a recommended admin change, which the information in at least one of the subsets indicates to have been made after an admin change of the type, to be performed by the administrator based at least in part on one or more categories into which the at least one of the subsets is categorized and further based at least in part on a causal relationship between the recommended admin change and an increase in at least one of the one or more values of at least one of the one or more respective metrics, wherein the information is categorized into a plurality of categories that includes the one or more categories based at least in part on one or more characteristics of the environments in which the admin changes are made. 16. The method of claim 15, wherein recommending the recommended admin change comprises: recommending the recommended admin change via an admin change recommendation service; and wherein the method further comprises: offering a discount on a cost of using the admin change recommendation service to the administrator, the discount contingent on the administrator allowing information regarding admin changes made by the administrator to be collected for purposes of contributing to the information regarding the admin changes made by the administrators in the respective environments of the respective enterprises. 17. The method of claim 15, further comprising: determining that the administrator initiates performance of the recommended admin change; and populating a plurality of fields that define a plurality of respective attributes of the recommended admin change in an electronic form based at least in part on a determination that the administrator initiates the performance of the recommended admin change. 18. The method of claim 17, further comprising: providing an inquiry to the administrator, the inquiry requesting confirmation that the recommended admin change is to be performed in accordance with the attributes that are defined by the respective fields; and performing the recommended admin change in accordance with the attributes that are defined by the respective fields based at least in part on receipt of the confirmation from the administrator. 19. The method of claim 15, further comprising: determining that a human has approved recommendation of the recommended admin change to be performed by the administrator; wherein recommending the recommended admin change comprises: recommending the recommended admin change to be performed by the administrator further based at least in part on a determination that the human has approved the recommendation of the recommended admin change to be performed by the administrator. 20. A computer program product comprising a computer-readable storage medium having instructions recorded thereon for enabling a processor-based system to perform operations to provide an admin change recommendation, the operations comprising: determine a type of intended admin change that an administrator is to perform with regard to an enterprise based at least in part on an operation performed by the administrator using an enterprise management tool; cross-reference the type of the intended admin change with information indicating admin changes made by administrators in respective environments of respective enterprises and further indicating values of metrics resulting from the admin changes to identify a plurality of subsets of the information to which the type corresponds; infer a causal relationship between one or more admin changes that were made after an admin change of the type, as indicated by the information that is in the subsets, and an increase in one or more values of one or more respective metrics that are indicated by the information that is in the subsets, by analyzing the subsets, based at least in part on cross-referencing the type of the intended admin change with the information that is in the subsets; and recommend a recommended admin change, which the information in at least one of the subsets indicates to have been made after an admin change of the type, to be performed by the administrator based at least in part on one or more categories into which the at least one of the subsets is categorized and further based at least in part on a causal relationship between the recommended admin change and an increase in at least one of the one or more values of at least one of the one or more respective metrics, wherein the information is categorized into a plurality of categories that includes the one or more categories based at least in part on one or more characteristics of the environments in which the admin changes are made.
3,700
340,153
16,801,140
3,715
The present disclosure generally relates to a multi-leaf collimator. The multi-leaf collimator may include a set of leaves installed in a cavity, each leaf of the set of leaves having a length along a first direction. At least a portion of the set of leaves may extend beyond the cavity along the first direction. The set of leaves may be arranged along a second direction, the second direction being different from the first direction. A length of a target leaf of the set of leaves may be less than a length of a reference leaf of the set of leaves. The target leaf may be located in an end portion of the set of leaves along the second direction. The length of the set of leaves may conform to the shape of a maximum therapeutic radiation field.
1. A multi-leaf collimator, comprising: a set of leaves installed in a cavity, each leaf of the set of leaves having a length along a first direction, at least a portion of the set of leaves extending beyond the cavity along the first direction, wherein the set of leaves are arranged along a second direction, the second direction being different from the first direction, and a length of a target leaf of the set of leaves is less than a length of a reference leaf of the set of leaves, wherein the target leaf is located in an end portion of the set of leaves along the second direction. 2. The multi-leaf collimator of claim 1, wherein the set of leaves include a plurality of target leaves located at both end portions of the set of leaves along the second direction. 3. The multi-leaf collimator of claim 1, wherein the set of leaves include a group of reference leaves of a same length, and a plurality of target leaves located on both sides along the second direction of the group of reference leaves, wherein lengths of at least two of the plurality of target leaves are different from each other. 4. The multi-leaf collimator of claim 3, wherein the lengths of the at least two of the plurality of target leaves gradually increase or decrease along the second direction. 5. The multi-leaf collimator of claim 1, further comprising a box, wherein the cavity is within the box, and a dimension of at least one end portion of the box is less than a dimension of a middle portion of the box. 6. The multi-leaf collimator of claim 1, wherein: each leaf of the set of leaves is located in a leaf plane, and a plurality of leaf planes intersect substantially at a focus point. 7. The multi-leaf collimator of claim 1, further comprising: a second set of leaves installed in a second cavity, each leaf of the second set of leaves having a length along a first direction, at least a portion of the second set of leaves extending beyond the second cavity along the first direction, wherein the second set of leaves are arranged along the second direction, a length of a second target leaf of the second set of leaves is less than a length of a second reference leaf of the second set of leaves, wherein the second target leaf is located in an end portion of the second set of leaves along the second direction, the set of leaves are disposed in a first plane, and the second set of leaves are disposed in a second plane, the second plane being different from the first plane. 8. The multi-leaf collimator of claim 7, wherein the second set of leaves include a plurality of second target leaves located in both end portions of the second set of leaves along the second direction. 9. The multi-leaf collimator of claim 8, wherein the lengths of the at least two of the plurality of second target leaves gradually increase or decrease along the second direction. 10. The multi-leaf collimator of claim 7, wherein the second set of leaves include a group of second reference leaves of a same length, and a plurality of second target leaves located on both sides along the second direction of the group of second reference leaves, wherein lengths of at least two of the plurality of second target leaves are different from each other. 11. The multi-leaf collimator of claim 7, further comprising a second box, wherein the second cavity is within the second box, and a dimension of at least one end portion of the second box is less than a dimension of a middle portion of the second box. 12. The multi-leaf collimator of claim 7, wherein the set of leaves and the second set of leaves are staggered such that radiation that leaks through an inter-leaf space between a pair of neighboring leaves of at least some of the set of leaves is at least partially blocked by a leaf of the second set of leaves. 13. The multi-leaf collimator of claim 7, wherein: each leaf of the second set of leaves is located in a second leaf plane, and a plurality of second leaf planes intersect substantially at a second focus point. 14. The multi-leaf collimator of claim 7, wherein a width of each of at least some of the set of leaves projected onto a third plane is the same as a width of each of at least some of the second set of leaves projected onto the third plane, wherein the third plan is parallel to the first direction and the second direction. 15. A radiation therapy (RT) device including a multi-leaf collimator, wherein the multi-leaf collimator includes: a set of leaves installed in a cavity, each leaf of the set of leaves having a length along a first direction, at least a portion of the set of leaves extending beyond the cavity along a first direction, wherein the set of leaves are arranged along a second direction, the second direction being different from the first direction, and a length of a target leaf of the set of leaves is less than a length of a reference leaf of the set of leaves, wherein the target leaf is located in an end portion of the set of leaves along the second direction. 16. The RT device of claim 15, wherein the multi-leaf collimator includes: a second set of leaves installed in a second cavity, each leaf of the second set of leaves having a length along the first direction, at least a portion of the second set of leaves extending beyond the second cavity along the first direction, wherein the second set of leaves are arranged along the second direction, a length of a second target leaf of the second set of leaves is less than a length of a second reference leaf of the second set of leaves, wherein the second target leaf is located in an end portion of the second set of leaves along the second direction, the set of leaves are disposed in a first plane, and the second set of leaves are disposed in a second plane, the second plane being different from the first plane. 17. The RT device of claim 16, wherein the multi-leaf collimator includes: a first pair of boxes that are symmetrically disposed with respect to the second direction, wherein each of the first pair of boxes includes the cavity where the set of leaves are located; and a second pair of boxes that are symmetrically disposed with respect to the second direction, wherein each of the second pair of boxes includes the second cavity where the second set of leaves are located, and each leaf of the sets of leaves and the second sets of leaves is movable along the first direction, and each box of the first pair of boxes and the second pair of boxes is movable along the first direction. 18. The RT device of claim 16, wherein a width of each of at least some of the set of leaves projected onto a third plane is the same as a width of each of at least some of the second set of leaves projected onto the third plane, the third plane being an isocentric plane. 19. The RT device of claim 15, wherein the set of leaves include: a group of reference leaves of a same length, and a plurality of target leaves located on both sides along the second direction of the group of reference leaves, wherein lengths of at least two of the plurality of target leaves are different from each other. 20. The RT device of claim 19, wherein the lengths of the at least two of the plurality of target leaves gradually increase or decrease along the second direction.
The present disclosure generally relates to a multi-leaf collimator. The multi-leaf collimator may include a set of leaves installed in a cavity, each leaf of the set of leaves having a length along a first direction. At least a portion of the set of leaves may extend beyond the cavity along the first direction. The set of leaves may be arranged along a second direction, the second direction being different from the first direction. A length of a target leaf of the set of leaves may be less than a length of a reference leaf of the set of leaves. The target leaf may be located in an end portion of the set of leaves along the second direction. The length of the set of leaves may conform to the shape of a maximum therapeutic radiation field.1. A multi-leaf collimator, comprising: a set of leaves installed in a cavity, each leaf of the set of leaves having a length along a first direction, at least a portion of the set of leaves extending beyond the cavity along the first direction, wherein the set of leaves are arranged along a second direction, the second direction being different from the first direction, and a length of a target leaf of the set of leaves is less than a length of a reference leaf of the set of leaves, wherein the target leaf is located in an end portion of the set of leaves along the second direction. 2. The multi-leaf collimator of claim 1, wherein the set of leaves include a plurality of target leaves located at both end portions of the set of leaves along the second direction. 3. The multi-leaf collimator of claim 1, wherein the set of leaves include a group of reference leaves of a same length, and a plurality of target leaves located on both sides along the second direction of the group of reference leaves, wherein lengths of at least two of the plurality of target leaves are different from each other. 4. The multi-leaf collimator of claim 3, wherein the lengths of the at least two of the plurality of target leaves gradually increase or decrease along the second direction. 5. The multi-leaf collimator of claim 1, further comprising a box, wherein the cavity is within the box, and a dimension of at least one end portion of the box is less than a dimension of a middle portion of the box. 6. The multi-leaf collimator of claim 1, wherein: each leaf of the set of leaves is located in a leaf plane, and a plurality of leaf planes intersect substantially at a focus point. 7. The multi-leaf collimator of claim 1, further comprising: a second set of leaves installed in a second cavity, each leaf of the second set of leaves having a length along a first direction, at least a portion of the second set of leaves extending beyond the second cavity along the first direction, wherein the second set of leaves are arranged along the second direction, a length of a second target leaf of the second set of leaves is less than a length of a second reference leaf of the second set of leaves, wherein the second target leaf is located in an end portion of the second set of leaves along the second direction, the set of leaves are disposed in a first plane, and the second set of leaves are disposed in a second plane, the second plane being different from the first plane. 8. The multi-leaf collimator of claim 7, wherein the second set of leaves include a plurality of second target leaves located in both end portions of the second set of leaves along the second direction. 9. The multi-leaf collimator of claim 8, wherein the lengths of the at least two of the plurality of second target leaves gradually increase or decrease along the second direction. 10. The multi-leaf collimator of claim 7, wherein the second set of leaves include a group of second reference leaves of a same length, and a plurality of second target leaves located on both sides along the second direction of the group of second reference leaves, wherein lengths of at least two of the plurality of second target leaves are different from each other. 11. The multi-leaf collimator of claim 7, further comprising a second box, wherein the second cavity is within the second box, and a dimension of at least one end portion of the second box is less than a dimension of a middle portion of the second box. 12. The multi-leaf collimator of claim 7, wherein the set of leaves and the second set of leaves are staggered such that radiation that leaks through an inter-leaf space between a pair of neighboring leaves of at least some of the set of leaves is at least partially blocked by a leaf of the second set of leaves. 13. The multi-leaf collimator of claim 7, wherein: each leaf of the second set of leaves is located in a second leaf plane, and a plurality of second leaf planes intersect substantially at a second focus point. 14. The multi-leaf collimator of claim 7, wherein a width of each of at least some of the set of leaves projected onto a third plane is the same as a width of each of at least some of the second set of leaves projected onto the third plane, wherein the third plan is parallel to the first direction and the second direction. 15. A radiation therapy (RT) device including a multi-leaf collimator, wherein the multi-leaf collimator includes: a set of leaves installed in a cavity, each leaf of the set of leaves having a length along a first direction, at least a portion of the set of leaves extending beyond the cavity along a first direction, wherein the set of leaves are arranged along a second direction, the second direction being different from the first direction, and a length of a target leaf of the set of leaves is less than a length of a reference leaf of the set of leaves, wherein the target leaf is located in an end portion of the set of leaves along the second direction. 16. The RT device of claim 15, wherein the multi-leaf collimator includes: a second set of leaves installed in a second cavity, each leaf of the second set of leaves having a length along the first direction, at least a portion of the second set of leaves extending beyond the second cavity along the first direction, wherein the second set of leaves are arranged along the second direction, a length of a second target leaf of the second set of leaves is less than a length of a second reference leaf of the second set of leaves, wherein the second target leaf is located in an end portion of the second set of leaves along the second direction, the set of leaves are disposed in a first plane, and the second set of leaves are disposed in a second plane, the second plane being different from the first plane. 17. The RT device of claim 16, wherein the multi-leaf collimator includes: a first pair of boxes that are symmetrically disposed with respect to the second direction, wherein each of the first pair of boxes includes the cavity where the set of leaves are located; and a second pair of boxes that are symmetrically disposed with respect to the second direction, wherein each of the second pair of boxes includes the second cavity where the second set of leaves are located, and each leaf of the sets of leaves and the second sets of leaves is movable along the first direction, and each box of the first pair of boxes and the second pair of boxes is movable along the first direction. 18. The RT device of claim 16, wherein a width of each of at least some of the set of leaves projected onto a third plane is the same as a width of each of at least some of the second set of leaves projected onto the third plane, the third plane being an isocentric plane. 19. The RT device of claim 15, wherein the set of leaves include: a group of reference leaves of a same length, and a plurality of target leaves located on both sides along the second direction of the group of reference leaves, wherein lengths of at least two of the plurality of target leaves are different from each other. 20. The RT device of claim 19, wherein the lengths of the at least two of the plurality of target leaves gradually increase or decrease along the second direction.
3,700
340,154
16,801,132
2,896
A method of operating an electrical generator with a control unit may include: providing an electrical output voltage by rotating a rotor unit relative to a stator unit at a given rotation speed; providing the control unit with a control unit supply voltage; determining a control unit supply voltage value of the control unit supply voltage; providing the rotor unit with a rotor supply voltage; determining a rotation speed of the rotor unit; determining an ambient temperature of the electrical generator; determining a rotor supply voltage value for the determined rotation speed, and the determined ambient temperature and the determined control unit supply voltage value at which the electrical generator may have a maximal permitted thermal load; and operating the electrical generator at the maximal permitted thermal load by at least one of adjusting and controlling the rotor supply voltage of the rotor unit to the determined rotor supply voltage value.
1. A method of operating an electrical generator with a control unit, comprising: providing an electrical output voltage by rotating a rotor unit relative to a stator unit at a given rotation speed; providing the control unit with a control unit supply voltage; determining, via the control unit, a control unit supply voltage value of the control unit supply voltage; providing, via the control unit, the rotor unit with a rotor supply voltage; determining, via the control unit, a rotation speed of the rotor unit; determining, via the control unit, an ambient temperature of the electrical generator; determining, via the control unit, a rotor supply voltage value for the determined rotation speed, and the determined ambient temperature and the determined control unit supply voltage value at which the electrical generator has a maximal permitted thermal load; and operating, via the control unit, the electrical generator at the maximal permitted thermal load by at least one of adjusting and controlling the rotor supply voltage of the rotor unit to the determined rotor supply voltage value. 2. The method according to claim 1, wherein: the control unit supply voltage is an external control unit supply voltage provided by an external voltage source; the control unit supply voltage is an internal control unit supply voltage provided by the electrical output voltage of the electrical generator; or the control unit supply voltage is a combination of an external control unit supply voltage provided by an external voltage source and an internal control unit supply voltage provided by the electrical output voltage of the electrical generator. 3. The method according to claim 1, wherein: the control unit provides a data storage unit in which at least one value table is stored; the control unit determines the rotor supply voltage value to be applied to the rotor unit by comparing the determined rotation speed, the determined ambient temperature and the determined control unit supply voltage value with the at least one stored value table; and the at least one stored value table provides the relation between rotation speed of the rotor unit, the ambient temperature of the electrical generator, the determined control unit supply voltage value and a required rotor supply voltage value for an operation of the electrical generator at a maximal permitted thermal load. 4. The method according to claim 3, wherein the at least one stored value table is determined by: at least one of measuring and adjusting the rotation speed of the rotor unit, the ambient temperature of the electrical generator and the determined control unit supply voltage value; measuring the thermal load of the electrical generator, while the rotor supply voltage of the rotor unit is adjusted until the thermal load of the electrical generator reaches the maximal permitted thermal load; and storing in the value table: the rotor supply voltage value at which the maximal permitted thermal load of the electrical generator is achieved with the corresponding rotation speed of the rotor unit, the ambient temperature of the electrical generator and the determined control unit supply voltage value. 5. The method according to claim 4, wherein the at least one stored value table is determined by: at least one of measuring and adjusting the rotation speed of the rotor unit in a rotation speed range of 1100 to 15000 rpm; at least one of measuring and adjusting the ambient temperature of the electrical generator in a temperature range of 15° C. to 130° C.; and adjusting the control unit supply voltage value between 5V and 60V. 6. The method according to claim 1, wherein the electrical generator exceeds the maximal permitted thermal load for a predefined time period in order to improve the step load response of the electrical generator. 7. The method according to claim 6, wherein the rotor unit is supplied with at least one of the internal control unit supply voltage and the external control unit supply voltage during the predefined time period without voltage limitation. 8. The method according to claim 6, wherein the control unit initiates a cooling procedure after the predefined time period in order to reduce the thermal load of the electrical generator to the maximal permitted thermal load. 9. The method according to claim 1, wherein a predefined electrical output voltage of the electrical generator is at least one of maintained and controlled by the control unit. 10. A control unit for an electrical generator configured to: receive a control unit supply voltage; determine a control unit supply voltage value of the control unit supply voltage; provide a rotor unit with a rotor supply voltage; determine a rotation speed of the rotor unit; determine an ambient temperature of the electrical generator; determine a rotor supply voltage value for the determined rotation speed, and the determined ambient temperature and the determined control unit supply voltage value at which the electrical generator has a maximal permitted thermal load; and operate the electrical generator at the maximal permitted thermal load by at least one of adjusting and controlling the rotor supply voltage of the rotor unit to the determined rotor supply voltage value. 11. The control unit according to claim 10, comprising at least one: an ambient temperature unit for determining the ambient temperature of the electrical generator; a rotation speed unit for determining the rotation speed of the rotor unit; a rotor supply voltage unit for controlling and/or adjusting the rotor supply voltage of the rotor unit; a control unit supply voltage unit for determining the control unit supply voltage value of the control unit supply voltage; a data storage unit for storing at least one value table; and an output voltage control unit for at least one of controlling and maintaining a predefined electrical output voltage of the electrical generator. 12. An electrical generator comprising: a rotor unit with at least one rotor coil; a stator unit with at least one stator coil, the rotor unit being rotated relative to the stator unit at a given rotation speed; and a control unit configured to: receive a control unit supply voltage; determine a control unit supply voltage value of the control unit supply voltage; provide the rotor unit with a rotor supply voltage; determine a rotation speed of the rotor unit; determine an ambient temperature of the electrical generator; determine a rotor supply voltage value for the determined rotation speed, and the determined ambient temperature and the determined control unit supply voltage value at which the electrical generator has a maximal permitted thermal load; and operate the electrical generator at the maximal permitted thermal load by at least one of adjusting and controlling the rotor supply voltage of the rotor unit to the determined rotor supply voltage value. 13. The electrical generator according to claim 12, wherein the electrical generator is at least one of formed and operated as a batteryless system. 14. The electrical generator according to claim 12, further comprising at least one of: a rectifier unit which converts the alternating voltage of the stator coil to a direct voltage; a safety unit for limiting the electrical output voltage to a maximum electrical output voltage; and a capacitor unit for reducing electrical output voltage ripples. 15. The electrical generator according to claim 12, wherein the stator unit has three stator coils arranged in a star configuration or in a delta configuration. 16. The electrical generator according to, wherein at least one of the rotor unit and the rotor coil is optimized for an operation beyond at least one of a critical operation rotation frequency and a critical rotation speed. 17. The electrical generator according to claim 12, wherein at least one of the rotor unit and the rotor coil provides an ampere-turn value of at least 2900 At at a control unit supply voltage of 14V, 28V, 48V or 56V and an ambient temperature of 20° C. 18. The electrical generator according to claim 17, wherein at least one of the rotor unit and the rotor coil has at least 300 turns. 19. A computer program comprising instructions to: provide an electrical output voltage by rotating a rotor unit relative to a stator unit at a given rotation speed; provide a control unit with a control unit supply voltage; determine, by the control unit a control unit supply voltage value of the control unit supply voltage; provide, by the control unit, the rotor unit with a rotor supply voltage; determine, by the control unit, a rotation speed of the rotor unit; determine, by the control unit, an ambient temperature of the electrical generator; determine, by the control unit, a rotor supply voltage value for the determined rotation speed, and the determined ambient temperature and the determined control unit supply voltage value at which the electrical generator has a maximal permitted thermal load; and operate, by the control unit the electrical generator at the maximal permitted thermal load by at least one of adjusting and controlling the rotor supply voltage of the rotor unit to the determined rotor supply voltage value. 20. A non-transitory computer-readable medium having instructions stored thereon to: provide an electrical output voltage by rotating a rotor unit relative to a stator unit at a given rotation speed; provide a control unit with a control unit supply voltage; determine, by the control unit a control unit supply voltage value of the control unit supply voltage; provide, by the control unit, the rotor unit with a rotor supply voltage; determine, by the control unit, a rotation speed of the rotor unit; determine, by the control unit, an ambient temperature of the electrical generator; determine, by the control unit, a rotor supply voltage value for the determined rotation speed, and the determined ambient temperature and the determined control unit supply voltage value at which the electrical generator has a maximal permitted thermal load; and operate, by the control unit the electrical generator at the maximal permitted thermal load by at least one of adjusting and controlling the rotor supply voltage of the rotor unit to the determined rotor supply voltage value.
A method of operating an electrical generator with a control unit may include: providing an electrical output voltage by rotating a rotor unit relative to a stator unit at a given rotation speed; providing the control unit with a control unit supply voltage; determining a control unit supply voltage value of the control unit supply voltage; providing the rotor unit with a rotor supply voltage; determining a rotation speed of the rotor unit; determining an ambient temperature of the electrical generator; determining a rotor supply voltage value for the determined rotation speed, and the determined ambient temperature and the determined control unit supply voltage value at which the electrical generator may have a maximal permitted thermal load; and operating the electrical generator at the maximal permitted thermal load by at least one of adjusting and controlling the rotor supply voltage of the rotor unit to the determined rotor supply voltage value.1. A method of operating an electrical generator with a control unit, comprising: providing an electrical output voltage by rotating a rotor unit relative to a stator unit at a given rotation speed; providing the control unit with a control unit supply voltage; determining, via the control unit, a control unit supply voltage value of the control unit supply voltage; providing, via the control unit, the rotor unit with a rotor supply voltage; determining, via the control unit, a rotation speed of the rotor unit; determining, via the control unit, an ambient temperature of the electrical generator; determining, via the control unit, a rotor supply voltage value for the determined rotation speed, and the determined ambient temperature and the determined control unit supply voltage value at which the electrical generator has a maximal permitted thermal load; and operating, via the control unit, the electrical generator at the maximal permitted thermal load by at least one of adjusting and controlling the rotor supply voltage of the rotor unit to the determined rotor supply voltage value. 2. The method according to claim 1, wherein: the control unit supply voltage is an external control unit supply voltage provided by an external voltage source; the control unit supply voltage is an internal control unit supply voltage provided by the electrical output voltage of the electrical generator; or the control unit supply voltage is a combination of an external control unit supply voltage provided by an external voltage source and an internal control unit supply voltage provided by the electrical output voltage of the electrical generator. 3. The method according to claim 1, wherein: the control unit provides a data storage unit in which at least one value table is stored; the control unit determines the rotor supply voltage value to be applied to the rotor unit by comparing the determined rotation speed, the determined ambient temperature and the determined control unit supply voltage value with the at least one stored value table; and the at least one stored value table provides the relation between rotation speed of the rotor unit, the ambient temperature of the electrical generator, the determined control unit supply voltage value and a required rotor supply voltage value for an operation of the electrical generator at a maximal permitted thermal load. 4. The method according to claim 3, wherein the at least one stored value table is determined by: at least one of measuring and adjusting the rotation speed of the rotor unit, the ambient temperature of the electrical generator and the determined control unit supply voltage value; measuring the thermal load of the electrical generator, while the rotor supply voltage of the rotor unit is adjusted until the thermal load of the electrical generator reaches the maximal permitted thermal load; and storing in the value table: the rotor supply voltage value at which the maximal permitted thermal load of the electrical generator is achieved with the corresponding rotation speed of the rotor unit, the ambient temperature of the electrical generator and the determined control unit supply voltage value. 5. The method according to claim 4, wherein the at least one stored value table is determined by: at least one of measuring and adjusting the rotation speed of the rotor unit in a rotation speed range of 1100 to 15000 rpm; at least one of measuring and adjusting the ambient temperature of the electrical generator in a temperature range of 15° C. to 130° C.; and adjusting the control unit supply voltage value between 5V and 60V. 6. The method according to claim 1, wherein the electrical generator exceeds the maximal permitted thermal load for a predefined time period in order to improve the step load response of the electrical generator. 7. The method according to claim 6, wherein the rotor unit is supplied with at least one of the internal control unit supply voltage and the external control unit supply voltage during the predefined time period without voltage limitation. 8. The method according to claim 6, wherein the control unit initiates a cooling procedure after the predefined time period in order to reduce the thermal load of the electrical generator to the maximal permitted thermal load. 9. The method according to claim 1, wherein a predefined electrical output voltage of the electrical generator is at least one of maintained and controlled by the control unit. 10. A control unit for an electrical generator configured to: receive a control unit supply voltage; determine a control unit supply voltage value of the control unit supply voltage; provide a rotor unit with a rotor supply voltage; determine a rotation speed of the rotor unit; determine an ambient temperature of the electrical generator; determine a rotor supply voltage value for the determined rotation speed, and the determined ambient temperature and the determined control unit supply voltage value at which the electrical generator has a maximal permitted thermal load; and operate the electrical generator at the maximal permitted thermal load by at least one of adjusting and controlling the rotor supply voltage of the rotor unit to the determined rotor supply voltage value. 11. The control unit according to claim 10, comprising at least one: an ambient temperature unit for determining the ambient temperature of the electrical generator; a rotation speed unit for determining the rotation speed of the rotor unit; a rotor supply voltage unit for controlling and/or adjusting the rotor supply voltage of the rotor unit; a control unit supply voltage unit for determining the control unit supply voltage value of the control unit supply voltage; a data storage unit for storing at least one value table; and an output voltage control unit for at least one of controlling and maintaining a predefined electrical output voltage of the electrical generator. 12. An electrical generator comprising: a rotor unit with at least one rotor coil; a stator unit with at least one stator coil, the rotor unit being rotated relative to the stator unit at a given rotation speed; and a control unit configured to: receive a control unit supply voltage; determine a control unit supply voltage value of the control unit supply voltage; provide the rotor unit with a rotor supply voltage; determine a rotation speed of the rotor unit; determine an ambient temperature of the electrical generator; determine a rotor supply voltage value for the determined rotation speed, and the determined ambient temperature and the determined control unit supply voltage value at which the electrical generator has a maximal permitted thermal load; and operate the electrical generator at the maximal permitted thermal load by at least one of adjusting and controlling the rotor supply voltage of the rotor unit to the determined rotor supply voltage value. 13. The electrical generator according to claim 12, wherein the electrical generator is at least one of formed and operated as a batteryless system. 14. The electrical generator according to claim 12, further comprising at least one of: a rectifier unit which converts the alternating voltage of the stator coil to a direct voltage; a safety unit for limiting the electrical output voltage to a maximum electrical output voltage; and a capacitor unit for reducing electrical output voltage ripples. 15. The electrical generator according to claim 12, wherein the stator unit has three stator coils arranged in a star configuration or in a delta configuration. 16. The electrical generator according to, wherein at least one of the rotor unit and the rotor coil is optimized for an operation beyond at least one of a critical operation rotation frequency and a critical rotation speed. 17. The electrical generator according to claim 12, wherein at least one of the rotor unit and the rotor coil provides an ampere-turn value of at least 2900 At at a control unit supply voltage of 14V, 28V, 48V or 56V and an ambient temperature of 20° C. 18. The electrical generator according to claim 17, wherein at least one of the rotor unit and the rotor coil has at least 300 turns. 19. A computer program comprising instructions to: provide an electrical output voltage by rotating a rotor unit relative to a stator unit at a given rotation speed; provide a control unit with a control unit supply voltage; determine, by the control unit a control unit supply voltage value of the control unit supply voltage; provide, by the control unit, the rotor unit with a rotor supply voltage; determine, by the control unit, a rotation speed of the rotor unit; determine, by the control unit, an ambient temperature of the electrical generator; determine, by the control unit, a rotor supply voltage value for the determined rotation speed, and the determined ambient temperature and the determined control unit supply voltage value at which the electrical generator has a maximal permitted thermal load; and operate, by the control unit the electrical generator at the maximal permitted thermal load by at least one of adjusting and controlling the rotor supply voltage of the rotor unit to the determined rotor supply voltage value. 20. A non-transitory computer-readable medium having instructions stored thereon to: provide an electrical output voltage by rotating a rotor unit relative to a stator unit at a given rotation speed; provide a control unit with a control unit supply voltage; determine, by the control unit a control unit supply voltage value of the control unit supply voltage; provide, by the control unit, the rotor unit with a rotor supply voltage; determine, by the control unit, a rotation speed of the rotor unit; determine, by the control unit, an ambient temperature of the electrical generator; determine, by the control unit, a rotor supply voltage value for the determined rotation speed, and the determined ambient temperature and the determined control unit supply voltage value at which the electrical generator has a maximal permitted thermal load; and operate, by the control unit the electrical generator at the maximal permitted thermal load by at least one of adjusting and controlling the rotor supply voltage of the rotor unit to the determined rotor supply voltage value.
2,800
340,155
16,873,202
2,896
A method of operating an electrical generator with a control unit may include: providing an electrical output voltage by rotating a rotor unit relative to a stator unit at a given rotation speed; providing the control unit with a control unit supply voltage; determining a control unit supply voltage value of the control unit supply voltage; providing the rotor unit with a rotor supply voltage; determining a rotation speed of the rotor unit; determining an ambient temperature of the electrical generator; determining a rotor supply voltage value for the determined rotation speed, and the determined ambient temperature and the determined control unit supply voltage value at which the electrical generator may have a maximal permitted thermal load; and operating the electrical generator at the maximal permitted thermal load by at least one of adjusting and controlling the rotor supply voltage of the rotor unit to the determined rotor supply voltage value.
1. A method of operating an electrical generator with a control unit, comprising: providing an electrical output voltage by rotating a rotor unit relative to a stator unit at a given rotation speed; providing the control unit with a control unit supply voltage; determining, via the control unit, a control unit supply voltage value of the control unit supply voltage; providing, via the control unit, the rotor unit with a rotor supply voltage; determining, via the control unit, a rotation speed of the rotor unit; determining, via the control unit, an ambient temperature of the electrical generator; determining, via the control unit, a rotor supply voltage value for the determined rotation speed, and the determined ambient temperature and the determined control unit supply voltage value at which the electrical generator has a maximal permitted thermal load; and operating, via the control unit, the electrical generator at the maximal permitted thermal load by at least one of adjusting and controlling the rotor supply voltage of the rotor unit to the determined rotor supply voltage value. 2. The method according to claim 1, wherein: the control unit supply voltage is an external control unit supply voltage provided by an external voltage source; the control unit supply voltage is an internal control unit supply voltage provided by the electrical output voltage of the electrical generator; or the control unit supply voltage is a combination of an external control unit supply voltage provided by an external voltage source and an internal control unit supply voltage provided by the electrical output voltage of the electrical generator. 3. The method according to claim 1, wherein: the control unit provides a data storage unit in which at least one value table is stored; the control unit determines the rotor supply voltage value to be applied to the rotor unit by comparing the determined rotation speed, the determined ambient temperature and the determined control unit supply voltage value with the at least one stored value table; and the at least one stored value table provides the relation between rotation speed of the rotor unit, the ambient temperature of the electrical generator, the determined control unit supply voltage value and a required rotor supply voltage value for an operation of the electrical generator at a maximal permitted thermal load. 4. The method according to claim 3, wherein the at least one stored value table is determined by: at least one of measuring and adjusting the rotation speed of the rotor unit, the ambient temperature of the electrical generator and the determined control unit supply voltage value; measuring the thermal load of the electrical generator, while the rotor supply voltage of the rotor unit is adjusted until the thermal load of the electrical generator reaches the maximal permitted thermal load; and storing in the value table: the rotor supply voltage value at which the maximal permitted thermal load of the electrical generator is achieved with the corresponding rotation speed of the rotor unit, the ambient temperature of the electrical generator and the determined control unit supply voltage value. 5. The method according to claim 4, wherein the at least one stored value table is determined by: at least one of measuring and adjusting the rotation speed of the rotor unit in a rotation speed range of 1100 to 15000 rpm; at least one of measuring and adjusting the ambient temperature of the electrical generator in a temperature range of 15° C. to 130° C.; and adjusting the control unit supply voltage value between 5V and 60V. 6. The method according to claim 1, wherein the electrical generator exceeds the maximal permitted thermal load for a predefined time period in order to improve the step load response of the electrical generator. 7. The method according to claim 6, wherein the rotor unit is supplied with at least one of the internal control unit supply voltage and the external control unit supply voltage during the predefined time period without voltage limitation. 8. The method according to claim 6, wherein the control unit initiates a cooling procedure after the predefined time period in order to reduce the thermal load of the electrical generator to the maximal permitted thermal load. 9. The method according to claim 1, wherein a predefined electrical output voltage of the electrical generator is at least one of maintained and controlled by the control unit. 10. A control unit for an electrical generator configured to: receive a control unit supply voltage; determine a control unit supply voltage value of the control unit supply voltage; provide a rotor unit with a rotor supply voltage; determine a rotation speed of the rotor unit; determine an ambient temperature of the electrical generator; determine a rotor supply voltage value for the determined rotation speed, and the determined ambient temperature and the determined control unit supply voltage value at which the electrical generator has a maximal permitted thermal load; and operate the electrical generator at the maximal permitted thermal load by at least one of adjusting and controlling the rotor supply voltage of the rotor unit to the determined rotor supply voltage value. 11. The control unit according to claim 10, comprising at least one: an ambient temperature unit for determining the ambient temperature of the electrical generator; a rotation speed unit for determining the rotation speed of the rotor unit; a rotor supply voltage unit for controlling and/or adjusting the rotor supply voltage of the rotor unit; a control unit supply voltage unit for determining the control unit supply voltage value of the control unit supply voltage; a data storage unit for storing at least one value table; and an output voltage control unit for at least one of controlling and maintaining a predefined electrical output voltage of the electrical generator. 12. An electrical generator comprising: a rotor unit with at least one rotor coil; a stator unit with at least one stator coil, the rotor unit being rotated relative to the stator unit at a given rotation speed; and a control unit configured to: receive a control unit supply voltage; determine a control unit supply voltage value of the control unit supply voltage; provide the rotor unit with a rotor supply voltage; determine a rotation speed of the rotor unit; determine an ambient temperature of the electrical generator; determine a rotor supply voltage value for the determined rotation speed, and the determined ambient temperature and the determined control unit supply voltage value at which the electrical generator has a maximal permitted thermal load; and operate the electrical generator at the maximal permitted thermal load by at least one of adjusting and controlling the rotor supply voltage of the rotor unit to the determined rotor supply voltage value. 13. The electrical generator according to claim 12, wherein the electrical generator is at least one of formed and operated as a batteryless system. 14. The electrical generator according to claim 12, further comprising at least one of: a rectifier unit which converts the alternating voltage of the stator coil to a direct voltage; a safety unit for limiting the electrical output voltage to a maximum electrical output voltage; and a capacitor unit for reducing electrical output voltage ripples. 15. The electrical generator according to claim 12, wherein the stator unit has three stator coils arranged in a star configuration or in a delta configuration. 16. The electrical generator according to, wherein at least one of the rotor unit and the rotor coil is optimized for an operation beyond at least one of a critical operation rotation frequency and a critical rotation speed. 17. The electrical generator according to claim 12, wherein at least one of the rotor unit and the rotor coil provides an ampere-turn value of at least 2900 At at a control unit supply voltage of 14V, 28V, 48V or 56V and an ambient temperature of 20° C. 18. The electrical generator according to claim 17, wherein at least one of the rotor unit and the rotor coil has at least 300 turns. 19. A computer program comprising instructions to: provide an electrical output voltage by rotating a rotor unit relative to a stator unit at a given rotation speed; provide a control unit with a control unit supply voltage; determine, by the control unit a control unit supply voltage value of the control unit supply voltage; provide, by the control unit, the rotor unit with a rotor supply voltage; determine, by the control unit, a rotation speed of the rotor unit; determine, by the control unit, an ambient temperature of the electrical generator; determine, by the control unit, a rotor supply voltage value for the determined rotation speed, and the determined ambient temperature and the determined control unit supply voltage value at which the electrical generator has a maximal permitted thermal load; and operate, by the control unit the electrical generator at the maximal permitted thermal load by at least one of adjusting and controlling the rotor supply voltage of the rotor unit to the determined rotor supply voltage value. 20. A non-transitory computer-readable medium having instructions stored thereon to: provide an electrical output voltage by rotating a rotor unit relative to a stator unit at a given rotation speed; provide a control unit with a control unit supply voltage; determine, by the control unit a control unit supply voltage value of the control unit supply voltage; provide, by the control unit, the rotor unit with a rotor supply voltage; determine, by the control unit, a rotation speed of the rotor unit; determine, by the control unit, an ambient temperature of the electrical generator; determine, by the control unit, a rotor supply voltage value for the determined rotation speed, and the determined ambient temperature and the determined control unit supply voltage value at which the electrical generator has a maximal permitted thermal load; and operate, by the control unit the electrical generator at the maximal permitted thermal load by at least one of adjusting and controlling the rotor supply voltage of the rotor unit to the determined rotor supply voltage value.
A method of operating an electrical generator with a control unit may include: providing an electrical output voltage by rotating a rotor unit relative to a stator unit at a given rotation speed; providing the control unit with a control unit supply voltage; determining a control unit supply voltage value of the control unit supply voltage; providing the rotor unit with a rotor supply voltage; determining a rotation speed of the rotor unit; determining an ambient temperature of the electrical generator; determining a rotor supply voltage value for the determined rotation speed, and the determined ambient temperature and the determined control unit supply voltage value at which the electrical generator may have a maximal permitted thermal load; and operating the electrical generator at the maximal permitted thermal load by at least one of adjusting and controlling the rotor supply voltage of the rotor unit to the determined rotor supply voltage value.1. A method of operating an electrical generator with a control unit, comprising: providing an electrical output voltage by rotating a rotor unit relative to a stator unit at a given rotation speed; providing the control unit with a control unit supply voltage; determining, via the control unit, a control unit supply voltage value of the control unit supply voltage; providing, via the control unit, the rotor unit with a rotor supply voltage; determining, via the control unit, a rotation speed of the rotor unit; determining, via the control unit, an ambient temperature of the electrical generator; determining, via the control unit, a rotor supply voltage value for the determined rotation speed, and the determined ambient temperature and the determined control unit supply voltage value at which the electrical generator has a maximal permitted thermal load; and operating, via the control unit, the electrical generator at the maximal permitted thermal load by at least one of adjusting and controlling the rotor supply voltage of the rotor unit to the determined rotor supply voltage value. 2. The method according to claim 1, wherein: the control unit supply voltage is an external control unit supply voltage provided by an external voltage source; the control unit supply voltage is an internal control unit supply voltage provided by the electrical output voltage of the electrical generator; or the control unit supply voltage is a combination of an external control unit supply voltage provided by an external voltage source and an internal control unit supply voltage provided by the electrical output voltage of the electrical generator. 3. The method according to claim 1, wherein: the control unit provides a data storage unit in which at least one value table is stored; the control unit determines the rotor supply voltage value to be applied to the rotor unit by comparing the determined rotation speed, the determined ambient temperature and the determined control unit supply voltage value with the at least one stored value table; and the at least one stored value table provides the relation between rotation speed of the rotor unit, the ambient temperature of the electrical generator, the determined control unit supply voltage value and a required rotor supply voltage value for an operation of the electrical generator at a maximal permitted thermal load. 4. The method according to claim 3, wherein the at least one stored value table is determined by: at least one of measuring and adjusting the rotation speed of the rotor unit, the ambient temperature of the electrical generator and the determined control unit supply voltage value; measuring the thermal load of the electrical generator, while the rotor supply voltage of the rotor unit is adjusted until the thermal load of the electrical generator reaches the maximal permitted thermal load; and storing in the value table: the rotor supply voltage value at which the maximal permitted thermal load of the electrical generator is achieved with the corresponding rotation speed of the rotor unit, the ambient temperature of the electrical generator and the determined control unit supply voltage value. 5. The method according to claim 4, wherein the at least one stored value table is determined by: at least one of measuring and adjusting the rotation speed of the rotor unit in a rotation speed range of 1100 to 15000 rpm; at least one of measuring and adjusting the ambient temperature of the electrical generator in a temperature range of 15° C. to 130° C.; and adjusting the control unit supply voltage value between 5V and 60V. 6. The method according to claim 1, wherein the electrical generator exceeds the maximal permitted thermal load for a predefined time period in order to improve the step load response of the electrical generator. 7. The method according to claim 6, wherein the rotor unit is supplied with at least one of the internal control unit supply voltage and the external control unit supply voltage during the predefined time period without voltage limitation. 8. The method according to claim 6, wherein the control unit initiates a cooling procedure after the predefined time period in order to reduce the thermal load of the electrical generator to the maximal permitted thermal load. 9. The method according to claim 1, wherein a predefined electrical output voltage of the electrical generator is at least one of maintained and controlled by the control unit. 10. A control unit for an electrical generator configured to: receive a control unit supply voltage; determine a control unit supply voltage value of the control unit supply voltage; provide a rotor unit with a rotor supply voltage; determine a rotation speed of the rotor unit; determine an ambient temperature of the electrical generator; determine a rotor supply voltage value for the determined rotation speed, and the determined ambient temperature and the determined control unit supply voltage value at which the electrical generator has a maximal permitted thermal load; and operate the electrical generator at the maximal permitted thermal load by at least one of adjusting and controlling the rotor supply voltage of the rotor unit to the determined rotor supply voltage value. 11. The control unit according to claim 10, comprising at least one: an ambient temperature unit for determining the ambient temperature of the electrical generator; a rotation speed unit for determining the rotation speed of the rotor unit; a rotor supply voltage unit for controlling and/or adjusting the rotor supply voltage of the rotor unit; a control unit supply voltage unit for determining the control unit supply voltage value of the control unit supply voltage; a data storage unit for storing at least one value table; and an output voltage control unit for at least one of controlling and maintaining a predefined electrical output voltage of the electrical generator. 12. An electrical generator comprising: a rotor unit with at least one rotor coil; a stator unit with at least one stator coil, the rotor unit being rotated relative to the stator unit at a given rotation speed; and a control unit configured to: receive a control unit supply voltage; determine a control unit supply voltage value of the control unit supply voltage; provide the rotor unit with a rotor supply voltage; determine a rotation speed of the rotor unit; determine an ambient temperature of the electrical generator; determine a rotor supply voltage value for the determined rotation speed, and the determined ambient temperature and the determined control unit supply voltage value at which the electrical generator has a maximal permitted thermal load; and operate the electrical generator at the maximal permitted thermal load by at least one of adjusting and controlling the rotor supply voltage of the rotor unit to the determined rotor supply voltage value. 13. The electrical generator according to claim 12, wherein the electrical generator is at least one of formed and operated as a batteryless system. 14. The electrical generator according to claim 12, further comprising at least one of: a rectifier unit which converts the alternating voltage of the stator coil to a direct voltage; a safety unit for limiting the electrical output voltage to a maximum electrical output voltage; and a capacitor unit for reducing electrical output voltage ripples. 15. The electrical generator according to claim 12, wherein the stator unit has three stator coils arranged in a star configuration or in a delta configuration. 16. The electrical generator according to, wherein at least one of the rotor unit and the rotor coil is optimized for an operation beyond at least one of a critical operation rotation frequency and a critical rotation speed. 17. The electrical generator according to claim 12, wherein at least one of the rotor unit and the rotor coil provides an ampere-turn value of at least 2900 At at a control unit supply voltage of 14V, 28V, 48V or 56V and an ambient temperature of 20° C. 18. The electrical generator according to claim 17, wherein at least one of the rotor unit and the rotor coil has at least 300 turns. 19. A computer program comprising instructions to: provide an electrical output voltage by rotating a rotor unit relative to a stator unit at a given rotation speed; provide a control unit with a control unit supply voltage; determine, by the control unit a control unit supply voltage value of the control unit supply voltage; provide, by the control unit, the rotor unit with a rotor supply voltage; determine, by the control unit, a rotation speed of the rotor unit; determine, by the control unit, an ambient temperature of the electrical generator; determine, by the control unit, a rotor supply voltage value for the determined rotation speed, and the determined ambient temperature and the determined control unit supply voltage value at which the electrical generator has a maximal permitted thermal load; and operate, by the control unit the electrical generator at the maximal permitted thermal load by at least one of adjusting and controlling the rotor supply voltage of the rotor unit to the determined rotor supply voltage value. 20. A non-transitory computer-readable medium having instructions stored thereon to: provide an electrical output voltage by rotating a rotor unit relative to a stator unit at a given rotation speed; provide a control unit with a control unit supply voltage; determine, by the control unit a control unit supply voltage value of the control unit supply voltage; provide, by the control unit, the rotor unit with a rotor supply voltage; determine, by the control unit, a rotation speed of the rotor unit; determine, by the control unit, an ambient temperature of the electrical generator; determine, by the control unit, a rotor supply voltage value for the determined rotation speed, and the determined ambient temperature and the determined control unit supply voltage value at which the electrical generator has a maximal permitted thermal load; and operate, by the control unit the electrical generator at the maximal permitted thermal load by at least one of adjusting and controlling the rotor supply voltage of the rotor unit to the determined rotor supply voltage value.
2,800
340,156
16,801,139
2,896
The present disclosure discloses a method for identifying ice crystal fabric and distribution characteristics of ice flow field in ice sheet based on polarimetric radar. Because there is a correlation between the second-order fabric azimuth tensor and the dielectric constant tensor of the ice crystals inside the ice sheet, the present disclosure obtains the dielectric constant tensor of each reflection layer inside the ice sheet and its rotation angle from the polarimetric radar echo signal by the layer-by-layer recursive method, and then calculates to obtain the characteristic value of the second-order fabric orientation tensor and identifies its fabric type. After that, according to the correlation among the fabric, stress deformation and the ice flow to extract the information of ice flow direction and its spatial distribution characteristics.
1. A method for identifying ice crystal fabric and distribution characteristics of ice flow field in ice sheet based on polarimetric radar, the method comprising: S1: acquiring radar data of four channels, EHH r, EHV r, EVH r and EVV r, by the orthogonal arrangement receiving and transmitting antenna of the polarimetric radar; S2: performing normalization processing on the radar data EHH r, EHV r, EVH r and EVV r obtained in step 1 to obtain the radar echo records of four channels RHH, RHV, RVH and RVV; 2. The method according to claim 1, wherein the deconvolution processing in S3 uses a sparse spike deconvolution method. 3. The method according to claim 1, wherein the reflection coefficient matrix formula of the layer interface (3) is deformable as formulas (8) or (9) to solve eigenvalues εi+1,1,εi+1,2 of the dielectric constant tensor of the lower layer, and as formulas (10) or (11) to use to solve the rotation angle ϕi+1 of the lower layer:
The present disclosure discloses a method for identifying ice crystal fabric and distribution characteristics of ice flow field in ice sheet based on polarimetric radar. Because there is a correlation between the second-order fabric azimuth tensor and the dielectric constant tensor of the ice crystals inside the ice sheet, the present disclosure obtains the dielectric constant tensor of each reflection layer inside the ice sheet and its rotation angle from the polarimetric radar echo signal by the layer-by-layer recursive method, and then calculates to obtain the characteristic value of the second-order fabric orientation tensor and identifies its fabric type. After that, according to the correlation among the fabric, stress deformation and the ice flow to extract the information of ice flow direction and its spatial distribution characteristics.1. A method for identifying ice crystal fabric and distribution characteristics of ice flow field in ice sheet based on polarimetric radar, the method comprising: S1: acquiring radar data of four channels, EHH r, EHV r, EVH r and EVV r, by the orthogonal arrangement receiving and transmitting antenna of the polarimetric radar; S2: performing normalization processing on the radar data EHH r, EHV r, EVH r and EVV r obtained in step 1 to obtain the radar echo records of four channels RHH, RHV, RVH and RVV; 2. The method according to claim 1, wherein the deconvolution processing in S3 uses a sparse spike deconvolution method. 3. The method according to claim 1, wherein the reflection coefficient matrix formula of the layer interface (3) is deformable as formulas (8) or (9) to solve eigenvalues εi+1,1,εi+1,2 of the dielectric constant tensor of the lower layer, and as formulas (10) or (11) to use to solve the rotation angle ϕi+1 of the lower layer:
2,800
340,157
16,873,203
1,661
The present disclosure discloses a method for identifying ice crystal fabric and distribution characteristics of ice flow field in ice sheet based on polarimetric radar. Because there is a correlation between the second-order fabric azimuth tensor and the dielectric constant tensor of the ice crystals inside the ice sheet, the present disclosure obtains the dielectric constant tensor of each reflection layer inside the ice sheet and its rotation angle from the polarimetric radar echo signal by the layer-by-layer recursive method, and then calculates to obtain the characteristic value of the second-order fabric orientation tensor and identifies its fabric type. After that, according to the correlation among the fabric, stress deformation and the ice flow to extract the information of ice flow direction and its spatial distribution characteristics.
1. A method for identifying ice crystal fabric and distribution characteristics of ice flow field in ice sheet based on polarimetric radar, the method comprising: S1: acquiring radar data of four channels, EHH r, EHV r, EVH r and EVV r, by the orthogonal arrangement receiving and transmitting antenna of the polarimetric radar; S2: performing normalization processing on the radar data EHH r, EHV r, EVH r and EVV r obtained in step 1 to obtain the radar echo records of four channels RHH, RHV, RVH and RVV; 2. The method according to claim 1, wherein the deconvolution processing in S3 uses a sparse spike deconvolution method. 3. The method according to claim 1, wherein the reflection coefficient matrix formula of the layer interface (3) is deformable as formulas (8) or (9) to solve eigenvalues εi+1,1,εi+1,2 of the dielectric constant tensor of the lower layer, and as formulas (10) or (11) to use to solve the rotation angle ϕi+1 of the lower layer:
The present disclosure discloses a method for identifying ice crystal fabric and distribution characteristics of ice flow field in ice sheet based on polarimetric radar. Because there is a correlation between the second-order fabric azimuth tensor and the dielectric constant tensor of the ice crystals inside the ice sheet, the present disclosure obtains the dielectric constant tensor of each reflection layer inside the ice sheet and its rotation angle from the polarimetric radar echo signal by the layer-by-layer recursive method, and then calculates to obtain the characteristic value of the second-order fabric orientation tensor and identifies its fabric type. After that, according to the correlation among the fabric, stress deformation and the ice flow to extract the information of ice flow direction and its spatial distribution characteristics.1. A method for identifying ice crystal fabric and distribution characteristics of ice flow field in ice sheet based on polarimetric radar, the method comprising: S1: acquiring radar data of four channels, EHH r, EHV r, EVH r and EVV r, by the orthogonal arrangement receiving and transmitting antenna of the polarimetric radar; S2: performing normalization processing on the radar data EHH r, EHV r, EVH r and EVV r obtained in step 1 to obtain the radar echo records of four channels RHH, RHV, RVH and RVV; 2. The method according to claim 1, wherein the deconvolution processing in S3 uses a sparse spike deconvolution method. 3. The method according to claim 1, wherein the reflection coefficient matrix formula of the layer interface (3) is deformable as formulas (8) or (9) to solve eigenvalues εi+1,1,εi+1,2 of the dielectric constant tensor of the lower layer, and as formulas (10) or (11) to use to solve the rotation angle ϕi+1 of the lower layer:
1,600
340,158
16,873,198
1,661
A shock absorbing handle for a white cane for blind people or visually impaired, essentially providing a lengthy type of white cane, one that may be collapsible to reduce its size for packaging and conveyance, but once assembled, incorporates resilient members within its handle, primarily in the form of a spring located in the handle region of the cane, in order to cushion the impact when the lower tip of the cane encounters and obstruction, that impedes further movement. A length of resilient cord, such as a bungee cord, extends from the top of the handle of the cane, to the lower tip of its bottom most segment, so that when the cord is stretched, the various segments can be separated from their connecting ferrules, and contracted into a smaller size for packaging. The various segments can be stretched, through their resilient cord, and secured together, to form the lengthy white cane, having cushioning impact provided within its handle, to relieve stress upon the user, when obstructions are encountered during usage of the cane during its application.
1. A white cane for the visually impaired, including a lengthy cane made up of various segments, the various segments being interconnected together to form the length of the white cane, a handle provided upon the upper segment of the cane, a spring provided within the handle and biasing against the upper segment of the cane, the handle being telescopically applied to the upper segment, so that when an obstacle is encountered by the user, the compression spring cushions the impact relieving the user from stress to his/her hand during application of said device; a resilient cord extending from the upper end of the handle, through the handle and its in place spring, and through the various segments, and securing within the bottom most segment of the cane, to hold the segments of the cane and its handle together when assembled for usage, but to allow the various segments to be separated from each other, and from the handle, through stretching of said resilient cord, when dismantled for storage or conveyance. 2. The shock absorbing white cane of claim 1, wherein ferrules or sleeve secure the various cane segments together during its assembly. 3. The shock absorbing handle for cane of claim 2, wherein the resilient cord extends above the cushioned handle for the cane, forming a loop, to provide for grasping or securement about the wrist of the user, to prevent inadvertent loss during usage of the said white cane.
A shock absorbing handle for a white cane for blind people or visually impaired, essentially providing a lengthy type of white cane, one that may be collapsible to reduce its size for packaging and conveyance, but once assembled, incorporates resilient members within its handle, primarily in the form of a spring located in the handle region of the cane, in order to cushion the impact when the lower tip of the cane encounters and obstruction, that impedes further movement. A length of resilient cord, such as a bungee cord, extends from the top of the handle of the cane, to the lower tip of its bottom most segment, so that when the cord is stretched, the various segments can be separated from their connecting ferrules, and contracted into a smaller size for packaging. The various segments can be stretched, through their resilient cord, and secured together, to form the lengthy white cane, having cushioning impact provided within its handle, to relieve stress upon the user, when obstructions are encountered during usage of the cane during its application.1. A white cane for the visually impaired, including a lengthy cane made up of various segments, the various segments being interconnected together to form the length of the white cane, a handle provided upon the upper segment of the cane, a spring provided within the handle and biasing against the upper segment of the cane, the handle being telescopically applied to the upper segment, so that when an obstacle is encountered by the user, the compression spring cushions the impact relieving the user from stress to his/her hand during application of said device; a resilient cord extending from the upper end of the handle, through the handle and its in place spring, and through the various segments, and securing within the bottom most segment of the cane, to hold the segments of the cane and its handle together when assembled for usage, but to allow the various segments to be separated from each other, and from the handle, through stretching of said resilient cord, when dismantled for storage or conveyance. 2. The shock absorbing white cane of claim 1, wherein ferrules or sleeve secure the various cane segments together during its assembly. 3. The shock absorbing handle for cane of claim 2, wherein the resilient cord extends above the cushioned handle for the cane, forming a loop, to provide for grasping or securement about the wrist of the user, to prevent inadvertent loss during usage of the said white cane.
1,600
340,159
29,725,339
2,919
A shock absorbing handle for a white cane for blind people or visually impaired, essentially providing a lengthy type of white cane, one that may be collapsible to reduce its size for packaging and conveyance, but once assembled, incorporates resilient members within its handle, primarily in the form of a spring located in the handle region of the cane, in order to cushion the impact when the lower tip of the cane encounters and obstruction, that impedes further movement. A length of resilient cord, such as a bungee cord, extends from the top of the handle of the cane, to the lower tip of its bottom most segment, so that when the cord is stretched, the various segments can be separated from their connecting ferrules, and contracted into a smaller size for packaging. The various segments can be stretched, through their resilient cord, and secured together, to form the lengthy white cane, having cushioning impact provided within its handle, to relieve stress upon the user, when obstructions are encountered during usage of the cane during its application.
1. A white cane for the visually impaired, including a lengthy cane made up of various segments, the various segments being interconnected together to form the length of the white cane, a handle provided upon the upper segment of the cane, a spring provided within the handle and biasing against the upper segment of the cane, the handle being telescopically applied to the upper segment, so that when an obstacle is encountered by the user, the compression spring cushions the impact relieving the user from stress to his/her hand during application of said device; a resilient cord extending from the upper end of the handle, through the handle and its in place spring, and through the various segments, and securing within the bottom most segment of the cane, to hold the segments of the cane and its handle together when assembled for usage, but to allow the various segments to be separated from each other, and from the handle, through stretching of said resilient cord, when dismantled for storage or conveyance. 2. The shock absorbing white cane of claim 1, wherein ferrules or sleeve secure the various cane segments together during its assembly. 3. The shock absorbing handle for cane of claim 2, wherein the resilient cord extends above the cushioned handle for the cane, forming a loop, to provide for grasping or securement about the wrist of the user, to prevent inadvertent loss during usage of the said white cane.
A shock absorbing handle for a white cane for blind people or visually impaired, essentially providing a lengthy type of white cane, one that may be collapsible to reduce its size for packaging and conveyance, but once assembled, incorporates resilient members within its handle, primarily in the form of a spring located in the handle region of the cane, in order to cushion the impact when the lower tip of the cane encounters and obstruction, that impedes further movement. A length of resilient cord, such as a bungee cord, extends from the top of the handle of the cane, to the lower tip of its bottom most segment, so that when the cord is stretched, the various segments can be separated from their connecting ferrules, and contracted into a smaller size for packaging. The various segments can be stretched, through their resilient cord, and secured together, to form the lengthy white cane, having cushioning impact provided within its handle, to relieve stress upon the user, when obstructions are encountered during usage of the cane during its application.1. A white cane for the visually impaired, including a lengthy cane made up of various segments, the various segments being interconnected together to form the length of the white cane, a handle provided upon the upper segment of the cane, a spring provided within the handle and biasing against the upper segment of the cane, the handle being telescopically applied to the upper segment, so that when an obstacle is encountered by the user, the compression spring cushions the impact relieving the user from stress to his/her hand during application of said device; a resilient cord extending from the upper end of the handle, through the handle and its in place spring, and through the various segments, and securing within the bottom most segment of the cane, to hold the segments of the cane and its handle together when assembled for usage, but to allow the various segments to be separated from each other, and from the handle, through stretching of said resilient cord, when dismantled for storage or conveyance. 2. The shock absorbing white cane of claim 1, wherein ferrules or sleeve secure the various cane segments together during its assembly. 3. The shock absorbing handle for cane of claim 2, wherein the resilient cord extends above the cushioned handle for the cane, forming a loop, to provide for grasping or securement about the wrist of the user, to prevent inadvertent loss during usage of the said white cane.
2,900
340,160
29,725,340
2,919
A shock absorbing handle for a white cane for blind people or visually impaired, essentially providing a lengthy type of white cane, one that may be collapsible to reduce its size for packaging and conveyance, but once assembled, incorporates resilient members within its handle, primarily in the form of a spring located in the handle region of the cane, in order to cushion the impact when the lower tip of the cane encounters and obstruction, that impedes further movement. A length of resilient cord, such as a bungee cord, extends from the top of the handle of the cane, to the lower tip of its bottom most segment, so that when the cord is stretched, the various segments can be separated from their connecting ferrules, and contracted into a smaller size for packaging. The various segments can be stretched, through their resilient cord, and secured together, to form the lengthy white cane, having cushioning impact provided within its handle, to relieve stress upon the user, when obstructions are encountered during usage of the cane during its application.
1. A white cane for the visually impaired, including a lengthy cane made up of various segments, the various segments being interconnected together to form the length of the white cane, a handle provided upon the upper segment of the cane, a spring provided within the handle and biasing against the upper segment of the cane, the handle being telescopically applied to the upper segment, so that when an obstacle is encountered by the user, the compression spring cushions the impact relieving the user from stress to his/her hand during application of said device; a resilient cord extending from the upper end of the handle, through the handle and its in place spring, and through the various segments, and securing within the bottom most segment of the cane, to hold the segments of the cane and its handle together when assembled for usage, but to allow the various segments to be separated from each other, and from the handle, through stretching of said resilient cord, when dismantled for storage or conveyance. 2. The shock absorbing white cane of claim 1, wherein ferrules or sleeve secure the various cane segments together during its assembly. 3. The shock absorbing handle for cane of claim 2, wherein the resilient cord extends above the cushioned handle for the cane, forming a loop, to provide for grasping or securement about the wrist of the user, to prevent inadvertent loss during usage of the said white cane.
A shock absorbing handle for a white cane for blind people or visually impaired, essentially providing a lengthy type of white cane, one that may be collapsible to reduce its size for packaging and conveyance, but once assembled, incorporates resilient members within its handle, primarily in the form of a spring located in the handle region of the cane, in order to cushion the impact when the lower tip of the cane encounters and obstruction, that impedes further movement. A length of resilient cord, such as a bungee cord, extends from the top of the handle of the cane, to the lower tip of its bottom most segment, so that when the cord is stretched, the various segments can be separated from their connecting ferrules, and contracted into a smaller size for packaging. The various segments can be stretched, through their resilient cord, and secured together, to form the lengthy white cane, having cushioning impact provided within its handle, to relieve stress upon the user, when obstructions are encountered during usage of the cane during its application.1. A white cane for the visually impaired, including a lengthy cane made up of various segments, the various segments being interconnected together to form the length of the white cane, a handle provided upon the upper segment of the cane, a spring provided within the handle and biasing against the upper segment of the cane, the handle being telescopically applied to the upper segment, so that when an obstacle is encountered by the user, the compression spring cushions the impact relieving the user from stress to his/her hand during application of said device; a resilient cord extending from the upper end of the handle, through the handle and its in place spring, and through the various segments, and securing within the bottom most segment of the cane, to hold the segments of the cane and its handle together when assembled for usage, but to allow the various segments to be separated from each other, and from the handle, through stretching of said resilient cord, when dismantled for storage or conveyance. 2. The shock absorbing white cane of claim 1, wherein ferrules or sleeve secure the various cane segments together during its assembly. 3. The shock absorbing handle for cane of claim 2, wherein the resilient cord extends above the cushioned handle for the cane, forming a loop, to provide for grasping or securement about the wrist of the user, to prevent inadvertent loss during usage of the said white cane.
2,900
340,161
16,873,192
1,661
A shock absorbing handle for a white cane for blind people or visually impaired, essentially providing a lengthy type of white cane, one that may be collapsible to reduce its size for packaging and conveyance, but once assembled, incorporates resilient members within its handle, primarily in the form of a spring located in the handle region of the cane, in order to cushion the impact when the lower tip of the cane encounters and obstruction, that impedes further movement. A length of resilient cord, such as a bungee cord, extends from the top of the handle of the cane, to the lower tip of its bottom most segment, so that when the cord is stretched, the various segments can be separated from their connecting ferrules, and contracted into a smaller size for packaging. The various segments can be stretched, through their resilient cord, and secured together, to form the lengthy white cane, having cushioning impact provided within its handle, to relieve stress upon the user, when obstructions are encountered during usage of the cane during its application.
1. A white cane for the visually impaired, including a lengthy cane made up of various segments, the various segments being interconnected together to form the length of the white cane, a handle provided upon the upper segment of the cane, a spring provided within the handle and biasing against the upper segment of the cane, the handle being telescopically applied to the upper segment, so that when an obstacle is encountered by the user, the compression spring cushions the impact relieving the user from stress to his/her hand during application of said device; a resilient cord extending from the upper end of the handle, through the handle and its in place spring, and through the various segments, and securing within the bottom most segment of the cane, to hold the segments of the cane and its handle together when assembled for usage, but to allow the various segments to be separated from each other, and from the handle, through stretching of said resilient cord, when dismantled for storage or conveyance. 2. The shock absorbing white cane of claim 1, wherein ferrules or sleeve secure the various cane segments together during its assembly. 3. The shock absorbing handle for cane of claim 2, wherein the resilient cord extends above the cushioned handle for the cane, forming a loop, to provide for grasping or securement about the wrist of the user, to prevent inadvertent loss during usage of the said white cane.
A shock absorbing handle for a white cane for blind people or visually impaired, essentially providing a lengthy type of white cane, one that may be collapsible to reduce its size for packaging and conveyance, but once assembled, incorporates resilient members within its handle, primarily in the form of a spring located in the handle region of the cane, in order to cushion the impact when the lower tip of the cane encounters and obstruction, that impedes further movement. A length of resilient cord, such as a bungee cord, extends from the top of the handle of the cane, to the lower tip of its bottom most segment, so that when the cord is stretched, the various segments can be separated from their connecting ferrules, and contracted into a smaller size for packaging. The various segments can be stretched, through their resilient cord, and secured together, to form the lengthy white cane, having cushioning impact provided within its handle, to relieve stress upon the user, when obstructions are encountered during usage of the cane during its application.1. A white cane for the visually impaired, including a lengthy cane made up of various segments, the various segments being interconnected together to form the length of the white cane, a handle provided upon the upper segment of the cane, a spring provided within the handle and biasing against the upper segment of the cane, the handle being telescopically applied to the upper segment, so that when an obstacle is encountered by the user, the compression spring cushions the impact relieving the user from stress to his/her hand during application of said device; a resilient cord extending from the upper end of the handle, through the handle and its in place spring, and through the various segments, and securing within the bottom most segment of the cane, to hold the segments of the cane and its handle together when assembled for usage, but to allow the various segments to be separated from each other, and from the handle, through stretching of said resilient cord, when dismantled for storage or conveyance. 2. The shock absorbing white cane of claim 1, wherein ferrules or sleeve secure the various cane segments together during its assembly. 3. The shock absorbing handle for cane of claim 2, wherein the resilient cord extends above the cushioned handle for the cane, forming a loop, to provide for grasping or securement about the wrist of the user, to prevent inadvertent loss during usage of the said white cane.
1,600
340,162
16,873,191
1,655
A method of reducing anxiety in a non-human mammal by increasing brain serotonin levels, includes: down regulating in vivo levels of indigenous inflammatory cytokines in the nasal cavity of said non-human mammal by delivering an effective amount of an anti-inflammatory formula to said nasal cavity, which formula includes: at least one lipid-soluble antioxidant (which also functions as an anti-inflammatory agent) (the lipid-soluble antioxidant may be selected from the group consisting of alpha lipoic acid, aloe vera, omega 3 oil, N-acetylcysteine, cannabidiol, civet, oxytocin and combinations thereof); melatonin; tryptophan; and at least one essential oil. The most preferred antioxidant is N-acetylcysteine and the preferred essential oil is combination of chamomile, lavender and lemon oil.
1. Formulations for use in methods of reducing anxiety in a non-human mammal by increasing brain serotonin levels, which comprises: a) at least one lipid soluble antioxidant; b) melatonin; c) tryptophan; and d) at least one essential oil. 2. The formulations of claim 1 wherein said at least one essential oil is selected from the group consisting of chamomile, lavender and lemon oil. 3. The formulations of claim 1 wherein said at least one essential is a combination of chamomile, lavender and lemon oil. 4. The formulations of claim 1 which further includes a liquid carrier selected from the group consisting of aqueous, aqueous-oil and oil liquid carriers. 5. The formulations of claim 1 wherein said lipid-soluble antioxidant is selected from the group consisting of alpha lipoic acid, aloe vera, omega 3 oil, cannabidiol, civet, oxytocin and combinations thereof. 6. The formulations of claim 1 wherein said lipid-soluble antioxidant is selected from the group consisting of vitamin A, vitamin B, vitamin C, carotene, tocopherol, salts thereof and mixtures thereof. 7. The formulations of claim 1 wherein said lipid-soluble antioxidant is a form of tocopherol selected from the group consisting of vitamin E, vitamin E esters, vitamin E salts, N-acetylcysteine and combinations thereof. 8. The formulations of claim 1 wherein said lipid-soluble antioxidant is selected from the group consisting of vitamin E, vitamin E acetate and N-acetylcysteine. 9. The formulations of claim 8 wherein said lipid-soluble antioxidant is in an oil-aqueous liquid carrier oil emulsion, and said antioxidant is in an aqueous phase of said oil emulsion. 10. The method of claim 9 wherein said lipid-soluble antioxidant is N-acetylcysteine in an emulsion. 11. The formulations of claim 1 wherein said antioxidant is within the range of about 0.1% to about 5% by weight of said formula. 12. The formulations of claim 1 wherein said antioxidant is within the range of about 0.2% to about 2% by weight of said formula. 13. The formulations of claim 1 wherein said melatonin is within the range of about 0.1% to about 5% by weight of said formula. 14. The formulations of claim 1 wherein said melatonin is within the range of about 0.2% to about 2% by weight of said formula. 15. The formulations of claim 1 wherein said tryptophan is within the range of about 0.1% to about 5% by weight of said formula. 16. The formulations of claim 1 wherein said tryptophan is within the range of about 0.2% to about 2% by weight of said formula. 17. The formulations of claim 1 wherein said cannabidiol is within the range of about 2% to about 20% by weight of said formula. 18. The formulations of claim 1 wherein said cannabidiol is within the range of about 5% to about 10% by weight of said formula. 19. The formulations of claim 1 wherein said at least one essential oil is within the range of about 65% to about 97.5% by weight of said formula. 20. The formulations of claim 1 wherein said at least one essential oil is within the range of about 84% to about 94.5% by weight of said formula.
A method of reducing anxiety in a non-human mammal by increasing brain serotonin levels, includes: down regulating in vivo levels of indigenous inflammatory cytokines in the nasal cavity of said non-human mammal by delivering an effective amount of an anti-inflammatory formula to said nasal cavity, which formula includes: at least one lipid-soluble antioxidant (which also functions as an anti-inflammatory agent) (the lipid-soluble antioxidant may be selected from the group consisting of alpha lipoic acid, aloe vera, omega 3 oil, N-acetylcysteine, cannabidiol, civet, oxytocin and combinations thereof); melatonin; tryptophan; and at least one essential oil. The most preferred antioxidant is N-acetylcysteine and the preferred essential oil is combination of chamomile, lavender and lemon oil.1. Formulations for use in methods of reducing anxiety in a non-human mammal by increasing brain serotonin levels, which comprises: a) at least one lipid soluble antioxidant; b) melatonin; c) tryptophan; and d) at least one essential oil. 2. The formulations of claim 1 wherein said at least one essential oil is selected from the group consisting of chamomile, lavender and lemon oil. 3. The formulations of claim 1 wherein said at least one essential is a combination of chamomile, lavender and lemon oil. 4. The formulations of claim 1 which further includes a liquid carrier selected from the group consisting of aqueous, aqueous-oil and oil liquid carriers. 5. The formulations of claim 1 wherein said lipid-soluble antioxidant is selected from the group consisting of alpha lipoic acid, aloe vera, omega 3 oil, cannabidiol, civet, oxytocin and combinations thereof. 6. The formulations of claim 1 wherein said lipid-soluble antioxidant is selected from the group consisting of vitamin A, vitamin B, vitamin C, carotene, tocopherol, salts thereof and mixtures thereof. 7. The formulations of claim 1 wherein said lipid-soluble antioxidant is a form of tocopherol selected from the group consisting of vitamin E, vitamin E esters, vitamin E salts, N-acetylcysteine and combinations thereof. 8. The formulations of claim 1 wherein said lipid-soluble antioxidant is selected from the group consisting of vitamin E, vitamin E acetate and N-acetylcysteine. 9. The formulations of claim 8 wherein said lipid-soluble antioxidant is in an oil-aqueous liquid carrier oil emulsion, and said antioxidant is in an aqueous phase of said oil emulsion. 10. The method of claim 9 wherein said lipid-soluble antioxidant is N-acetylcysteine in an emulsion. 11. The formulations of claim 1 wherein said antioxidant is within the range of about 0.1% to about 5% by weight of said formula. 12. The formulations of claim 1 wherein said antioxidant is within the range of about 0.2% to about 2% by weight of said formula. 13. The formulations of claim 1 wherein said melatonin is within the range of about 0.1% to about 5% by weight of said formula. 14. The formulations of claim 1 wherein said melatonin is within the range of about 0.2% to about 2% by weight of said formula. 15. The formulations of claim 1 wherein said tryptophan is within the range of about 0.1% to about 5% by weight of said formula. 16. The formulations of claim 1 wherein said tryptophan is within the range of about 0.2% to about 2% by weight of said formula. 17. The formulations of claim 1 wherein said cannabidiol is within the range of about 2% to about 20% by weight of said formula. 18. The formulations of claim 1 wherein said cannabidiol is within the range of about 5% to about 10% by weight of said formula. 19. The formulations of claim 1 wherein said at least one essential oil is within the range of about 65% to about 97.5% by weight of said formula. 20. The formulations of claim 1 wherein said at least one essential oil is within the range of about 84% to about 94.5% by weight of said formula.
1,600
340,163
29,725,343
1,655
A method of reducing anxiety in a non-human mammal by increasing brain serotonin levels, includes: down regulating in vivo levels of indigenous inflammatory cytokines in the nasal cavity of said non-human mammal by delivering an effective amount of an anti-inflammatory formula to said nasal cavity, which formula includes: at least one lipid-soluble antioxidant (which also functions as an anti-inflammatory agent) (the lipid-soluble antioxidant may be selected from the group consisting of alpha lipoic acid, aloe vera, omega 3 oil, N-acetylcysteine, cannabidiol, civet, oxytocin and combinations thereof); melatonin; tryptophan; and at least one essential oil. The most preferred antioxidant is N-acetylcysteine and the preferred essential oil is combination of chamomile, lavender and lemon oil.
1. Formulations for use in methods of reducing anxiety in a non-human mammal by increasing brain serotonin levels, which comprises: a) at least one lipid soluble antioxidant; b) melatonin; c) tryptophan; and d) at least one essential oil. 2. The formulations of claim 1 wherein said at least one essential oil is selected from the group consisting of chamomile, lavender and lemon oil. 3. The formulations of claim 1 wherein said at least one essential is a combination of chamomile, lavender and lemon oil. 4. The formulations of claim 1 which further includes a liquid carrier selected from the group consisting of aqueous, aqueous-oil and oil liquid carriers. 5. The formulations of claim 1 wherein said lipid-soluble antioxidant is selected from the group consisting of alpha lipoic acid, aloe vera, omega 3 oil, cannabidiol, civet, oxytocin and combinations thereof. 6. The formulations of claim 1 wherein said lipid-soluble antioxidant is selected from the group consisting of vitamin A, vitamin B, vitamin C, carotene, tocopherol, salts thereof and mixtures thereof. 7. The formulations of claim 1 wherein said lipid-soluble antioxidant is a form of tocopherol selected from the group consisting of vitamin E, vitamin E esters, vitamin E salts, N-acetylcysteine and combinations thereof. 8. The formulations of claim 1 wherein said lipid-soluble antioxidant is selected from the group consisting of vitamin E, vitamin E acetate and N-acetylcysteine. 9. The formulations of claim 8 wherein said lipid-soluble antioxidant is in an oil-aqueous liquid carrier oil emulsion, and said antioxidant is in an aqueous phase of said oil emulsion. 10. The method of claim 9 wherein said lipid-soluble antioxidant is N-acetylcysteine in an emulsion. 11. The formulations of claim 1 wherein said antioxidant is within the range of about 0.1% to about 5% by weight of said formula. 12. The formulations of claim 1 wherein said antioxidant is within the range of about 0.2% to about 2% by weight of said formula. 13. The formulations of claim 1 wherein said melatonin is within the range of about 0.1% to about 5% by weight of said formula. 14. The formulations of claim 1 wherein said melatonin is within the range of about 0.2% to about 2% by weight of said formula. 15. The formulations of claim 1 wherein said tryptophan is within the range of about 0.1% to about 5% by weight of said formula. 16. The formulations of claim 1 wherein said tryptophan is within the range of about 0.2% to about 2% by weight of said formula. 17. The formulations of claim 1 wherein said cannabidiol is within the range of about 2% to about 20% by weight of said formula. 18. The formulations of claim 1 wherein said cannabidiol is within the range of about 5% to about 10% by weight of said formula. 19. The formulations of claim 1 wherein said at least one essential oil is within the range of about 65% to about 97.5% by weight of said formula. 20. The formulations of claim 1 wherein said at least one essential oil is within the range of about 84% to about 94.5% by weight of said formula.
A method of reducing anxiety in a non-human mammal by increasing brain serotonin levels, includes: down regulating in vivo levels of indigenous inflammatory cytokines in the nasal cavity of said non-human mammal by delivering an effective amount of an anti-inflammatory formula to said nasal cavity, which formula includes: at least one lipid-soluble antioxidant (which also functions as an anti-inflammatory agent) (the lipid-soluble antioxidant may be selected from the group consisting of alpha lipoic acid, aloe vera, omega 3 oil, N-acetylcysteine, cannabidiol, civet, oxytocin and combinations thereof); melatonin; tryptophan; and at least one essential oil. The most preferred antioxidant is N-acetylcysteine and the preferred essential oil is combination of chamomile, lavender and lemon oil.1. Formulations for use in methods of reducing anxiety in a non-human mammal by increasing brain serotonin levels, which comprises: a) at least one lipid soluble antioxidant; b) melatonin; c) tryptophan; and d) at least one essential oil. 2. The formulations of claim 1 wherein said at least one essential oil is selected from the group consisting of chamomile, lavender and lemon oil. 3. The formulations of claim 1 wherein said at least one essential is a combination of chamomile, lavender and lemon oil. 4. The formulations of claim 1 which further includes a liquid carrier selected from the group consisting of aqueous, aqueous-oil and oil liquid carriers. 5. The formulations of claim 1 wherein said lipid-soluble antioxidant is selected from the group consisting of alpha lipoic acid, aloe vera, omega 3 oil, cannabidiol, civet, oxytocin and combinations thereof. 6. The formulations of claim 1 wherein said lipid-soluble antioxidant is selected from the group consisting of vitamin A, vitamin B, vitamin C, carotene, tocopherol, salts thereof and mixtures thereof. 7. The formulations of claim 1 wherein said lipid-soluble antioxidant is a form of tocopherol selected from the group consisting of vitamin E, vitamin E esters, vitamin E salts, N-acetylcysteine and combinations thereof. 8. The formulations of claim 1 wherein said lipid-soluble antioxidant is selected from the group consisting of vitamin E, vitamin E acetate and N-acetylcysteine. 9. The formulations of claim 8 wherein said lipid-soluble antioxidant is in an oil-aqueous liquid carrier oil emulsion, and said antioxidant is in an aqueous phase of said oil emulsion. 10. The method of claim 9 wherein said lipid-soluble antioxidant is N-acetylcysteine in an emulsion. 11. The formulations of claim 1 wherein said antioxidant is within the range of about 0.1% to about 5% by weight of said formula. 12. The formulations of claim 1 wherein said antioxidant is within the range of about 0.2% to about 2% by weight of said formula. 13. The formulations of claim 1 wherein said melatonin is within the range of about 0.1% to about 5% by weight of said formula. 14. The formulations of claim 1 wherein said melatonin is within the range of about 0.2% to about 2% by weight of said formula. 15. The formulations of claim 1 wherein said tryptophan is within the range of about 0.1% to about 5% by weight of said formula. 16. The formulations of claim 1 wherein said tryptophan is within the range of about 0.2% to about 2% by weight of said formula. 17. The formulations of claim 1 wherein said cannabidiol is within the range of about 2% to about 20% by weight of said formula. 18. The formulations of claim 1 wherein said cannabidiol is within the range of about 5% to about 10% by weight of said formula. 19. The formulations of claim 1 wherein said at least one essential oil is within the range of about 65% to about 97.5% by weight of said formula. 20. The formulations of claim 1 wherein said at least one essential oil is within the range of about 84% to about 94.5% by weight of said formula.
1,600
340,164
16,873,193
1,655
A method of reducing anxiety in a non-human mammal by increasing brain serotonin levels, includes: down regulating in vivo levels of indigenous inflammatory cytokines in the nasal cavity of said non-human mammal by delivering an effective amount of an anti-inflammatory formula to said nasal cavity, which formula includes: at least one lipid-soluble antioxidant (which also functions as an anti-inflammatory agent) (the lipid-soluble antioxidant may be selected from the group consisting of alpha lipoic acid, aloe vera, omega 3 oil, N-acetylcysteine, cannabidiol, civet, oxytocin and combinations thereof); melatonin; tryptophan; and at least one essential oil. The most preferred antioxidant is N-acetylcysteine and the preferred essential oil is combination of chamomile, lavender and lemon oil.
1. Formulations for use in methods of reducing anxiety in a non-human mammal by increasing brain serotonin levels, which comprises: a) at least one lipid soluble antioxidant; b) melatonin; c) tryptophan; and d) at least one essential oil. 2. The formulations of claim 1 wherein said at least one essential oil is selected from the group consisting of chamomile, lavender and lemon oil. 3. The formulations of claim 1 wherein said at least one essential is a combination of chamomile, lavender and lemon oil. 4. The formulations of claim 1 which further includes a liquid carrier selected from the group consisting of aqueous, aqueous-oil and oil liquid carriers. 5. The formulations of claim 1 wherein said lipid-soluble antioxidant is selected from the group consisting of alpha lipoic acid, aloe vera, omega 3 oil, cannabidiol, civet, oxytocin and combinations thereof. 6. The formulations of claim 1 wherein said lipid-soluble antioxidant is selected from the group consisting of vitamin A, vitamin B, vitamin C, carotene, tocopherol, salts thereof and mixtures thereof. 7. The formulations of claim 1 wherein said lipid-soluble antioxidant is a form of tocopherol selected from the group consisting of vitamin E, vitamin E esters, vitamin E salts, N-acetylcysteine and combinations thereof. 8. The formulations of claim 1 wherein said lipid-soluble antioxidant is selected from the group consisting of vitamin E, vitamin E acetate and N-acetylcysteine. 9. The formulations of claim 8 wherein said lipid-soluble antioxidant is in an oil-aqueous liquid carrier oil emulsion, and said antioxidant is in an aqueous phase of said oil emulsion. 10. The method of claim 9 wherein said lipid-soluble antioxidant is N-acetylcysteine in an emulsion. 11. The formulations of claim 1 wherein said antioxidant is within the range of about 0.1% to about 5% by weight of said formula. 12. The formulations of claim 1 wherein said antioxidant is within the range of about 0.2% to about 2% by weight of said formula. 13. The formulations of claim 1 wherein said melatonin is within the range of about 0.1% to about 5% by weight of said formula. 14. The formulations of claim 1 wherein said melatonin is within the range of about 0.2% to about 2% by weight of said formula. 15. The formulations of claim 1 wherein said tryptophan is within the range of about 0.1% to about 5% by weight of said formula. 16. The formulations of claim 1 wherein said tryptophan is within the range of about 0.2% to about 2% by weight of said formula. 17. The formulations of claim 1 wherein said cannabidiol is within the range of about 2% to about 20% by weight of said formula. 18. The formulations of claim 1 wherein said cannabidiol is within the range of about 5% to about 10% by weight of said formula. 19. The formulations of claim 1 wherein said at least one essential oil is within the range of about 65% to about 97.5% by weight of said formula. 20. The formulations of claim 1 wherein said at least one essential oil is within the range of about 84% to about 94.5% by weight of said formula.
A method of reducing anxiety in a non-human mammal by increasing brain serotonin levels, includes: down regulating in vivo levels of indigenous inflammatory cytokines in the nasal cavity of said non-human mammal by delivering an effective amount of an anti-inflammatory formula to said nasal cavity, which formula includes: at least one lipid-soluble antioxidant (which also functions as an anti-inflammatory agent) (the lipid-soluble antioxidant may be selected from the group consisting of alpha lipoic acid, aloe vera, omega 3 oil, N-acetylcysteine, cannabidiol, civet, oxytocin and combinations thereof); melatonin; tryptophan; and at least one essential oil. The most preferred antioxidant is N-acetylcysteine and the preferred essential oil is combination of chamomile, lavender and lemon oil.1. Formulations for use in methods of reducing anxiety in a non-human mammal by increasing brain serotonin levels, which comprises: a) at least one lipid soluble antioxidant; b) melatonin; c) tryptophan; and d) at least one essential oil. 2. The formulations of claim 1 wherein said at least one essential oil is selected from the group consisting of chamomile, lavender and lemon oil. 3. The formulations of claim 1 wherein said at least one essential is a combination of chamomile, lavender and lemon oil. 4. The formulations of claim 1 which further includes a liquid carrier selected from the group consisting of aqueous, aqueous-oil and oil liquid carriers. 5. The formulations of claim 1 wherein said lipid-soluble antioxidant is selected from the group consisting of alpha lipoic acid, aloe vera, omega 3 oil, cannabidiol, civet, oxytocin and combinations thereof. 6. The formulations of claim 1 wherein said lipid-soluble antioxidant is selected from the group consisting of vitamin A, vitamin B, vitamin C, carotene, tocopherol, salts thereof and mixtures thereof. 7. The formulations of claim 1 wherein said lipid-soluble antioxidant is a form of tocopherol selected from the group consisting of vitamin E, vitamin E esters, vitamin E salts, N-acetylcysteine and combinations thereof. 8. The formulations of claim 1 wherein said lipid-soluble antioxidant is selected from the group consisting of vitamin E, vitamin E acetate and N-acetylcysteine. 9. The formulations of claim 8 wherein said lipid-soluble antioxidant is in an oil-aqueous liquid carrier oil emulsion, and said antioxidant is in an aqueous phase of said oil emulsion. 10. The method of claim 9 wherein said lipid-soluble antioxidant is N-acetylcysteine in an emulsion. 11. The formulations of claim 1 wherein said antioxidant is within the range of about 0.1% to about 5% by weight of said formula. 12. The formulations of claim 1 wherein said antioxidant is within the range of about 0.2% to about 2% by weight of said formula. 13. The formulations of claim 1 wherein said melatonin is within the range of about 0.1% to about 5% by weight of said formula. 14. The formulations of claim 1 wherein said melatonin is within the range of about 0.2% to about 2% by weight of said formula. 15. The formulations of claim 1 wherein said tryptophan is within the range of about 0.1% to about 5% by weight of said formula. 16. The formulations of claim 1 wherein said tryptophan is within the range of about 0.2% to about 2% by weight of said formula. 17. The formulations of claim 1 wherein said cannabidiol is within the range of about 2% to about 20% by weight of said formula. 18. The formulations of claim 1 wherein said cannabidiol is within the range of about 5% to about 10% by weight of said formula. 19. The formulations of claim 1 wherein said at least one essential oil is within the range of about 65% to about 97.5% by weight of said formula. 20. The formulations of claim 1 wherein said at least one essential oil is within the range of about 84% to about 94.5% by weight of said formula.
1,600
340,165
16,801,130
1,655
The present invention relates to methods, network devices, and machine-readable media for an integrated environment and platform for automated processing of reports of suspicious messages, and further including automated threat simulation, reporting, detection, and remediation, including rapid quarantine and restore functions.
1. A computerized method for suspicious message processing and incident response, comprising: at a message store module: receiving copies of incoming email messages; parsing the incoming email messages into message components; storing the message components in a data store, each of the message components being stored as a separate field in a database in the data store, each of the fields being stored in association with a unique message identifier for the messages; at a threat detection platform: receiving a report of a potentially suspicious message delivered into a user account, the report being generated as a result of an action by the user indicating that the message has been identified by the user as a potential security threat, and wherein the report having been initiated by a user interface element in an email client, and wherein the report comprising a copy of the delivered message; receiving the transmitted copy of the message at the threat detection platform; electronically storing patterns for determining whether a body of the received message or an attachment of the received message contains defined textual or binary patterns associated with a security threat; processing the received message according to the electronically stored patterns to determine whether the body of the received message or an attachment of the received message contains defined textual or binary patterns associated with a security threat; associating the received message with a message cluster, the message cluster being defined as a group of messages having at least one characteristic in common with the received message, the characteristic being selected from at least a portion of metadata, body, or attachment of the delivered message; determining if the common characteristic for the message cluster is associated with a security threat; if the common characteristic for the message cluster is associated with a security threat, then: transmitting a command to the message store module to return one or more message identifiers and associated account identifiers for other messages having the same common characteristic; receiving the message identifiers and account identifiers for the other messages having the same common characteristic; transmitting the message identifiers and account identifiers to an email server in association with a command to move the messages from user account inboxes. 2. The method of claim 1, wherein the other messages having the same common characteristic include one or more messages that were not previously reported by a user as suspicious. 3. The method of claim 1, further comprising executing an integration, wherein the integration comprises one or more of opening a link contained in the delivered message data in a simulated environment, opening attachment data in a simulated environment, and scanning the delivered message for malicious content, and querying a database of known threat activity with data extracted from the delivered message. 4. The method of claim 1, further comprising comparing the delivered message against stored rules for determining whether the delivered message or associated attachment data contains a pre-defined a textual or pre-defined binary pattern. 5. The method of claim 1, further comprising enabling access to a message server for removing messages from messaging accounts associated with multiple users. 6. The method of claim 1, further comprising processing the delivered message according to a pre-defined rule configured to process messages received at a network server that have been identified as suspicious by a user. 7. The method of claim 6, further comprising processing the delivered message by pattern matching according to pattern matching rules to detect malicious messages based on local threat information. 8. The method of claim 1, wherein if multiple users identify multiple copies of a message, the copies having an identical identifying characteristic, increasing a threat score for the messages having the identical identifying characteristic; and processing the multiple copies of the message according to the threat score. 9. The method of claim 8, further comprising generating a command to remove one or more messages from a user inbox based on a threshold score, sender credibility score, or threshold reporter reputation score. 10. The method of claim 1, wherein the at least one characteristic in common with the delivered message includes a hash of an attachment to received message. 11. A computerized method for suspicious message processing and incident response, comprising: receiving a report of a potentially suspicious message delivered into a user account, the report being generated as a result of an action by the user indicating that the message has been identified by the user as a potential security threat, and wherein the report having been initiated by a user interface element in an email client, and wherein the report comprising a copy of the delivered message; receiving the transmitted copy of the message at the threat detection platform; electronically storing patterns for determining whether a body of the received message or an attachment of the received message contains defined textual or binary patterns associated with a security threat; processing the received message according to the electronically stored patterns to determine whether the body of the received message or an attachment of the received message contains defined textual or binary patterns associated with a security threat; associating the received message with a message cluster, the message cluster being defined as a group of messages having at least one characteristic in common with the received message, the characteristic being selected from at least a portion of metadata, body, or attachment of the delivered message; determining if the common characteristic for the message cluster is associated with a security threat; if the common characteristic for the message cluster is associated with a security threat, then: transmitting a command to the message store module to return one or more message identifiers and associated account identifiers for other messages having the same common characteristic; receiving the message identifiers and account identifiers for the other messages having the same common characteristic; transmitting the message identifiers and account identifiers to an email server in association with a command to move the messages from user account inboxes; generating a copy of the received message, the copy having been modified such that the security threat has been replaced with innocuous content or deleted; and establishing a privileged account connection to an administrative account on an email server system to subscribe to multiple user email accounts; using the privileged account, inserting the copy of the message having been modified into one or more of the multiple user email accounts. 12. The method of claim 11, wherein the inserting of the copy is performed only after a user activity action has been detected on the one or more multiple user email accounts. 13. The method of claim 11, further comprising: transmitting a command to the message processor module to return one or more message identifiers and associated account identifiers for other messages having the same characteristic; receiving the message identifiers and account identifiers for the other messages having the same characteristic; transmitting the message identifiers and account identifiers to an email server in association with a command to move the messages from user account inboxes. 14. The method of claim 11, further comprising: at a message processor module: receiving copies of incoming email messages; parsing the incoming email messages into Multipurpose Internet Mail Extension components; storing the message components in a data store, each of the messages components being stored as a separate field in a database in the data store, each of the fields being stored in association with a unique message identifier for the message; 15. A method for inserting simulated phishing email messages into user accounts on-demand, comprising: storing simulated phishing email content information in a data store; establishing a privileged account connection to an administrative account on an email server system to subscribe to multiple user email accounts; detecting if a user in a subscribed account is actively using an email client; when the user is determined to be actively using the email client: using the privileged account, inserting a simulated phishing message directly into one or more of the multiple user email accounts by use of an application programming interface command to directly insert the message content, bypassing Internet email transmission protocols.
The present invention relates to methods, network devices, and machine-readable media for an integrated environment and platform for automated processing of reports of suspicious messages, and further including automated threat simulation, reporting, detection, and remediation, including rapid quarantine and restore functions.1. A computerized method for suspicious message processing and incident response, comprising: at a message store module: receiving copies of incoming email messages; parsing the incoming email messages into message components; storing the message components in a data store, each of the message components being stored as a separate field in a database in the data store, each of the fields being stored in association with a unique message identifier for the messages; at a threat detection platform: receiving a report of a potentially suspicious message delivered into a user account, the report being generated as a result of an action by the user indicating that the message has been identified by the user as a potential security threat, and wherein the report having been initiated by a user interface element in an email client, and wherein the report comprising a copy of the delivered message; receiving the transmitted copy of the message at the threat detection platform; electronically storing patterns for determining whether a body of the received message or an attachment of the received message contains defined textual or binary patterns associated with a security threat; processing the received message according to the electronically stored patterns to determine whether the body of the received message or an attachment of the received message contains defined textual or binary patterns associated with a security threat; associating the received message with a message cluster, the message cluster being defined as a group of messages having at least one characteristic in common with the received message, the characteristic being selected from at least a portion of metadata, body, or attachment of the delivered message; determining if the common characteristic for the message cluster is associated with a security threat; if the common characteristic for the message cluster is associated with a security threat, then: transmitting a command to the message store module to return one or more message identifiers and associated account identifiers for other messages having the same common characteristic; receiving the message identifiers and account identifiers for the other messages having the same common characteristic; transmitting the message identifiers and account identifiers to an email server in association with a command to move the messages from user account inboxes. 2. The method of claim 1, wherein the other messages having the same common characteristic include one or more messages that were not previously reported by a user as suspicious. 3. The method of claim 1, further comprising executing an integration, wherein the integration comprises one or more of opening a link contained in the delivered message data in a simulated environment, opening attachment data in a simulated environment, and scanning the delivered message for malicious content, and querying a database of known threat activity with data extracted from the delivered message. 4. The method of claim 1, further comprising comparing the delivered message against stored rules for determining whether the delivered message or associated attachment data contains a pre-defined a textual or pre-defined binary pattern. 5. The method of claim 1, further comprising enabling access to a message server for removing messages from messaging accounts associated with multiple users. 6. The method of claim 1, further comprising processing the delivered message according to a pre-defined rule configured to process messages received at a network server that have been identified as suspicious by a user. 7. The method of claim 6, further comprising processing the delivered message by pattern matching according to pattern matching rules to detect malicious messages based on local threat information. 8. The method of claim 1, wherein if multiple users identify multiple copies of a message, the copies having an identical identifying characteristic, increasing a threat score for the messages having the identical identifying characteristic; and processing the multiple copies of the message according to the threat score. 9. The method of claim 8, further comprising generating a command to remove one or more messages from a user inbox based on a threshold score, sender credibility score, or threshold reporter reputation score. 10. The method of claim 1, wherein the at least one characteristic in common with the delivered message includes a hash of an attachment to received message. 11. A computerized method for suspicious message processing and incident response, comprising: receiving a report of a potentially suspicious message delivered into a user account, the report being generated as a result of an action by the user indicating that the message has been identified by the user as a potential security threat, and wherein the report having been initiated by a user interface element in an email client, and wherein the report comprising a copy of the delivered message; receiving the transmitted copy of the message at the threat detection platform; electronically storing patterns for determining whether a body of the received message or an attachment of the received message contains defined textual or binary patterns associated with a security threat; processing the received message according to the electronically stored patterns to determine whether the body of the received message or an attachment of the received message contains defined textual or binary patterns associated with a security threat; associating the received message with a message cluster, the message cluster being defined as a group of messages having at least one characteristic in common with the received message, the characteristic being selected from at least a portion of metadata, body, or attachment of the delivered message; determining if the common characteristic for the message cluster is associated with a security threat; if the common characteristic for the message cluster is associated with a security threat, then: transmitting a command to the message store module to return one or more message identifiers and associated account identifiers for other messages having the same common characteristic; receiving the message identifiers and account identifiers for the other messages having the same common characteristic; transmitting the message identifiers and account identifiers to an email server in association with a command to move the messages from user account inboxes; generating a copy of the received message, the copy having been modified such that the security threat has been replaced with innocuous content or deleted; and establishing a privileged account connection to an administrative account on an email server system to subscribe to multiple user email accounts; using the privileged account, inserting the copy of the message having been modified into one or more of the multiple user email accounts. 12. The method of claim 11, wherein the inserting of the copy is performed only after a user activity action has been detected on the one or more multiple user email accounts. 13. The method of claim 11, further comprising: transmitting a command to the message processor module to return one or more message identifiers and associated account identifiers for other messages having the same characteristic; receiving the message identifiers and account identifiers for the other messages having the same characteristic; transmitting the message identifiers and account identifiers to an email server in association with a command to move the messages from user account inboxes. 14. The method of claim 11, further comprising: at a message processor module: receiving copies of incoming email messages; parsing the incoming email messages into Multipurpose Internet Mail Extension components; storing the message components in a data store, each of the messages components being stored as a separate field in a database in the data store, each of the fields being stored in association with a unique message identifier for the message; 15. A method for inserting simulated phishing email messages into user accounts on-demand, comprising: storing simulated phishing email content information in a data store; establishing a privileged account connection to an administrative account on an email server system to subscribe to multiple user email accounts; detecting if a user in a subscribed account is actively using an email client; when the user is determined to be actively using the email client: using the privileged account, inserting a simulated phishing message directly into one or more of the multiple user email accounts by use of an application programming interface command to directly insert the message content, bypassing Internet email transmission protocols.
1,600
340,166
29,725,374
2,925
The present invention relates to methods, network devices, and machine-readable media for an integrated environment and platform for automated processing of reports of suspicious messages, and further including automated threat simulation, reporting, detection, and remediation, including rapid quarantine and restore functions.
1. A computerized method for suspicious message processing and incident response, comprising: at a message store module: receiving copies of incoming email messages; parsing the incoming email messages into message components; storing the message components in a data store, each of the message components being stored as a separate field in a database in the data store, each of the fields being stored in association with a unique message identifier for the messages; at a threat detection platform: receiving a report of a potentially suspicious message delivered into a user account, the report being generated as a result of an action by the user indicating that the message has been identified by the user as a potential security threat, and wherein the report having been initiated by a user interface element in an email client, and wherein the report comprising a copy of the delivered message; receiving the transmitted copy of the message at the threat detection platform; electronically storing patterns for determining whether a body of the received message or an attachment of the received message contains defined textual or binary patterns associated with a security threat; processing the received message according to the electronically stored patterns to determine whether the body of the received message or an attachment of the received message contains defined textual or binary patterns associated with a security threat; associating the received message with a message cluster, the message cluster being defined as a group of messages having at least one characteristic in common with the received message, the characteristic being selected from at least a portion of metadata, body, or attachment of the delivered message; determining if the common characteristic for the message cluster is associated with a security threat; if the common characteristic for the message cluster is associated with a security threat, then: transmitting a command to the message store module to return one or more message identifiers and associated account identifiers for other messages having the same common characteristic; receiving the message identifiers and account identifiers for the other messages having the same common characteristic; transmitting the message identifiers and account identifiers to an email server in association with a command to move the messages from user account inboxes. 2. The method of claim 1, wherein the other messages having the same common characteristic include one or more messages that were not previously reported by a user as suspicious. 3. The method of claim 1, further comprising executing an integration, wherein the integration comprises one or more of opening a link contained in the delivered message data in a simulated environment, opening attachment data in a simulated environment, and scanning the delivered message for malicious content, and querying a database of known threat activity with data extracted from the delivered message. 4. The method of claim 1, further comprising comparing the delivered message against stored rules for determining whether the delivered message or associated attachment data contains a pre-defined a textual or pre-defined binary pattern. 5. The method of claim 1, further comprising enabling access to a message server for removing messages from messaging accounts associated with multiple users. 6. The method of claim 1, further comprising processing the delivered message according to a pre-defined rule configured to process messages received at a network server that have been identified as suspicious by a user. 7. The method of claim 6, further comprising processing the delivered message by pattern matching according to pattern matching rules to detect malicious messages based on local threat information. 8. The method of claim 1, wherein if multiple users identify multiple copies of a message, the copies having an identical identifying characteristic, increasing a threat score for the messages having the identical identifying characteristic; and processing the multiple copies of the message according to the threat score. 9. The method of claim 8, further comprising generating a command to remove one or more messages from a user inbox based on a threshold score, sender credibility score, or threshold reporter reputation score. 10. The method of claim 1, wherein the at least one characteristic in common with the delivered message includes a hash of an attachment to received message. 11. A computerized method for suspicious message processing and incident response, comprising: receiving a report of a potentially suspicious message delivered into a user account, the report being generated as a result of an action by the user indicating that the message has been identified by the user as a potential security threat, and wherein the report having been initiated by a user interface element in an email client, and wherein the report comprising a copy of the delivered message; receiving the transmitted copy of the message at the threat detection platform; electronically storing patterns for determining whether a body of the received message or an attachment of the received message contains defined textual or binary patterns associated with a security threat; processing the received message according to the electronically stored patterns to determine whether the body of the received message or an attachment of the received message contains defined textual or binary patterns associated with a security threat; associating the received message with a message cluster, the message cluster being defined as a group of messages having at least one characteristic in common with the received message, the characteristic being selected from at least a portion of metadata, body, or attachment of the delivered message; determining if the common characteristic for the message cluster is associated with a security threat; if the common characteristic for the message cluster is associated with a security threat, then: transmitting a command to the message store module to return one or more message identifiers and associated account identifiers for other messages having the same common characteristic; receiving the message identifiers and account identifiers for the other messages having the same common characteristic; transmitting the message identifiers and account identifiers to an email server in association with a command to move the messages from user account inboxes; generating a copy of the received message, the copy having been modified such that the security threat has been replaced with innocuous content or deleted; and establishing a privileged account connection to an administrative account on an email server system to subscribe to multiple user email accounts; using the privileged account, inserting the copy of the message having been modified into one or more of the multiple user email accounts. 12. The method of claim 11, wherein the inserting of the copy is performed only after a user activity action has been detected on the one or more multiple user email accounts. 13. The method of claim 11, further comprising: transmitting a command to the message processor module to return one or more message identifiers and associated account identifiers for other messages having the same characteristic; receiving the message identifiers and account identifiers for the other messages having the same characteristic; transmitting the message identifiers and account identifiers to an email server in association with a command to move the messages from user account inboxes. 14. The method of claim 11, further comprising: at a message processor module: receiving copies of incoming email messages; parsing the incoming email messages into Multipurpose Internet Mail Extension components; storing the message components in a data store, each of the messages components being stored as a separate field in a database in the data store, each of the fields being stored in association with a unique message identifier for the message; 15. A method for inserting simulated phishing email messages into user accounts on-demand, comprising: storing simulated phishing email content information in a data store; establishing a privileged account connection to an administrative account on an email server system to subscribe to multiple user email accounts; detecting if a user in a subscribed account is actively using an email client; when the user is determined to be actively using the email client: using the privileged account, inserting a simulated phishing message directly into one or more of the multiple user email accounts by use of an application programming interface command to directly insert the message content, bypassing Internet email transmission protocols.
The present invention relates to methods, network devices, and machine-readable media for an integrated environment and platform for automated processing of reports of suspicious messages, and further including automated threat simulation, reporting, detection, and remediation, including rapid quarantine and restore functions.1. A computerized method for suspicious message processing and incident response, comprising: at a message store module: receiving copies of incoming email messages; parsing the incoming email messages into message components; storing the message components in a data store, each of the message components being stored as a separate field in a database in the data store, each of the fields being stored in association with a unique message identifier for the messages; at a threat detection platform: receiving a report of a potentially suspicious message delivered into a user account, the report being generated as a result of an action by the user indicating that the message has been identified by the user as a potential security threat, and wherein the report having been initiated by a user interface element in an email client, and wherein the report comprising a copy of the delivered message; receiving the transmitted copy of the message at the threat detection platform; electronically storing patterns for determining whether a body of the received message or an attachment of the received message contains defined textual or binary patterns associated with a security threat; processing the received message according to the electronically stored patterns to determine whether the body of the received message or an attachment of the received message contains defined textual or binary patterns associated with a security threat; associating the received message with a message cluster, the message cluster being defined as a group of messages having at least one characteristic in common with the received message, the characteristic being selected from at least a portion of metadata, body, or attachment of the delivered message; determining if the common characteristic for the message cluster is associated with a security threat; if the common characteristic for the message cluster is associated with a security threat, then: transmitting a command to the message store module to return one or more message identifiers and associated account identifiers for other messages having the same common characteristic; receiving the message identifiers and account identifiers for the other messages having the same common characteristic; transmitting the message identifiers and account identifiers to an email server in association with a command to move the messages from user account inboxes. 2. The method of claim 1, wherein the other messages having the same common characteristic include one or more messages that were not previously reported by a user as suspicious. 3. The method of claim 1, further comprising executing an integration, wherein the integration comprises one or more of opening a link contained in the delivered message data in a simulated environment, opening attachment data in a simulated environment, and scanning the delivered message for malicious content, and querying a database of known threat activity with data extracted from the delivered message. 4. The method of claim 1, further comprising comparing the delivered message against stored rules for determining whether the delivered message or associated attachment data contains a pre-defined a textual or pre-defined binary pattern. 5. The method of claim 1, further comprising enabling access to a message server for removing messages from messaging accounts associated with multiple users. 6. The method of claim 1, further comprising processing the delivered message according to a pre-defined rule configured to process messages received at a network server that have been identified as suspicious by a user. 7. The method of claim 6, further comprising processing the delivered message by pattern matching according to pattern matching rules to detect malicious messages based on local threat information. 8. The method of claim 1, wherein if multiple users identify multiple copies of a message, the copies having an identical identifying characteristic, increasing a threat score for the messages having the identical identifying characteristic; and processing the multiple copies of the message according to the threat score. 9. The method of claim 8, further comprising generating a command to remove one or more messages from a user inbox based on a threshold score, sender credibility score, or threshold reporter reputation score. 10. The method of claim 1, wherein the at least one characteristic in common with the delivered message includes a hash of an attachment to received message. 11. A computerized method for suspicious message processing and incident response, comprising: receiving a report of a potentially suspicious message delivered into a user account, the report being generated as a result of an action by the user indicating that the message has been identified by the user as a potential security threat, and wherein the report having been initiated by a user interface element in an email client, and wherein the report comprising a copy of the delivered message; receiving the transmitted copy of the message at the threat detection platform; electronically storing patterns for determining whether a body of the received message or an attachment of the received message contains defined textual or binary patterns associated with a security threat; processing the received message according to the electronically stored patterns to determine whether the body of the received message or an attachment of the received message contains defined textual or binary patterns associated with a security threat; associating the received message with a message cluster, the message cluster being defined as a group of messages having at least one characteristic in common with the received message, the characteristic being selected from at least a portion of metadata, body, or attachment of the delivered message; determining if the common characteristic for the message cluster is associated with a security threat; if the common characteristic for the message cluster is associated with a security threat, then: transmitting a command to the message store module to return one or more message identifiers and associated account identifiers for other messages having the same common characteristic; receiving the message identifiers and account identifiers for the other messages having the same common characteristic; transmitting the message identifiers and account identifiers to an email server in association with a command to move the messages from user account inboxes; generating a copy of the received message, the copy having been modified such that the security threat has been replaced with innocuous content or deleted; and establishing a privileged account connection to an administrative account on an email server system to subscribe to multiple user email accounts; using the privileged account, inserting the copy of the message having been modified into one or more of the multiple user email accounts. 12. The method of claim 11, wherein the inserting of the copy is performed only after a user activity action has been detected on the one or more multiple user email accounts. 13. The method of claim 11, further comprising: transmitting a command to the message processor module to return one or more message identifiers and associated account identifiers for other messages having the same characteristic; receiving the message identifiers and account identifiers for the other messages having the same characteristic; transmitting the message identifiers and account identifiers to an email server in association with a command to move the messages from user account inboxes. 14. The method of claim 11, further comprising: at a message processor module: receiving copies of incoming email messages; parsing the incoming email messages into Multipurpose Internet Mail Extension components; storing the message components in a data store, each of the messages components being stored as a separate field in a database in the data store, each of the fields being stored in association with a unique message identifier for the message; 15. A method for inserting simulated phishing email messages into user accounts on-demand, comprising: storing simulated phishing email content information in a data store; establishing a privileged account connection to an administrative account on an email server system to subscribe to multiple user email accounts; detecting if a user in a subscribed account is actively using an email client; when the user is determined to be actively using the email client: using the privileged account, inserting a simulated phishing message directly into one or more of the multiple user email accounts by use of an application programming interface command to directly insert the message content, bypassing Internet email transmission protocols.
2,900
340,167
16,873,195
1,661
The present invention relates to methods, network devices, and machine-readable media for an integrated environment and platform for automated processing of reports of suspicious messages, and further including automated threat simulation, reporting, detection, and remediation, including rapid quarantine and restore functions.
1. A computerized method for suspicious message processing and incident response, comprising: at a message store module: receiving copies of incoming email messages; parsing the incoming email messages into message components; storing the message components in a data store, each of the message components being stored as a separate field in a database in the data store, each of the fields being stored in association with a unique message identifier for the messages; at a threat detection platform: receiving a report of a potentially suspicious message delivered into a user account, the report being generated as a result of an action by the user indicating that the message has been identified by the user as a potential security threat, and wherein the report having been initiated by a user interface element in an email client, and wherein the report comprising a copy of the delivered message; receiving the transmitted copy of the message at the threat detection platform; electronically storing patterns for determining whether a body of the received message or an attachment of the received message contains defined textual or binary patterns associated with a security threat; processing the received message according to the electronically stored patterns to determine whether the body of the received message or an attachment of the received message contains defined textual or binary patterns associated with a security threat; associating the received message with a message cluster, the message cluster being defined as a group of messages having at least one characteristic in common with the received message, the characteristic being selected from at least a portion of metadata, body, or attachment of the delivered message; determining if the common characteristic for the message cluster is associated with a security threat; if the common characteristic for the message cluster is associated with a security threat, then: transmitting a command to the message store module to return one or more message identifiers and associated account identifiers for other messages having the same common characteristic; receiving the message identifiers and account identifiers for the other messages having the same common characteristic; transmitting the message identifiers and account identifiers to an email server in association with a command to move the messages from user account inboxes. 2. The method of claim 1, wherein the other messages having the same common characteristic include one or more messages that were not previously reported by a user as suspicious. 3. The method of claim 1, further comprising executing an integration, wherein the integration comprises one or more of opening a link contained in the delivered message data in a simulated environment, opening attachment data in a simulated environment, and scanning the delivered message for malicious content, and querying a database of known threat activity with data extracted from the delivered message. 4. The method of claim 1, further comprising comparing the delivered message against stored rules for determining whether the delivered message or associated attachment data contains a pre-defined a textual or pre-defined binary pattern. 5. The method of claim 1, further comprising enabling access to a message server for removing messages from messaging accounts associated with multiple users. 6. The method of claim 1, further comprising processing the delivered message according to a pre-defined rule configured to process messages received at a network server that have been identified as suspicious by a user. 7. The method of claim 6, further comprising processing the delivered message by pattern matching according to pattern matching rules to detect malicious messages based on local threat information. 8. The method of claim 1, wherein if multiple users identify multiple copies of a message, the copies having an identical identifying characteristic, increasing a threat score for the messages having the identical identifying characteristic; and processing the multiple copies of the message according to the threat score. 9. The method of claim 8, further comprising generating a command to remove one or more messages from a user inbox based on a threshold score, sender credibility score, or threshold reporter reputation score. 10. The method of claim 1, wherein the at least one characteristic in common with the delivered message includes a hash of an attachment to received message. 11. A computerized method for suspicious message processing and incident response, comprising: receiving a report of a potentially suspicious message delivered into a user account, the report being generated as a result of an action by the user indicating that the message has been identified by the user as a potential security threat, and wherein the report having been initiated by a user interface element in an email client, and wherein the report comprising a copy of the delivered message; receiving the transmitted copy of the message at the threat detection platform; electronically storing patterns for determining whether a body of the received message or an attachment of the received message contains defined textual or binary patterns associated with a security threat; processing the received message according to the electronically stored patterns to determine whether the body of the received message or an attachment of the received message contains defined textual or binary patterns associated with a security threat; associating the received message with a message cluster, the message cluster being defined as a group of messages having at least one characteristic in common with the received message, the characteristic being selected from at least a portion of metadata, body, or attachment of the delivered message; determining if the common characteristic for the message cluster is associated with a security threat; if the common characteristic for the message cluster is associated with a security threat, then: transmitting a command to the message store module to return one or more message identifiers and associated account identifiers for other messages having the same common characteristic; receiving the message identifiers and account identifiers for the other messages having the same common characteristic; transmitting the message identifiers and account identifiers to an email server in association with a command to move the messages from user account inboxes; generating a copy of the received message, the copy having been modified such that the security threat has been replaced with innocuous content or deleted; and establishing a privileged account connection to an administrative account on an email server system to subscribe to multiple user email accounts; using the privileged account, inserting the copy of the message having been modified into one or more of the multiple user email accounts. 12. The method of claim 11, wherein the inserting of the copy is performed only after a user activity action has been detected on the one or more multiple user email accounts. 13. The method of claim 11, further comprising: transmitting a command to the message processor module to return one or more message identifiers and associated account identifiers for other messages having the same characteristic; receiving the message identifiers and account identifiers for the other messages having the same characteristic; transmitting the message identifiers and account identifiers to an email server in association with a command to move the messages from user account inboxes. 14. The method of claim 11, further comprising: at a message processor module: receiving copies of incoming email messages; parsing the incoming email messages into Multipurpose Internet Mail Extension components; storing the message components in a data store, each of the messages components being stored as a separate field in a database in the data store, each of the fields being stored in association with a unique message identifier for the message; 15. A method for inserting simulated phishing email messages into user accounts on-demand, comprising: storing simulated phishing email content information in a data store; establishing a privileged account connection to an administrative account on an email server system to subscribe to multiple user email accounts; detecting if a user in a subscribed account is actively using an email client; when the user is determined to be actively using the email client: using the privileged account, inserting a simulated phishing message directly into one or more of the multiple user email accounts by use of an application programming interface command to directly insert the message content, bypassing Internet email transmission protocols.
The present invention relates to methods, network devices, and machine-readable media for an integrated environment and platform for automated processing of reports of suspicious messages, and further including automated threat simulation, reporting, detection, and remediation, including rapid quarantine and restore functions.1. A computerized method for suspicious message processing and incident response, comprising: at a message store module: receiving copies of incoming email messages; parsing the incoming email messages into message components; storing the message components in a data store, each of the message components being stored as a separate field in a database in the data store, each of the fields being stored in association with a unique message identifier for the messages; at a threat detection platform: receiving a report of a potentially suspicious message delivered into a user account, the report being generated as a result of an action by the user indicating that the message has been identified by the user as a potential security threat, and wherein the report having been initiated by a user interface element in an email client, and wherein the report comprising a copy of the delivered message; receiving the transmitted copy of the message at the threat detection platform; electronically storing patterns for determining whether a body of the received message or an attachment of the received message contains defined textual or binary patterns associated with a security threat; processing the received message according to the electronically stored patterns to determine whether the body of the received message or an attachment of the received message contains defined textual or binary patterns associated with a security threat; associating the received message with a message cluster, the message cluster being defined as a group of messages having at least one characteristic in common with the received message, the characteristic being selected from at least a portion of metadata, body, or attachment of the delivered message; determining if the common characteristic for the message cluster is associated with a security threat; if the common characteristic for the message cluster is associated with a security threat, then: transmitting a command to the message store module to return one or more message identifiers and associated account identifiers for other messages having the same common characteristic; receiving the message identifiers and account identifiers for the other messages having the same common characteristic; transmitting the message identifiers and account identifiers to an email server in association with a command to move the messages from user account inboxes. 2. The method of claim 1, wherein the other messages having the same common characteristic include one or more messages that were not previously reported by a user as suspicious. 3. The method of claim 1, further comprising executing an integration, wherein the integration comprises one or more of opening a link contained in the delivered message data in a simulated environment, opening attachment data in a simulated environment, and scanning the delivered message for malicious content, and querying a database of known threat activity with data extracted from the delivered message. 4. The method of claim 1, further comprising comparing the delivered message against stored rules for determining whether the delivered message or associated attachment data contains a pre-defined a textual or pre-defined binary pattern. 5. The method of claim 1, further comprising enabling access to a message server for removing messages from messaging accounts associated with multiple users. 6. The method of claim 1, further comprising processing the delivered message according to a pre-defined rule configured to process messages received at a network server that have been identified as suspicious by a user. 7. The method of claim 6, further comprising processing the delivered message by pattern matching according to pattern matching rules to detect malicious messages based on local threat information. 8. The method of claim 1, wherein if multiple users identify multiple copies of a message, the copies having an identical identifying characteristic, increasing a threat score for the messages having the identical identifying characteristic; and processing the multiple copies of the message according to the threat score. 9. The method of claim 8, further comprising generating a command to remove one or more messages from a user inbox based on a threshold score, sender credibility score, or threshold reporter reputation score. 10. The method of claim 1, wherein the at least one characteristic in common with the delivered message includes a hash of an attachment to received message. 11. A computerized method for suspicious message processing and incident response, comprising: receiving a report of a potentially suspicious message delivered into a user account, the report being generated as a result of an action by the user indicating that the message has been identified by the user as a potential security threat, and wherein the report having been initiated by a user interface element in an email client, and wherein the report comprising a copy of the delivered message; receiving the transmitted copy of the message at the threat detection platform; electronically storing patterns for determining whether a body of the received message or an attachment of the received message contains defined textual or binary patterns associated with a security threat; processing the received message according to the electronically stored patterns to determine whether the body of the received message or an attachment of the received message contains defined textual or binary patterns associated with a security threat; associating the received message with a message cluster, the message cluster being defined as a group of messages having at least one characteristic in common with the received message, the characteristic being selected from at least a portion of metadata, body, or attachment of the delivered message; determining if the common characteristic for the message cluster is associated with a security threat; if the common characteristic for the message cluster is associated with a security threat, then: transmitting a command to the message store module to return one or more message identifiers and associated account identifiers for other messages having the same common characteristic; receiving the message identifiers and account identifiers for the other messages having the same common characteristic; transmitting the message identifiers and account identifiers to an email server in association with a command to move the messages from user account inboxes; generating a copy of the received message, the copy having been modified such that the security threat has been replaced with innocuous content or deleted; and establishing a privileged account connection to an administrative account on an email server system to subscribe to multiple user email accounts; using the privileged account, inserting the copy of the message having been modified into one or more of the multiple user email accounts. 12. The method of claim 11, wherein the inserting of the copy is performed only after a user activity action has been detected on the one or more multiple user email accounts. 13. The method of claim 11, further comprising: transmitting a command to the message processor module to return one or more message identifiers and associated account identifiers for other messages having the same characteristic; receiving the message identifiers and account identifiers for the other messages having the same characteristic; transmitting the message identifiers and account identifiers to an email server in association with a command to move the messages from user account inboxes. 14. The method of claim 11, further comprising: at a message processor module: receiving copies of incoming email messages; parsing the incoming email messages into Multipurpose Internet Mail Extension components; storing the message components in a data store, each of the messages components being stored as a separate field in a database in the data store, each of the fields being stored in association with a unique message identifier for the message; 15. A method for inserting simulated phishing email messages into user accounts on-demand, comprising: storing simulated phishing email content information in a data store; establishing a privileged account connection to an administrative account on an email server system to subscribe to multiple user email accounts; detecting if a user in a subscribed account is actively using an email client; when the user is determined to be actively using the email client: using the privileged account, inserting a simulated phishing message directly into one or more of the multiple user email accounts by use of an application programming interface command to directly insert the message content, bypassing Internet email transmission protocols.
1,600
340,168
16,801,128
1,661
Provided herein are methods for treating chronic pain by administering low doses of buprenorphine twice daily (or once daily) via a transmucosal drug delivery device. The methods and devices efficiently treat chronic pain without significant side effects.
1. A method of treating chronic pain, the method comprising: administering to a subject in need thereof a mucoadhesive bioerodable drug delivery device, wherein, the device is administered once or twice daily, wherein the device comprises: a bioerodable mucoadhesive layer comprising about 100 μg to about 0.9 mg buprenorphine and buffered to a pH of between about 4.0 and about 6.0; and a backing layer buffered to a pH of between about 4.0 and about 4.8 and that does not include an opioid antagonist; wherein the device provides a steady-state Cmax of plasma buprenorphine concentration in a range between about 0.156 and about 0.364 ng/mL; wherein the subject is an opioid-experienced subject; and wherein the subject treated experiences mild or moderate common opioid adverse effects, or no common opioid adverse effects. 2-20. (canceled)
Provided herein are methods for treating chronic pain by administering low doses of buprenorphine twice daily (or once daily) via a transmucosal drug delivery device. The methods and devices efficiently treat chronic pain without significant side effects.1. A method of treating chronic pain, the method comprising: administering to a subject in need thereof a mucoadhesive bioerodable drug delivery device, wherein, the device is administered once or twice daily, wherein the device comprises: a bioerodable mucoadhesive layer comprising about 100 μg to about 0.9 mg buprenorphine and buffered to a pH of between about 4.0 and about 6.0; and a backing layer buffered to a pH of between about 4.0 and about 4.8 and that does not include an opioid antagonist; wherein the device provides a steady-state Cmax of plasma buprenorphine concentration in a range between about 0.156 and about 0.364 ng/mL; wherein the subject is an opioid-experienced subject; and wherein the subject treated experiences mild or moderate common opioid adverse effects, or no common opioid adverse effects. 2-20. (canceled)
1,600
340,169
29,725,369
2,914
Provided herein are methods for treating chronic pain by administering low doses of buprenorphine twice daily (or once daily) via a transmucosal drug delivery device. The methods and devices efficiently treat chronic pain without significant side effects.
1. A method of treating chronic pain, the method comprising: administering to a subject in need thereof a mucoadhesive bioerodable drug delivery device, wherein, the device is administered once or twice daily, wherein the device comprises: a bioerodable mucoadhesive layer comprising about 100 μg to about 0.9 mg buprenorphine and buffered to a pH of between about 4.0 and about 6.0; and a backing layer buffered to a pH of between about 4.0 and about 4.8 and that does not include an opioid antagonist; wherein the device provides a steady-state Cmax of plasma buprenorphine concentration in a range between about 0.156 and about 0.364 ng/mL; wherein the subject is an opioid-experienced subject; and wherein the subject treated experiences mild or moderate common opioid adverse effects, or no common opioid adverse effects. 2-20. (canceled)
Provided herein are methods for treating chronic pain by administering low doses of buprenorphine twice daily (or once daily) via a transmucosal drug delivery device. The methods and devices efficiently treat chronic pain without significant side effects.1. A method of treating chronic pain, the method comprising: administering to a subject in need thereof a mucoadhesive bioerodable drug delivery device, wherein, the device is administered once or twice daily, wherein the device comprises: a bioerodable mucoadhesive layer comprising about 100 μg to about 0.9 mg buprenorphine and buffered to a pH of between about 4.0 and about 6.0; and a backing layer buffered to a pH of between about 4.0 and about 4.8 and that does not include an opioid antagonist; wherein the device provides a steady-state Cmax of plasma buprenorphine concentration in a range between about 0.156 and about 0.364 ng/mL; wherein the subject is an opioid-experienced subject; and wherein the subject treated experiences mild or moderate common opioid adverse effects, or no common opioid adverse effects. 2-20. (canceled)
2,900
340,170
16,873,197
1,661
Provided herein are methods for treating chronic pain by administering low doses of buprenorphine twice daily (or once daily) via a transmucosal drug delivery device. The methods and devices efficiently treat chronic pain without significant side effects.
1. A method of treating chronic pain, the method comprising: administering to a subject in need thereof a mucoadhesive bioerodable drug delivery device, wherein, the device is administered once or twice daily, wherein the device comprises: a bioerodable mucoadhesive layer comprising about 100 μg to about 0.9 mg buprenorphine and buffered to a pH of between about 4.0 and about 6.0; and a backing layer buffered to a pH of between about 4.0 and about 4.8 and that does not include an opioid antagonist; wherein the device provides a steady-state Cmax of plasma buprenorphine concentration in a range between about 0.156 and about 0.364 ng/mL; wherein the subject is an opioid-experienced subject; and wherein the subject treated experiences mild or moderate common opioid adverse effects, or no common opioid adverse effects. 2-20. (canceled)
Provided herein are methods for treating chronic pain by administering low doses of buprenorphine twice daily (or once daily) via a transmucosal drug delivery device. The methods and devices efficiently treat chronic pain without significant side effects.1. A method of treating chronic pain, the method comprising: administering to a subject in need thereof a mucoadhesive bioerodable drug delivery device, wherein, the device is administered once or twice daily, wherein the device comprises: a bioerodable mucoadhesive layer comprising about 100 μg to about 0.9 mg buprenorphine and buffered to a pH of between about 4.0 and about 6.0; and a backing layer buffered to a pH of between about 4.0 and about 4.8 and that does not include an opioid antagonist; wherein the device provides a steady-state Cmax of plasma buprenorphine concentration in a range between about 0.156 and about 0.364 ng/mL; wherein the subject is an opioid-experienced subject; and wherein the subject treated experiences mild or moderate common opioid adverse effects, or no common opioid adverse effects. 2-20. (canceled)
1,600
340,171
16,873,196
1,661
Provided herein are methods for treating chronic pain by administering low doses of buprenorphine twice daily (or once daily) via a transmucosal drug delivery device. The methods and devices efficiently treat chronic pain without significant side effects.
1. A method of treating chronic pain, the method comprising: administering to a subject in need thereof a mucoadhesive bioerodable drug delivery device, wherein, the device is administered once or twice daily, wherein the device comprises: a bioerodable mucoadhesive layer comprising about 100 μg to about 0.9 mg buprenorphine and buffered to a pH of between about 4.0 and about 6.0; and a backing layer buffered to a pH of between about 4.0 and about 4.8 and that does not include an opioid antagonist; wherein the device provides a steady-state Cmax of plasma buprenorphine concentration in a range between about 0.156 and about 0.364 ng/mL; wherein the subject is an opioid-experienced subject; and wherein the subject treated experiences mild or moderate common opioid adverse effects, or no common opioid adverse effects. 2-20. (canceled)
Provided herein are methods for treating chronic pain by administering low doses of buprenorphine twice daily (or once daily) via a transmucosal drug delivery device. The methods and devices efficiently treat chronic pain without significant side effects.1. A method of treating chronic pain, the method comprising: administering to a subject in need thereof a mucoadhesive bioerodable drug delivery device, wherein, the device is administered once or twice daily, wherein the device comprises: a bioerodable mucoadhesive layer comprising about 100 μg to about 0.9 mg buprenorphine and buffered to a pH of between about 4.0 and about 6.0; and a backing layer buffered to a pH of between about 4.0 and about 4.8 and that does not include an opioid antagonist; wherein the device provides a steady-state Cmax of plasma buprenorphine concentration in a range between about 0.156 and about 0.364 ng/mL; wherein the subject is an opioid-experienced subject; and wherein the subject treated experiences mild or moderate common opioid adverse effects, or no common opioid adverse effects. 2-20. (canceled)
1,600
340,172
29,725,377
1,661
Provided herein are methods for treating chronic pain by administering low doses of buprenorphine twice daily (or once daily) via a transmucosal drug delivery device. The methods and devices efficiently treat chronic pain without significant side effects.
1. A method of treating chronic pain, the method comprising: administering to a subject in need thereof a mucoadhesive bioerodable drug delivery device, wherein, the device is administered once or twice daily, wherein the device comprises: a bioerodable mucoadhesive layer comprising about 100 μg to about 0.9 mg buprenorphine and buffered to a pH of between about 4.0 and about 6.0; and a backing layer buffered to a pH of between about 4.0 and about 4.8 and that does not include an opioid antagonist; wherein the device provides a steady-state Cmax of plasma buprenorphine concentration in a range between about 0.156 and about 0.364 ng/mL; wherein the subject is an opioid-experienced subject; and wherein the subject treated experiences mild or moderate common opioid adverse effects, or no common opioid adverse effects. 2-20. (canceled)
Provided herein are methods for treating chronic pain by administering low doses of buprenorphine twice daily (or once daily) via a transmucosal drug delivery device. The methods and devices efficiently treat chronic pain without significant side effects.1. A method of treating chronic pain, the method comprising: administering to a subject in need thereof a mucoadhesive bioerodable drug delivery device, wherein, the device is administered once or twice daily, wherein the device comprises: a bioerodable mucoadhesive layer comprising about 100 μg to about 0.9 mg buprenorphine and buffered to a pH of between about 4.0 and about 6.0; and a backing layer buffered to a pH of between about 4.0 and about 4.8 and that does not include an opioid antagonist; wherein the device provides a steady-state Cmax of plasma buprenorphine concentration in a range between about 0.156 and about 0.364 ng/mL; wherein the subject is an opioid-experienced subject; and wherein the subject treated experiences mild or moderate common opioid adverse effects, or no common opioid adverse effects. 2-20. (canceled)
1,600
340,173
16,801,118
1,661
Provided herein are methods for treating chronic pain by administering low doses of buprenorphine twice daily (or once daily) via a transmucosal drug delivery device. The methods and devices efficiently treat chronic pain without significant side effects.
1. A method of treating chronic pain, the method comprising: administering to a subject in need thereof a mucoadhesive bioerodable drug delivery device, wherein, the device is administered once or twice daily, wherein the device comprises: a bioerodable mucoadhesive layer comprising about 100 μg to about 0.9 mg buprenorphine and buffered to a pH of between about 4.0 and about 6.0; and a backing layer buffered to a pH of between about 4.0 and about 4.8 and that does not include an opioid antagonist; wherein the device provides a steady-state Cmax of plasma buprenorphine concentration in a range between about 0.156 and about 0.364 ng/mL; wherein the subject is an opioid-experienced subject; and wherein the subject treated experiences mild or moderate common opioid adverse effects, or no common opioid adverse effects. 2-20. (canceled)
Provided herein are methods for treating chronic pain by administering low doses of buprenorphine twice daily (or once daily) via a transmucosal drug delivery device. The methods and devices efficiently treat chronic pain without significant side effects.1. A method of treating chronic pain, the method comprising: administering to a subject in need thereof a mucoadhesive bioerodable drug delivery device, wherein, the device is administered once or twice daily, wherein the device comprises: a bioerodable mucoadhesive layer comprising about 100 μg to about 0.9 mg buprenorphine and buffered to a pH of between about 4.0 and about 6.0; and a backing layer buffered to a pH of between about 4.0 and about 4.8 and that does not include an opioid antagonist; wherein the device provides a steady-state Cmax of plasma buprenorphine concentration in a range between about 0.156 and about 0.364 ng/mL; wherein the subject is an opioid-experienced subject; and wherein the subject treated experiences mild or moderate common opioid adverse effects, or no common opioid adverse effects. 2-20. (canceled)
1,600
340,174
16,801,125
1,661
Embodiments of the disclosure provide a method for configuring indication devices in transportation services. The method includes receiving a plurality of transportation requests including passenger pick-up points located in a preset geographical area. The method further includes identifying a first transportation request matching a first vehicle and a second transportation request matching a second vehicle, where the first vehicle and the second vehicle are detected to be located in the preset geographical area. The method also includes determining that first indication information assigned with the first transportation request shares an attribute with second indication information assigned with the second transportation request. The method additionally includes adjusting the first indication information so that the first indication information no longer shares the attribute with the second indication information.
1. A method for configuring indication devices to provide transportation service, the method comprising: receiving, by at least one processor, a plurality of transportation requests including passenger pick-up points located in a preset geographical area; identifying, by the at least one processor, a first transportation request matching a first vehicle and a second transportation request matching a second vehicle, wherein the first vehicle and the second vehicle are detected to be located in the preset geographical area; determining, by the at least one processor, that an attribute of first indication information assigned to indicate the first vehicle is matched with the first transportation request is same to an attribute of second indication information assigned for the second vehicle to indicate it is matched with the second transportation request; and adjusting, by the at least one processor, the first indication information so that the attribute of the first indication information is different from the attribute of the second indication information. 2. The method of claim 1, the method further comprising: sending, by the at least one processor, the adjusted first indication information to an indication device associated with the first vehicle. 3. The method of claim 1, the method further comprising: sending, by the at least one processor, the adjusted first indication information to a user device used by a user, wherein the user is picked up by the first vehicle. 4. The method of claim 1, wherein the preset geographical area has a shape of a regular polygon. 5. The method of claim 4, wherein the preset geographical area has a shape of a regular hexagon. 6. A system for configuring indication devices to provide transportation service, the system comprising: a communication interface configured to receive transportation requests; and at least one processor configured to: receive a plurality of transportation requests including passenger pick-up points located in a preset geographical area; identify a first transportation request matching a first vehicle and a second transportation request matching a second vehicle, wherein the first vehicle and the second vehicle are detected to be located in the preset geographical area; determine that an attribute of first indication information assigned to indicate the first vehicle is matched with the first transportation request is same to an attribute of second indication information assigned for the second vehicle to indicate it is matched with the second transportation request; and adjust the first indication information so that the attribute of the first indication information is different from the attribute of the second indication information. 7. The system of claim 6, wherein the at least one processor sends the adjusted first indication information to an indication device associated with the first vehicle. 8. The system of claim 6, wherein the at least one processor sends the adjusted first indication information to a user device used by a user, wherein the user is picked up by the first vehicle. 9. The system of claim 6, wherein the preset geographical area has a shape of a regular polygon. 10. The system of claim 9, wherein the preset geographical area has a shape of a regular hexagon. 11. A non-transitory computer-readable medium having stored thereon computer instructions, when executed by at least one processor, perform a method for configuring indication devices to provide transportation service, the method comprising: receiving a first transportation request including a first passenger pick-up point located in a preset geographical area, the first transportation request matching a first vehicle associated with a first indication device; receiving a second transportation request including a second passenger pick-up point located in the preset geographical area, the second transportation request matching a second vehicle associated with a second indication device; determining, by the at least one processor, that an attribute of first indication information assigned to indicate the first vehicle is matched with the first transportation request is same to an attribute of second indication information assigned for the second vehicle to indicate it is matched with the second transportation request; determining a time difference between a first estimated time for the first vehicle to arrive in the preset geographical area and a second estimated time for the second vehicle to arrive in the preset geographical area is smaller than a threshold; and adjusting, by the at least one processor, the first indication information so that the attribute of the first indication information is different from the attribute of the second indication information. 12. The non-transitory computer-readable medium of claim 11, wherein the method further comprises: sending the adjusted first indication information to an indication device associated with the first vehicle. 13. The non-transitory computer-readable medium of claim 11, wherein the method further comprises: sending the adjusted first indication information to a user device used by a user, wherein the user is picked up by the first vehicle. 14. The non-transitory computer-readable medium of claim 11, wherein the preset geographical area has a shape of a regular polygon. 15. The non-transitory computer-readable medium of claim 14, wherein the preset geographical area has a shape of a regular hexagon. 16. The method of claim 1, further comprising: determining a time difference between a first estimated time for the first vehicle to arrive in the preset geographical area and a second estimated time for the second vehicle to arrive in the preset geographical area; and adjusting the first indication information based on the time difference. 17. The method of claim 16, wherein the first indication information is adjusted when the time difference is smaller than a threshold. 18. The system of claim 6, wherein the at least one processor is further configured to: determine a time difference between a first estimated time for the first vehicle to arrive in the preset geographical area and a second estimated time for the second vehicle to arrive in the preset geographical area; and adjust the first indication information based on the time difference. 19. The system of claim 18, wherein the first indication information is adjusted when the time difference is smaller than a threshold.
Embodiments of the disclosure provide a method for configuring indication devices in transportation services. The method includes receiving a plurality of transportation requests including passenger pick-up points located in a preset geographical area. The method further includes identifying a first transportation request matching a first vehicle and a second transportation request matching a second vehicle, where the first vehicle and the second vehicle are detected to be located in the preset geographical area. The method also includes determining that first indication information assigned with the first transportation request shares an attribute with second indication information assigned with the second transportation request. The method additionally includes adjusting the first indication information so that the first indication information no longer shares the attribute with the second indication information.1. A method for configuring indication devices to provide transportation service, the method comprising: receiving, by at least one processor, a plurality of transportation requests including passenger pick-up points located in a preset geographical area; identifying, by the at least one processor, a first transportation request matching a first vehicle and a second transportation request matching a second vehicle, wherein the first vehicle and the second vehicle are detected to be located in the preset geographical area; determining, by the at least one processor, that an attribute of first indication information assigned to indicate the first vehicle is matched with the first transportation request is same to an attribute of second indication information assigned for the second vehicle to indicate it is matched with the second transportation request; and adjusting, by the at least one processor, the first indication information so that the attribute of the first indication information is different from the attribute of the second indication information. 2. The method of claim 1, the method further comprising: sending, by the at least one processor, the adjusted first indication information to an indication device associated with the first vehicle. 3. The method of claim 1, the method further comprising: sending, by the at least one processor, the adjusted first indication information to a user device used by a user, wherein the user is picked up by the first vehicle. 4. The method of claim 1, wherein the preset geographical area has a shape of a regular polygon. 5. The method of claim 4, wherein the preset geographical area has a shape of a regular hexagon. 6. A system for configuring indication devices to provide transportation service, the system comprising: a communication interface configured to receive transportation requests; and at least one processor configured to: receive a plurality of transportation requests including passenger pick-up points located in a preset geographical area; identify a first transportation request matching a first vehicle and a second transportation request matching a second vehicle, wherein the first vehicle and the second vehicle are detected to be located in the preset geographical area; determine that an attribute of first indication information assigned to indicate the first vehicle is matched with the first transportation request is same to an attribute of second indication information assigned for the second vehicle to indicate it is matched with the second transportation request; and adjust the first indication information so that the attribute of the first indication information is different from the attribute of the second indication information. 7. The system of claim 6, wherein the at least one processor sends the adjusted first indication information to an indication device associated with the first vehicle. 8. The system of claim 6, wherein the at least one processor sends the adjusted first indication information to a user device used by a user, wherein the user is picked up by the first vehicle. 9. The system of claim 6, wherein the preset geographical area has a shape of a regular polygon. 10. The system of claim 9, wherein the preset geographical area has a shape of a regular hexagon. 11. A non-transitory computer-readable medium having stored thereon computer instructions, when executed by at least one processor, perform a method for configuring indication devices to provide transportation service, the method comprising: receiving a first transportation request including a first passenger pick-up point located in a preset geographical area, the first transportation request matching a first vehicle associated with a first indication device; receiving a second transportation request including a second passenger pick-up point located in the preset geographical area, the second transportation request matching a second vehicle associated with a second indication device; determining, by the at least one processor, that an attribute of first indication information assigned to indicate the first vehicle is matched with the first transportation request is same to an attribute of second indication information assigned for the second vehicle to indicate it is matched with the second transportation request; determining a time difference between a first estimated time for the first vehicle to arrive in the preset geographical area and a second estimated time for the second vehicle to arrive in the preset geographical area is smaller than a threshold; and adjusting, by the at least one processor, the first indication information so that the attribute of the first indication information is different from the attribute of the second indication information. 12. The non-transitory computer-readable medium of claim 11, wherein the method further comprises: sending the adjusted first indication information to an indication device associated with the first vehicle. 13. The non-transitory computer-readable medium of claim 11, wherein the method further comprises: sending the adjusted first indication information to a user device used by a user, wherein the user is picked up by the first vehicle. 14. The non-transitory computer-readable medium of claim 11, wherein the preset geographical area has a shape of a regular polygon. 15. The non-transitory computer-readable medium of claim 14, wherein the preset geographical area has a shape of a regular hexagon. 16. The method of claim 1, further comprising: determining a time difference between a first estimated time for the first vehicle to arrive in the preset geographical area and a second estimated time for the second vehicle to arrive in the preset geographical area; and adjusting the first indication information based on the time difference. 17. The method of claim 16, wherein the first indication information is adjusted when the time difference is smaller than a threshold. 18. The system of claim 6, wherein the at least one processor is further configured to: determine a time difference between a first estimated time for the first vehicle to arrive in the preset geographical area and a second estimated time for the second vehicle to arrive in the preset geographical area; and adjust the first indication information based on the time difference. 19. The system of claim 18, wherein the first indication information is adjusted when the time difference is smaller than a threshold.
1,600
340,175
29,725,387
2,925
Embodiments of the disclosure provide a method for configuring indication devices in transportation services. The method includes receiving a plurality of transportation requests including passenger pick-up points located in a preset geographical area. The method further includes identifying a first transportation request matching a first vehicle and a second transportation request matching a second vehicle, where the first vehicle and the second vehicle are detected to be located in the preset geographical area. The method also includes determining that first indication information assigned with the first transportation request shares an attribute with second indication information assigned with the second transportation request. The method additionally includes adjusting the first indication information so that the first indication information no longer shares the attribute with the second indication information.
1. A method for configuring indication devices to provide transportation service, the method comprising: receiving, by at least one processor, a plurality of transportation requests including passenger pick-up points located in a preset geographical area; identifying, by the at least one processor, a first transportation request matching a first vehicle and a second transportation request matching a second vehicle, wherein the first vehicle and the second vehicle are detected to be located in the preset geographical area; determining, by the at least one processor, that an attribute of first indication information assigned to indicate the first vehicle is matched with the first transportation request is same to an attribute of second indication information assigned for the second vehicle to indicate it is matched with the second transportation request; and adjusting, by the at least one processor, the first indication information so that the attribute of the first indication information is different from the attribute of the second indication information. 2. The method of claim 1, the method further comprising: sending, by the at least one processor, the adjusted first indication information to an indication device associated with the first vehicle. 3. The method of claim 1, the method further comprising: sending, by the at least one processor, the adjusted first indication information to a user device used by a user, wherein the user is picked up by the first vehicle. 4. The method of claim 1, wherein the preset geographical area has a shape of a regular polygon. 5. The method of claim 4, wherein the preset geographical area has a shape of a regular hexagon. 6. A system for configuring indication devices to provide transportation service, the system comprising: a communication interface configured to receive transportation requests; and at least one processor configured to: receive a plurality of transportation requests including passenger pick-up points located in a preset geographical area; identify a first transportation request matching a first vehicle and a second transportation request matching a second vehicle, wherein the first vehicle and the second vehicle are detected to be located in the preset geographical area; determine that an attribute of first indication information assigned to indicate the first vehicle is matched with the first transportation request is same to an attribute of second indication information assigned for the second vehicle to indicate it is matched with the second transportation request; and adjust the first indication information so that the attribute of the first indication information is different from the attribute of the second indication information. 7. The system of claim 6, wherein the at least one processor sends the adjusted first indication information to an indication device associated with the first vehicle. 8. The system of claim 6, wherein the at least one processor sends the adjusted first indication information to a user device used by a user, wherein the user is picked up by the first vehicle. 9. The system of claim 6, wherein the preset geographical area has a shape of a regular polygon. 10. The system of claim 9, wherein the preset geographical area has a shape of a regular hexagon. 11. A non-transitory computer-readable medium having stored thereon computer instructions, when executed by at least one processor, perform a method for configuring indication devices to provide transportation service, the method comprising: receiving a first transportation request including a first passenger pick-up point located in a preset geographical area, the first transportation request matching a first vehicle associated with a first indication device; receiving a second transportation request including a second passenger pick-up point located in the preset geographical area, the second transportation request matching a second vehicle associated with a second indication device; determining, by the at least one processor, that an attribute of first indication information assigned to indicate the first vehicle is matched with the first transportation request is same to an attribute of second indication information assigned for the second vehicle to indicate it is matched with the second transportation request; determining a time difference between a first estimated time for the first vehicle to arrive in the preset geographical area and a second estimated time for the second vehicle to arrive in the preset geographical area is smaller than a threshold; and adjusting, by the at least one processor, the first indication information so that the attribute of the first indication information is different from the attribute of the second indication information. 12. The non-transitory computer-readable medium of claim 11, wherein the method further comprises: sending the adjusted first indication information to an indication device associated with the first vehicle. 13. The non-transitory computer-readable medium of claim 11, wherein the method further comprises: sending the adjusted first indication information to a user device used by a user, wherein the user is picked up by the first vehicle. 14. The non-transitory computer-readable medium of claim 11, wherein the preset geographical area has a shape of a regular polygon. 15. The non-transitory computer-readable medium of claim 14, wherein the preset geographical area has a shape of a regular hexagon. 16. The method of claim 1, further comprising: determining a time difference between a first estimated time for the first vehicle to arrive in the preset geographical area and a second estimated time for the second vehicle to arrive in the preset geographical area; and adjusting the first indication information based on the time difference. 17. The method of claim 16, wherein the first indication information is adjusted when the time difference is smaller than a threshold. 18. The system of claim 6, wherein the at least one processor is further configured to: determine a time difference between a first estimated time for the first vehicle to arrive in the preset geographical area and a second estimated time for the second vehicle to arrive in the preset geographical area; and adjust the first indication information based on the time difference. 19. The system of claim 18, wherein the first indication information is adjusted when the time difference is smaller than a threshold.
Embodiments of the disclosure provide a method for configuring indication devices in transportation services. The method includes receiving a plurality of transportation requests including passenger pick-up points located in a preset geographical area. The method further includes identifying a first transportation request matching a first vehicle and a second transportation request matching a second vehicle, where the first vehicle and the second vehicle are detected to be located in the preset geographical area. The method also includes determining that first indication information assigned with the first transportation request shares an attribute with second indication information assigned with the second transportation request. The method additionally includes adjusting the first indication information so that the first indication information no longer shares the attribute with the second indication information.1. A method for configuring indication devices to provide transportation service, the method comprising: receiving, by at least one processor, a plurality of transportation requests including passenger pick-up points located in a preset geographical area; identifying, by the at least one processor, a first transportation request matching a first vehicle and a second transportation request matching a second vehicle, wherein the first vehicle and the second vehicle are detected to be located in the preset geographical area; determining, by the at least one processor, that an attribute of first indication information assigned to indicate the first vehicle is matched with the first transportation request is same to an attribute of second indication information assigned for the second vehicle to indicate it is matched with the second transportation request; and adjusting, by the at least one processor, the first indication information so that the attribute of the first indication information is different from the attribute of the second indication information. 2. The method of claim 1, the method further comprising: sending, by the at least one processor, the adjusted first indication information to an indication device associated with the first vehicle. 3. The method of claim 1, the method further comprising: sending, by the at least one processor, the adjusted first indication information to a user device used by a user, wherein the user is picked up by the first vehicle. 4. The method of claim 1, wherein the preset geographical area has a shape of a regular polygon. 5. The method of claim 4, wherein the preset geographical area has a shape of a regular hexagon. 6. A system for configuring indication devices to provide transportation service, the system comprising: a communication interface configured to receive transportation requests; and at least one processor configured to: receive a plurality of transportation requests including passenger pick-up points located in a preset geographical area; identify a first transportation request matching a first vehicle and a second transportation request matching a second vehicle, wherein the first vehicle and the second vehicle are detected to be located in the preset geographical area; determine that an attribute of first indication information assigned to indicate the first vehicle is matched with the first transportation request is same to an attribute of second indication information assigned for the second vehicle to indicate it is matched with the second transportation request; and adjust the first indication information so that the attribute of the first indication information is different from the attribute of the second indication information. 7. The system of claim 6, wherein the at least one processor sends the adjusted first indication information to an indication device associated with the first vehicle. 8. The system of claim 6, wherein the at least one processor sends the adjusted first indication information to a user device used by a user, wherein the user is picked up by the first vehicle. 9. The system of claim 6, wherein the preset geographical area has a shape of a regular polygon. 10. The system of claim 9, wherein the preset geographical area has a shape of a regular hexagon. 11. A non-transitory computer-readable medium having stored thereon computer instructions, when executed by at least one processor, perform a method for configuring indication devices to provide transportation service, the method comprising: receiving a first transportation request including a first passenger pick-up point located in a preset geographical area, the first transportation request matching a first vehicle associated with a first indication device; receiving a second transportation request including a second passenger pick-up point located in the preset geographical area, the second transportation request matching a second vehicle associated with a second indication device; determining, by the at least one processor, that an attribute of first indication information assigned to indicate the first vehicle is matched with the first transportation request is same to an attribute of second indication information assigned for the second vehicle to indicate it is matched with the second transportation request; determining a time difference between a first estimated time for the first vehicle to arrive in the preset geographical area and a second estimated time for the second vehicle to arrive in the preset geographical area is smaller than a threshold; and adjusting, by the at least one processor, the first indication information so that the attribute of the first indication information is different from the attribute of the second indication information. 12. The non-transitory computer-readable medium of claim 11, wherein the method further comprises: sending the adjusted first indication information to an indication device associated with the first vehicle. 13. The non-transitory computer-readable medium of claim 11, wherein the method further comprises: sending the adjusted first indication information to a user device used by a user, wherein the user is picked up by the first vehicle. 14. The non-transitory computer-readable medium of claim 11, wherein the preset geographical area has a shape of a regular polygon. 15. The non-transitory computer-readable medium of claim 14, wherein the preset geographical area has a shape of a regular hexagon. 16. The method of claim 1, further comprising: determining a time difference between a first estimated time for the first vehicle to arrive in the preset geographical area and a second estimated time for the second vehicle to arrive in the preset geographical area; and adjusting the first indication information based on the time difference. 17. The method of claim 16, wherein the first indication information is adjusted when the time difference is smaller than a threshold. 18. The system of claim 6, wherein the at least one processor is further configured to: determine a time difference between a first estimated time for the first vehicle to arrive in the preset geographical area and a second estimated time for the second vehicle to arrive in the preset geographical area; and adjust the first indication information based on the time difference. 19. The system of claim 18, wherein the first indication information is adjusted when the time difference is smaller than a threshold.
2,900
340,176
29,725,350
2,925
Embodiments of the disclosure provide a method for configuring indication devices in transportation services. The method includes receiving a plurality of transportation requests including passenger pick-up points located in a preset geographical area. The method further includes identifying a first transportation request matching a first vehicle and a second transportation request matching a second vehicle, where the first vehicle and the second vehicle are detected to be located in the preset geographical area. The method also includes determining that first indication information assigned with the first transportation request shares an attribute with second indication information assigned with the second transportation request. The method additionally includes adjusting the first indication information so that the first indication information no longer shares the attribute with the second indication information.
1. A method for configuring indication devices to provide transportation service, the method comprising: receiving, by at least one processor, a plurality of transportation requests including passenger pick-up points located in a preset geographical area; identifying, by the at least one processor, a first transportation request matching a first vehicle and a second transportation request matching a second vehicle, wherein the first vehicle and the second vehicle are detected to be located in the preset geographical area; determining, by the at least one processor, that an attribute of first indication information assigned to indicate the first vehicle is matched with the first transportation request is same to an attribute of second indication information assigned for the second vehicle to indicate it is matched with the second transportation request; and adjusting, by the at least one processor, the first indication information so that the attribute of the first indication information is different from the attribute of the second indication information. 2. The method of claim 1, the method further comprising: sending, by the at least one processor, the adjusted first indication information to an indication device associated with the first vehicle. 3. The method of claim 1, the method further comprising: sending, by the at least one processor, the adjusted first indication information to a user device used by a user, wherein the user is picked up by the first vehicle. 4. The method of claim 1, wherein the preset geographical area has a shape of a regular polygon. 5. The method of claim 4, wherein the preset geographical area has a shape of a regular hexagon. 6. A system for configuring indication devices to provide transportation service, the system comprising: a communication interface configured to receive transportation requests; and at least one processor configured to: receive a plurality of transportation requests including passenger pick-up points located in a preset geographical area; identify a first transportation request matching a first vehicle and a second transportation request matching a second vehicle, wherein the first vehicle and the second vehicle are detected to be located in the preset geographical area; determine that an attribute of first indication information assigned to indicate the first vehicle is matched with the first transportation request is same to an attribute of second indication information assigned for the second vehicle to indicate it is matched with the second transportation request; and adjust the first indication information so that the attribute of the first indication information is different from the attribute of the second indication information. 7. The system of claim 6, wherein the at least one processor sends the adjusted first indication information to an indication device associated with the first vehicle. 8. The system of claim 6, wherein the at least one processor sends the adjusted first indication information to a user device used by a user, wherein the user is picked up by the first vehicle. 9. The system of claim 6, wherein the preset geographical area has a shape of a regular polygon. 10. The system of claim 9, wherein the preset geographical area has a shape of a regular hexagon. 11. A non-transitory computer-readable medium having stored thereon computer instructions, when executed by at least one processor, perform a method for configuring indication devices to provide transportation service, the method comprising: receiving a first transportation request including a first passenger pick-up point located in a preset geographical area, the first transportation request matching a first vehicle associated with a first indication device; receiving a second transportation request including a second passenger pick-up point located in the preset geographical area, the second transportation request matching a second vehicle associated with a second indication device; determining, by the at least one processor, that an attribute of first indication information assigned to indicate the first vehicle is matched with the first transportation request is same to an attribute of second indication information assigned for the second vehicle to indicate it is matched with the second transportation request; determining a time difference between a first estimated time for the first vehicle to arrive in the preset geographical area and a second estimated time for the second vehicle to arrive in the preset geographical area is smaller than a threshold; and adjusting, by the at least one processor, the first indication information so that the attribute of the first indication information is different from the attribute of the second indication information. 12. The non-transitory computer-readable medium of claim 11, wherein the method further comprises: sending the adjusted first indication information to an indication device associated with the first vehicle. 13. The non-transitory computer-readable medium of claim 11, wherein the method further comprises: sending the adjusted first indication information to a user device used by a user, wherein the user is picked up by the first vehicle. 14. The non-transitory computer-readable medium of claim 11, wherein the preset geographical area has a shape of a regular polygon. 15. The non-transitory computer-readable medium of claim 14, wherein the preset geographical area has a shape of a regular hexagon. 16. The method of claim 1, further comprising: determining a time difference between a first estimated time for the first vehicle to arrive in the preset geographical area and a second estimated time for the second vehicle to arrive in the preset geographical area; and adjusting the first indication information based on the time difference. 17. The method of claim 16, wherein the first indication information is adjusted when the time difference is smaller than a threshold. 18. The system of claim 6, wherein the at least one processor is further configured to: determine a time difference between a first estimated time for the first vehicle to arrive in the preset geographical area and a second estimated time for the second vehicle to arrive in the preset geographical area; and adjust the first indication information based on the time difference. 19. The system of claim 18, wherein the first indication information is adjusted when the time difference is smaller than a threshold.
Embodiments of the disclosure provide a method for configuring indication devices in transportation services. The method includes receiving a plurality of transportation requests including passenger pick-up points located in a preset geographical area. The method further includes identifying a first transportation request matching a first vehicle and a second transportation request matching a second vehicle, where the first vehicle and the second vehicle are detected to be located in the preset geographical area. The method also includes determining that first indication information assigned with the first transportation request shares an attribute with second indication information assigned with the second transportation request. The method additionally includes adjusting the first indication information so that the first indication information no longer shares the attribute with the second indication information.1. A method for configuring indication devices to provide transportation service, the method comprising: receiving, by at least one processor, a plurality of transportation requests including passenger pick-up points located in a preset geographical area; identifying, by the at least one processor, a first transportation request matching a first vehicle and a second transportation request matching a second vehicle, wherein the first vehicle and the second vehicle are detected to be located in the preset geographical area; determining, by the at least one processor, that an attribute of first indication information assigned to indicate the first vehicle is matched with the first transportation request is same to an attribute of second indication information assigned for the second vehicle to indicate it is matched with the second transportation request; and adjusting, by the at least one processor, the first indication information so that the attribute of the first indication information is different from the attribute of the second indication information. 2. The method of claim 1, the method further comprising: sending, by the at least one processor, the adjusted first indication information to an indication device associated with the first vehicle. 3. The method of claim 1, the method further comprising: sending, by the at least one processor, the adjusted first indication information to a user device used by a user, wherein the user is picked up by the first vehicle. 4. The method of claim 1, wherein the preset geographical area has a shape of a regular polygon. 5. The method of claim 4, wherein the preset geographical area has a shape of a regular hexagon. 6. A system for configuring indication devices to provide transportation service, the system comprising: a communication interface configured to receive transportation requests; and at least one processor configured to: receive a plurality of transportation requests including passenger pick-up points located in a preset geographical area; identify a first transportation request matching a first vehicle and a second transportation request matching a second vehicle, wherein the first vehicle and the second vehicle are detected to be located in the preset geographical area; determine that an attribute of first indication information assigned to indicate the first vehicle is matched with the first transportation request is same to an attribute of second indication information assigned for the second vehicle to indicate it is matched with the second transportation request; and adjust the first indication information so that the attribute of the first indication information is different from the attribute of the second indication information. 7. The system of claim 6, wherein the at least one processor sends the adjusted first indication information to an indication device associated with the first vehicle. 8. The system of claim 6, wherein the at least one processor sends the adjusted first indication information to a user device used by a user, wherein the user is picked up by the first vehicle. 9. The system of claim 6, wherein the preset geographical area has a shape of a regular polygon. 10. The system of claim 9, wherein the preset geographical area has a shape of a regular hexagon. 11. A non-transitory computer-readable medium having stored thereon computer instructions, when executed by at least one processor, perform a method for configuring indication devices to provide transportation service, the method comprising: receiving a first transportation request including a first passenger pick-up point located in a preset geographical area, the first transportation request matching a first vehicle associated with a first indication device; receiving a second transportation request including a second passenger pick-up point located in the preset geographical area, the second transportation request matching a second vehicle associated with a second indication device; determining, by the at least one processor, that an attribute of first indication information assigned to indicate the first vehicle is matched with the first transportation request is same to an attribute of second indication information assigned for the second vehicle to indicate it is matched with the second transportation request; determining a time difference between a first estimated time for the first vehicle to arrive in the preset geographical area and a second estimated time for the second vehicle to arrive in the preset geographical area is smaller than a threshold; and adjusting, by the at least one processor, the first indication information so that the attribute of the first indication information is different from the attribute of the second indication information. 12. The non-transitory computer-readable medium of claim 11, wherein the method further comprises: sending the adjusted first indication information to an indication device associated with the first vehicle. 13. The non-transitory computer-readable medium of claim 11, wherein the method further comprises: sending the adjusted first indication information to a user device used by a user, wherein the user is picked up by the first vehicle. 14. The non-transitory computer-readable medium of claim 11, wherein the preset geographical area has a shape of a regular polygon. 15. The non-transitory computer-readable medium of claim 14, wherein the preset geographical area has a shape of a regular hexagon. 16. The method of claim 1, further comprising: determining a time difference between a first estimated time for the first vehicle to arrive in the preset geographical area and a second estimated time for the second vehicle to arrive in the preset geographical area; and adjusting the first indication information based on the time difference. 17. The method of claim 16, wherein the first indication information is adjusted when the time difference is smaller than a threshold. 18. The system of claim 6, wherein the at least one processor is further configured to: determine a time difference between a first estimated time for the first vehicle to arrive in the preset geographical area and a second estimated time for the second vehicle to arrive in the preset geographical area; and adjust the first indication information based on the time difference. 19. The system of claim 18, wherein the first indication information is adjusted when the time difference is smaller than a threshold.
2,900
340,177
29,725,347
2,925
Embodiments of the disclosure provide a method for configuring indication devices in transportation services. The method includes receiving a plurality of transportation requests including passenger pick-up points located in a preset geographical area. The method further includes identifying a first transportation request matching a first vehicle and a second transportation request matching a second vehicle, where the first vehicle and the second vehicle are detected to be located in the preset geographical area. The method also includes determining that first indication information assigned with the first transportation request shares an attribute with second indication information assigned with the second transportation request. The method additionally includes adjusting the first indication information so that the first indication information no longer shares the attribute with the second indication information.
1. A method for configuring indication devices to provide transportation service, the method comprising: receiving, by at least one processor, a plurality of transportation requests including passenger pick-up points located in a preset geographical area; identifying, by the at least one processor, a first transportation request matching a first vehicle and a second transportation request matching a second vehicle, wherein the first vehicle and the second vehicle are detected to be located in the preset geographical area; determining, by the at least one processor, that an attribute of first indication information assigned to indicate the first vehicle is matched with the first transportation request is same to an attribute of second indication information assigned for the second vehicle to indicate it is matched with the second transportation request; and adjusting, by the at least one processor, the first indication information so that the attribute of the first indication information is different from the attribute of the second indication information. 2. The method of claim 1, the method further comprising: sending, by the at least one processor, the adjusted first indication information to an indication device associated with the first vehicle. 3. The method of claim 1, the method further comprising: sending, by the at least one processor, the adjusted first indication information to a user device used by a user, wherein the user is picked up by the first vehicle. 4. The method of claim 1, wherein the preset geographical area has a shape of a regular polygon. 5. The method of claim 4, wherein the preset geographical area has a shape of a regular hexagon. 6. A system for configuring indication devices to provide transportation service, the system comprising: a communication interface configured to receive transportation requests; and at least one processor configured to: receive a plurality of transportation requests including passenger pick-up points located in a preset geographical area; identify a first transportation request matching a first vehicle and a second transportation request matching a second vehicle, wherein the first vehicle and the second vehicle are detected to be located in the preset geographical area; determine that an attribute of first indication information assigned to indicate the first vehicle is matched with the first transportation request is same to an attribute of second indication information assigned for the second vehicle to indicate it is matched with the second transportation request; and adjust the first indication information so that the attribute of the first indication information is different from the attribute of the second indication information. 7. The system of claim 6, wherein the at least one processor sends the adjusted first indication information to an indication device associated with the first vehicle. 8. The system of claim 6, wherein the at least one processor sends the adjusted first indication information to a user device used by a user, wherein the user is picked up by the first vehicle. 9. The system of claim 6, wherein the preset geographical area has a shape of a regular polygon. 10. The system of claim 9, wherein the preset geographical area has a shape of a regular hexagon. 11. A non-transitory computer-readable medium having stored thereon computer instructions, when executed by at least one processor, perform a method for configuring indication devices to provide transportation service, the method comprising: receiving a first transportation request including a first passenger pick-up point located in a preset geographical area, the first transportation request matching a first vehicle associated with a first indication device; receiving a second transportation request including a second passenger pick-up point located in the preset geographical area, the second transportation request matching a second vehicle associated with a second indication device; determining, by the at least one processor, that an attribute of first indication information assigned to indicate the first vehicle is matched with the first transportation request is same to an attribute of second indication information assigned for the second vehicle to indicate it is matched with the second transportation request; determining a time difference between a first estimated time for the first vehicle to arrive in the preset geographical area and a second estimated time for the second vehicle to arrive in the preset geographical area is smaller than a threshold; and adjusting, by the at least one processor, the first indication information so that the attribute of the first indication information is different from the attribute of the second indication information. 12. The non-transitory computer-readable medium of claim 11, wherein the method further comprises: sending the adjusted first indication information to an indication device associated with the first vehicle. 13. The non-transitory computer-readable medium of claim 11, wherein the method further comprises: sending the adjusted first indication information to a user device used by a user, wherein the user is picked up by the first vehicle. 14. The non-transitory computer-readable medium of claim 11, wherein the preset geographical area has a shape of a regular polygon. 15. The non-transitory computer-readable medium of claim 14, wherein the preset geographical area has a shape of a regular hexagon. 16. The method of claim 1, further comprising: determining a time difference between a first estimated time for the first vehicle to arrive in the preset geographical area and a second estimated time for the second vehicle to arrive in the preset geographical area; and adjusting the first indication information based on the time difference. 17. The method of claim 16, wherein the first indication information is adjusted when the time difference is smaller than a threshold. 18. The system of claim 6, wherein the at least one processor is further configured to: determine a time difference between a first estimated time for the first vehicle to arrive in the preset geographical area and a second estimated time for the second vehicle to arrive in the preset geographical area; and adjust the first indication information based on the time difference. 19. The system of claim 18, wherein the first indication information is adjusted when the time difference is smaller than a threshold.
Embodiments of the disclosure provide a method for configuring indication devices in transportation services. The method includes receiving a plurality of transportation requests including passenger pick-up points located in a preset geographical area. The method further includes identifying a first transportation request matching a first vehicle and a second transportation request matching a second vehicle, where the first vehicle and the second vehicle are detected to be located in the preset geographical area. The method also includes determining that first indication information assigned with the first transportation request shares an attribute with second indication information assigned with the second transportation request. The method additionally includes adjusting the first indication information so that the first indication information no longer shares the attribute with the second indication information.1. A method for configuring indication devices to provide transportation service, the method comprising: receiving, by at least one processor, a plurality of transportation requests including passenger pick-up points located in a preset geographical area; identifying, by the at least one processor, a first transportation request matching a first vehicle and a second transportation request matching a second vehicle, wherein the first vehicle and the second vehicle are detected to be located in the preset geographical area; determining, by the at least one processor, that an attribute of first indication information assigned to indicate the first vehicle is matched with the first transportation request is same to an attribute of second indication information assigned for the second vehicle to indicate it is matched with the second transportation request; and adjusting, by the at least one processor, the first indication information so that the attribute of the first indication information is different from the attribute of the second indication information. 2. The method of claim 1, the method further comprising: sending, by the at least one processor, the adjusted first indication information to an indication device associated with the first vehicle. 3. The method of claim 1, the method further comprising: sending, by the at least one processor, the adjusted first indication information to a user device used by a user, wherein the user is picked up by the first vehicle. 4. The method of claim 1, wherein the preset geographical area has a shape of a regular polygon. 5. The method of claim 4, wherein the preset geographical area has a shape of a regular hexagon. 6. A system for configuring indication devices to provide transportation service, the system comprising: a communication interface configured to receive transportation requests; and at least one processor configured to: receive a plurality of transportation requests including passenger pick-up points located in a preset geographical area; identify a first transportation request matching a first vehicle and a second transportation request matching a second vehicle, wherein the first vehicle and the second vehicle are detected to be located in the preset geographical area; determine that an attribute of first indication information assigned to indicate the first vehicle is matched with the first transportation request is same to an attribute of second indication information assigned for the second vehicle to indicate it is matched with the second transportation request; and adjust the first indication information so that the attribute of the first indication information is different from the attribute of the second indication information. 7. The system of claim 6, wherein the at least one processor sends the adjusted first indication information to an indication device associated with the first vehicle. 8. The system of claim 6, wherein the at least one processor sends the adjusted first indication information to a user device used by a user, wherein the user is picked up by the first vehicle. 9. The system of claim 6, wherein the preset geographical area has a shape of a regular polygon. 10. The system of claim 9, wherein the preset geographical area has a shape of a regular hexagon. 11. A non-transitory computer-readable medium having stored thereon computer instructions, when executed by at least one processor, perform a method for configuring indication devices to provide transportation service, the method comprising: receiving a first transportation request including a first passenger pick-up point located in a preset geographical area, the first transportation request matching a first vehicle associated with a first indication device; receiving a second transportation request including a second passenger pick-up point located in the preset geographical area, the second transportation request matching a second vehicle associated with a second indication device; determining, by the at least one processor, that an attribute of first indication information assigned to indicate the first vehicle is matched with the first transportation request is same to an attribute of second indication information assigned for the second vehicle to indicate it is matched with the second transportation request; determining a time difference between a first estimated time for the first vehicle to arrive in the preset geographical area and a second estimated time for the second vehicle to arrive in the preset geographical area is smaller than a threshold; and adjusting, by the at least one processor, the first indication information so that the attribute of the first indication information is different from the attribute of the second indication information. 12. The non-transitory computer-readable medium of claim 11, wherein the method further comprises: sending the adjusted first indication information to an indication device associated with the first vehicle. 13. The non-transitory computer-readable medium of claim 11, wherein the method further comprises: sending the adjusted first indication information to a user device used by a user, wherein the user is picked up by the first vehicle. 14. The non-transitory computer-readable medium of claim 11, wherein the preset geographical area has a shape of a regular polygon. 15. The non-transitory computer-readable medium of claim 14, wherein the preset geographical area has a shape of a regular hexagon. 16. The method of claim 1, further comprising: determining a time difference between a first estimated time for the first vehicle to arrive in the preset geographical area and a second estimated time for the second vehicle to arrive in the preset geographical area; and adjusting the first indication information based on the time difference. 17. The method of claim 16, wherein the first indication information is adjusted when the time difference is smaller than a threshold. 18. The system of claim 6, wherein the at least one processor is further configured to: determine a time difference between a first estimated time for the first vehicle to arrive in the preset geographical area and a second estimated time for the second vehicle to arrive in the preset geographical area; and adjust the first indication information based on the time difference. 19. The system of claim 18, wherein the first indication information is adjusted when the time difference is smaller than a threshold.
2,900
340,178
29,725,346
2,925
Embodiments of the disclosure provide a method for configuring indication devices in transportation services. The method includes receiving a plurality of transportation requests including passenger pick-up points located in a preset geographical area. The method further includes identifying a first transportation request matching a first vehicle and a second transportation request matching a second vehicle, where the first vehicle and the second vehicle are detected to be located in the preset geographical area. The method also includes determining that first indication information assigned with the first transportation request shares an attribute with second indication information assigned with the second transportation request. The method additionally includes adjusting the first indication information so that the first indication information no longer shares the attribute with the second indication information.
1. A method for configuring indication devices to provide transportation service, the method comprising: receiving, by at least one processor, a plurality of transportation requests including passenger pick-up points located in a preset geographical area; identifying, by the at least one processor, a first transportation request matching a first vehicle and a second transportation request matching a second vehicle, wherein the first vehicle and the second vehicle are detected to be located in the preset geographical area; determining, by the at least one processor, that an attribute of first indication information assigned to indicate the first vehicle is matched with the first transportation request is same to an attribute of second indication information assigned for the second vehicle to indicate it is matched with the second transportation request; and adjusting, by the at least one processor, the first indication information so that the attribute of the first indication information is different from the attribute of the second indication information. 2. The method of claim 1, the method further comprising: sending, by the at least one processor, the adjusted first indication information to an indication device associated with the first vehicle. 3. The method of claim 1, the method further comprising: sending, by the at least one processor, the adjusted first indication information to a user device used by a user, wherein the user is picked up by the first vehicle. 4. The method of claim 1, wherein the preset geographical area has a shape of a regular polygon. 5. The method of claim 4, wherein the preset geographical area has a shape of a regular hexagon. 6. A system for configuring indication devices to provide transportation service, the system comprising: a communication interface configured to receive transportation requests; and at least one processor configured to: receive a plurality of transportation requests including passenger pick-up points located in a preset geographical area; identify a first transportation request matching a first vehicle and a second transportation request matching a second vehicle, wherein the first vehicle and the second vehicle are detected to be located in the preset geographical area; determine that an attribute of first indication information assigned to indicate the first vehicle is matched with the first transportation request is same to an attribute of second indication information assigned for the second vehicle to indicate it is matched with the second transportation request; and adjust the first indication information so that the attribute of the first indication information is different from the attribute of the second indication information. 7. The system of claim 6, wherein the at least one processor sends the adjusted first indication information to an indication device associated with the first vehicle. 8. The system of claim 6, wherein the at least one processor sends the adjusted first indication information to a user device used by a user, wherein the user is picked up by the first vehicle. 9. The system of claim 6, wherein the preset geographical area has a shape of a regular polygon. 10. The system of claim 9, wherein the preset geographical area has a shape of a regular hexagon. 11. A non-transitory computer-readable medium having stored thereon computer instructions, when executed by at least one processor, perform a method for configuring indication devices to provide transportation service, the method comprising: receiving a first transportation request including a first passenger pick-up point located in a preset geographical area, the first transportation request matching a first vehicle associated with a first indication device; receiving a second transportation request including a second passenger pick-up point located in the preset geographical area, the second transportation request matching a second vehicle associated with a second indication device; determining, by the at least one processor, that an attribute of first indication information assigned to indicate the first vehicle is matched with the first transportation request is same to an attribute of second indication information assigned for the second vehicle to indicate it is matched with the second transportation request; determining a time difference between a first estimated time for the first vehicle to arrive in the preset geographical area and a second estimated time for the second vehicle to arrive in the preset geographical area is smaller than a threshold; and adjusting, by the at least one processor, the first indication information so that the attribute of the first indication information is different from the attribute of the second indication information. 12. The non-transitory computer-readable medium of claim 11, wherein the method further comprises: sending the adjusted first indication information to an indication device associated with the first vehicle. 13. The non-transitory computer-readable medium of claim 11, wherein the method further comprises: sending the adjusted first indication information to a user device used by a user, wherein the user is picked up by the first vehicle. 14. The non-transitory computer-readable medium of claim 11, wherein the preset geographical area has a shape of a regular polygon. 15. The non-transitory computer-readable medium of claim 14, wherein the preset geographical area has a shape of a regular hexagon. 16. The method of claim 1, further comprising: determining a time difference between a first estimated time for the first vehicle to arrive in the preset geographical area and a second estimated time for the second vehicle to arrive in the preset geographical area; and adjusting the first indication information based on the time difference. 17. The method of claim 16, wherein the first indication information is adjusted when the time difference is smaller than a threshold. 18. The system of claim 6, wherein the at least one processor is further configured to: determine a time difference between a first estimated time for the first vehicle to arrive in the preset geographical area and a second estimated time for the second vehicle to arrive in the preset geographical area; and adjust the first indication information based on the time difference. 19. The system of claim 18, wherein the first indication information is adjusted when the time difference is smaller than a threshold.
Embodiments of the disclosure provide a method for configuring indication devices in transportation services. The method includes receiving a plurality of transportation requests including passenger pick-up points located in a preset geographical area. The method further includes identifying a first transportation request matching a first vehicle and a second transportation request matching a second vehicle, where the first vehicle and the second vehicle are detected to be located in the preset geographical area. The method also includes determining that first indication information assigned with the first transportation request shares an attribute with second indication information assigned with the second transportation request. The method additionally includes adjusting the first indication information so that the first indication information no longer shares the attribute with the second indication information.1. A method for configuring indication devices to provide transportation service, the method comprising: receiving, by at least one processor, a plurality of transportation requests including passenger pick-up points located in a preset geographical area; identifying, by the at least one processor, a first transportation request matching a first vehicle and a second transportation request matching a second vehicle, wherein the first vehicle and the second vehicle are detected to be located in the preset geographical area; determining, by the at least one processor, that an attribute of first indication information assigned to indicate the first vehicle is matched with the first transportation request is same to an attribute of second indication information assigned for the second vehicle to indicate it is matched with the second transportation request; and adjusting, by the at least one processor, the first indication information so that the attribute of the first indication information is different from the attribute of the second indication information. 2. The method of claim 1, the method further comprising: sending, by the at least one processor, the adjusted first indication information to an indication device associated with the first vehicle. 3. The method of claim 1, the method further comprising: sending, by the at least one processor, the adjusted first indication information to a user device used by a user, wherein the user is picked up by the first vehicle. 4. The method of claim 1, wherein the preset geographical area has a shape of a regular polygon. 5. The method of claim 4, wherein the preset geographical area has a shape of a regular hexagon. 6. A system for configuring indication devices to provide transportation service, the system comprising: a communication interface configured to receive transportation requests; and at least one processor configured to: receive a plurality of transportation requests including passenger pick-up points located in a preset geographical area; identify a first transportation request matching a first vehicle and a second transportation request matching a second vehicle, wherein the first vehicle and the second vehicle are detected to be located in the preset geographical area; determine that an attribute of first indication information assigned to indicate the first vehicle is matched with the first transportation request is same to an attribute of second indication information assigned for the second vehicle to indicate it is matched with the second transportation request; and adjust the first indication information so that the attribute of the first indication information is different from the attribute of the second indication information. 7. The system of claim 6, wherein the at least one processor sends the adjusted first indication information to an indication device associated with the first vehicle. 8. The system of claim 6, wherein the at least one processor sends the adjusted first indication information to a user device used by a user, wherein the user is picked up by the first vehicle. 9. The system of claim 6, wherein the preset geographical area has a shape of a regular polygon. 10. The system of claim 9, wherein the preset geographical area has a shape of a regular hexagon. 11. A non-transitory computer-readable medium having stored thereon computer instructions, when executed by at least one processor, perform a method for configuring indication devices to provide transportation service, the method comprising: receiving a first transportation request including a first passenger pick-up point located in a preset geographical area, the first transportation request matching a first vehicle associated with a first indication device; receiving a second transportation request including a second passenger pick-up point located in the preset geographical area, the second transportation request matching a second vehicle associated with a second indication device; determining, by the at least one processor, that an attribute of first indication information assigned to indicate the first vehicle is matched with the first transportation request is same to an attribute of second indication information assigned for the second vehicle to indicate it is matched with the second transportation request; determining a time difference between a first estimated time for the first vehicle to arrive in the preset geographical area and a second estimated time for the second vehicle to arrive in the preset geographical area is smaller than a threshold; and adjusting, by the at least one processor, the first indication information so that the attribute of the first indication information is different from the attribute of the second indication information. 12. The non-transitory computer-readable medium of claim 11, wherein the method further comprises: sending the adjusted first indication information to an indication device associated with the first vehicle. 13. The non-transitory computer-readable medium of claim 11, wherein the method further comprises: sending the adjusted first indication information to a user device used by a user, wherein the user is picked up by the first vehicle. 14. The non-transitory computer-readable medium of claim 11, wherein the preset geographical area has a shape of a regular polygon. 15. The non-transitory computer-readable medium of claim 14, wherein the preset geographical area has a shape of a regular hexagon. 16. The method of claim 1, further comprising: determining a time difference between a first estimated time for the first vehicle to arrive in the preset geographical area and a second estimated time for the second vehicle to arrive in the preset geographical area; and adjusting the first indication information based on the time difference. 17. The method of claim 16, wherein the first indication information is adjusted when the time difference is smaller than a threshold. 18. The system of claim 6, wherein the at least one processor is further configured to: determine a time difference between a first estimated time for the first vehicle to arrive in the preset geographical area and a second estimated time for the second vehicle to arrive in the preset geographical area; and adjust the first indication information based on the time difference. 19. The system of claim 18, wherein the first indication information is adjusted when the time difference is smaller than a threshold.
2,900
340,179
16,873,200
2,461
Managing communications among a plurality of wireless communication transceiver nodes in a mobile ad-hoc network, wherein each node performs several steps: including storing a plurality of timeslot sets, wherein each timeslot set comprises a plurality of timeslots having a predetermined location within a TDMA frame, and the plurality of timeslot sets comprises an intra-region timeslot set and at least one inter-region timeslot set, a timeslot function assigning each timeslot to one timeslot set from said plurality of timeslot sets, and one neighbor node set from a plurality of neighbor node sets, and a plurality of channel sets, wherein each channel set is associated with: a cellular channel assignment function assigning one channel from said channel set to an input set of spatial coordinates; a Transmission Interference Range (TIR) function assigning a Maximum Transmission Interference Range (MTIR) value based on an input timeslot set and said input set of spatial coordinates.
1. A method for managing communications among a plurality of wireless communication transceiver nodes in a mobile ad-hoc network, wherein each node from said plurality of wireless communication transceiver nodes performs the following steps: storing in the memory an input data set comprising: 1) a plurality of timeslot sets, wherein a) each timeslot set comprises a plurality of timeslots having a predetermined location within a TDMA frame, and b) the plurality of timeslot sets comprises an intra-region timeslot set and at least one inter-region timeslot set, 2) a timeslot function assigning each timeslot to a) one timeslot set from said plurality of timeslot sets, and b) one neighbor node set from a plurality of neighbor node sets; and 3) a plurality of channel sets, wherein each channel set is associated with: a) a cellular channel assignment function assigning one channel from said channel set to an input set of spatial coordinates, b) a Transmission Interference Range (TIR) function assigning a Maximum Transmission Interference Range (MTIR) value based on an input timeslot set and said input set of spatial coordinates, and c) one logic condition from a set of logic conditions, wherein the node selects a channel from said each channel set if the one logic condition is fulfilled for a predetermined duration; periodically performing the steps of: obtaining the node's spatial coordinates; identifying a next timeslot; identifying the timeslot set and neighbor node set assigned by the timeslot function to the identified next timeslot; periodically identifying one logic condition that is fulfilled for a predetermined duration, and then identifying the channel set, cellular channel assignment function, and TIR function that are associated with the identified one fulfilled logic condition; determining if the node will be transmitting, or receiving, in the next timeslot; and, upon determining the node will be transmitting, performing the steps of: a) obtaining the channel assigned by the identified cellular channel assignment function to the node's obtained spatial coordinates; b) obtaining the MTIR value assigned by the identified TIR function to the combination of the node's obtained spatial coordinates and the identified timeslot set; c) calculating a transmission power value using the obtained MTIR value and the node's spatial coordinates; and d) transmitting data during the next timeslot using the obtained channel and calculated transmission power value; or upon determining the node will be receiving, performing the step of receiving data during the next timeslot on a channel used by at least one transmitting node in the identified neighbor node set. 2. A wireless communication transceiver node comprising a processor and non-transitory memory having stored thereon a set of processor-executable software instructions configured to cause the processor to perform the following steps: storing in the memory an input data set comprising: 1) a plurality of timeslot sets, wherein a) each timeslot set comprises a plurality, of timeslots having a predetermined location within a TDMA frame, and b) the plurality of timeslot sets comprises an intra-region timeslot set and at least one inter-region timeslot set, 2) a timeslot function assigning each timeslot to a) one timeslot set from said plurality of timeslot sets, and b) one neighbor node set from a plurality of neighbor node sets; and 3) a plurality of channel sets, wherein each channel set is associated with: a) a cellular channel assignment function assigning one channel from said channel set to an input set of spatial coordinates, b) a Transmission Interference Range (TIR) function assigning a Maximum Transmission Interference Range (MTIR) value based on an input timeslot set and said input set of spatial coordinates, and c) one logic condition from a set of logic conditions, wherein the node selects a channel from said each channel set if the one logic condition is fulfilled for a predetermined duration; periodically performing the steps of: obtaining the node's spatial coordinates; identifying a next timeslot; identifying the timeslot set and neighbor node set assigned by the timeslot function to the identified next timeslot; periodically identifying one logic condition that is fulfilled for a predetermined duration, and then identifying the channel set, cellular channel assignment function, and TIR function that are associated with the identified one fulfilled logic condition; determining if the node will be transmitting, or receiving, in the next timeslot; and, upon determining the node will be transmitting, performing the steps of: a) obtaining the channel assigned by the identified cellular channel assignment function to the node's obtained spatial coordinates; b) obtaining the MTIR value assigned by the identified TIR function to the combination of the node's obtained spatial coordinates and the identified timeslot set; c) calculating a transmission power value using the obtained MTIR value and the node's spatial coordinates; and d) transmitting data during the next timeslot using the obtained channel and calculated transmission power value; or upon determining the node will be receiving, performing the step of receiving data during the next timeslot on a channel used by at least one transmitting node in the identified neighbor node set. 3. A non-transitory computer readable storage medium having stored thereon a set of processor-executable software instructions configured to cause a processor in a wireless communication transceiver node comprising non-transitory memory to perform the following steps: storing in the memory an input data set comprising: 1) a plurality of timeslot sets, wherein a) each timeslot set comprises a plurality of timeslots having a predetermined location within a TDMA frame, and b) the plurality of timeslot sets comprises an intra-region timeslot set and at least one inter-region timeslot set, 2) a timeslot function assigning each timeslot to a) one timeslot set from said plurality of timeslot sets, and b) one neighbor node set from a plurality of neighbor node sets; and 3) a plurality of channel sets, wherein each channel set is associated with: a) a cellular channel assignment function assigning one channel from said channel set to an input set of spatial coordinates, b) a Transmission Interference Range (TIR) function assigning a Maximum Transmission Interference Range (MTIR) value based on an input timeslot set and said input set of spatial coordinates, and c) one logic condition from a set of logic conditions, wherein the node selects a channel from said each channel set if the one logic condition is fulfilled for a predetermined duration; periodically performing the steps of: obtaining the node's spatial coordinates; identifying a next timeslot; identifying the timeslot set and neighbor node set assigned by the timeslot function to the identified next timeslot; periodically identifying one logic condition that is fulfilled for a predetermined duration, and then identifying the channel set, cellular channel assignment function, and TIR function that are associated with the identified one fulfilled logic condition; determining if the node will be transmitting, or receiving, in the next timeslot; and, upon determining the node will be transmitting, performing the steps of: a) obtaining the channel assigned by the identified cellular channel assignment function to the node's obtained spatial coordinates; b) obtaining the MTIR value assigned by the identified TIR function to the combination of the node's obtained spatial coordinates and the identified timeslot set; c) calculating a transmission power value using the obtained MTIR value and the node's spatial coordinates; and d) transmitting data during the next timeslot using the obtained channel and calculated transmission power value; or upon determining the node will be receiving, performing the step of receiving data during the next timeslot on a channel used by at least one transmitting node in the identified neighbor node set. 4. A mobile ad-hoc network, comprising a plurality of wireless communication transceiver nodes according to claim 2. 5. The method of claim 1, wherein the set of logic conditions contains at least one of the following conditions: 1) the total number of nodes within a region is less than a maximum region population and greater than a minimum region population, wherein: a) if the total node population in a region is greater than the maximum region node population then the region will recursively split into two or more smaller regions until the region node population of each of the smaller regions is less than the maximum region node population, and b) if the total node population in a region is less than the minimum region node population then the region will recursively merge with one or more neighbor regions until the region node population of the combined region is greater than the minimum region node population and less than the maximum node population; 2) there are at least K nodes in a region, where K is a predetermined positive integer number, wherein each one of the K nodes has at least one connected 1-hop neighbor node belonging to a neighbor region, and further wherein each at least one connected 1-hop neighbor node belongs to a different neighbor region; and, 3) data packet transmissions originating by any one node within a region can reach every destination node located within a distance D from the geographic center of the region within a number of transmission hops that is less than N, where D is a predetermined positive real number and N is a predetermined positive integer number. 6. The wireless communication transceiver node of claim 2, wherein the set of logic conditions contains at least one of the following conditions: 1) the total number of nodes within a region is less than a maximum region population and greater than a minimum region population, wherein: a) if the total node population in a region is greater than the maximum region node population then the region will recursively split into two or more smaller regions until the region node population of each of the smaller regions is less than the maximum region node population, and b) if the total node population in a region is less than the minimum region node population then the region will recursively merge with one or more neighbor regions until the region node population of the combined region is greater than the minimum region node population and less than the maximum node population; 2) there are at least K nodes in a region, where K is a predetermined positive integer number, wherein each one of the K nodes has at least one connected 1-hop neighbor node belonging to a neighbor region, and further wherein each at least one connected 1-hop neighbor node belongs to a different neighbor region; and, 3) data packet transmissions originating by any one node within a region can reach every destination node located within a distance D from the geographic center of the region within a number of transmission hops that is less than N, where D is a predetermined positive real number and N is a predetermined positive integer number.
Managing communications among a plurality of wireless communication transceiver nodes in a mobile ad-hoc network, wherein each node performs several steps: including storing a plurality of timeslot sets, wherein each timeslot set comprises a plurality of timeslots having a predetermined location within a TDMA frame, and the plurality of timeslot sets comprises an intra-region timeslot set and at least one inter-region timeslot set, a timeslot function assigning each timeslot to one timeslot set from said plurality of timeslot sets, and one neighbor node set from a plurality of neighbor node sets, and a plurality of channel sets, wherein each channel set is associated with: a cellular channel assignment function assigning one channel from said channel set to an input set of spatial coordinates; a Transmission Interference Range (TIR) function assigning a Maximum Transmission Interference Range (MTIR) value based on an input timeslot set and said input set of spatial coordinates.1. A method for managing communications among a plurality of wireless communication transceiver nodes in a mobile ad-hoc network, wherein each node from said plurality of wireless communication transceiver nodes performs the following steps: storing in the memory an input data set comprising: 1) a plurality of timeslot sets, wherein a) each timeslot set comprises a plurality of timeslots having a predetermined location within a TDMA frame, and b) the plurality of timeslot sets comprises an intra-region timeslot set and at least one inter-region timeslot set, 2) a timeslot function assigning each timeslot to a) one timeslot set from said plurality of timeslot sets, and b) one neighbor node set from a plurality of neighbor node sets; and 3) a plurality of channel sets, wherein each channel set is associated with: a) a cellular channel assignment function assigning one channel from said channel set to an input set of spatial coordinates, b) a Transmission Interference Range (TIR) function assigning a Maximum Transmission Interference Range (MTIR) value based on an input timeslot set and said input set of spatial coordinates, and c) one logic condition from a set of logic conditions, wherein the node selects a channel from said each channel set if the one logic condition is fulfilled for a predetermined duration; periodically performing the steps of: obtaining the node's spatial coordinates; identifying a next timeslot; identifying the timeslot set and neighbor node set assigned by the timeslot function to the identified next timeslot; periodically identifying one logic condition that is fulfilled for a predetermined duration, and then identifying the channel set, cellular channel assignment function, and TIR function that are associated with the identified one fulfilled logic condition; determining if the node will be transmitting, or receiving, in the next timeslot; and, upon determining the node will be transmitting, performing the steps of: a) obtaining the channel assigned by the identified cellular channel assignment function to the node's obtained spatial coordinates; b) obtaining the MTIR value assigned by the identified TIR function to the combination of the node's obtained spatial coordinates and the identified timeslot set; c) calculating a transmission power value using the obtained MTIR value and the node's spatial coordinates; and d) transmitting data during the next timeslot using the obtained channel and calculated transmission power value; or upon determining the node will be receiving, performing the step of receiving data during the next timeslot on a channel used by at least one transmitting node in the identified neighbor node set. 2. A wireless communication transceiver node comprising a processor and non-transitory memory having stored thereon a set of processor-executable software instructions configured to cause the processor to perform the following steps: storing in the memory an input data set comprising: 1) a plurality of timeslot sets, wherein a) each timeslot set comprises a plurality, of timeslots having a predetermined location within a TDMA frame, and b) the plurality of timeslot sets comprises an intra-region timeslot set and at least one inter-region timeslot set, 2) a timeslot function assigning each timeslot to a) one timeslot set from said plurality of timeslot sets, and b) one neighbor node set from a plurality of neighbor node sets; and 3) a plurality of channel sets, wherein each channel set is associated with: a) a cellular channel assignment function assigning one channel from said channel set to an input set of spatial coordinates, b) a Transmission Interference Range (TIR) function assigning a Maximum Transmission Interference Range (MTIR) value based on an input timeslot set and said input set of spatial coordinates, and c) one logic condition from a set of logic conditions, wherein the node selects a channel from said each channel set if the one logic condition is fulfilled for a predetermined duration; periodically performing the steps of: obtaining the node's spatial coordinates; identifying a next timeslot; identifying the timeslot set and neighbor node set assigned by the timeslot function to the identified next timeslot; periodically identifying one logic condition that is fulfilled for a predetermined duration, and then identifying the channel set, cellular channel assignment function, and TIR function that are associated with the identified one fulfilled logic condition; determining if the node will be transmitting, or receiving, in the next timeslot; and, upon determining the node will be transmitting, performing the steps of: a) obtaining the channel assigned by the identified cellular channel assignment function to the node's obtained spatial coordinates; b) obtaining the MTIR value assigned by the identified TIR function to the combination of the node's obtained spatial coordinates and the identified timeslot set; c) calculating a transmission power value using the obtained MTIR value and the node's spatial coordinates; and d) transmitting data during the next timeslot using the obtained channel and calculated transmission power value; or upon determining the node will be receiving, performing the step of receiving data during the next timeslot on a channel used by at least one transmitting node in the identified neighbor node set. 3. A non-transitory computer readable storage medium having stored thereon a set of processor-executable software instructions configured to cause a processor in a wireless communication transceiver node comprising non-transitory memory to perform the following steps: storing in the memory an input data set comprising: 1) a plurality of timeslot sets, wherein a) each timeslot set comprises a plurality of timeslots having a predetermined location within a TDMA frame, and b) the plurality of timeslot sets comprises an intra-region timeslot set and at least one inter-region timeslot set, 2) a timeslot function assigning each timeslot to a) one timeslot set from said plurality of timeslot sets, and b) one neighbor node set from a plurality of neighbor node sets; and 3) a plurality of channel sets, wherein each channel set is associated with: a) a cellular channel assignment function assigning one channel from said channel set to an input set of spatial coordinates, b) a Transmission Interference Range (TIR) function assigning a Maximum Transmission Interference Range (MTIR) value based on an input timeslot set and said input set of spatial coordinates, and c) one logic condition from a set of logic conditions, wherein the node selects a channel from said each channel set if the one logic condition is fulfilled for a predetermined duration; periodically performing the steps of: obtaining the node's spatial coordinates; identifying a next timeslot; identifying the timeslot set and neighbor node set assigned by the timeslot function to the identified next timeslot; periodically identifying one logic condition that is fulfilled for a predetermined duration, and then identifying the channel set, cellular channel assignment function, and TIR function that are associated with the identified one fulfilled logic condition; determining if the node will be transmitting, or receiving, in the next timeslot; and, upon determining the node will be transmitting, performing the steps of: a) obtaining the channel assigned by the identified cellular channel assignment function to the node's obtained spatial coordinates; b) obtaining the MTIR value assigned by the identified TIR function to the combination of the node's obtained spatial coordinates and the identified timeslot set; c) calculating a transmission power value using the obtained MTIR value and the node's spatial coordinates; and d) transmitting data during the next timeslot using the obtained channel and calculated transmission power value; or upon determining the node will be receiving, performing the step of receiving data during the next timeslot on a channel used by at least one transmitting node in the identified neighbor node set. 4. A mobile ad-hoc network, comprising a plurality of wireless communication transceiver nodes according to claim 2. 5. The method of claim 1, wherein the set of logic conditions contains at least one of the following conditions: 1) the total number of nodes within a region is less than a maximum region population and greater than a minimum region population, wherein: a) if the total node population in a region is greater than the maximum region node population then the region will recursively split into two or more smaller regions until the region node population of each of the smaller regions is less than the maximum region node population, and b) if the total node population in a region is less than the minimum region node population then the region will recursively merge with one or more neighbor regions until the region node population of the combined region is greater than the minimum region node population and less than the maximum node population; 2) there are at least K nodes in a region, where K is a predetermined positive integer number, wherein each one of the K nodes has at least one connected 1-hop neighbor node belonging to a neighbor region, and further wherein each at least one connected 1-hop neighbor node belongs to a different neighbor region; and, 3) data packet transmissions originating by any one node within a region can reach every destination node located within a distance D from the geographic center of the region within a number of transmission hops that is less than N, where D is a predetermined positive real number and N is a predetermined positive integer number. 6. The wireless communication transceiver node of claim 2, wherein the set of logic conditions contains at least one of the following conditions: 1) the total number of nodes within a region is less than a maximum region population and greater than a minimum region population, wherein: a) if the total node population in a region is greater than the maximum region node population then the region will recursively split into two or more smaller regions until the region node population of each of the smaller regions is less than the maximum region node population, and b) if the total node population in a region is less than the minimum region node population then the region will recursively merge with one or more neighbor regions until the region node population of the combined region is greater than the minimum region node population and less than the maximum node population; 2) there are at least K nodes in a region, where K is a predetermined positive integer number, wherein each one of the K nodes has at least one connected 1-hop neighbor node belonging to a neighbor region, and further wherein each at least one connected 1-hop neighbor node belongs to a different neighbor region; and, 3) data packet transmissions originating by any one node within a region can reach every destination node located within a distance D from the geographic center of the region within a number of transmission hops that is less than N, where D is a predetermined positive real number and N is a predetermined positive integer number.
2,400
340,180
16,801,145
2,461
A method, system, and computer program product to manage a network comprising a plurality of interconnected components are described. The method includes obtaining a set of all the components that are part of the network over time, and identifying one or more repeating patterns of components among the set of all the components as corresponding lower-level definitions to generate a hierarchical set of all the components. The method also includes obtaining time-varying information regarding topology and operational values within the network, and creating a representation of the network at a set of times based on the hierarchical set of all the components and the time-varying information.
1. A method of managing a network comprising a plurality of interconnected components, the method comprising: obtaining, using a processor, a set of all the components that are part of the network over time; identifying one or more repeating patterns of components among the set of all the components as corresponding lower-level definitions to generate a hierarchical set of all the components; obtaining time-varying information regarding topology and operational values within the network; and creating, using the processor, a representation of the network at a set of times based on the hierarchical set of all the components and the time-varying information.
A method, system, and computer program product to manage a network comprising a plurality of interconnected components are described. The method includes obtaining a set of all the components that are part of the network over time, and identifying one or more repeating patterns of components among the set of all the components as corresponding lower-level definitions to generate a hierarchical set of all the components. The method also includes obtaining time-varying information regarding topology and operational values within the network, and creating a representation of the network at a set of times based on the hierarchical set of all the components and the time-varying information.1. A method of managing a network comprising a plurality of interconnected components, the method comprising: obtaining, using a processor, a set of all the components that are part of the network over time; identifying one or more repeating patterns of components among the set of all the components as corresponding lower-level definitions to generate a hierarchical set of all the components; obtaining time-varying information regarding topology and operational values within the network; and creating, using the processor, a representation of the network at a set of times based on the hierarchical set of all the components and the time-varying information.
2,400
340,181
16,801,119
2,461
Embodiments of the disclosure provide a method for configuring indication devices in transportation services. The method includes receiving a first transportation request which includes a first passenger pick-up point located in a preset geographical area, and the first transportation request matches a first vehicle associated with a first indication device. The method also includes receiving a second transportation request which includes a second passenger pick-up point located in the preset geographical area, and the second transportation request matches a second vehicle associated with a second indication device. The method further includes determining a time difference between a first estimated time for the first vehicle to arrive in the preset geographical area and a second estimated time for the second vehicle to arrive in the preset geographical area, and sending first indication information to the first indication device and second indication information to the second indication device according to the time difference.
1. A method for configuring indication devices to provide transportation service, the method comprising: receiving, by at least one processor, a first transportation request including a first passenger pick-up point located in a preset geographical area, the first transportation request matching a first vehicle associated with a first indication device; receiving, by the at least one processor, a second transportation request including a second passenger pick-up point located in the preset geographical area, the second transportation request matching a second vehicle associated with a second indication device; determining, by the at least one processor, a time difference between a first estimated time for the first vehicle to arrive in the preset geographical area and a second estimated time for the second vehicle to arrive in the preset geographical area; and sending, by the at least one processor, first indication information to the first indication device and second indication information to the second indication device according to the time difference. 2. The method of claim 1, wherein the first transportation request provides transportation service to a first user using a first user device and the second transportation request provides transportation service to a second user using a second user device, wherein the method further comprising: sending, by the at least one processor, the first indication information to the first user device; and sending, by the at least one processor, the second indication information to the second user device. 3. The method of claim 1, further comprising: determining that the time difference is above a preset threshold; and selecting, by the at least one processor, same attributes for the first indication information and the second indication information. 4. The method of claim 1, further comprising: determining that the time difference is below a preset threshold; and selecting, by the at least one processor, different attributes for the first indication information and the second indication information. 5. The method of claim 2, the method further comprising: receiving, by the at least one processor, an indication information change request from the first user device; and sending, by the at least one processor, third indication information to the first indication device according to the indication information change request to replace the first indication information, wherein the third indication information has one or more attributes different from that of the second indication information. 6. The method of claim 2, the method further comprising: receiving, by the at least one processor, the indication information change request from the first user device; verifying, by the at least one processor, that the first vehicle and the second vehicle are located in the preset geographical area; and sending, by the at least one processor, third indication information to the first indication device according to the verification result to replace the first indication information, wherein the third indication information has one or more attributes different from that of the second indication information. 7. The method of claim 2, the method further comprising: detecting, by the at least one processor, that the first vehicle and the second vehicle are located in the preset geographical area; and sending, by the at least one processor, the third indication information to the first indication device to replace the first indication information, wherein the third indication information has one or more attributes different from that of the second indication information. 8. The method of claim 7, the method further comprising: sending, by the at least one processor, a notification to the first user device to inform it that the first indication information has been replaced. 9. The method of claim 1, wherein the preset geographical area has a shape of a regular polygon. 10. The method of claim 9, wherein the preset geographical area has a shape of a regular hexagon. 11. A system for configuring indication devices to provide transportation service, the system comprising: a communication interface configured to receive a first transportation request and a second transportation request; and at least one processor configured to: receive the first transportation request including a first passenger pick-up point located in a preset geographical area, wherein the first transportation request matches a first vehicle associated with a first indication device; receive the second transportation request including a second passenger pick-up point located in the preset geographical area, wherein the second transportation request matches a second vehicle associated with a second indication device; determine a time difference between a first estimated time for the first vehicle to arrive in the preset geographical area and a second estimated time for the second vehicle to arrive in the preset geographical area; and send first indication information to the first indication device and second indication information to the second indication device according to the time difference. 12. The system of claim 11, wherein the first transportation request provides transportation service to a first user using a first user device and the second transportation request provides transportation service to a second user using a second user device, and wherein the at least one processor is further configured to: send the first indication information to the first user device; and send the second indication information to the second user device. 13. The system of claim 11, wherein the at least one processor is further configured to: determine that the time difference is above a preset threshold; and select same attributes for the first indication information and the second indication information. 14. The system of claim 11, wherein the at least one processor is further configured to: determine that the time difference is below a preset threshold; and select different attributes for the first indication information and the second indication information. 15. The system of claim 12, wherein the at least one processor is further configured to: receive an indication information change request from the first user device; and send third indication information to the first indication device according to the indication information change request to replace the first indication information, wherein the third indication information has one or more attributes different from that of the second indication information. 16. The system of claim 12, wherein the at least one processor is further configured to: receive the indication information change request from the first user device; and verify that the first vehicle and the second vehicle are located in the preset geographical area; and send the third indication information to the first indication device according to the verification result to replace the first indication information, wherein the third indication information has one or more attributes different from that of the second indication information. 17. The system of claim 12, wherein the at least one processor is further configured to: detect that the first vehicle and the second vehicle are located in the preset geographical area; and send the third indication information to the first indication device to replace the first indication information, wherein the third indication information has one or more attributes different from that of the second indication information. 18. The system of claim 17, wherein the at least one processor is further configured to: send a notification to the first user device to inform it that the first indication information has been replaced. 19. The system of claim 11, wherein the preset geographical area has a shape of a regular polygon. 20. A non-transitory computer-readable medium having stored thereon computer instructions, when executed by at least one processor, perform a method for configuring indication devices to provide transportation service, the method comprising: receiving a first transportation request including a first passenger pick-up point located in a preset geographical area, the first transportation request matching a first vehicle associated with a first indication device; receiving a second transportation request including a second passenger pick-up point located in the preset geographical area, the second transportation request matching a second vehicle associated with a second indication device; determining a time difference between a first estimated time for the first vehicle to arrive in the preset geographical area and a second estimated time for the second vehicle to arrive in the preset geographical area; and sending first indication information to the first indication device and second indication information to the second indication device according to the time difference.
Embodiments of the disclosure provide a method for configuring indication devices in transportation services. The method includes receiving a first transportation request which includes a first passenger pick-up point located in a preset geographical area, and the first transportation request matches a first vehicle associated with a first indication device. The method also includes receiving a second transportation request which includes a second passenger pick-up point located in the preset geographical area, and the second transportation request matches a second vehicle associated with a second indication device. The method further includes determining a time difference between a first estimated time for the first vehicle to arrive in the preset geographical area and a second estimated time for the second vehicle to arrive in the preset geographical area, and sending first indication information to the first indication device and second indication information to the second indication device according to the time difference.1. A method for configuring indication devices to provide transportation service, the method comprising: receiving, by at least one processor, a first transportation request including a first passenger pick-up point located in a preset geographical area, the first transportation request matching a first vehicle associated with a first indication device; receiving, by the at least one processor, a second transportation request including a second passenger pick-up point located in the preset geographical area, the second transportation request matching a second vehicle associated with a second indication device; determining, by the at least one processor, a time difference between a first estimated time for the first vehicle to arrive in the preset geographical area and a second estimated time for the second vehicle to arrive in the preset geographical area; and sending, by the at least one processor, first indication information to the first indication device and second indication information to the second indication device according to the time difference. 2. The method of claim 1, wherein the first transportation request provides transportation service to a first user using a first user device and the second transportation request provides transportation service to a second user using a second user device, wherein the method further comprising: sending, by the at least one processor, the first indication information to the first user device; and sending, by the at least one processor, the second indication information to the second user device. 3. The method of claim 1, further comprising: determining that the time difference is above a preset threshold; and selecting, by the at least one processor, same attributes for the first indication information and the second indication information. 4. The method of claim 1, further comprising: determining that the time difference is below a preset threshold; and selecting, by the at least one processor, different attributes for the first indication information and the second indication information. 5. The method of claim 2, the method further comprising: receiving, by the at least one processor, an indication information change request from the first user device; and sending, by the at least one processor, third indication information to the first indication device according to the indication information change request to replace the first indication information, wherein the third indication information has one or more attributes different from that of the second indication information. 6. The method of claim 2, the method further comprising: receiving, by the at least one processor, the indication information change request from the first user device; verifying, by the at least one processor, that the first vehicle and the second vehicle are located in the preset geographical area; and sending, by the at least one processor, third indication information to the first indication device according to the verification result to replace the first indication information, wherein the third indication information has one or more attributes different from that of the second indication information. 7. The method of claim 2, the method further comprising: detecting, by the at least one processor, that the first vehicle and the second vehicle are located in the preset geographical area; and sending, by the at least one processor, the third indication information to the first indication device to replace the first indication information, wherein the third indication information has one or more attributes different from that of the second indication information. 8. The method of claim 7, the method further comprising: sending, by the at least one processor, a notification to the first user device to inform it that the first indication information has been replaced. 9. The method of claim 1, wherein the preset geographical area has a shape of a regular polygon. 10. The method of claim 9, wherein the preset geographical area has a shape of a regular hexagon. 11. A system for configuring indication devices to provide transportation service, the system comprising: a communication interface configured to receive a first transportation request and a second transportation request; and at least one processor configured to: receive the first transportation request including a first passenger pick-up point located in a preset geographical area, wherein the first transportation request matches a first vehicle associated with a first indication device; receive the second transportation request including a second passenger pick-up point located in the preset geographical area, wherein the second transportation request matches a second vehicle associated with a second indication device; determine a time difference between a first estimated time for the first vehicle to arrive in the preset geographical area and a second estimated time for the second vehicle to arrive in the preset geographical area; and send first indication information to the first indication device and second indication information to the second indication device according to the time difference. 12. The system of claim 11, wherein the first transportation request provides transportation service to a first user using a first user device and the second transportation request provides transportation service to a second user using a second user device, and wherein the at least one processor is further configured to: send the first indication information to the first user device; and send the second indication information to the second user device. 13. The system of claim 11, wherein the at least one processor is further configured to: determine that the time difference is above a preset threshold; and select same attributes for the first indication information and the second indication information. 14. The system of claim 11, wherein the at least one processor is further configured to: determine that the time difference is below a preset threshold; and select different attributes for the first indication information and the second indication information. 15. The system of claim 12, wherein the at least one processor is further configured to: receive an indication information change request from the first user device; and send third indication information to the first indication device according to the indication information change request to replace the first indication information, wherein the third indication information has one or more attributes different from that of the second indication information. 16. The system of claim 12, wherein the at least one processor is further configured to: receive the indication information change request from the first user device; and verify that the first vehicle and the second vehicle are located in the preset geographical area; and send the third indication information to the first indication device according to the verification result to replace the first indication information, wherein the third indication information has one or more attributes different from that of the second indication information. 17. The system of claim 12, wherein the at least one processor is further configured to: detect that the first vehicle and the second vehicle are located in the preset geographical area; and send the third indication information to the first indication device to replace the first indication information, wherein the third indication information has one or more attributes different from that of the second indication information. 18. The system of claim 17, wherein the at least one processor is further configured to: send a notification to the first user device to inform it that the first indication information has been replaced. 19. The system of claim 11, wherein the preset geographical area has a shape of a regular polygon. 20. A non-transitory computer-readable medium having stored thereon computer instructions, when executed by at least one processor, perform a method for configuring indication devices to provide transportation service, the method comprising: receiving a first transportation request including a first passenger pick-up point located in a preset geographical area, the first transportation request matching a first vehicle associated with a first indication device; receiving a second transportation request including a second passenger pick-up point located in the preset geographical area, the second transportation request matching a second vehicle associated with a second indication device; determining a time difference between a first estimated time for the first vehicle to arrive in the preset geographical area and a second estimated time for the second vehicle to arrive in the preset geographical area; and sending first indication information to the first indication device and second indication information to the second indication device according to the time difference.
2,400
340,182
16,801,124
2,461
Embodiments of the disclosure provide a method for configuring indication devices in transportation services. The method includes receiving a first transportation request which includes a first passenger pick-up point located in a preset geographical area, and the first transportation request matches a first vehicle associated with a first indication device. The method also includes receiving a second transportation request which includes a second passenger pick-up point located in the preset geographical area, and the second transportation request matches a second vehicle associated with a second indication device. The method further includes determining a time difference between a first estimated time for the first vehicle to arrive in the preset geographical area and a second estimated time for the second vehicle to arrive in the preset geographical area, and sending first indication information to the first indication device and second indication information to the second indication device according to the time difference.
1. A method for configuring indication devices to provide transportation service, the method comprising: receiving, by at least one processor, a first transportation request including a first passenger pick-up point located in a preset geographical area, the first transportation request matching a first vehicle associated with a first indication device; receiving, by the at least one processor, a second transportation request including a second passenger pick-up point located in the preset geographical area, the second transportation request matching a second vehicle associated with a second indication device; determining, by the at least one processor, a time difference between a first estimated time for the first vehicle to arrive in the preset geographical area and a second estimated time for the second vehicle to arrive in the preset geographical area; and sending, by the at least one processor, first indication information to the first indication device and second indication information to the second indication device according to the time difference. 2. The method of claim 1, wherein the first transportation request provides transportation service to a first user using a first user device and the second transportation request provides transportation service to a second user using a second user device, wherein the method further comprising: sending, by the at least one processor, the first indication information to the first user device; and sending, by the at least one processor, the second indication information to the second user device. 3. The method of claim 1, further comprising: determining that the time difference is above a preset threshold; and selecting, by the at least one processor, same attributes for the first indication information and the second indication information. 4. The method of claim 1, further comprising: determining that the time difference is below a preset threshold; and selecting, by the at least one processor, different attributes for the first indication information and the second indication information. 5. The method of claim 2, the method further comprising: receiving, by the at least one processor, an indication information change request from the first user device; and sending, by the at least one processor, third indication information to the first indication device according to the indication information change request to replace the first indication information, wherein the third indication information has one or more attributes different from that of the second indication information. 6. The method of claim 2, the method further comprising: receiving, by the at least one processor, the indication information change request from the first user device; verifying, by the at least one processor, that the first vehicle and the second vehicle are located in the preset geographical area; and sending, by the at least one processor, third indication information to the first indication device according to the verification result to replace the first indication information, wherein the third indication information has one or more attributes different from that of the second indication information. 7. The method of claim 2, the method further comprising: detecting, by the at least one processor, that the first vehicle and the second vehicle are located in the preset geographical area; and sending, by the at least one processor, the third indication information to the first indication device to replace the first indication information, wherein the third indication information has one or more attributes different from that of the second indication information. 8. The method of claim 7, the method further comprising: sending, by the at least one processor, a notification to the first user device to inform it that the first indication information has been replaced. 9. The method of claim 1, wherein the preset geographical area has a shape of a regular polygon. 10. The method of claim 9, wherein the preset geographical area has a shape of a regular hexagon. 11. A system for configuring indication devices to provide transportation service, the system comprising: a communication interface configured to receive a first transportation request and a second transportation request; and at least one processor configured to: receive the first transportation request including a first passenger pick-up point located in a preset geographical area, wherein the first transportation request matches a first vehicle associated with a first indication device; receive the second transportation request including a second passenger pick-up point located in the preset geographical area, wherein the second transportation request matches a second vehicle associated with a second indication device; determine a time difference between a first estimated time for the first vehicle to arrive in the preset geographical area and a second estimated time for the second vehicle to arrive in the preset geographical area; and send first indication information to the first indication device and second indication information to the second indication device according to the time difference. 12. The system of claim 11, wherein the first transportation request provides transportation service to a first user using a first user device and the second transportation request provides transportation service to a second user using a second user device, and wherein the at least one processor is further configured to: send the first indication information to the first user device; and send the second indication information to the second user device. 13. The system of claim 11, wherein the at least one processor is further configured to: determine that the time difference is above a preset threshold; and select same attributes for the first indication information and the second indication information. 14. The system of claim 11, wherein the at least one processor is further configured to: determine that the time difference is below a preset threshold; and select different attributes for the first indication information and the second indication information. 15. The system of claim 12, wherein the at least one processor is further configured to: receive an indication information change request from the first user device; and send third indication information to the first indication device according to the indication information change request to replace the first indication information, wherein the third indication information has one or more attributes different from that of the second indication information. 16. The system of claim 12, wherein the at least one processor is further configured to: receive the indication information change request from the first user device; and verify that the first vehicle and the second vehicle are located in the preset geographical area; and send the third indication information to the first indication device according to the verification result to replace the first indication information, wherein the third indication information has one or more attributes different from that of the second indication information. 17. The system of claim 12, wherein the at least one processor is further configured to: detect that the first vehicle and the second vehicle are located in the preset geographical area; and send the third indication information to the first indication device to replace the first indication information, wherein the third indication information has one or more attributes different from that of the second indication information. 18. The system of claim 17, wherein the at least one processor is further configured to: send a notification to the first user device to inform it that the first indication information has been replaced. 19. The system of claim 11, wherein the preset geographical area has a shape of a regular polygon. 20. A non-transitory computer-readable medium having stored thereon computer instructions, when executed by at least one processor, perform a method for configuring indication devices to provide transportation service, the method comprising: receiving a first transportation request including a first passenger pick-up point located in a preset geographical area, the first transportation request matching a first vehicle associated with a first indication device; receiving a second transportation request including a second passenger pick-up point located in the preset geographical area, the second transportation request matching a second vehicle associated with a second indication device; determining a time difference between a first estimated time for the first vehicle to arrive in the preset geographical area and a second estimated time for the second vehicle to arrive in the preset geographical area; and sending first indication information to the first indication device and second indication information to the second indication device according to the time difference.
Embodiments of the disclosure provide a method for configuring indication devices in transportation services. The method includes receiving a first transportation request which includes a first passenger pick-up point located in a preset geographical area, and the first transportation request matches a first vehicle associated with a first indication device. The method also includes receiving a second transportation request which includes a second passenger pick-up point located in the preset geographical area, and the second transportation request matches a second vehicle associated with a second indication device. The method further includes determining a time difference between a first estimated time for the first vehicle to arrive in the preset geographical area and a second estimated time for the second vehicle to arrive in the preset geographical area, and sending first indication information to the first indication device and second indication information to the second indication device according to the time difference.1. A method for configuring indication devices to provide transportation service, the method comprising: receiving, by at least one processor, a first transportation request including a first passenger pick-up point located in a preset geographical area, the first transportation request matching a first vehicle associated with a first indication device; receiving, by the at least one processor, a second transportation request including a second passenger pick-up point located in the preset geographical area, the second transportation request matching a second vehicle associated with a second indication device; determining, by the at least one processor, a time difference between a first estimated time for the first vehicle to arrive in the preset geographical area and a second estimated time for the second vehicle to arrive in the preset geographical area; and sending, by the at least one processor, first indication information to the first indication device and second indication information to the second indication device according to the time difference. 2. The method of claim 1, wherein the first transportation request provides transportation service to a first user using a first user device and the second transportation request provides transportation service to a second user using a second user device, wherein the method further comprising: sending, by the at least one processor, the first indication information to the first user device; and sending, by the at least one processor, the second indication information to the second user device. 3. The method of claim 1, further comprising: determining that the time difference is above a preset threshold; and selecting, by the at least one processor, same attributes for the first indication information and the second indication information. 4. The method of claim 1, further comprising: determining that the time difference is below a preset threshold; and selecting, by the at least one processor, different attributes for the first indication information and the second indication information. 5. The method of claim 2, the method further comprising: receiving, by the at least one processor, an indication information change request from the first user device; and sending, by the at least one processor, third indication information to the first indication device according to the indication information change request to replace the first indication information, wherein the third indication information has one or more attributes different from that of the second indication information. 6. The method of claim 2, the method further comprising: receiving, by the at least one processor, the indication information change request from the first user device; verifying, by the at least one processor, that the first vehicle and the second vehicle are located in the preset geographical area; and sending, by the at least one processor, third indication information to the first indication device according to the verification result to replace the first indication information, wherein the third indication information has one or more attributes different from that of the second indication information. 7. The method of claim 2, the method further comprising: detecting, by the at least one processor, that the first vehicle and the second vehicle are located in the preset geographical area; and sending, by the at least one processor, the third indication information to the first indication device to replace the first indication information, wherein the third indication information has one or more attributes different from that of the second indication information. 8. The method of claim 7, the method further comprising: sending, by the at least one processor, a notification to the first user device to inform it that the first indication information has been replaced. 9. The method of claim 1, wherein the preset geographical area has a shape of a regular polygon. 10. The method of claim 9, wherein the preset geographical area has a shape of a regular hexagon. 11. A system for configuring indication devices to provide transportation service, the system comprising: a communication interface configured to receive a first transportation request and a second transportation request; and at least one processor configured to: receive the first transportation request including a first passenger pick-up point located in a preset geographical area, wherein the first transportation request matches a first vehicle associated with a first indication device; receive the second transportation request including a second passenger pick-up point located in the preset geographical area, wherein the second transportation request matches a second vehicle associated with a second indication device; determine a time difference between a first estimated time for the first vehicle to arrive in the preset geographical area and a second estimated time for the second vehicle to arrive in the preset geographical area; and send first indication information to the first indication device and second indication information to the second indication device according to the time difference. 12. The system of claim 11, wherein the first transportation request provides transportation service to a first user using a first user device and the second transportation request provides transportation service to a second user using a second user device, and wherein the at least one processor is further configured to: send the first indication information to the first user device; and send the second indication information to the second user device. 13. The system of claim 11, wherein the at least one processor is further configured to: determine that the time difference is above a preset threshold; and select same attributes for the first indication information and the second indication information. 14. The system of claim 11, wherein the at least one processor is further configured to: determine that the time difference is below a preset threshold; and select different attributes for the first indication information and the second indication information. 15. The system of claim 12, wherein the at least one processor is further configured to: receive an indication information change request from the first user device; and send third indication information to the first indication device according to the indication information change request to replace the first indication information, wherein the third indication information has one or more attributes different from that of the second indication information. 16. The system of claim 12, wherein the at least one processor is further configured to: receive the indication information change request from the first user device; and verify that the first vehicle and the second vehicle are located in the preset geographical area; and send the third indication information to the first indication device according to the verification result to replace the first indication information, wherein the third indication information has one or more attributes different from that of the second indication information. 17. The system of claim 12, wherein the at least one processor is further configured to: detect that the first vehicle and the second vehicle are located in the preset geographical area; and send the third indication information to the first indication device to replace the first indication information, wherein the third indication information has one or more attributes different from that of the second indication information. 18. The system of claim 17, wherein the at least one processor is further configured to: send a notification to the first user device to inform it that the first indication information has been replaced. 19. The system of claim 11, wherein the preset geographical area has a shape of a regular polygon. 20. A non-transitory computer-readable medium having stored thereon computer instructions, when executed by at least one processor, perform a method for configuring indication devices to provide transportation service, the method comprising: receiving a first transportation request including a first passenger pick-up point located in a preset geographical area, the first transportation request matching a first vehicle associated with a first indication device; receiving a second transportation request including a second passenger pick-up point located in the preset geographical area, the second transportation request matching a second vehicle associated with a second indication device; determining a time difference between a first estimated time for the first vehicle to arrive in the preset geographical area and a second estimated time for the second vehicle to arrive in the preset geographical area; and sending first indication information to the first indication device and second indication information to the second indication device according to the time difference.
2,400
340,183
16,801,143
2,461
A system and a method to detect malicious software written to an Ethernet solid-state drive (eSSD). The system includes an Ethernet switch, at least one SSD, and a baseboard management controller (BMC). The Ethernet switch receives write data from a communication network in response to a write command. The at least one SSD receives the write data from the Ethernet switch and stores the received write data. The BMC receives from the at least one SSD the received write data. The BMC determines whether the received write data contains malicious software. The received write data may be contained in a plurality of Ethernet packets in which case the BMC stores the received write data in a scan buffer in an order that is based on an assembled order of the received write data.
1. A system, comprising: an Ethernet switch to receive write data from a communication network in response to a write command; and a device to receive the write data in a buffer in an order that is based on an assembled order of the write data, wherein the device is configured to scan the write data using the buffer to determine whether the write data contains at least one of a) a virus code, or b) a malicious signature. 2. The system of claim 1, wherein: the device is configured to periodically update a database of virus signature scans; and the device is configured to scan the write data based at least on the database of virus signature scans. 3. The system of claim 1, further comprising at least one solid-state drive (SSD) coupled to the Ethernet switch and to the device, the at least one SSD to receive the write data and store the write data. 4. The system of claim 3, wherein: the at least one SSD includes a reset pin; and in response to the device determining that the write data contains the at least one of a) the virus code, or b) the malicious signature, the device is configured to assert the reset pin of the at least one SSD until the at least one SSD is at least one of a) removed from the system or b) power is removed from the at least one SSD. 5. The system of claim 3, wherein the at least one SSD is coupled to the device through at least one of a) a Peripheral Component Interface Express (PCIe) based communication link or b) a system management bus. 6. The system of claim 3, wherein the device is configured to perform health monitoring of the at least one SSD. 7. The system of claim 3, wherein the device is configured to provide operational status information of the at least one SSD. 8. The system of claim 1, wherein: in response to the device determining that the write data contains the at least one of a) the virus code, or b) the malicious signature, the device is configured to: log detection of the at least one of a) the virus code, or b) the malicious signature; and notify a storage administrator of the detection of the at least one of a) the virus code, or b) the malicious signature. 9. The system of claim 1, wherein the virus code comprises a software virus. 10. The system of claim 1, wherein: the write data is contained in a plurality of Ethernet packets; and the device is configured to detect any malicious signature located on a boundary of adjacent Ethernet packets from among the plurality of Ethernet packets. 11. The system of claim 1, wherein the SSD comprises an Ethernet SSD (eSSD). 12. A method to detect malicious software, the method comprising: receiving, by an Ethernet switch, write data from a communication network in response to a write command; receiving, by a device, the write data in a buffer in an order that is based on an assembled order of the write data; scanning, by the device, the write data using the buffer; and determining, by the device, whether the write data contains at least one of a) a virus code, or b) a malicious signature. 13. The method of claim 12, further comprising: periodically updating, by the device, a database of virus signature scans; and scanning, by the device, the write data based at least on the database of virus signature scans. 14. The method of claim 12, further comprising: receiving, by at least one solid-state drive (SSD), the write data; and storing, by the at least one SSD, the write data. 15. The method of claim 14, wherein the at least one SSD includes a reset pin, the method further comprising asserting, by the device, the reset pin of the at least one SSD until the at least one SSD is at least one of a) removed from the system or b) power is removed from the at least one SSD. 16. The method of claim 15, wherein asserting the reset pin occurs in response to the device determining that the write data contains the at least one of a) the virus code, or b) the malicious signature. 17. The method of claim 14, wherein the device is configured to perform health monitoring of the at least one SSD. 18. The method of claim 14, wherein the device is configured to provide operational status information of the at least one SSD. 19. The method of claim 12, wherein responsive to the device determining that the write data contains the at least one of a) the virus code, or b) the malicious signature: logging, by the device, detection of the at least one of a) the virus code, or b) the malicious signature; and notifying, by the device, a storage administrator of the detection of the at least one of a) the virus code, or b) the malicious signature. 20. The method of claim 12, wherein the write data is contained in a plurality of Ethernet packets, the method further comprising detecting, by the device, any malicious signature located on a boundary of adjacent Ethernet packets from among the plurality of Ethernet packets.
A system and a method to detect malicious software written to an Ethernet solid-state drive (eSSD). The system includes an Ethernet switch, at least one SSD, and a baseboard management controller (BMC). The Ethernet switch receives write data from a communication network in response to a write command. The at least one SSD receives the write data from the Ethernet switch and stores the received write data. The BMC receives from the at least one SSD the received write data. The BMC determines whether the received write data contains malicious software. The received write data may be contained in a plurality of Ethernet packets in which case the BMC stores the received write data in a scan buffer in an order that is based on an assembled order of the received write data.1. A system, comprising: an Ethernet switch to receive write data from a communication network in response to a write command; and a device to receive the write data in a buffer in an order that is based on an assembled order of the write data, wherein the device is configured to scan the write data using the buffer to determine whether the write data contains at least one of a) a virus code, or b) a malicious signature. 2. The system of claim 1, wherein: the device is configured to periodically update a database of virus signature scans; and the device is configured to scan the write data based at least on the database of virus signature scans. 3. The system of claim 1, further comprising at least one solid-state drive (SSD) coupled to the Ethernet switch and to the device, the at least one SSD to receive the write data and store the write data. 4. The system of claim 3, wherein: the at least one SSD includes a reset pin; and in response to the device determining that the write data contains the at least one of a) the virus code, or b) the malicious signature, the device is configured to assert the reset pin of the at least one SSD until the at least one SSD is at least one of a) removed from the system or b) power is removed from the at least one SSD. 5. The system of claim 3, wherein the at least one SSD is coupled to the device through at least one of a) a Peripheral Component Interface Express (PCIe) based communication link or b) a system management bus. 6. The system of claim 3, wherein the device is configured to perform health monitoring of the at least one SSD. 7. The system of claim 3, wherein the device is configured to provide operational status information of the at least one SSD. 8. The system of claim 1, wherein: in response to the device determining that the write data contains the at least one of a) the virus code, or b) the malicious signature, the device is configured to: log detection of the at least one of a) the virus code, or b) the malicious signature; and notify a storage administrator of the detection of the at least one of a) the virus code, or b) the malicious signature. 9. The system of claim 1, wherein the virus code comprises a software virus. 10. The system of claim 1, wherein: the write data is contained in a plurality of Ethernet packets; and the device is configured to detect any malicious signature located on a boundary of adjacent Ethernet packets from among the plurality of Ethernet packets. 11. The system of claim 1, wherein the SSD comprises an Ethernet SSD (eSSD). 12. A method to detect malicious software, the method comprising: receiving, by an Ethernet switch, write data from a communication network in response to a write command; receiving, by a device, the write data in a buffer in an order that is based on an assembled order of the write data; scanning, by the device, the write data using the buffer; and determining, by the device, whether the write data contains at least one of a) a virus code, or b) a malicious signature. 13. The method of claim 12, further comprising: periodically updating, by the device, a database of virus signature scans; and scanning, by the device, the write data based at least on the database of virus signature scans. 14. The method of claim 12, further comprising: receiving, by at least one solid-state drive (SSD), the write data; and storing, by the at least one SSD, the write data. 15. The method of claim 14, wherein the at least one SSD includes a reset pin, the method further comprising asserting, by the device, the reset pin of the at least one SSD until the at least one SSD is at least one of a) removed from the system or b) power is removed from the at least one SSD. 16. The method of claim 15, wherein asserting the reset pin occurs in response to the device determining that the write data contains the at least one of a) the virus code, or b) the malicious signature. 17. The method of claim 14, wherein the device is configured to perform health monitoring of the at least one SSD. 18. The method of claim 14, wherein the device is configured to provide operational status information of the at least one SSD. 19. The method of claim 12, wherein responsive to the device determining that the write data contains the at least one of a) the virus code, or b) the malicious signature: logging, by the device, detection of the at least one of a) the virus code, or b) the malicious signature; and notifying, by the device, a storage administrator of the detection of the at least one of a) the virus code, or b) the malicious signature. 20. The method of claim 12, wherein the write data is contained in a plurality of Ethernet packets, the method further comprising detecting, by the device, any malicious signature located on a boundary of adjacent Ethernet packets from among the plurality of Ethernet packets.
2,400
340,184
29,725,358
2,461
A system and a method to detect malicious software written to an Ethernet solid-state drive (eSSD). The system includes an Ethernet switch, at least one SSD, and a baseboard management controller (BMC). The Ethernet switch receives write data from a communication network in response to a write command. The at least one SSD receives the write data from the Ethernet switch and stores the received write data. The BMC receives from the at least one SSD the received write data. The BMC determines whether the received write data contains malicious software. The received write data may be contained in a plurality of Ethernet packets in which case the BMC stores the received write data in a scan buffer in an order that is based on an assembled order of the received write data.
1. A system, comprising: an Ethernet switch to receive write data from a communication network in response to a write command; and a device to receive the write data in a buffer in an order that is based on an assembled order of the write data, wherein the device is configured to scan the write data using the buffer to determine whether the write data contains at least one of a) a virus code, or b) a malicious signature. 2. The system of claim 1, wherein: the device is configured to periodically update a database of virus signature scans; and the device is configured to scan the write data based at least on the database of virus signature scans. 3. The system of claim 1, further comprising at least one solid-state drive (SSD) coupled to the Ethernet switch and to the device, the at least one SSD to receive the write data and store the write data. 4. The system of claim 3, wherein: the at least one SSD includes a reset pin; and in response to the device determining that the write data contains the at least one of a) the virus code, or b) the malicious signature, the device is configured to assert the reset pin of the at least one SSD until the at least one SSD is at least one of a) removed from the system or b) power is removed from the at least one SSD. 5. The system of claim 3, wherein the at least one SSD is coupled to the device through at least one of a) a Peripheral Component Interface Express (PCIe) based communication link or b) a system management bus. 6. The system of claim 3, wherein the device is configured to perform health monitoring of the at least one SSD. 7. The system of claim 3, wherein the device is configured to provide operational status information of the at least one SSD. 8. The system of claim 1, wherein: in response to the device determining that the write data contains the at least one of a) the virus code, or b) the malicious signature, the device is configured to: log detection of the at least one of a) the virus code, or b) the malicious signature; and notify a storage administrator of the detection of the at least one of a) the virus code, or b) the malicious signature. 9. The system of claim 1, wherein the virus code comprises a software virus. 10. The system of claim 1, wherein: the write data is contained in a plurality of Ethernet packets; and the device is configured to detect any malicious signature located on a boundary of adjacent Ethernet packets from among the plurality of Ethernet packets. 11. The system of claim 1, wherein the SSD comprises an Ethernet SSD (eSSD). 12. A method to detect malicious software, the method comprising: receiving, by an Ethernet switch, write data from a communication network in response to a write command; receiving, by a device, the write data in a buffer in an order that is based on an assembled order of the write data; scanning, by the device, the write data using the buffer; and determining, by the device, whether the write data contains at least one of a) a virus code, or b) a malicious signature. 13. The method of claim 12, further comprising: periodically updating, by the device, a database of virus signature scans; and scanning, by the device, the write data based at least on the database of virus signature scans. 14. The method of claim 12, further comprising: receiving, by at least one solid-state drive (SSD), the write data; and storing, by the at least one SSD, the write data. 15. The method of claim 14, wherein the at least one SSD includes a reset pin, the method further comprising asserting, by the device, the reset pin of the at least one SSD until the at least one SSD is at least one of a) removed from the system or b) power is removed from the at least one SSD. 16. The method of claim 15, wherein asserting the reset pin occurs in response to the device determining that the write data contains the at least one of a) the virus code, or b) the malicious signature. 17. The method of claim 14, wherein the device is configured to perform health monitoring of the at least one SSD. 18. The method of claim 14, wherein the device is configured to provide operational status information of the at least one SSD. 19. The method of claim 12, wherein responsive to the device determining that the write data contains the at least one of a) the virus code, or b) the malicious signature: logging, by the device, detection of the at least one of a) the virus code, or b) the malicious signature; and notifying, by the device, a storage administrator of the detection of the at least one of a) the virus code, or b) the malicious signature. 20. The method of claim 12, wherein the write data is contained in a plurality of Ethernet packets, the method further comprising detecting, by the device, any malicious signature located on a boundary of adjacent Ethernet packets from among the plurality of Ethernet packets.
A system and a method to detect malicious software written to an Ethernet solid-state drive (eSSD). The system includes an Ethernet switch, at least one SSD, and a baseboard management controller (BMC). The Ethernet switch receives write data from a communication network in response to a write command. The at least one SSD receives the write data from the Ethernet switch and stores the received write data. The BMC receives from the at least one SSD the received write data. The BMC determines whether the received write data contains malicious software. The received write data may be contained in a plurality of Ethernet packets in which case the BMC stores the received write data in a scan buffer in an order that is based on an assembled order of the received write data.1. A system, comprising: an Ethernet switch to receive write data from a communication network in response to a write command; and a device to receive the write data in a buffer in an order that is based on an assembled order of the write data, wherein the device is configured to scan the write data using the buffer to determine whether the write data contains at least one of a) a virus code, or b) a malicious signature. 2. The system of claim 1, wherein: the device is configured to periodically update a database of virus signature scans; and the device is configured to scan the write data based at least on the database of virus signature scans. 3. The system of claim 1, further comprising at least one solid-state drive (SSD) coupled to the Ethernet switch and to the device, the at least one SSD to receive the write data and store the write data. 4. The system of claim 3, wherein: the at least one SSD includes a reset pin; and in response to the device determining that the write data contains the at least one of a) the virus code, or b) the malicious signature, the device is configured to assert the reset pin of the at least one SSD until the at least one SSD is at least one of a) removed from the system or b) power is removed from the at least one SSD. 5. The system of claim 3, wherein the at least one SSD is coupled to the device through at least one of a) a Peripheral Component Interface Express (PCIe) based communication link or b) a system management bus. 6. The system of claim 3, wherein the device is configured to perform health monitoring of the at least one SSD. 7. The system of claim 3, wherein the device is configured to provide operational status information of the at least one SSD. 8. The system of claim 1, wherein: in response to the device determining that the write data contains the at least one of a) the virus code, or b) the malicious signature, the device is configured to: log detection of the at least one of a) the virus code, or b) the malicious signature; and notify a storage administrator of the detection of the at least one of a) the virus code, or b) the malicious signature. 9. The system of claim 1, wherein the virus code comprises a software virus. 10. The system of claim 1, wherein: the write data is contained in a plurality of Ethernet packets; and the device is configured to detect any malicious signature located on a boundary of adjacent Ethernet packets from among the plurality of Ethernet packets. 11. The system of claim 1, wherein the SSD comprises an Ethernet SSD (eSSD). 12. A method to detect malicious software, the method comprising: receiving, by an Ethernet switch, write data from a communication network in response to a write command; receiving, by a device, the write data in a buffer in an order that is based on an assembled order of the write data; scanning, by the device, the write data using the buffer; and determining, by the device, whether the write data contains at least one of a) a virus code, or b) a malicious signature. 13. The method of claim 12, further comprising: periodically updating, by the device, a database of virus signature scans; and scanning, by the device, the write data based at least on the database of virus signature scans. 14. The method of claim 12, further comprising: receiving, by at least one solid-state drive (SSD), the write data; and storing, by the at least one SSD, the write data. 15. The method of claim 14, wherein the at least one SSD includes a reset pin, the method further comprising asserting, by the device, the reset pin of the at least one SSD until the at least one SSD is at least one of a) removed from the system or b) power is removed from the at least one SSD. 16. The method of claim 15, wherein asserting the reset pin occurs in response to the device determining that the write data contains the at least one of a) the virus code, or b) the malicious signature. 17. The method of claim 14, wherein the device is configured to perform health monitoring of the at least one SSD. 18. The method of claim 14, wherein the device is configured to provide operational status information of the at least one SSD. 19. The method of claim 12, wherein responsive to the device determining that the write data contains the at least one of a) the virus code, or b) the malicious signature: logging, by the device, detection of the at least one of a) the virus code, or b) the malicious signature; and notifying, by the device, a storage administrator of the detection of the at least one of a) the virus code, or b) the malicious signature. 20. The method of claim 12, wherein the write data is contained in a plurality of Ethernet packets, the method further comprising detecting, by the device, any malicious signature located on a boundary of adjacent Ethernet packets from among the plurality of Ethernet packets.
2,400
340,185
29,725,348
2,461
A system and a method to detect malicious software written to an Ethernet solid-state drive (eSSD). The system includes an Ethernet switch, at least one SSD, and a baseboard management controller (BMC). The Ethernet switch receives write data from a communication network in response to a write command. The at least one SSD receives the write data from the Ethernet switch and stores the received write data. The BMC receives from the at least one SSD the received write data. The BMC determines whether the received write data contains malicious software. The received write data may be contained in a plurality of Ethernet packets in which case the BMC stores the received write data in a scan buffer in an order that is based on an assembled order of the received write data.
1. A system, comprising: an Ethernet switch to receive write data from a communication network in response to a write command; and a device to receive the write data in a buffer in an order that is based on an assembled order of the write data, wherein the device is configured to scan the write data using the buffer to determine whether the write data contains at least one of a) a virus code, or b) a malicious signature. 2. The system of claim 1, wherein: the device is configured to periodically update a database of virus signature scans; and the device is configured to scan the write data based at least on the database of virus signature scans. 3. The system of claim 1, further comprising at least one solid-state drive (SSD) coupled to the Ethernet switch and to the device, the at least one SSD to receive the write data and store the write data. 4. The system of claim 3, wherein: the at least one SSD includes a reset pin; and in response to the device determining that the write data contains the at least one of a) the virus code, or b) the malicious signature, the device is configured to assert the reset pin of the at least one SSD until the at least one SSD is at least one of a) removed from the system or b) power is removed from the at least one SSD. 5. The system of claim 3, wherein the at least one SSD is coupled to the device through at least one of a) a Peripheral Component Interface Express (PCIe) based communication link or b) a system management bus. 6. The system of claim 3, wherein the device is configured to perform health monitoring of the at least one SSD. 7. The system of claim 3, wherein the device is configured to provide operational status information of the at least one SSD. 8. The system of claim 1, wherein: in response to the device determining that the write data contains the at least one of a) the virus code, or b) the malicious signature, the device is configured to: log detection of the at least one of a) the virus code, or b) the malicious signature; and notify a storage administrator of the detection of the at least one of a) the virus code, or b) the malicious signature. 9. The system of claim 1, wherein the virus code comprises a software virus. 10. The system of claim 1, wherein: the write data is contained in a plurality of Ethernet packets; and the device is configured to detect any malicious signature located on a boundary of adjacent Ethernet packets from among the plurality of Ethernet packets. 11. The system of claim 1, wherein the SSD comprises an Ethernet SSD (eSSD). 12. A method to detect malicious software, the method comprising: receiving, by an Ethernet switch, write data from a communication network in response to a write command; receiving, by a device, the write data in a buffer in an order that is based on an assembled order of the write data; scanning, by the device, the write data using the buffer; and determining, by the device, whether the write data contains at least one of a) a virus code, or b) a malicious signature. 13. The method of claim 12, further comprising: periodically updating, by the device, a database of virus signature scans; and scanning, by the device, the write data based at least on the database of virus signature scans. 14. The method of claim 12, further comprising: receiving, by at least one solid-state drive (SSD), the write data; and storing, by the at least one SSD, the write data. 15. The method of claim 14, wherein the at least one SSD includes a reset pin, the method further comprising asserting, by the device, the reset pin of the at least one SSD until the at least one SSD is at least one of a) removed from the system or b) power is removed from the at least one SSD. 16. The method of claim 15, wherein asserting the reset pin occurs in response to the device determining that the write data contains the at least one of a) the virus code, or b) the malicious signature. 17. The method of claim 14, wherein the device is configured to perform health monitoring of the at least one SSD. 18. The method of claim 14, wherein the device is configured to provide operational status information of the at least one SSD. 19. The method of claim 12, wherein responsive to the device determining that the write data contains the at least one of a) the virus code, or b) the malicious signature: logging, by the device, detection of the at least one of a) the virus code, or b) the malicious signature; and notifying, by the device, a storage administrator of the detection of the at least one of a) the virus code, or b) the malicious signature. 20. The method of claim 12, wherein the write data is contained in a plurality of Ethernet packets, the method further comprising detecting, by the device, any malicious signature located on a boundary of adjacent Ethernet packets from among the plurality of Ethernet packets.
A system and a method to detect malicious software written to an Ethernet solid-state drive (eSSD). The system includes an Ethernet switch, at least one SSD, and a baseboard management controller (BMC). The Ethernet switch receives write data from a communication network in response to a write command. The at least one SSD receives the write data from the Ethernet switch and stores the received write data. The BMC receives from the at least one SSD the received write data. The BMC determines whether the received write data contains malicious software. The received write data may be contained in a plurality of Ethernet packets in which case the BMC stores the received write data in a scan buffer in an order that is based on an assembled order of the received write data.1. A system, comprising: an Ethernet switch to receive write data from a communication network in response to a write command; and a device to receive the write data in a buffer in an order that is based on an assembled order of the write data, wherein the device is configured to scan the write data using the buffer to determine whether the write data contains at least one of a) a virus code, or b) a malicious signature. 2. The system of claim 1, wherein: the device is configured to periodically update a database of virus signature scans; and the device is configured to scan the write data based at least on the database of virus signature scans. 3. The system of claim 1, further comprising at least one solid-state drive (SSD) coupled to the Ethernet switch and to the device, the at least one SSD to receive the write data and store the write data. 4. The system of claim 3, wherein: the at least one SSD includes a reset pin; and in response to the device determining that the write data contains the at least one of a) the virus code, or b) the malicious signature, the device is configured to assert the reset pin of the at least one SSD until the at least one SSD is at least one of a) removed from the system or b) power is removed from the at least one SSD. 5. The system of claim 3, wherein the at least one SSD is coupled to the device through at least one of a) a Peripheral Component Interface Express (PCIe) based communication link or b) a system management bus. 6. The system of claim 3, wherein the device is configured to perform health monitoring of the at least one SSD. 7. The system of claim 3, wherein the device is configured to provide operational status information of the at least one SSD. 8. The system of claim 1, wherein: in response to the device determining that the write data contains the at least one of a) the virus code, or b) the malicious signature, the device is configured to: log detection of the at least one of a) the virus code, or b) the malicious signature; and notify a storage administrator of the detection of the at least one of a) the virus code, or b) the malicious signature. 9. The system of claim 1, wherein the virus code comprises a software virus. 10. The system of claim 1, wherein: the write data is contained in a plurality of Ethernet packets; and the device is configured to detect any malicious signature located on a boundary of adjacent Ethernet packets from among the plurality of Ethernet packets. 11. The system of claim 1, wherein the SSD comprises an Ethernet SSD (eSSD). 12. A method to detect malicious software, the method comprising: receiving, by an Ethernet switch, write data from a communication network in response to a write command; receiving, by a device, the write data in a buffer in an order that is based on an assembled order of the write data; scanning, by the device, the write data using the buffer; and determining, by the device, whether the write data contains at least one of a) a virus code, or b) a malicious signature. 13. The method of claim 12, further comprising: periodically updating, by the device, a database of virus signature scans; and scanning, by the device, the write data based at least on the database of virus signature scans. 14. The method of claim 12, further comprising: receiving, by at least one solid-state drive (SSD), the write data; and storing, by the at least one SSD, the write data. 15. The method of claim 14, wherein the at least one SSD includes a reset pin, the method further comprising asserting, by the device, the reset pin of the at least one SSD until the at least one SSD is at least one of a) removed from the system or b) power is removed from the at least one SSD. 16. The method of claim 15, wherein asserting the reset pin occurs in response to the device determining that the write data contains the at least one of a) the virus code, or b) the malicious signature. 17. The method of claim 14, wherein the device is configured to perform health monitoring of the at least one SSD. 18. The method of claim 14, wherein the device is configured to provide operational status information of the at least one SSD. 19. The method of claim 12, wherein responsive to the device determining that the write data contains the at least one of a) the virus code, or b) the malicious signature: logging, by the device, detection of the at least one of a) the virus code, or b) the malicious signature; and notifying, by the device, a storage administrator of the detection of the at least one of a) the virus code, or b) the malicious signature. 20. The method of claim 12, wherein the write data is contained in a plurality of Ethernet packets, the method further comprising detecting, by the device, any malicious signature located on a boundary of adjacent Ethernet packets from among the plurality of Ethernet packets.
2,400
340,186
29,725,365
2,461
A system and a method to detect malicious software written to an Ethernet solid-state drive (eSSD). The system includes an Ethernet switch, at least one SSD, and a baseboard management controller (BMC). The Ethernet switch receives write data from a communication network in response to a write command. The at least one SSD receives the write data from the Ethernet switch and stores the received write data. The BMC receives from the at least one SSD the received write data. The BMC determines whether the received write data contains malicious software. The received write data may be contained in a plurality of Ethernet packets in which case the BMC stores the received write data in a scan buffer in an order that is based on an assembled order of the received write data.
1. A system, comprising: an Ethernet switch to receive write data from a communication network in response to a write command; and a device to receive the write data in a buffer in an order that is based on an assembled order of the write data, wherein the device is configured to scan the write data using the buffer to determine whether the write data contains at least one of a) a virus code, or b) a malicious signature. 2. The system of claim 1, wherein: the device is configured to periodically update a database of virus signature scans; and the device is configured to scan the write data based at least on the database of virus signature scans. 3. The system of claim 1, further comprising at least one solid-state drive (SSD) coupled to the Ethernet switch and to the device, the at least one SSD to receive the write data and store the write data. 4. The system of claim 3, wherein: the at least one SSD includes a reset pin; and in response to the device determining that the write data contains the at least one of a) the virus code, or b) the malicious signature, the device is configured to assert the reset pin of the at least one SSD until the at least one SSD is at least one of a) removed from the system or b) power is removed from the at least one SSD. 5. The system of claim 3, wherein the at least one SSD is coupled to the device through at least one of a) a Peripheral Component Interface Express (PCIe) based communication link or b) a system management bus. 6. The system of claim 3, wherein the device is configured to perform health monitoring of the at least one SSD. 7. The system of claim 3, wherein the device is configured to provide operational status information of the at least one SSD. 8. The system of claim 1, wherein: in response to the device determining that the write data contains the at least one of a) the virus code, or b) the malicious signature, the device is configured to: log detection of the at least one of a) the virus code, or b) the malicious signature; and notify a storage administrator of the detection of the at least one of a) the virus code, or b) the malicious signature. 9. The system of claim 1, wherein the virus code comprises a software virus. 10. The system of claim 1, wherein: the write data is contained in a plurality of Ethernet packets; and the device is configured to detect any malicious signature located on a boundary of adjacent Ethernet packets from among the plurality of Ethernet packets. 11. The system of claim 1, wherein the SSD comprises an Ethernet SSD (eSSD). 12. A method to detect malicious software, the method comprising: receiving, by an Ethernet switch, write data from a communication network in response to a write command; receiving, by a device, the write data in a buffer in an order that is based on an assembled order of the write data; scanning, by the device, the write data using the buffer; and determining, by the device, whether the write data contains at least one of a) a virus code, or b) a malicious signature. 13. The method of claim 12, further comprising: periodically updating, by the device, a database of virus signature scans; and scanning, by the device, the write data based at least on the database of virus signature scans. 14. The method of claim 12, further comprising: receiving, by at least one solid-state drive (SSD), the write data; and storing, by the at least one SSD, the write data. 15. The method of claim 14, wherein the at least one SSD includes a reset pin, the method further comprising asserting, by the device, the reset pin of the at least one SSD until the at least one SSD is at least one of a) removed from the system or b) power is removed from the at least one SSD. 16. The method of claim 15, wherein asserting the reset pin occurs in response to the device determining that the write data contains the at least one of a) the virus code, or b) the malicious signature. 17. The method of claim 14, wherein the device is configured to perform health monitoring of the at least one SSD. 18. The method of claim 14, wherein the device is configured to provide operational status information of the at least one SSD. 19. The method of claim 12, wherein responsive to the device determining that the write data contains the at least one of a) the virus code, or b) the malicious signature: logging, by the device, detection of the at least one of a) the virus code, or b) the malicious signature; and notifying, by the device, a storage administrator of the detection of the at least one of a) the virus code, or b) the malicious signature. 20. The method of claim 12, wherein the write data is contained in a plurality of Ethernet packets, the method further comprising detecting, by the device, any malicious signature located on a boundary of adjacent Ethernet packets from among the plurality of Ethernet packets.
A system and a method to detect malicious software written to an Ethernet solid-state drive (eSSD). The system includes an Ethernet switch, at least one SSD, and a baseboard management controller (BMC). The Ethernet switch receives write data from a communication network in response to a write command. The at least one SSD receives the write data from the Ethernet switch and stores the received write data. The BMC receives from the at least one SSD the received write data. The BMC determines whether the received write data contains malicious software. The received write data may be contained in a plurality of Ethernet packets in which case the BMC stores the received write data in a scan buffer in an order that is based on an assembled order of the received write data.1. A system, comprising: an Ethernet switch to receive write data from a communication network in response to a write command; and a device to receive the write data in a buffer in an order that is based on an assembled order of the write data, wherein the device is configured to scan the write data using the buffer to determine whether the write data contains at least one of a) a virus code, or b) a malicious signature. 2. The system of claim 1, wherein: the device is configured to periodically update a database of virus signature scans; and the device is configured to scan the write data based at least on the database of virus signature scans. 3. The system of claim 1, further comprising at least one solid-state drive (SSD) coupled to the Ethernet switch and to the device, the at least one SSD to receive the write data and store the write data. 4. The system of claim 3, wherein: the at least one SSD includes a reset pin; and in response to the device determining that the write data contains the at least one of a) the virus code, or b) the malicious signature, the device is configured to assert the reset pin of the at least one SSD until the at least one SSD is at least one of a) removed from the system or b) power is removed from the at least one SSD. 5. The system of claim 3, wherein the at least one SSD is coupled to the device through at least one of a) a Peripheral Component Interface Express (PCIe) based communication link or b) a system management bus. 6. The system of claim 3, wherein the device is configured to perform health monitoring of the at least one SSD. 7. The system of claim 3, wherein the device is configured to provide operational status information of the at least one SSD. 8. The system of claim 1, wherein: in response to the device determining that the write data contains the at least one of a) the virus code, or b) the malicious signature, the device is configured to: log detection of the at least one of a) the virus code, or b) the malicious signature; and notify a storage administrator of the detection of the at least one of a) the virus code, or b) the malicious signature. 9. The system of claim 1, wherein the virus code comprises a software virus. 10. The system of claim 1, wherein: the write data is contained in a plurality of Ethernet packets; and the device is configured to detect any malicious signature located on a boundary of adjacent Ethernet packets from among the plurality of Ethernet packets. 11. The system of claim 1, wherein the SSD comprises an Ethernet SSD (eSSD). 12. A method to detect malicious software, the method comprising: receiving, by an Ethernet switch, write data from a communication network in response to a write command; receiving, by a device, the write data in a buffer in an order that is based on an assembled order of the write data; scanning, by the device, the write data using the buffer; and determining, by the device, whether the write data contains at least one of a) a virus code, or b) a malicious signature. 13. The method of claim 12, further comprising: periodically updating, by the device, a database of virus signature scans; and scanning, by the device, the write data based at least on the database of virus signature scans. 14. The method of claim 12, further comprising: receiving, by at least one solid-state drive (SSD), the write data; and storing, by the at least one SSD, the write data. 15. The method of claim 14, wherein the at least one SSD includes a reset pin, the method further comprising asserting, by the device, the reset pin of the at least one SSD until the at least one SSD is at least one of a) removed from the system or b) power is removed from the at least one SSD. 16. The method of claim 15, wherein asserting the reset pin occurs in response to the device determining that the write data contains the at least one of a) the virus code, or b) the malicious signature. 17. The method of claim 14, wherein the device is configured to perform health monitoring of the at least one SSD. 18. The method of claim 14, wherein the device is configured to provide operational status information of the at least one SSD. 19. The method of claim 12, wherein responsive to the device determining that the write data contains the at least one of a) the virus code, or b) the malicious signature: logging, by the device, detection of the at least one of a) the virus code, or b) the malicious signature; and notifying, by the device, a storage administrator of the detection of the at least one of a) the virus code, or b) the malicious signature. 20. The method of claim 12, wherein the write data is contained in a plurality of Ethernet packets, the method further comprising detecting, by the device, any malicious signature located on a boundary of adjacent Ethernet packets from among the plurality of Ethernet packets.
2,400
340,187
29,725,366
2,461
A system and a method to detect malicious software written to an Ethernet solid-state drive (eSSD). The system includes an Ethernet switch, at least one SSD, and a baseboard management controller (BMC). The Ethernet switch receives write data from a communication network in response to a write command. The at least one SSD receives the write data from the Ethernet switch and stores the received write data. The BMC receives from the at least one SSD the received write data. The BMC determines whether the received write data contains malicious software. The received write data may be contained in a plurality of Ethernet packets in which case the BMC stores the received write data in a scan buffer in an order that is based on an assembled order of the received write data.
1. A system, comprising: an Ethernet switch to receive write data from a communication network in response to a write command; and a device to receive the write data in a buffer in an order that is based on an assembled order of the write data, wherein the device is configured to scan the write data using the buffer to determine whether the write data contains at least one of a) a virus code, or b) a malicious signature. 2. The system of claim 1, wherein: the device is configured to periodically update a database of virus signature scans; and the device is configured to scan the write data based at least on the database of virus signature scans. 3. The system of claim 1, further comprising at least one solid-state drive (SSD) coupled to the Ethernet switch and to the device, the at least one SSD to receive the write data and store the write data. 4. The system of claim 3, wherein: the at least one SSD includes a reset pin; and in response to the device determining that the write data contains the at least one of a) the virus code, or b) the malicious signature, the device is configured to assert the reset pin of the at least one SSD until the at least one SSD is at least one of a) removed from the system or b) power is removed from the at least one SSD. 5. The system of claim 3, wherein the at least one SSD is coupled to the device through at least one of a) a Peripheral Component Interface Express (PCIe) based communication link or b) a system management bus. 6. The system of claim 3, wherein the device is configured to perform health monitoring of the at least one SSD. 7. The system of claim 3, wherein the device is configured to provide operational status information of the at least one SSD. 8. The system of claim 1, wherein: in response to the device determining that the write data contains the at least one of a) the virus code, or b) the malicious signature, the device is configured to: log detection of the at least one of a) the virus code, or b) the malicious signature; and notify a storage administrator of the detection of the at least one of a) the virus code, or b) the malicious signature. 9. The system of claim 1, wherein the virus code comprises a software virus. 10. The system of claim 1, wherein: the write data is contained in a plurality of Ethernet packets; and the device is configured to detect any malicious signature located on a boundary of adjacent Ethernet packets from among the plurality of Ethernet packets. 11. The system of claim 1, wherein the SSD comprises an Ethernet SSD (eSSD). 12. A method to detect malicious software, the method comprising: receiving, by an Ethernet switch, write data from a communication network in response to a write command; receiving, by a device, the write data in a buffer in an order that is based on an assembled order of the write data; scanning, by the device, the write data using the buffer; and determining, by the device, whether the write data contains at least one of a) a virus code, or b) a malicious signature. 13. The method of claim 12, further comprising: periodically updating, by the device, a database of virus signature scans; and scanning, by the device, the write data based at least on the database of virus signature scans. 14. The method of claim 12, further comprising: receiving, by at least one solid-state drive (SSD), the write data; and storing, by the at least one SSD, the write data. 15. The method of claim 14, wherein the at least one SSD includes a reset pin, the method further comprising asserting, by the device, the reset pin of the at least one SSD until the at least one SSD is at least one of a) removed from the system or b) power is removed from the at least one SSD. 16. The method of claim 15, wherein asserting the reset pin occurs in response to the device determining that the write data contains the at least one of a) the virus code, or b) the malicious signature. 17. The method of claim 14, wherein the device is configured to perform health monitoring of the at least one SSD. 18. The method of claim 14, wherein the device is configured to provide operational status information of the at least one SSD. 19. The method of claim 12, wherein responsive to the device determining that the write data contains the at least one of a) the virus code, or b) the malicious signature: logging, by the device, detection of the at least one of a) the virus code, or b) the malicious signature; and notifying, by the device, a storage administrator of the detection of the at least one of a) the virus code, or b) the malicious signature. 20. The method of claim 12, wherein the write data is contained in a plurality of Ethernet packets, the method further comprising detecting, by the device, any malicious signature located on a boundary of adjacent Ethernet packets from among the plurality of Ethernet packets.
A system and a method to detect malicious software written to an Ethernet solid-state drive (eSSD). The system includes an Ethernet switch, at least one SSD, and a baseboard management controller (BMC). The Ethernet switch receives write data from a communication network in response to a write command. The at least one SSD receives the write data from the Ethernet switch and stores the received write data. The BMC receives from the at least one SSD the received write data. The BMC determines whether the received write data contains malicious software. The received write data may be contained in a plurality of Ethernet packets in which case the BMC stores the received write data in a scan buffer in an order that is based on an assembled order of the received write data.1. A system, comprising: an Ethernet switch to receive write data from a communication network in response to a write command; and a device to receive the write data in a buffer in an order that is based on an assembled order of the write data, wherein the device is configured to scan the write data using the buffer to determine whether the write data contains at least one of a) a virus code, or b) a malicious signature. 2. The system of claim 1, wherein: the device is configured to periodically update a database of virus signature scans; and the device is configured to scan the write data based at least on the database of virus signature scans. 3. The system of claim 1, further comprising at least one solid-state drive (SSD) coupled to the Ethernet switch and to the device, the at least one SSD to receive the write data and store the write data. 4. The system of claim 3, wherein: the at least one SSD includes a reset pin; and in response to the device determining that the write data contains the at least one of a) the virus code, or b) the malicious signature, the device is configured to assert the reset pin of the at least one SSD until the at least one SSD is at least one of a) removed from the system or b) power is removed from the at least one SSD. 5. The system of claim 3, wherein the at least one SSD is coupled to the device through at least one of a) a Peripheral Component Interface Express (PCIe) based communication link or b) a system management bus. 6. The system of claim 3, wherein the device is configured to perform health monitoring of the at least one SSD. 7. The system of claim 3, wherein the device is configured to provide operational status information of the at least one SSD. 8. The system of claim 1, wherein: in response to the device determining that the write data contains the at least one of a) the virus code, or b) the malicious signature, the device is configured to: log detection of the at least one of a) the virus code, or b) the malicious signature; and notify a storage administrator of the detection of the at least one of a) the virus code, or b) the malicious signature. 9. The system of claim 1, wherein the virus code comprises a software virus. 10. The system of claim 1, wherein: the write data is contained in a plurality of Ethernet packets; and the device is configured to detect any malicious signature located on a boundary of adjacent Ethernet packets from among the plurality of Ethernet packets. 11. The system of claim 1, wherein the SSD comprises an Ethernet SSD (eSSD). 12. A method to detect malicious software, the method comprising: receiving, by an Ethernet switch, write data from a communication network in response to a write command; receiving, by a device, the write data in a buffer in an order that is based on an assembled order of the write data; scanning, by the device, the write data using the buffer; and determining, by the device, whether the write data contains at least one of a) a virus code, or b) a malicious signature. 13. The method of claim 12, further comprising: periodically updating, by the device, a database of virus signature scans; and scanning, by the device, the write data based at least on the database of virus signature scans. 14. The method of claim 12, further comprising: receiving, by at least one solid-state drive (SSD), the write data; and storing, by the at least one SSD, the write data. 15. The method of claim 14, wherein the at least one SSD includes a reset pin, the method further comprising asserting, by the device, the reset pin of the at least one SSD until the at least one SSD is at least one of a) removed from the system or b) power is removed from the at least one SSD. 16. The method of claim 15, wherein asserting the reset pin occurs in response to the device determining that the write data contains the at least one of a) the virus code, or b) the malicious signature. 17. The method of claim 14, wherein the device is configured to perform health monitoring of the at least one SSD. 18. The method of claim 14, wherein the device is configured to provide operational status information of the at least one SSD. 19. The method of claim 12, wherein responsive to the device determining that the write data contains the at least one of a) the virus code, or b) the malicious signature: logging, by the device, detection of the at least one of a) the virus code, or b) the malicious signature; and notifying, by the device, a storage administrator of the detection of the at least one of a) the virus code, or b) the malicious signature. 20. The method of claim 12, wherein the write data is contained in a plurality of Ethernet packets, the method further comprising detecting, by the device, any malicious signature located on a boundary of adjacent Ethernet packets from among the plurality of Ethernet packets.
2,400
340,188
29,725,399
2,917
A system and a method to detect malicious software written to an Ethernet solid-state drive (eSSD). The system includes an Ethernet switch, at least one SSD, and a baseboard management controller (BMC). The Ethernet switch receives write data from a communication network in response to a write command. The at least one SSD receives the write data from the Ethernet switch and stores the received write data. The BMC receives from the at least one SSD the received write data. The BMC determines whether the received write data contains malicious software. The received write data may be contained in a plurality of Ethernet packets in which case the BMC stores the received write data in a scan buffer in an order that is based on an assembled order of the received write data.
1. A system, comprising: an Ethernet switch to receive write data from a communication network in response to a write command; and a device to receive the write data in a buffer in an order that is based on an assembled order of the write data, wherein the device is configured to scan the write data using the buffer to determine whether the write data contains at least one of a) a virus code, or b) a malicious signature. 2. The system of claim 1, wherein: the device is configured to periodically update a database of virus signature scans; and the device is configured to scan the write data based at least on the database of virus signature scans. 3. The system of claim 1, further comprising at least one solid-state drive (SSD) coupled to the Ethernet switch and to the device, the at least one SSD to receive the write data and store the write data. 4. The system of claim 3, wherein: the at least one SSD includes a reset pin; and in response to the device determining that the write data contains the at least one of a) the virus code, or b) the malicious signature, the device is configured to assert the reset pin of the at least one SSD until the at least one SSD is at least one of a) removed from the system or b) power is removed from the at least one SSD. 5. The system of claim 3, wherein the at least one SSD is coupled to the device through at least one of a) a Peripheral Component Interface Express (PCIe) based communication link or b) a system management bus. 6. The system of claim 3, wherein the device is configured to perform health monitoring of the at least one SSD. 7. The system of claim 3, wherein the device is configured to provide operational status information of the at least one SSD. 8. The system of claim 1, wherein: in response to the device determining that the write data contains the at least one of a) the virus code, or b) the malicious signature, the device is configured to: log detection of the at least one of a) the virus code, or b) the malicious signature; and notify a storage administrator of the detection of the at least one of a) the virus code, or b) the malicious signature. 9. The system of claim 1, wherein the virus code comprises a software virus. 10. The system of claim 1, wherein: the write data is contained in a plurality of Ethernet packets; and the device is configured to detect any malicious signature located on a boundary of adjacent Ethernet packets from among the plurality of Ethernet packets. 11. The system of claim 1, wherein the SSD comprises an Ethernet SSD (eSSD). 12. A method to detect malicious software, the method comprising: receiving, by an Ethernet switch, write data from a communication network in response to a write command; receiving, by a device, the write data in a buffer in an order that is based on an assembled order of the write data; scanning, by the device, the write data using the buffer; and determining, by the device, whether the write data contains at least one of a) a virus code, or b) a malicious signature. 13. The method of claim 12, further comprising: periodically updating, by the device, a database of virus signature scans; and scanning, by the device, the write data based at least on the database of virus signature scans. 14. The method of claim 12, further comprising: receiving, by at least one solid-state drive (SSD), the write data; and storing, by the at least one SSD, the write data. 15. The method of claim 14, wherein the at least one SSD includes a reset pin, the method further comprising asserting, by the device, the reset pin of the at least one SSD until the at least one SSD is at least one of a) removed from the system or b) power is removed from the at least one SSD. 16. The method of claim 15, wherein asserting the reset pin occurs in response to the device determining that the write data contains the at least one of a) the virus code, or b) the malicious signature. 17. The method of claim 14, wherein the device is configured to perform health monitoring of the at least one SSD. 18. The method of claim 14, wherein the device is configured to provide operational status information of the at least one SSD. 19. The method of claim 12, wherein responsive to the device determining that the write data contains the at least one of a) the virus code, or b) the malicious signature: logging, by the device, detection of the at least one of a) the virus code, or b) the malicious signature; and notifying, by the device, a storage administrator of the detection of the at least one of a) the virus code, or b) the malicious signature. 20. The method of claim 12, wherein the write data is contained in a plurality of Ethernet packets, the method further comprising detecting, by the device, any malicious signature located on a boundary of adjacent Ethernet packets from among the plurality of Ethernet packets.
A system and a method to detect malicious software written to an Ethernet solid-state drive (eSSD). The system includes an Ethernet switch, at least one SSD, and a baseboard management controller (BMC). The Ethernet switch receives write data from a communication network in response to a write command. The at least one SSD receives the write data from the Ethernet switch and stores the received write data. The BMC receives from the at least one SSD the received write data. The BMC determines whether the received write data contains malicious software. The received write data may be contained in a plurality of Ethernet packets in which case the BMC stores the received write data in a scan buffer in an order that is based on an assembled order of the received write data.1. A system, comprising: an Ethernet switch to receive write data from a communication network in response to a write command; and a device to receive the write data in a buffer in an order that is based on an assembled order of the write data, wherein the device is configured to scan the write data using the buffer to determine whether the write data contains at least one of a) a virus code, or b) a malicious signature. 2. The system of claim 1, wherein: the device is configured to periodically update a database of virus signature scans; and the device is configured to scan the write data based at least on the database of virus signature scans. 3. The system of claim 1, further comprising at least one solid-state drive (SSD) coupled to the Ethernet switch and to the device, the at least one SSD to receive the write data and store the write data. 4. The system of claim 3, wherein: the at least one SSD includes a reset pin; and in response to the device determining that the write data contains the at least one of a) the virus code, or b) the malicious signature, the device is configured to assert the reset pin of the at least one SSD until the at least one SSD is at least one of a) removed from the system or b) power is removed from the at least one SSD. 5. The system of claim 3, wherein the at least one SSD is coupled to the device through at least one of a) a Peripheral Component Interface Express (PCIe) based communication link or b) a system management bus. 6. The system of claim 3, wherein the device is configured to perform health monitoring of the at least one SSD. 7. The system of claim 3, wherein the device is configured to provide operational status information of the at least one SSD. 8. The system of claim 1, wherein: in response to the device determining that the write data contains the at least one of a) the virus code, or b) the malicious signature, the device is configured to: log detection of the at least one of a) the virus code, or b) the malicious signature; and notify a storage administrator of the detection of the at least one of a) the virus code, or b) the malicious signature. 9. The system of claim 1, wherein the virus code comprises a software virus. 10. The system of claim 1, wherein: the write data is contained in a plurality of Ethernet packets; and the device is configured to detect any malicious signature located on a boundary of adjacent Ethernet packets from among the plurality of Ethernet packets. 11. The system of claim 1, wherein the SSD comprises an Ethernet SSD (eSSD). 12. A method to detect malicious software, the method comprising: receiving, by an Ethernet switch, write data from a communication network in response to a write command; receiving, by a device, the write data in a buffer in an order that is based on an assembled order of the write data; scanning, by the device, the write data using the buffer; and determining, by the device, whether the write data contains at least one of a) a virus code, or b) a malicious signature. 13. The method of claim 12, further comprising: periodically updating, by the device, a database of virus signature scans; and scanning, by the device, the write data based at least on the database of virus signature scans. 14. The method of claim 12, further comprising: receiving, by at least one solid-state drive (SSD), the write data; and storing, by the at least one SSD, the write data. 15. The method of claim 14, wherein the at least one SSD includes a reset pin, the method further comprising asserting, by the device, the reset pin of the at least one SSD until the at least one SSD is at least one of a) removed from the system or b) power is removed from the at least one SSD. 16. The method of claim 15, wherein asserting the reset pin occurs in response to the device determining that the write data contains the at least one of a) the virus code, or b) the malicious signature. 17. The method of claim 14, wherein the device is configured to perform health monitoring of the at least one SSD. 18. The method of claim 14, wherein the device is configured to provide operational status information of the at least one SSD. 19. The method of claim 12, wherein responsive to the device determining that the write data contains the at least one of a) the virus code, or b) the malicious signature: logging, by the device, detection of the at least one of a) the virus code, or b) the malicious signature; and notifying, by the device, a storage administrator of the detection of the at least one of a) the virus code, or b) the malicious signature. 20. The method of claim 12, wherein the write data is contained in a plurality of Ethernet packets, the method further comprising detecting, by the device, any malicious signature located on a boundary of adjacent Ethernet packets from among the plurality of Ethernet packets.
2,900
340,189
29,725,384
2,917
A system and a method to detect malicious software written to an Ethernet solid-state drive (eSSD). The system includes an Ethernet switch, at least one SSD, and a baseboard management controller (BMC). The Ethernet switch receives write data from a communication network in response to a write command. The at least one SSD receives the write data from the Ethernet switch and stores the received write data. The BMC receives from the at least one SSD the received write data. The BMC determines whether the received write data contains malicious software. The received write data may be contained in a plurality of Ethernet packets in which case the BMC stores the received write data in a scan buffer in an order that is based on an assembled order of the received write data.
1. A system, comprising: an Ethernet switch to receive write data from a communication network in response to a write command; and a device to receive the write data in a buffer in an order that is based on an assembled order of the write data, wherein the device is configured to scan the write data using the buffer to determine whether the write data contains at least one of a) a virus code, or b) a malicious signature. 2. The system of claim 1, wherein: the device is configured to periodically update a database of virus signature scans; and the device is configured to scan the write data based at least on the database of virus signature scans. 3. The system of claim 1, further comprising at least one solid-state drive (SSD) coupled to the Ethernet switch and to the device, the at least one SSD to receive the write data and store the write data. 4. The system of claim 3, wherein: the at least one SSD includes a reset pin; and in response to the device determining that the write data contains the at least one of a) the virus code, or b) the malicious signature, the device is configured to assert the reset pin of the at least one SSD until the at least one SSD is at least one of a) removed from the system or b) power is removed from the at least one SSD. 5. The system of claim 3, wherein the at least one SSD is coupled to the device through at least one of a) a Peripheral Component Interface Express (PCIe) based communication link or b) a system management bus. 6. The system of claim 3, wherein the device is configured to perform health monitoring of the at least one SSD. 7. The system of claim 3, wherein the device is configured to provide operational status information of the at least one SSD. 8. The system of claim 1, wherein: in response to the device determining that the write data contains the at least one of a) the virus code, or b) the malicious signature, the device is configured to: log detection of the at least one of a) the virus code, or b) the malicious signature; and notify a storage administrator of the detection of the at least one of a) the virus code, or b) the malicious signature. 9. The system of claim 1, wherein the virus code comprises a software virus. 10. The system of claim 1, wherein: the write data is contained in a plurality of Ethernet packets; and the device is configured to detect any malicious signature located on a boundary of adjacent Ethernet packets from among the plurality of Ethernet packets. 11. The system of claim 1, wherein the SSD comprises an Ethernet SSD (eSSD). 12. A method to detect malicious software, the method comprising: receiving, by an Ethernet switch, write data from a communication network in response to a write command; receiving, by a device, the write data in a buffer in an order that is based on an assembled order of the write data; scanning, by the device, the write data using the buffer; and determining, by the device, whether the write data contains at least one of a) a virus code, or b) a malicious signature. 13. The method of claim 12, further comprising: periodically updating, by the device, a database of virus signature scans; and scanning, by the device, the write data based at least on the database of virus signature scans. 14. The method of claim 12, further comprising: receiving, by at least one solid-state drive (SSD), the write data; and storing, by the at least one SSD, the write data. 15. The method of claim 14, wherein the at least one SSD includes a reset pin, the method further comprising asserting, by the device, the reset pin of the at least one SSD until the at least one SSD is at least one of a) removed from the system or b) power is removed from the at least one SSD. 16. The method of claim 15, wherein asserting the reset pin occurs in response to the device determining that the write data contains the at least one of a) the virus code, or b) the malicious signature. 17. The method of claim 14, wherein the device is configured to perform health monitoring of the at least one SSD. 18. The method of claim 14, wherein the device is configured to provide operational status information of the at least one SSD. 19. The method of claim 12, wherein responsive to the device determining that the write data contains the at least one of a) the virus code, or b) the malicious signature: logging, by the device, detection of the at least one of a) the virus code, or b) the malicious signature; and notifying, by the device, a storage administrator of the detection of the at least one of a) the virus code, or b) the malicious signature. 20. The method of claim 12, wherein the write data is contained in a plurality of Ethernet packets, the method further comprising detecting, by the device, any malicious signature located on a boundary of adjacent Ethernet packets from among the plurality of Ethernet packets.
A system and a method to detect malicious software written to an Ethernet solid-state drive (eSSD). The system includes an Ethernet switch, at least one SSD, and a baseboard management controller (BMC). The Ethernet switch receives write data from a communication network in response to a write command. The at least one SSD receives the write data from the Ethernet switch and stores the received write data. The BMC receives from the at least one SSD the received write data. The BMC determines whether the received write data contains malicious software. The received write data may be contained in a plurality of Ethernet packets in which case the BMC stores the received write data in a scan buffer in an order that is based on an assembled order of the received write data.1. A system, comprising: an Ethernet switch to receive write data from a communication network in response to a write command; and a device to receive the write data in a buffer in an order that is based on an assembled order of the write data, wherein the device is configured to scan the write data using the buffer to determine whether the write data contains at least one of a) a virus code, or b) a malicious signature. 2. The system of claim 1, wherein: the device is configured to periodically update a database of virus signature scans; and the device is configured to scan the write data based at least on the database of virus signature scans. 3. The system of claim 1, further comprising at least one solid-state drive (SSD) coupled to the Ethernet switch and to the device, the at least one SSD to receive the write data and store the write data. 4. The system of claim 3, wherein: the at least one SSD includes a reset pin; and in response to the device determining that the write data contains the at least one of a) the virus code, or b) the malicious signature, the device is configured to assert the reset pin of the at least one SSD until the at least one SSD is at least one of a) removed from the system or b) power is removed from the at least one SSD. 5. The system of claim 3, wherein the at least one SSD is coupled to the device through at least one of a) a Peripheral Component Interface Express (PCIe) based communication link or b) a system management bus. 6. The system of claim 3, wherein the device is configured to perform health monitoring of the at least one SSD. 7. The system of claim 3, wherein the device is configured to provide operational status information of the at least one SSD. 8. The system of claim 1, wherein: in response to the device determining that the write data contains the at least one of a) the virus code, or b) the malicious signature, the device is configured to: log detection of the at least one of a) the virus code, or b) the malicious signature; and notify a storage administrator of the detection of the at least one of a) the virus code, or b) the malicious signature. 9. The system of claim 1, wherein the virus code comprises a software virus. 10. The system of claim 1, wherein: the write data is contained in a plurality of Ethernet packets; and the device is configured to detect any malicious signature located on a boundary of adjacent Ethernet packets from among the plurality of Ethernet packets. 11. The system of claim 1, wherein the SSD comprises an Ethernet SSD (eSSD). 12. A method to detect malicious software, the method comprising: receiving, by an Ethernet switch, write data from a communication network in response to a write command; receiving, by a device, the write data in a buffer in an order that is based on an assembled order of the write data; scanning, by the device, the write data using the buffer; and determining, by the device, whether the write data contains at least one of a) a virus code, or b) a malicious signature. 13. The method of claim 12, further comprising: periodically updating, by the device, a database of virus signature scans; and scanning, by the device, the write data based at least on the database of virus signature scans. 14. The method of claim 12, further comprising: receiving, by at least one solid-state drive (SSD), the write data; and storing, by the at least one SSD, the write data. 15. The method of claim 14, wherein the at least one SSD includes a reset pin, the method further comprising asserting, by the device, the reset pin of the at least one SSD until the at least one SSD is at least one of a) removed from the system or b) power is removed from the at least one SSD. 16. The method of claim 15, wherein asserting the reset pin occurs in response to the device determining that the write data contains the at least one of a) the virus code, or b) the malicious signature. 17. The method of claim 14, wherein the device is configured to perform health monitoring of the at least one SSD. 18. The method of claim 14, wherein the device is configured to provide operational status information of the at least one SSD. 19. The method of claim 12, wherein responsive to the device determining that the write data contains the at least one of a) the virus code, or b) the malicious signature: logging, by the device, detection of the at least one of a) the virus code, or b) the malicious signature; and notifying, by the device, a storage administrator of the detection of the at least one of a) the virus code, or b) the malicious signature. 20. The method of claim 12, wherein the write data is contained in a plurality of Ethernet packets, the method further comprising detecting, by the device, any malicious signature located on a boundary of adjacent Ethernet packets from among the plurality of Ethernet packets.
2,900
340,190
29,725,345
2,917
A system and a method to detect malicious software written to an Ethernet solid-state drive (eSSD). The system includes an Ethernet switch, at least one SSD, and a baseboard management controller (BMC). The Ethernet switch receives write data from a communication network in response to a write command. The at least one SSD receives the write data from the Ethernet switch and stores the received write data. The BMC receives from the at least one SSD the received write data. The BMC determines whether the received write data contains malicious software. The received write data may be contained in a plurality of Ethernet packets in which case the BMC stores the received write data in a scan buffer in an order that is based on an assembled order of the received write data.
1. A system, comprising: an Ethernet switch to receive write data from a communication network in response to a write command; and a device to receive the write data in a buffer in an order that is based on an assembled order of the write data, wherein the device is configured to scan the write data using the buffer to determine whether the write data contains at least one of a) a virus code, or b) a malicious signature. 2. The system of claim 1, wherein: the device is configured to periodically update a database of virus signature scans; and the device is configured to scan the write data based at least on the database of virus signature scans. 3. The system of claim 1, further comprising at least one solid-state drive (SSD) coupled to the Ethernet switch and to the device, the at least one SSD to receive the write data and store the write data. 4. The system of claim 3, wherein: the at least one SSD includes a reset pin; and in response to the device determining that the write data contains the at least one of a) the virus code, or b) the malicious signature, the device is configured to assert the reset pin of the at least one SSD until the at least one SSD is at least one of a) removed from the system or b) power is removed from the at least one SSD. 5. The system of claim 3, wherein the at least one SSD is coupled to the device through at least one of a) a Peripheral Component Interface Express (PCIe) based communication link or b) a system management bus. 6. The system of claim 3, wherein the device is configured to perform health monitoring of the at least one SSD. 7. The system of claim 3, wherein the device is configured to provide operational status information of the at least one SSD. 8. The system of claim 1, wherein: in response to the device determining that the write data contains the at least one of a) the virus code, or b) the malicious signature, the device is configured to: log detection of the at least one of a) the virus code, or b) the malicious signature; and notify a storage administrator of the detection of the at least one of a) the virus code, or b) the malicious signature. 9. The system of claim 1, wherein the virus code comprises a software virus. 10. The system of claim 1, wherein: the write data is contained in a plurality of Ethernet packets; and the device is configured to detect any malicious signature located on a boundary of adjacent Ethernet packets from among the plurality of Ethernet packets. 11. The system of claim 1, wherein the SSD comprises an Ethernet SSD (eSSD). 12. A method to detect malicious software, the method comprising: receiving, by an Ethernet switch, write data from a communication network in response to a write command; receiving, by a device, the write data in a buffer in an order that is based on an assembled order of the write data; scanning, by the device, the write data using the buffer; and determining, by the device, whether the write data contains at least one of a) a virus code, or b) a malicious signature. 13. The method of claim 12, further comprising: periodically updating, by the device, a database of virus signature scans; and scanning, by the device, the write data based at least on the database of virus signature scans. 14. The method of claim 12, further comprising: receiving, by at least one solid-state drive (SSD), the write data; and storing, by the at least one SSD, the write data. 15. The method of claim 14, wherein the at least one SSD includes a reset pin, the method further comprising asserting, by the device, the reset pin of the at least one SSD until the at least one SSD is at least one of a) removed from the system or b) power is removed from the at least one SSD. 16. The method of claim 15, wherein asserting the reset pin occurs in response to the device determining that the write data contains the at least one of a) the virus code, or b) the malicious signature. 17. The method of claim 14, wherein the device is configured to perform health monitoring of the at least one SSD. 18. The method of claim 14, wherein the device is configured to provide operational status information of the at least one SSD. 19. The method of claim 12, wherein responsive to the device determining that the write data contains the at least one of a) the virus code, or b) the malicious signature: logging, by the device, detection of the at least one of a) the virus code, or b) the malicious signature; and notifying, by the device, a storage administrator of the detection of the at least one of a) the virus code, or b) the malicious signature. 20. The method of claim 12, wherein the write data is contained in a plurality of Ethernet packets, the method further comprising detecting, by the device, any malicious signature located on a boundary of adjacent Ethernet packets from among the plurality of Ethernet packets.
A system and a method to detect malicious software written to an Ethernet solid-state drive (eSSD). The system includes an Ethernet switch, at least one SSD, and a baseboard management controller (BMC). The Ethernet switch receives write data from a communication network in response to a write command. The at least one SSD receives the write data from the Ethernet switch and stores the received write data. The BMC receives from the at least one SSD the received write data. The BMC determines whether the received write data contains malicious software. The received write data may be contained in a plurality of Ethernet packets in which case the BMC stores the received write data in a scan buffer in an order that is based on an assembled order of the received write data.1. A system, comprising: an Ethernet switch to receive write data from a communication network in response to a write command; and a device to receive the write data in a buffer in an order that is based on an assembled order of the write data, wherein the device is configured to scan the write data using the buffer to determine whether the write data contains at least one of a) a virus code, or b) a malicious signature. 2. The system of claim 1, wherein: the device is configured to periodically update a database of virus signature scans; and the device is configured to scan the write data based at least on the database of virus signature scans. 3. The system of claim 1, further comprising at least one solid-state drive (SSD) coupled to the Ethernet switch and to the device, the at least one SSD to receive the write data and store the write data. 4. The system of claim 3, wherein: the at least one SSD includes a reset pin; and in response to the device determining that the write data contains the at least one of a) the virus code, or b) the malicious signature, the device is configured to assert the reset pin of the at least one SSD until the at least one SSD is at least one of a) removed from the system or b) power is removed from the at least one SSD. 5. The system of claim 3, wherein the at least one SSD is coupled to the device through at least one of a) a Peripheral Component Interface Express (PCIe) based communication link or b) a system management bus. 6. The system of claim 3, wherein the device is configured to perform health monitoring of the at least one SSD. 7. The system of claim 3, wherein the device is configured to provide operational status information of the at least one SSD. 8. The system of claim 1, wherein: in response to the device determining that the write data contains the at least one of a) the virus code, or b) the malicious signature, the device is configured to: log detection of the at least one of a) the virus code, or b) the malicious signature; and notify a storage administrator of the detection of the at least one of a) the virus code, or b) the malicious signature. 9. The system of claim 1, wherein the virus code comprises a software virus. 10. The system of claim 1, wherein: the write data is contained in a plurality of Ethernet packets; and the device is configured to detect any malicious signature located on a boundary of adjacent Ethernet packets from among the plurality of Ethernet packets. 11. The system of claim 1, wherein the SSD comprises an Ethernet SSD (eSSD). 12. A method to detect malicious software, the method comprising: receiving, by an Ethernet switch, write data from a communication network in response to a write command; receiving, by a device, the write data in a buffer in an order that is based on an assembled order of the write data; scanning, by the device, the write data using the buffer; and determining, by the device, whether the write data contains at least one of a) a virus code, or b) a malicious signature. 13. The method of claim 12, further comprising: periodically updating, by the device, a database of virus signature scans; and scanning, by the device, the write data based at least on the database of virus signature scans. 14. The method of claim 12, further comprising: receiving, by at least one solid-state drive (SSD), the write data; and storing, by the at least one SSD, the write data. 15. The method of claim 14, wherein the at least one SSD includes a reset pin, the method further comprising asserting, by the device, the reset pin of the at least one SSD until the at least one SSD is at least one of a) removed from the system or b) power is removed from the at least one SSD. 16. The method of claim 15, wherein asserting the reset pin occurs in response to the device determining that the write data contains the at least one of a) the virus code, or b) the malicious signature. 17. The method of claim 14, wherein the device is configured to perform health monitoring of the at least one SSD. 18. The method of claim 14, wherein the device is configured to provide operational status information of the at least one SSD. 19. The method of claim 12, wherein responsive to the device determining that the write data contains the at least one of a) the virus code, or b) the malicious signature: logging, by the device, detection of the at least one of a) the virus code, or b) the malicious signature; and notifying, by the device, a storage administrator of the detection of the at least one of a) the virus code, or b) the malicious signature. 20. The method of claim 12, wherein the write data is contained in a plurality of Ethernet packets, the method further comprising detecting, by the device, any malicious signature located on a boundary of adjacent Ethernet packets from among the plurality of Ethernet packets.
2,900
340,191
29,725,388
2,913
A system and a method to detect malicious software written to an Ethernet solid-state drive (eSSD). The system includes an Ethernet switch, at least one SSD, and a baseboard management controller (BMC). The Ethernet switch receives write data from a communication network in response to a write command. The at least one SSD receives the write data from the Ethernet switch and stores the received write data. The BMC receives from the at least one SSD the received write data. The BMC determines whether the received write data contains malicious software. The received write data may be contained in a plurality of Ethernet packets in which case the BMC stores the received write data in a scan buffer in an order that is based on an assembled order of the received write data.
1. A system, comprising: an Ethernet switch to receive write data from a communication network in response to a write command; and a device to receive the write data in a buffer in an order that is based on an assembled order of the write data, wherein the device is configured to scan the write data using the buffer to determine whether the write data contains at least one of a) a virus code, or b) a malicious signature. 2. The system of claim 1, wherein: the device is configured to periodically update a database of virus signature scans; and the device is configured to scan the write data based at least on the database of virus signature scans. 3. The system of claim 1, further comprising at least one solid-state drive (SSD) coupled to the Ethernet switch and to the device, the at least one SSD to receive the write data and store the write data. 4. The system of claim 3, wherein: the at least one SSD includes a reset pin; and in response to the device determining that the write data contains the at least one of a) the virus code, or b) the malicious signature, the device is configured to assert the reset pin of the at least one SSD until the at least one SSD is at least one of a) removed from the system or b) power is removed from the at least one SSD. 5. The system of claim 3, wherein the at least one SSD is coupled to the device through at least one of a) a Peripheral Component Interface Express (PCIe) based communication link or b) a system management bus. 6. The system of claim 3, wherein the device is configured to perform health monitoring of the at least one SSD. 7. The system of claim 3, wherein the device is configured to provide operational status information of the at least one SSD. 8. The system of claim 1, wherein: in response to the device determining that the write data contains the at least one of a) the virus code, or b) the malicious signature, the device is configured to: log detection of the at least one of a) the virus code, or b) the malicious signature; and notify a storage administrator of the detection of the at least one of a) the virus code, or b) the malicious signature. 9. The system of claim 1, wherein the virus code comprises a software virus. 10. The system of claim 1, wherein: the write data is contained in a plurality of Ethernet packets; and the device is configured to detect any malicious signature located on a boundary of adjacent Ethernet packets from among the plurality of Ethernet packets. 11. The system of claim 1, wherein the SSD comprises an Ethernet SSD (eSSD). 12. A method to detect malicious software, the method comprising: receiving, by an Ethernet switch, write data from a communication network in response to a write command; receiving, by a device, the write data in a buffer in an order that is based on an assembled order of the write data; scanning, by the device, the write data using the buffer; and determining, by the device, whether the write data contains at least one of a) a virus code, or b) a malicious signature. 13. The method of claim 12, further comprising: periodically updating, by the device, a database of virus signature scans; and scanning, by the device, the write data based at least on the database of virus signature scans. 14. The method of claim 12, further comprising: receiving, by at least one solid-state drive (SSD), the write data; and storing, by the at least one SSD, the write data. 15. The method of claim 14, wherein the at least one SSD includes a reset pin, the method further comprising asserting, by the device, the reset pin of the at least one SSD until the at least one SSD is at least one of a) removed from the system or b) power is removed from the at least one SSD. 16. The method of claim 15, wherein asserting the reset pin occurs in response to the device determining that the write data contains the at least one of a) the virus code, or b) the malicious signature. 17. The method of claim 14, wherein the device is configured to perform health monitoring of the at least one SSD. 18. The method of claim 14, wherein the device is configured to provide operational status information of the at least one SSD. 19. The method of claim 12, wherein responsive to the device determining that the write data contains the at least one of a) the virus code, or b) the malicious signature: logging, by the device, detection of the at least one of a) the virus code, or b) the malicious signature; and notifying, by the device, a storage administrator of the detection of the at least one of a) the virus code, or b) the malicious signature. 20. The method of claim 12, wherein the write data is contained in a plurality of Ethernet packets, the method further comprising detecting, by the device, any malicious signature located on a boundary of adjacent Ethernet packets from among the plurality of Ethernet packets.
A system and a method to detect malicious software written to an Ethernet solid-state drive (eSSD). The system includes an Ethernet switch, at least one SSD, and a baseboard management controller (BMC). The Ethernet switch receives write data from a communication network in response to a write command. The at least one SSD receives the write data from the Ethernet switch and stores the received write data. The BMC receives from the at least one SSD the received write data. The BMC determines whether the received write data contains malicious software. The received write data may be contained in a plurality of Ethernet packets in which case the BMC stores the received write data in a scan buffer in an order that is based on an assembled order of the received write data.1. A system, comprising: an Ethernet switch to receive write data from a communication network in response to a write command; and a device to receive the write data in a buffer in an order that is based on an assembled order of the write data, wherein the device is configured to scan the write data using the buffer to determine whether the write data contains at least one of a) a virus code, or b) a malicious signature. 2. The system of claim 1, wherein: the device is configured to periodically update a database of virus signature scans; and the device is configured to scan the write data based at least on the database of virus signature scans. 3. The system of claim 1, further comprising at least one solid-state drive (SSD) coupled to the Ethernet switch and to the device, the at least one SSD to receive the write data and store the write data. 4. The system of claim 3, wherein: the at least one SSD includes a reset pin; and in response to the device determining that the write data contains the at least one of a) the virus code, or b) the malicious signature, the device is configured to assert the reset pin of the at least one SSD until the at least one SSD is at least one of a) removed from the system or b) power is removed from the at least one SSD. 5. The system of claim 3, wherein the at least one SSD is coupled to the device through at least one of a) a Peripheral Component Interface Express (PCIe) based communication link or b) a system management bus. 6. The system of claim 3, wherein the device is configured to perform health monitoring of the at least one SSD. 7. The system of claim 3, wherein the device is configured to provide operational status information of the at least one SSD. 8. The system of claim 1, wherein: in response to the device determining that the write data contains the at least one of a) the virus code, or b) the malicious signature, the device is configured to: log detection of the at least one of a) the virus code, or b) the malicious signature; and notify a storage administrator of the detection of the at least one of a) the virus code, or b) the malicious signature. 9. The system of claim 1, wherein the virus code comprises a software virus. 10. The system of claim 1, wherein: the write data is contained in a plurality of Ethernet packets; and the device is configured to detect any malicious signature located on a boundary of adjacent Ethernet packets from among the plurality of Ethernet packets. 11. The system of claim 1, wherein the SSD comprises an Ethernet SSD (eSSD). 12. A method to detect malicious software, the method comprising: receiving, by an Ethernet switch, write data from a communication network in response to a write command; receiving, by a device, the write data in a buffer in an order that is based on an assembled order of the write data; scanning, by the device, the write data using the buffer; and determining, by the device, whether the write data contains at least one of a) a virus code, or b) a malicious signature. 13. The method of claim 12, further comprising: periodically updating, by the device, a database of virus signature scans; and scanning, by the device, the write data based at least on the database of virus signature scans. 14. The method of claim 12, further comprising: receiving, by at least one solid-state drive (SSD), the write data; and storing, by the at least one SSD, the write data. 15. The method of claim 14, wherein the at least one SSD includes a reset pin, the method further comprising asserting, by the device, the reset pin of the at least one SSD until the at least one SSD is at least one of a) removed from the system or b) power is removed from the at least one SSD. 16. The method of claim 15, wherein asserting the reset pin occurs in response to the device determining that the write data contains the at least one of a) the virus code, or b) the malicious signature. 17. The method of claim 14, wherein the device is configured to perform health monitoring of the at least one SSD. 18. The method of claim 14, wherein the device is configured to provide operational status information of the at least one SSD. 19. The method of claim 12, wherein responsive to the device determining that the write data contains the at least one of a) the virus code, or b) the malicious signature: logging, by the device, detection of the at least one of a) the virus code, or b) the malicious signature; and notifying, by the device, a storage administrator of the detection of the at least one of a) the virus code, or b) the malicious signature. 20. The method of claim 12, wherein the write data is contained in a plurality of Ethernet packets, the method further comprising detecting, by the device, any malicious signature located on a boundary of adjacent Ethernet packets from among the plurality of Ethernet packets.
2,900
340,192
29,725,360
2,913
A system and a method to detect malicious software written to an Ethernet solid-state drive (eSSD). The system includes an Ethernet switch, at least one SSD, and a baseboard management controller (BMC). The Ethernet switch receives write data from a communication network in response to a write command. The at least one SSD receives the write data from the Ethernet switch and stores the received write data. The BMC receives from the at least one SSD the received write data. The BMC determines whether the received write data contains malicious software. The received write data may be contained in a plurality of Ethernet packets in which case the BMC stores the received write data in a scan buffer in an order that is based on an assembled order of the received write data.
1. A system, comprising: an Ethernet switch to receive write data from a communication network in response to a write command; and a device to receive the write data in a buffer in an order that is based on an assembled order of the write data, wherein the device is configured to scan the write data using the buffer to determine whether the write data contains at least one of a) a virus code, or b) a malicious signature. 2. The system of claim 1, wherein: the device is configured to periodically update a database of virus signature scans; and the device is configured to scan the write data based at least on the database of virus signature scans. 3. The system of claim 1, further comprising at least one solid-state drive (SSD) coupled to the Ethernet switch and to the device, the at least one SSD to receive the write data and store the write data. 4. The system of claim 3, wherein: the at least one SSD includes a reset pin; and in response to the device determining that the write data contains the at least one of a) the virus code, or b) the malicious signature, the device is configured to assert the reset pin of the at least one SSD until the at least one SSD is at least one of a) removed from the system or b) power is removed from the at least one SSD. 5. The system of claim 3, wherein the at least one SSD is coupled to the device through at least one of a) a Peripheral Component Interface Express (PCIe) based communication link or b) a system management bus. 6. The system of claim 3, wherein the device is configured to perform health monitoring of the at least one SSD. 7. The system of claim 3, wherein the device is configured to provide operational status information of the at least one SSD. 8. The system of claim 1, wherein: in response to the device determining that the write data contains the at least one of a) the virus code, or b) the malicious signature, the device is configured to: log detection of the at least one of a) the virus code, or b) the malicious signature; and notify a storage administrator of the detection of the at least one of a) the virus code, or b) the malicious signature. 9. The system of claim 1, wherein the virus code comprises a software virus. 10. The system of claim 1, wherein: the write data is contained in a plurality of Ethernet packets; and the device is configured to detect any malicious signature located on a boundary of adjacent Ethernet packets from among the plurality of Ethernet packets. 11. The system of claim 1, wherein the SSD comprises an Ethernet SSD (eSSD). 12. A method to detect malicious software, the method comprising: receiving, by an Ethernet switch, write data from a communication network in response to a write command; receiving, by a device, the write data in a buffer in an order that is based on an assembled order of the write data; scanning, by the device, the write data using the buffer; and determining, by the device, whether the write data contains at least one of a) a virus code, or b) a malicious signature. 13. The method of claim 12, further comprising: periodically updating, by the device, a database of virus signature scans; and scanning, by the device, the write data based at least on the database of virus signature scans. 14. The method of claim 12, further comprising: receiving, by at least one solid-state drive (SSD), the write data; and storing, by the at least one SSD, the write data. 15. The method of claim 14, wherein the at least one SSD includes a reset pin, the method further comprising asserting, by the device, the reset pin of the at least one SSD until the at least one SSD is at least one of a) removed from the system or b) power is removed from the at least one SSD. 16. The method of claim 15, wherein asserting the reset pin occurs in response to the device determining that the write data contains the at least one of a) the virus code, or b) the malicious signature. 17. The method of claim 14, wherein the device is configured to perform health monitoring of the at least one SSD. 18. The method of claim 14, wherein the device is configured to provide operational status information of the at least one SSD. 19. The method of claim 12, wherein responsive to the device determining that the write data contains the at least one of a) the virus code, or b) the malicious signature: logging, by the device, detection of the at least one of a) the virus code, or b) the malicious signature; and notifying, by the device, a storage administrator of the detection of the at least one of a) the virus code, or b) the malicious signature. 20. The method of claim 12, wherein the write data is contained in a plurality of Ethernet packets, the method further comprising detecting, by the device, any malicious signature located on a boundary of adjacent Ethernet packets from among the plurality of Ethernet packets.
A system and a method to detect malicious software written to an Ethernet solid-state drive (eSSD). The system includes an Ethernet switch, at least one SSD, and a baseboard management controller (BMC). The Ethernet switch receives write data from a communication network in response to a write command. The at least one SSD receives the write data from the Ethernet switch and stores the received write data. The BMC receives from the at least one SSD the received write data. The BMC determines whether the received write data contains malicious software. The received write data may be contained in a plurality of Ethernet packets in which case the BMC stores the received write data in a scan buffer in an order that is based on an assembled order of the received write data.1. A system, comprising: an Ethernet switch to receive write data from a communication network in response to a write command; and a device to receive the write data in a buffer in an order that is based on an assembled order of the write data, wherein the device is configured to scan the write data using the buffer to determine whether the write data contains at least one of a) a virus code, or b) a malicious signature. 2. The system of claim 1, wherein: the device is configured to periodically update a database of virus signature scans; and the device is configured to scan the write data based at least on the database of virus signature scans. 3. The system of claim 1, further comprising at least one solid-state drive (SSD) coupled to the Ethernet switch and to the device, the at least one SSD to receive the write data and store the write data. 4. The system of claim 3, wherein: the at least one SSD includes a reset pin; and in response to the device determining that the write data contains the at least one of a) the virus code, or b) the malicious signature, the device is configured to assert the reset pin of the at least one SSD until the at least one SSD is at least one of a) removed from the system or b) power is removed from the at least one SSD. 5. The system of claim 3, wherein the at least one SSD is coupled to the device through at least one of a) a Peripheral Component Interface Express (PCIe) based communication link or b) a system management bus. 6. The system of claim 3, wherein the device is configured to perform health monitoring of the at least one SSD. 7. The system of claim 3, wherein the device is configured to provide operational status information of the at least one SSD. 8. The system of claim 1, wherein: in response to the device determining that the write data contains the at least one of a) the virus code, or b) the malicious signature, the device is configured to: log detection of the at least one of a) the virus code, or b) the malicious signature; and notify a storage administrator of the detection of the at least one of a) the virus code, or b) the malicious signature. 9. The system of claim 1, wherein the virus code comprises a software virus. 10. The system of claim 1, wherein: the write data is contained in a plurality of Ethernet packets; and the device is configured to detect any malicious signature located on a boundary of adjacent Ethernet packets from among the plurality of Ethernet packets. 11. The system of claim 1, wherein the SSD comprises an Ethernet SSD (eSSD). 12. A method to detect malicious software, the method comprising: receiving, by an Ethernet switch, write data from a communication network in response to a write command; receiving, by a device, the write data in a buffer in an order that is based on an assembled order of the write data; scanning, by the device, the write data using the buffer; and determining, by the device, whether the write data contains at least one of a) a virus code, or b) a malicious signature. 13. The method of claim 12, further comprising: periodically updating, by the device, a database of virus signature scans; and scanning, by the device, the write data based at least on the database of virus signature scans. 14. The method of claim 12, further comprising: receiving, by at least one solid-state drive (SSD), the write data; and storing, by the at least one SSD, the write data. 15. The method of claim 14, wherein the at least one SSD includes a reset pin, the method further comprising asserting, by the device, the reset pin of the at least one SSD until the at least one SSD is at least one of a) removed from the system or b) power is removed from the at least one SSD. 16. The method of claim 15, wherein asserting the reset pin occurs in response to the device determining that the write data contains the at least one of a) the virus code, or b) the malicious signature. 17. The method of claim 14, wherein the device is configured to perform health monitoring of the at least one SSD. 18. The method of claim 14, wherein the device is configured to provide operational status information of the at least one SSD. 19. The method of claim 12, wherein responsive to the device determining that the write data contains the at least one of a) the virus code, or b) the malicious signature: logging, by the device, detection of the at least one of a) the virus code, or b) the malicious signature; and notifying, by the device, a storage administrator of the detection of the at least one of a) the virus code, or b) the malicious signature. 20. The method of claim 12, wherein the write data is contained in a plurality of Ethernet packets, the method further comprising detecting, by the device, any malicious signature located on a boundary of adjacent Ethernet packets from among the plurality of Ethernet packets.
2,900
340,193
29,725,375
2,913
A system and a method to detect malicious software written to an Ethernet solid-state drive (eSSD). The system includes an Ethernet switch, at least one SSD, and a baseboard management controller (BMC). The Ethernet switch receives write data from a communication network in response to a write command. The at least one SSD receives the write data from the Ethernet switch and stores the received write data. The BMC receives from the at least one SSD the received write data. The BMC determines whether the received write data contains malicious software. The received write data may be contained in a plurality of Ethernet packets in which case the BMC stores the received write data in a scan buffer in an order that is based on an assembled order of the received write data.
1. A system, comprising: an Ethernet switch to receive write data from a communication network in response to a write command; and a device to receive the write data in a buffer in an order that is based on an assembled order of the write data, wherein the device is configured to scan the write data using the buffer to determine whether the write data contains at least one of a) a virus code, or b) a malicious signature. 2. The system of claim 1, wherein: the device is configured to periodically update a database of virus signature scans; and the device is configured to scan the write data based at least on the database of virus signature scans. 3. The system of claim 1, further comprising at least one solid-state drive (SSD) coupled to the Ethernet switch and to the device, the at least one SSD to receive the write data and store the write data. 4. The system of claim 3, wherein: the at least one SSD includes a reset pin; and in response to the device determining that the write data contains the at least one of a) the virus code, or b) the malicious signature, the device is configured to assert the reset pin of the at least one SSD until the at least one SSD is at least one of a) removed from the system or b) power is removed from the at least one SSD. 5. The system of claim 3, wherein the at least one SSD is coupled to the device through at least one of a) a Peripheral Component Interface Express (PCIe) based communication link or b) a system management bus. 6. The system of claim 3, wherein the device is configured to perform health monitoring of the at least one SSD. 7. The system of claim 3, wherein the device is configured to provide operational status information of the at least one SSD. 8. The system of claim 1, wherein: in response to the device determining that the write data contains the at least one of a) the virus code, or b) the malicious signature, the device is configured to: log detection of the at least one of a) the virus code, or b) the malicious signature; and notify a storage administrator of the detection of the at least one of a) the virus code, or b) the malicious signature. 9. The system of claim 1, wherein the virus code comprises a software virus. 10. The system of claim 1, wherein: the write data is contained in a plurality of Ethernet packets; and the device is configured to detect any malicious signature located on a boundary of adjacent Ethernet packets from among the plurality of Ethernet packets. 11. The system of claim 1, wherein the SSD comprises an Ethernet SSD (eSSD). 12. A method to detect malicious software, the method comprising: receiving, by an Ethernet switch, write data from a communication network in response to a write command; receiving, by a device, the write data in a buffer in an order that is based on an assembled order of the write data; scanning, by the device, the write data using the buffer; and determining, by the device, whether the write data contains at least one of a) a virus code, or b) a malicious signature. 13. The method of claim 12, further comprising: periodically updating, by the device, a database of virus signature scans; and scanning, by the device, the write data based at least on the database of virus signature scans. 14. The method of claim 12, further comprising: receiving, by at least one solid-state drive (SSD), the write data; and storing, by the at least one SSD, the write data. 15. The method of claim 14, wherein the at least one SSD includes a reset pin, the method further comprising asserting, by the device, the reset pin of the at least one SSD until the at least one SSD is at least one of a) removed from the system or b) power is removed from the at least one SSD. 16. The method of claim 15, wherein asserting the reset pin occurs in response to the device determining that the write data contains the at least one of a) the virus code, or b) the malicious signature. 17. The method of claim 14, wherein the device is configured to perform health monitoring of the at least one SSD. 18. The method of claim 14, wherein the device is configured to provide operational status information of the at least one SSD. 19. The method of claim 12, wherein responsive to the device determining that the write data contains the at least one of a) the virus code, or b) the malicious signature: logging, by the device, detection of the at least one of a) the virus code, or b) the malicious signature; and notifying, by the device, a storage administrator of the detection of the at least one of a) the virus code, or b) the malicious signature. 20. The method of claim 12, wherein the write data is contained in a plurality of Ethernet packets, the method further comprising detecting, by the device, any malicious signature located on a boundary of adjacent Ethernet packets from among the plurality of Ethernet packets.
A system and a method to detect malicious software written to an Ethernet solid-state drive (eSSD). The system includes an Ethernet switch, at least one SSD, and a baseboard management controller (BMC). The Ethernet switch receives write data from a communication network in response to a write command. The at least one SSD receives the write data from the Ethernet switch and stores the received write data. The BMC receives from the at least one SSD the received write data. The BMC determines whether the received write data contains malicious software. The received write data may be contained in a plurality of Ethernet packets in which case the BMC stores the received write data in a scan buffer in an order that is based on an assembled order of the received write data.1. A system, comprising: an Ethernet switch to receive write data from a communication network in response to a write command; and a device to receive the write data in a buffer in an order that is based on an assembled order of the write data, wherein the device is configured to scan the write data using the buffer to determine whether the write data contains at least one of a) a virus code, or b) a malicious signature. 2. The system of claim 1, wherein: the device is configured to periodically update a database of virus signature scans; and the device is configured to scan the write data based at least on the database of virus signature scans. 3. The system of claim 1, further comprising at least one solid-state drive (SSD) coupled to the Ethernet switch and to the device, the at least one SSD to receive the write data and store the write data. 4. The system of claim 3, wherein: the at least one SSD includes a reset pin; and in response to the device determining that the write data contains the at least one of a) the virus code, or b) the malicious signature, the device is configured to assert the reset pin of the at least one SSD until the at least one SSD is at least one of a) removed from the system or b) power is removed from the at least one SSD. 5. The system of claim 3, wherein the at least one SSD is coupled to the device through at least one of a) a Peripheral Component Interface Express (PCIe) based communication link or b) a system management bus. 6. The system of claim 3, wherein the device is configured to perform health monitoring of the at least one SSD. 7. The system of claim 3, wherein the device is configured to provide operational status information of the at least one SSD. 8. The system of claim 1, wherein: in response to the device determining that the write data contains the at least one of a) the virus code, or b) the malicious signature, the device is configured to: log detection of the at least one of a) the virus code, or b) the malicious signature; and notify a storage administrator of the detection of the at least one of a) the virus code, or b) the malicious signature. 9. The system of claim 1, wherein the virus code comprises a software virus. 10. The system of claim 1, wherein: the write data is contained in a plurality of Ethernet packets; and the device is configured to detect any malicious signature located on a boundary of adjacent Ethernet packets from among the plurality of Ethernet packets. 11. The system of claim 1, wherein the SSD comprises an Ethernet SSD (eSSD). 12. A method to detect malicious software, the method comprising: receiving, by an Ethernet switch, write data from a communication network in response to a write command; receiving, by a device, the write data in a buffer in an order that is based on an assembled order of the write data; scanning, by the device, the write data using the buffer; and determining, by the device, whether the write data contains at least one of a) a virus code, or b) a malicious signature. 13. The method of claim 12, further comprising: periodically updating, by the device, a database of virus signature scans; and scanning, by the device, the write data based at least on the database of virus signature scans. 14. The method of claim 12, further comprising: receiving, by at least one solid-state drive (SSD), the write data; and storing, by the at least one SSD, the write data. 15. The method of claim 14, wherein the at least one SSD includes a reset pin, the method further comprising asserting, by the device, the reset pin of the at least one SSD until the at least one SSD is at least one of a) removed from the system or b) power is removed from the at least one SSD. 16. The method of claim 15, wherein asserting the reset pin occurs in response to the device determining that the write data contains the at least one of a) the virus code, or b) the malicious signature. 17. The method of claim 14, wherein the device is configured to perform health monitoring of the at least one SSD. 18. The method of claim 14, wherein the device is configured to provide operational status information of the at least one SSD. 19. The method of claim 12, wherein responsive to the device determining that the write data contains the at least one of a) the virus code, or b) the malicious signature: logging, by the device, detection of the at least one of a) the virus code, or b) the malicious signature; and notifying, by the device, a storage administrator of the detection of the at least one of a) the virus code, or b) the malicious signature. 20. The method of claim 12, wherein the write data is contained in a plurality of Ethernet packets, the method further comprising detecting, by the device, any malicious signature located on a boundary of adjacent Ethernet packets from among the plurality of Ethernet packets.
2,900
340,194
29,725,392
2,916
A system and a method to detect malicious software written to an Ethernet solid-state drive (eSSD). The system includes an Ethernet switch, at least one SSD, and a baseboard management controller (BMC). The Ethernet switch receives write data from a communication network in response to a write command. The at least one SSD receives the write data from the Ethernet switch and stores the received write data. The BMC receives from the at least one SSD the received write data. The BMC determines whether the received write data contains malicious software. The received write data may be contained in a plurality of Ethernet packets in which case the BMC stores the received write data in a scan buffer in an order that is based on an assembled order of the received write data.
1. A system, comprising: an Ethernet switch to receive write data from a communication network in response to a write command; and a device to receive the write data in a buffer in an order that is based on an assembled order of the write data, wherein the device is configured to scan the write data using the buffer to determine whether the write data contains at least one of a) a virus code, or b) a malicious signature. 2. The system of claim 1, wherein: the device is configured to periodically update a database of virus signature scans; and the device is configured to scan the write data based at least on the database of virus signature scans. 3. The system of claim 1, further comprising at least one solid-state drive (SSD) coupled to the Ethernet switch and to the device, the at least one SSD to receive the write data and store the write data. 4. The system of claim 3, wherein: the at least one SSD includes a reset pin; and in response to the device determining that the write data contains the at least one of a) the virus code, or b) the malicious signature, the device is configured to assert the reset pin of the at least one SSD until the at least one SSD is at least one of a) removed from the system or b) power is removed from the at least one SSD. 5. The system of claim 3, wherein the at least one SSD is coupled to the device through at least one of a) a Peripheral Component Interface Express (PCIe) based communication link or b) a system management bus. 6. The system of claim 3, wherein the device is configured to perform health monitoring of the at least one SSD. 7. The system of claim 3, wherein the device is configured to provide operational status information of the at least one SSD. 8. The system of claim 1, wherein: in response to the device determining that the write data contains the at least one of a) the virus code, or b) the malicious signature, the device is configured to: log detection of the at least one of a) the virus code, or b) the malicious signature; and notify a storage administrator of the detection of the at least one of a) the virus code, or b) the malicious signature. 9. The system of claim 1, wherein the virus code comprises a software virus. 10. The system of claim 1, wherein: the write data is contained in a plurality of Ethernet packets; and the device is configured to detect any malicious signature located on a boundary of adjacent Ethernet packets from among the plurality of Ethernet packets. 11. The system of claim 1, wherein the SSD comprises an Ethernet SSD (eSSD). 12. A method to detect malicious software, the method comprising: receiving, by an Ethernet switch, write data from a communication network in response to a write command; receiving, by a device, the write data in a buffer in an order that is based on an assembled order of the write data; scanning, by the device, the write data using the buffer; and determining, by the device, whether the write data contains at least one of a) a virus code, or b) a malicious signature. 13. The method of claim 12, further comprising: periodically updating, by the device, a database of virus signature scans; and scanning, by the device, the write data based at least on the database of virus signature scans. 14. The method of claim 12, further comprising: receiving, by at least one solid-state drive (SSD), the write data; and storing, by the at least one SSD, the write data. 15. The method of claim 14, wherein the at least one SSD includes a reset pin, the method further comprising asserting, by the device, the reset pin of the at least one SSD until the at least one SSD is at least one of a) removed from the system or b) power is removed from the at least one SSD. 16. The method of claim 15, wherein asserting the reset pin occurs in response to the device determining that the write data contains the at least one of a) the virus code, or b) the malicious signature. 17. The method of claim 14, wherein the device is configured to perform health monitoring of the at least one SSD. 18. The method of claim 14, wherein the device is configured to provide operational status information of the at least one SSD. 19. The method of claim 12, wherein responsive to the device determining that the write data contains the at least one of a) the virus code, or b) the malicious signature: logging, by the device, detection of the at least one of a) the virus code, or b) the malicious signature; and notifying, by the device, a storage administrator of the detection of the at least one of a) the virus code, or b) the malicious signature. 20. The method of claim 12, wherein the write data is contained in a plurality of Ethernet packets, the method further comprising detecting, by the device, any malicious signature located on a boundary of adjacent Ethernet packets from among the plurality of Ethernet packets.
A system and a method to detect malicious software written to an Ethernet solid-state drive (eSSD). The system includes an Ethernet switch, at least one SSD, and a baseboard management controller (BMC). The Ethernet switch receives write data from a communication network in response to a write command. The at least one SSD receives the write data from the Ethernet switch and stores the received write data. The BMC receives from the at least one SSD the received write data. The BMC determines whether the received write data contains malicious software. The received write data may be contained in a plurality of Ethernet packets in which case the BMC stores the received write data in a scan buffer in an order that is based on an assembled order of the received write data.1. A system, comprising: an Ethernet switch to receive write data from a communication network in response to a write command; and a device to receive the write data in a buffer in an order that is based on an assembled order of the write data, wherein the device is configured to scan the write data using the buffer to determine whether the write data contains at least one of a) a virus code, or b) a malicious signature. 2. The system of claim 1, wherein: the device is configured to periodically update a database of virus signature scans; and the device is configured to scan the write data based at least on the database of virus signature scans. 3. The system of claim 1, further comprising at least one solid-state drive (SSD) coupled to the Ethernet switch and to the device, the at least one SSD to receive the write data and store the write data. 4. The system of claim 3, wherein: the at least one SSD includes a reset pin; and in response to the device determining that the write data contains the at least one of a) the virus code, or b) the malicious signature, the device is configured to assert the reset pin of the at least one SSD until the at least one SSD is at least one of a) removed from the system or b) power is removed from the at least one SSD. 5. The system of claim 3, wherein the at least one SSD is coupled to the device through at least one of a) a Peripheral Component Interface Express (PCIe) based communication link or b) a system management bus. 6. The system of claim 3, wherein the device is configured to perform health monitoring of the at least one SSD. 7. The system of claim 3, wherein the device is configured to provide operational status information of the at least one SSD. 8. The system of claim 1, wherein: in response to the device determining that the write data contains the at least one of a) the virus code, or b) the malicious signature, the device is configured to: log detection of the at least one of a) the virus code, or b) the malicious signature; and notify a storage administrator of the detection of the at least one of a) the virus code, or b) the malicious signature. 9. The system of claim 1, wherein the virus code comprises a software virus. 10. The system of claim 1, wherein: the write data is contained in a plurality of Ethernet packets; and the device is configured to detect any malicious signature located on a boundary of adjacent Ethernet packets from among the plurality of Ethernet packets. 11. The system of claim 1, wherein the SSD comprises an Ethernet SSD (eSSD). 12. A method to detect malicious software, the method comprising: receiving, by an Ethernet switch, write data from a communication network in response to a write command; receiving, by a device, the write data in a buffer in an order that is based on an assembled order of the write data; scanning, by the device, the write data using the buffer; and determining, by the device, whether the write data contains at least one of a) a virus code, or b) a malicious signature. 13. The method of claim 12, further comprising: periodically updating, by the device, a database of virus signature scans; and scanning, by the device, the write data based at least on the database of virus signature scans. 14. The method of claim 12, further comprising: receiving, by at least one solid-state drive (SSD), the write data; and storing, by the at least one SSD, the write data. 15. The method of claim 14, wherein the at least one SSD includes a reset pin, the method further comprising asserting, by the device, the reset pin of the at least one SSD until the at least one SSD is at least one of a) removed from the system or b) power is removed from the at least one SSD. 16. The method of claim 15, wherein asserting the reset pin occurs in response to the device determining that the write data contains the at least one of a) the virus code, or b) the malicious signature. 17. The method of claim 14, wherein the device is configured to perform health monitoring of the at least one SSD. 18. The method of claim 14, wherein the device is configured to provide operational status information of the at least one SSD. 19. The method of claim 12, wherein responsive to the device determining that the write data contains the at least one of a) the virus code, or b) the malicious signature: logging, by the device, detection of the at least one of a) the virus code, or b) the malicious signature; and notifying, by the device, a storage administrator of the detection of the at least one of a) the virus code, or b) the malicious signature. 20. The method of claim 12, wherein the write data is contained in a plurality of Ethernet packets, the method further comprising detecting, by the device, any malicious signature located on a boundary of adjacent Ethernet packets from among the plurality of Ethernet packets.
2,900
340,195
29,725,351
2,916
A system and a method to detect malicious software written to an Ethernet solid-state drive (eSSD). The system includes an Ethernet switch, at least one SSD, and a baseboard management controller (BMC). The Ethernet switch receives write data from a communication network in response to a write command. The at least one SSD receives the write data from the Ethernet switch and stores the received write data. The BMC receives from the at least one SSD the received write data. The BMC determines whether the received write data contains malicious software. The received write data may be contained in a plurality of Ethernet packets in which case the BMC stores the received write data in a scan buffer in an order that is based on an assembled order of the received write data.
1. A system, comprising: an Ethernet switch to receive write data from a communication network in response to a write command; and a device to receive the write data in a buffer in an order that is based on an assembled order of the write data, wherein the device is configured to scan the write data using the buffer to determine whether the write data contains at least one of a) a virus code, or b) a malicious signature. 2. The system of claim 1, wherein: the device is configured to periodically update a database of virus signature scans; and the device is configured to scan the write data based at least on the database of virus signature scans. 3. The system of claim 1, further comprising at least one solid-state drive (SSD) coupled to the Ethernet switch and to the device, the at least one SSD to receive the write data and store the write data. 4. The system of claim 3, wherein: the at least one SSD includes a reset pin; and in response to the device determining that the write data contains the at least one of a) the virus code, or b) the malicious signature, the device is configured to assert the reset pin of the at least one SSD until the at least one SSD is at least one of a) removed from the system or b) power is removed from the at least one SSD. 5. The system of claim 3, wherein the at least one SSD is coupled to the device through at least one of a) a Peripheral Component Interface Express (PCIe) based communication link or b) a system management bus. 6. The system of claim 3, wherein the device is configured to perform health monitoring of the at least one SSD. 7. The system of claim 3, wherein the device is configured to provide operational status information of the at least one SSD. 8. The system of claim 1, wherein: in response to the device determining that the write data contains the at least one of a) the virus code, or b) the malicious signature, the device is configured to: log detection of the at least one of a) the virus code, or b) the malicious signature; and notify a storage administrator of the detection of the at least one of a) the virus code, or b) the malicious signature. 9. The system of claim 1, wherein the virus code comprises a software virus. 10. The system of claim 1, wherein: the write data is contained in a plurality of Ethernet packets; and the device is configured to detect any malicious signature located on a boundary of adjacent Ethernet packets from among the plurality of Ethernet packets. 11. The system of claim 1, wherein the SSD comprises an Ethernet SSD (eSSD). 12. A method to detect malicious software, the method comprising: receiving, by an Ethernet switch, write data from a communication network in response to a write command; receiving, by a device, the write data in a buffer in an order that is based on an assembled order of the write data; scanning, by the device, the write data using the buffer; and determining, by the device, whether the write data contains at least one of a) a virus code, or b) a malicious signature. 13. The method of claim 12, further comprising: periodically updating, by the device, a database of virus signature scans; and scanning, by the device, the write data based at least on the database of virus signature scans. 14. The method of claim 12, further comprising: receiving, by at least one solid-state drive (SSD), the write data; and storing, by the at least one SSD, the write data. 15. The method of claim 14, wherein the at least one SSD includes a reset pin, the method further comprising asserting, by the device, the reset pin of the at least one SSD until the at least one SSD is at least one of a) removed from the system or b) power is removed from the at least one SSD. 16. The method of claim 15, wherein asserting the reset pin occurs in response to the device determining that the write data contains the at least one of a) the virus code, or b) the malicious signature. 17. The method of claim 14, wherein the device is configured to perform health monitoring of the at least one SSD. 18. The method of claim 14, wherein the device is configured to provide operational status information of the at least one SSD. 19. The method of claim 12, wherein responsive to the device determining that the write data contains the at least one of a) the virus code, or b) the malicious signature: logging, by the device, detection of the at least one of a) the virus code, or b) the malicious signature; and notifying, by the device, a storage administrator of the detection of the at least one of a) the virus code, or b) the malicious signature. 20. The method of claim 12, wherein the write data is contained in a plurality of Ethernet packets, the method further comprising detecting, by the device, any malicious signature located on a boundary of adjacent Ethernet packets from among the plurality of Ethernet packets.
A system and a method to detect malicious software written to an Ethernet solid-state drive (eSSD). The system includes an Ethernet switch, at least one SSD, and a baseboard management controller (BMC). The Ethernet switch receives write data from a communication network in response to a write command. The at least one SSD receives the write data from the Ethernet switch and stores the received write data. The BMC receives from the at least one SSD the received write data. The BMC determines whether the received write data contains malicious software. The received write data may be contained in a plurality of Ethernet packets in which case the BMC stores the received write data in a scan buffer in an order that is based on an assembled order of the received write data.1. A system, comprising: an Ethernet switch to receive write data from a communication network in response to a write command; and a device to receive the write data in a buffer in an order that is based on an assembled order of the write data, wherein the device is configured to scan the write data using the buffer to determine whether the write data contains at least one of a) a virus code, or b) a malicious signature. 2. The system of claim 1, wherein: the device is configured to periodically update a database of virus signature scans; and the device is configured to scan the write data based at least on the database of virus signature scans. 3. The system of claim 1, further comprising at least one solid-state drive (SSD) coupled to the Ethernet switch and to the device, the at least one SSD to receive the write data and store the write data. 4. The system of claim 3, wherein: the at least one SSD includes a reset pin; and in response to the device determining that the write data contains the at least one of a) the virus code, or b) the malicious signature, the device is configured to assert the reset pin of the at least one SSD until the at least one SSD is at least one of a) removed from the system or b) power is removed from the at least one SSD. 5. The system of claim 3, wherein the at least one SSD is coupled to the device through at least one of a) a Peripheral Component Interface Express (PCIe) based communication link or b) a system management bus. 6. The system of claim 3, wherein the device is configured to perform health monitoring of the at least one SSD. 7. The system of claim 3, wherein the device is configured to provide operational status information of the at least one SSD. 8. The system of claim 1, wherein: in response to the device determining that the write data contains the at least one of a) the virus code, or b) the malicious signature, the device is configured to: log detection of the at least one of a) the virus code, or b) the malicious signature; and notify a storage administrator of the detection of the at least one of a) the virus code, or b) the malicious signature. 9. The system of claim 1, wherein the virus code comprises a software virus. 10. The system of claim 1, wherein: the write data is contained in a plurality of Ethernet packets; and the device is configured to detect any malicious signature located on a boundary of adjacent Ethernet packets from among the plurality of Ethernet packets. 11. The system of claim 1, wherein the SSD comprises an Ethernet SSD (eSSD). 12. A method to detect malicious software, the method comprising: receiving, by an Ethernet switch, write data from a communication network in response to a write command; receiving, by a device, the write data in a buffer in an order that is based on an assembled order of the write data; scanning, by the device, the write data using the buffer; and determining, by the device, whether the write data contains at least one of a) a virus code, or b) a malicious signature. 13. The method of claim 12, further comprising: periodically updating, by the device, a database of virus signature scans; and scanning, by the device, the write data based at least on the database of virus signature scans. 14. The method of claim 12, further comprising: receiving, by at least one solid-state drive (SSD), the write data; and storing, by the at least one SSD, the write data. 15. The method of claim 14, wherein the at least one SSD includes a reset pin, the method further comprising asserting, by the device, the reset pin of the at least one SSD until the at least one SSD is at least one of a) removed from the system or b) power is removed from the at least one SSD. 16. The method of claim 15, wherein asserting the reset pin occurs in response to the device determining that the write data contains the at least one of a) the virus code, or b) the malicious signature. 17. The method of claim 14, wherein the device is configured to perform health monitoring of the at least one SSD. 18. The method of claim 14, wherein the device is configured to provide operational status information of the at least one SSD. 19. The method of claim 12, wherein responsive to the device determining that the write data contains the at least one of a) the virus code, or b) the malicious signature: logging, by the device, detection of the at least one of a) the virus code, or b) the malicious signature; and notifying, by the device, a storage administrator of the detection of the at least one of a) the virus code, or b) the malicious signature. 20. The method of claim 12, wherein the write data is contained in a plurality of Ethernet packets, the method further comprising detecting, by the device, any malicious signature located on a boundary of adjacent Ethernet packets from among the plurality of Ethernet packets.
2,900
340,196
29,725,352
2,916
A system and a method to detect malicious software written to an Ethernet solid-state drive (eSSD). The system includes an Ethernet switch, at least one SSD, and a baseboard management controller (BMC). The Ethernet switch receives write data from a communication network in response to a write command. The at least one SSD receives the write data from the Ethernet switch and stores the received write data. The BMC receives from the at least one SSD the received write data. The BMC determines whether the received write data contains malicious software. The received write data may be contained in a plurality of Ethernet packets in which case the BMC stores the received write data in a scan buffer in an order that is based on an assembled order of the received write data.
1. A system, comprising: an Ethernet switch to receive write data from a communication network in response to a write command; and a device to receive the write data in a buffer in an order that is based on an assembled order of the write data, wherein the device is configured to scan the write data using the buffer to determine whether the write data contains at least one of a) a virus code, or b) a malicious signature. 2. The system of claim 1, wherein: the device is configured to periodically update a database of virus signature scans; and the device is configured to scan the write data based at least on the database of virus signature scans. 3. The system of claim 1, further comprising at least one solid-state drive (SSD) coupled to the Ethernet switch and to the device, the at least one SSD to receive the write data and store the write data. 4. The system of claim 3, wherein: the at least one SSD includes a reset pin; and in response to the device determining that the write data contains the at least one of a) the virus code, or b) the malicious signature, the device is configured to assert the reset pin of the at least one SSD until the at least one SSD is at least one of a) removed from the system or b) power is removed from the at least one SSD. 5. The system of claim 3, wherein the at least one SSD is coupled to the device through at least one of a) a Peripheral Component Interface Express (PCIe) based communication link or b) a system management bus. 6. The system of claim 3, wherein the device is configured to perform health monitoring of the at least one SSD. 7. The system of claim 3, wherein the device is configured to provide operational status information of the at least one SSD. 8. The system of claim 1, wherein: in response to the device determining that the write data contains the at least one of a) the virus code, or b) the malicious signature, the device is configured to: log detection of the at least one of a) the virus code, or b) the malicious signature; and notify a storage administrator of the detection of the at least one of a) the virus code, or b) the malicious signature. 9. The system of claim 1, wherein the virus code comprises a software virus. 10. The system of claim 1, wherein: the write data is contained in a plurality of Ethernet packets; and the device is configured to detect any malicious signature located on a boundary of adjacent Ethernet packets from among the plurality of Ethernet packets. 11. The system of claim 1, wherein the SSD comprises an Ethernet SSD (eSSD). 12. A method to detect malicious software, the method comprising: receiving, by an Ethernet switch, write data from a communication network in response to a write command; receiving, by a device, the write data in a buffer in an order that is based on an assembled order of the write data; scanning, by the device, the write data using the buffer; and determining, by the device, whether the write data contains at least one of a) a virus code, or b) a malicious signature. 13. The method of claim 12, further comprising: periodically updating, by the device, a database of virus signature scans; and scanning, by the device, the write data based at least on the database of virus signature scans. 14. The method of claim 12, further comprising: receiving, by at least one solid-state drive (SSD), the write data; and storing, by the at least one SSD, the write data. 15. The method of claim 14, wherein the at least one SSD includes a reset pin, the method further comprising asserting, by the device, the reset pin of the at least one SSD until the at least one SSD is at least one of a) removed from the system or b) power is removed from the at least one SSD. 16. The method of claim 15, wherein asserting the reset pin occurs in response to the device determining that the write data contains the at least one of a) the virus code, or b) the malicious signature. 17. The method of claim 14, wherein the device is configured to perform health monitoring of the at least one SSD. 18. The method of claim 14, wherein the device is configured to provide operational status information of the at least one SSD. 19. The method of claim 12, wherein responsive to the device determining that the write data contains the at least one of a) the virus code, or b) the malicious signature: logging, by the device, detection of the at least one of a) the virus code, or b) the malicious signature; and notifying, by the device, a storage administrator of the detection of the at least one of a) the virus code, or b) the malicious signature. 20. The method of claim 12, wherein the write data is contained in a plurality of Ethernet packets, the method further comprising detecting, by the device, any malicious signature located on a boundary of adjacent Ethernet packets from among the plurality of Ethernet packets.
A system and a method to detect malicious software written to an Ethernet solid-state drive (eSSD). The system includes an Ethernet switch, at least one SSD, and a baseboard management controller (BMC). The Ethernet switch receives write data from a communication network in response to a write command. The at least one SSD receives the write data from the Ethernet switch and stores the received write data. The BMC receives from the at least one SSD the received write data. The BMC determines whether the received write data contains malicious software. The received write data may be contained in a plurality of Ethernet packets in which case the BMC stores the received write data in a scan buffer in an order that is based on an assembled order of the received write data.1. A system, comprising: an Ethernet switch to receive write data from a communication network in response to a write command; and a device to receive the write data in a buffer in an order that is based on an assembled order of the write data, wherein the device is configured to scan the write data using the buffer to determine whether the write data contains at least one of a) a virus code, or b) a malicious signature. 2. The system of claim 1, wherein: the device is configured to periodically update a database of virus signature scans; and the device is configured to scan the write data based at least on the database of virus signature scans. 3. The system of claim 1, further comprising at least one solid-state drive (SSD) coupled to the Ethernet switch and to the device, the at least one SSD to receive the write data and store the write data. 4. The system of claim 3, wherein: the at least one SSD includes a reset pin; and in response to the device determining that the write data contains the at least one of a) the virus code, or b) the malicious signature, the device is configured to assert the reset pin of the at least one SSD until the at least one SSD is at least one of a) removed from the system or b) power is removed from the at least one SSD. 5. The system of claim 3, wherein the at least one SSD is coupled to the device through at least one of a) a Peripheral Component Interface Express (PCIe) based communication link or b) a system management bus. 6. The system of claim 3, wherein the device is configured to perform health monitoring of the at least one SSD. 7. The system of claim 3, wherein the device is configured to provide operational status information of the at least one SSD. 8. The system of claim 1, wherein: in response to the device determining that the write data contains the at least one of a) the virus code, or b) the malicious signature, the device is configured to: log detection of the at least one of a) the virus code, or b) the malicious signature; and notify a storage administrator of the detection of the at least one of a) the virus code, or b) the malicious signature. 9. The system of claim 1, wherein the virus code comprises a software virus. 10. The system of claim 1, wherein: the write data is contained in a plurality of Ethernet packets; and the device is configured to detect any malicious signature located on a boundary of adjacent Ethernet packets from among the plurality of Ethernet packets. 11. The system of claim 1, wherein the SSD comprises an Ethernet SSD (eSSD). 12. A method to detect malicious software, the method comprising: receiving, by an Ethernet switch, write data from a communication network in response to a write command; receiving, by a device, the write data in a buffer in an order that is based on an assembled order of the write data; scanning, by the device, the write data using the buffer; and determining, by the device, whether the write data contains at least one of a) a virus code, or b) a malicious signature. 13. The method of claim 12, further comprising: periodically updating, by the device, a database of virus signature scans; and scanning, by the device, the write data based at least on the database of virus signature scans. 14. The method of claim 12, further comprising: receiving, by at least one solid-state drive (SSD), the write data; and storing, by the at least one SSD, the write data. 15. The method of claim 14, wherein the at least one SSD includes a reset pin, the method further comprising asserting, by the device, the reset pin of the at least one SSD until the at least one SSD is at least one of a) removed from the system or b) power is removed from the at least one SSD. 16. The method of claim 15, wherein asserting the reset pin occurs in response to the device determining that the write data contains the at least one of a) the virus code, or b) the malicious signature. 17. The method of claim 14, wherein the device is configured to perform health monitoring of the at least one SSD. 18. The method of claim 14, wherein the device is configured to provide operational status information of the at least one SSD. 19. The method of claim 12, wherein responsive to the device determining that the write data contains the at least one of a) the virus code, or b) the malicious signature: logging, by the device, detection of the at least one of a) the virus code, or b) the malicious signature; and notifying, by the device, a storage administrator of the detection of the at least one of a) the virus code, or b) the malicious signature. 20. The method of claim 12, wherein the write data is contained in a plurality of Ethernet packets, the method further comprising detecting, by the device, any malicious signature located on a boundary of adjacent Ethernet packets from among the plurality of Ethernet packets.
2,900
340,197
16,801,142
2,851
A resilient system implementation in a network-on-ship with at least one functional logic unit and at least one duplicated logic unit. A resilient system and method, in accordance with the invention, are disclosed for detecting a fault or an uncorrectable error and isolating the fault. Isolation of the fault prevents further propagation of the fault throughout the system. The resilient system includes isolation logic or an isolation unit that isolates the fault.
1. An isolation unit in communication with an interconnect, the isolation unit prevents propagation of an uncorrectable error through a system, the isolation unit comprising: a state machine; a gate unit in communication with the state machine; a delay unit in communication with the state machine, wherein the delay unit introduces a delay in the communication path; and a multiplexer unit in communication with the state machine, wherein the state machine receives a fault signal indicating a fault has occurred and the isolation unit prevents the fault from propagating and generates a replacement packet as an output. 2. The isolation unit of claim 1 further comprising a buffer in communication with the state machine, wherein the buffer stores packets. 3. The isolation unit of claim 2, wherein the buffer stores packets when the isolation unit receives the fault signal. 4. The isolation unit of claim 1, wherein the state machine is a FLIT state machine. 5. The isolation unit of claim 1, wherein the fault signal indicates that the uncorrectable error originated outside of a network-on-chip (NoC). 6. The isolation unit of claim 1, wherein the fault signal indicates that the uncorrectable error originated inside the NoC. 7. The isolation unit of claim 1, wherein the isolation unit generates and sends a reset enable signal. 8. The isolation unit of claim 1, wherein the state machine sends a control signal to the gate unit to prevent packets from passing through the isolation unit. 9. The isolation unit of claim 1, wherein the isolation unit ends isolation mode to allow data propagation per normal mode of operation.
A resilient system implementation in a network-on-ship with at least one functional logic unit and at least one duplicated logic unit. A resilient system and method, in accordance with the invention, are disclosed for detecting a fault or an uncorrectable error and isolating the fault. Isolation of the fault prevents further propagation of the fault throughout the system. The resilient system includes isolation logic or an isolation unit that isolates the fault.1. An isolation unit in communication with an interconnect, the isolation unit prevents propagation of an uncorrectable error through a system, the isolation unit comprising: a state machine; a gate unit in communication with the state machine; a delay unit in communication with the state machine, wherein the delay unit introduces a delay in the communication path; and a multiplexer unit in communication with the state machine, wherein the state machine receives a fault signal indicating a fault has occurred and the isolation unit prevents the fault from propagating and generates a replacement packet as an output. 2. The isolation unit of claim 1 further comprising a buffer in communication with the state machine, wherein the buffer stores packets. 3. The isolation unit of claim 2, wherein the buffer stores packets when the isolation unit receives the fault signal. 4. The isolation unit of claim 1, wherein the state machine is a FLIT state machine. 5. The isolation unit of claim 1, wherein the fault signal indicates that the uncorrectable error originated outside of a network-on-chip (NoC). 6. The isolation unit of claim 1, wherein the fault signal indicates that the uncorrectable error originated inside the NoC. 7. The isolation unit of claim 1, wherein the isolation unit generates and sends a reset enable signal. 8. The isolation unit of claim 1, wherein the state machine sends a control signal to the gate unit to prevent packets from passing through the isolation unit. 9. The isolation unit of claim 1, wherein the isolation unit ends isolation mode to allow data propagation per normal mode of operation.
2,800
340,198
29,725,376
2,913
A resilient system implementation in a network-on-ship with at least one functional logic unit and at least one duplicated logic unit. A resilient system and method, in accordance with the invention, are disclosed for detecting a fault or an uncorrectable error and isolating the fault. Isolation of the fault prevents further propagation of the fault throughout the system. The resilient system includes isolation logic or an isolation unit that isolates the fault.
1. An isolation unit in communication with an interconnect, the isolation unit prevents propagation of an uncorrectable error through a system, the isolation unit comprising: a state machine; a gate unit in communication with the state machine; a delay unit in communication with the state machine, wherein the delay unit introduces a delay in the communication path; and a multiplexer unit in communication with the state machine, wherein the state machine receives a fault signal indicating a fault has occurred and the isolation unit prevents the fault from propagating and generates a replacement packet as an output. 2. The isolation unit of claim 1 further comprising a buffer in communication with the state machine, wherein the buffer stores packets. 3. The isolation unit of claim 2, wherein the buffer stores packets when the isolation unit receives the fault signal. 4. The isolation unit of claim 1, wherein the state machine is a FLIT state machine. 5. The isolation unit of claim 1, wherein the fault signal indicates that the uncorrectable error originated outside of a network-on-chip (NoC). 6. The isolation unit of claim 1, wherein the fault signal indicates that the uncorrectable error originated inside the NoC. 7. The isolation unit of claim 1, wherein the isolation unit generates and sends a reset enable signal. 8. The isolation unit of claim 1, wherein the state machine sends a control signal to the gate unit to prevent packets from passing through the isolation unit. 9. The isolation unit of claim 1, wherein the isolation unit ends isolation mode to allow data propagation per normal mode of operation.
A resilient system implementation in a network-on-ship with at least one functional logic unit and at least one duplicated logic unit. A resilient system and method, in accordance with the invention, are disclosed for detecting a fault or an uncorrectable error and isolating the fault. Isolation of the fault prevents further propagation of the fault throughout the system. The resilient system includes isolation logic or an isolation unit that isolates the fault.1. An isolation unit in communication with an interconnect, the isolation unit prevents propagation of an uncorrectable error through a system, the isolation unit comprising: a state machine; a gate unit in communication with the state machine; a delay unit in communication with the state machine, wherein the delay unit introduces a delay in the communication path; and a multiplexer unit in communication with the state machine, wherein the state machine receives a fault signal indicating a fault has occurred and the isolation unit prevents the fault from propagating and generates a replacement packet as an output. 2. The isolation unit of claim 1 further comprising a buffer in communication with the state machine, wherein the buffer stores packets. 3. The isolation unit of claim 2, wherein the buffer stores packets when the isolation unit receives the fault signal. 4. The isolation unit of claim 1, wherein the state machine is a FLIT state machine. 5. The isolation unit of claim 1, wherein the fault signal indicates that the uncorrectable error originated outside of a network-on-chip (NoC). 6. The isolation unit of claim 1, wherein the fault signal indicates that the uncorrectable error originated inside the NoC. 7. The isolation unit of claim 1, wherein the isolation unit generates and sends a reset enable signal. 8. The isolation unit of claim 1, wherein the state machine sends a control signal to the gate unit to prevent packets from passing through the isolation unit. 9. The isolation unit of claim 1, wherein the isolation unit ends isolation mode to allow data propagation per normal mode of operation.
2,900
340,199
29,725,389
2,913
A resilient system implementation in a network-on-ship with at least one functional logic unit and at least one duplicated logic unit. A resilient system and method, in accordance with the invention, are disclosed for detecting a fault or an uncorrectable error and isolating the fault. Isolation of the fault prevents further propagation of the fault throughout the system. The resilient system includes isolation logic or an isolation unit that isolates the fault.
1. An isolation unit in communication with an interconnect, the isolation unit prevents propagation of an uncorrectable error through a system, the isolation unit comprising: a state machine; a gate unit in communication with the state machine; a delay unit in communication with the state machine, wherein the delay unit introduces a delay in the communication path; and a multiplexer unit in communication with the state machine, wherein the state machine receives a fault signal indicating a fault has occurred and the isolation unit prevents the fault from propagating and generates a replacement packet as an output. 2. The isolation unit of claim 1 further comprising a buffer in communication with the state machine, wherein the buffer stores packets. 3. The isolation unit of claim 2, wherein the buffer stores packets when the isolation unit receives the fault signal. 4. The isolation unit of claim 1, wherein the state machine is a FLIT state machine. 5. The isolation unit of claim 1, wherein the fault signal indicates that the uncorrectable error originated outside of a network-on-chip (NoC). 6. The isolation unit of claim 1, wherein the fault signal indicates that the uncorrectable error originated inside the NoC. 7. The isolation unit of claim 1, wherein the isolation unit generates and sends a reset enable signal. 8. The isolation unit of claim 1, wherein the state machine sends a control signal to the gate unit to prevent packets from passing through the isolation unit. 9. The isolation unit of claim 1, wherein the isolation unit ends isolation mode to allow data propagation per normal mode of operation.
A resilient system implementation in a network-on-ship with at least one functional logic unit and at least one duplicated logic unit. A resilient system and method, in accordance with the invention, are disclosed for detecting a fault or an uncorrectable error and isolating the fault. Isolation of the fault prevents further propagation of the fault throughout the system. The resilient system includes isolation logic or an isolation unit that isolates the fault.1. An isolation unit in communication with an interconnect, the isolation unit prevents propagation of an uncorrectable error through a system, the isolation unit comprising: a state machine; a gate unit in communication with the state machine; a delay unit in communication with the state machine, wherein the delay unit introduces a delay in the communication path; and a multiplexer unit in communication with the state machine, wherein the state machine receives a fault signal indicating a fault has occurred and the isolation unit prevents the fault from propagating and generates a replacement packet as an output. 2. The isolation unit of claim 1 further comprising a buffer in communication with the state machine, wherein the buffer stores packets. 3. The isolation unit of claim 2, wherein the buffer stores packets when the isolation unit receives the fault signal. 4. The isolation unit of claim 1, wherein the state machine is a FLIT state machine. 5. The isolation unit of claim 1, wherein the fault signal indicates that the uncorrectable error originated outside of a network-on-chip (NoC). 6. The isolation unit of claim 1, wherein the fault signal indicates that the uncorrectable error originated inside the NoC. 7. The isolation unit of claim 1, wherein the isolation unit generates and sends a reset enable signal. 8. The isolation unit of claim 1, wherein the state machine sends a control signal to the gate unit to prevent packets from passing through the isolation unit. 9. The isolation unit of claim 1, wherein the isolation unit ends isolation mode to allow data propagation per normal mode of operation.
2,900