1
Vincent Le Chevalier
Vincent Le Chevalier, Ohad Eder Pressman, Shannyn Timrott, Charles F Geiger: Social sharing of multilayered document. Chegg, Fenwick & West, August 11, 2015: US09104892

A method for sharing multilayered electronic content among users of a social network within a digital education platform is provided. In one embodiment, the digital education platform allows a user to create user-generated content associated with a multilayered document and share the content with ot ...


2
Wendy A Kerr, Thomas W Lytle IV, Mark D Overmyer, Brett E Swensgard, Richard L Leimbach, Kevin D Sackett: Articulatable surgical instrument comprising a firing drive. Ethicon Endo Surgery, August 11, 2015: US09101358 (130 worldwide citation)

A surgical instrument can comprise a handle, a shaft extending from the handle, and an end effector rotatably coupled to the shaft by an articulation joint. The surgical instrument can further include a staple cartridge positioned within the end effector and a firing drive operably coupled with a tr ...


3
Frederick E Shelton IV, Jerome R Morgan, Chester O Baxter III: Electrode connections for rotary driven surgical tools. Ethicon Endo Surgery, August 11, 2015: US09101385 (101 worldwide citation)

A surgical tool can comprise an end effector, a shaft assembly, a rotatable drive shaft, a first electrical contact and a second electrical contact. The end effector comprises first and second jaw members that are pivotable relative to one another from an open position to a closed position and an el ...


4
Madhukar Kshirsagar, Ajay Joshi: Methods, systems and computer program products for authenticating computer processing devices and transferring both encrypted and unencrypted data therebetween. AT&T Intellectual Property I, Hanley Flight & Zimmerman, August 11, 2015: US09106617 (57 worldwide citation)

Methods for transferring a set of data from a first processing device to a second processing device are provided. Pursuant to these methods a secure shell (“SSH”) authentication is performed to authenticate a first user that is logged onto the first processing device to a second user that is logged ...


5
Mohamod Ali, Rashed H Bhuiyan, Rogor Dougal, Md Nazmul Alam: Non-intrusive cable fault detection and methods. University of South Carolina, Dority & Manning P A, August 11, 2015: US09103864 (55 worldwide citation)

In accordance with certain embodiments of the present disclosure, a cable fault detection device is described. The device includes a conformal monopole structure and a ground plane structure. The ground plane structure is configured to be generally parallel to the cable longitudinal axis.


6
Ashar Aziz, Henry Uyeno, Jay Manni, Muhammad Amin, Stuart Staniford: Electronic message analysis for malware detection. FireEye, Rutan & Tucker, William W Schaal, August 11, 2015: US09106694 (55 worldwide citation)

An electronic message is analyzed for malware contained in the message. Text of an electronic message may be analyzed to detect and process malware content in the electronic message itself. The present technology may analyze an electronic message and attachments to electronic messages to detect a un ...


7
Emmanuel Thioux, Muhammad Amin, Darien Kindlund, Alex Pilipenko, Michael Vincent: Malicious content analysis using simulated user interaction without user involvement. FireEye, Rutan & Tucker, William W Schaal, August 11, 2015: US09104867 (52 worldwide citation)

Techniques for detecting malicious content using simulated user interactions are described herein. In one embodiment, a monitoring module monitors activities of a malicious content suspect executed within a sandboxed operating environment. In response to detection of a predetermined event triggered ...


8
Valery G Telfort, Ammar Al Ali, Robert A Smith, Joel Fechter, Shaun Fetherson: Pulse oximetry system with low noise cable hub. Masimo Corporation, Knobbe Martens Olson & Bear, August 11, 2015: US09106038 (35 worldwide citation)

A pulse oximetry system for reducing the risk of electric shock to a medical patient can include physiological sensors, at least one of which has a light emitter that can impinge light on body tissue of a living patient and a detector responsive to the light after attenuation by the body tissue. The ...


9
David R Richardson, John Cormie, Colm MacCarthaigh, Benjamin W S Redman: Request routing management based on network components. Amazon Technologies, Knobbe Martens Olson & Bear, August 11, 2015: US09106701 (34 worldwide citation)

Systems and methods for managing requesting routing functionality associated with resource requests for one or more resources associated with a content provider are provided. A content delivery network (“CDN”) service provider, on behalf of a content provider, can process domain name service (“DNS”) ...


10
Lyle W Paczkowski, William M Parsel, Carl J Persson, Matthew C Schlesener: Trusted security zone watermark. Sprint Communications Company, August 11, 2015: US09104840 (30 worldwide citation)

Embodiments relate generally to methods and systems for creating and using a watermark for verification of operation in a trusted security zone of a mobile device. The watermark may be created or chosen by a user and may be unique to the user. The watermark may be stored in a trusted security zone o ...



Click the thumbnails below to visualize the patent trend.