Datasets:
image
imagewidth (px) 3.51k
3.51k
| image_name
stringlengths 17
21
| pub_number
stringlengths 11
11
| title
stringlengths 4
342
| figs_norm
sequencelengths 1
10
| short_description
sequencelengths 1
8
| long_description
sequencelengths 1
16
| short_description_token_count
int64 10
216
| long_description_token_count
int64 40
2.28k
| draft_class
stringclasses 566
values | cpc_class
stringclasses 9
values | relevant_terms
listlengths 0
903
| associated_claims
stringlengths 78
25.7k
| compound
bool 2
classes | references
sequencelengths 0
321
|
---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
EP_3500042_B1 (1).png | EP3500042B1 | SYSTEM AND METHOD FOR IMPROVING TRANSMISSION IN WIRELESS NETWORKS | [
"FIG2"
] | [
"FIG2 illustrates a system according to an embodiment of the invention"
] | [
"FIG2 illustrates a system 200 according to an embodiment of the disclosure. The system 200 includes a first network 202 and a second network 206. The first network 202 includes one or more first network devices 204, and the second network includes one or more second network devices 208. In FIG2, the boundary of the first network 202 is shown to intersect the boundary of the second network 206 to form a Venn diagram representing channels available to each network. That is, first network devices 204 may have first network channels 212 not available to second network devices 208, second network devices 208 may have second network channels 214 not available to first network devices 204, and both first network devices 204 and second network devices 208 may have overlapping network channels 210 available to both types of network devices. Both types of network devices may use the overlapping network channels 210 for communication. The overlapping network channels 210 may indicate an overlap in communication frequency or frequency bands for both the first network 202 and the second network 206. According to an embodiment of the disclosure, the first network 202 may be an LTE network with first network devices 204 including base stations, transmitters, Evolved Node B (eNodeB or eNB), terminals, mobile phones, any LTE based transmitter, and so on, and the second network 206 may be a Wi-Fi network with Wi-Fi devices or a Zigbee or Bluetooth network with wireless devices operating in an unlicensed 2.4 GHz band. Base stations in the first network 202 may be configured to perform base station to device or terminal communications with terminals or devices in either of the first network 202 or the second network 206. Terminals in the first network 202 may be configured to perform device-to-device communications in either of the first network 202 or the second network 206."
] | 11 | 343 | null | H | [
{
"element_identifier": "210",
"terms": [
"overlapping network channels"
]
},
{
"element_identifier": "214",
"terms": [
"have second network channels"
]
},
{
"element_identifier": "202",
"terms": [
"first network"
]
},
{
"element_identifier": "206",
"terms": [
"second network"
]
},
{
"element_identifier": "204",
"terms": [
"first network device",
"first network devices"
]
},
{
"element_identifier": "200",
"terms": [
"system"
]
},
{
"element_identifier": "212",
"terms": [
"have first network channels"
]
}
] | ['9. The method according to any of claims 1 to 8, wherein the threshold is determined based on evaluating min ( T LBT (1 - λ ), π ( ρ ) T LBT ), wherein T LBT is the fixed duration of time, λ is a load of the first network transmitter, and π ( ρ ) is a fraction of transmission opportunities on the channel.', '14. A system for operating a plurality of wireless networks, comprising: at least a first wireless transmitter operable in at least a first wireless network which has overlapping frequency bands with a second wireless network, the first wireless transmitter being configured to: monitor activity in the overlapping frequency bands; determine whether a channel in the overlapping frequency bands is idle for a predefined time period; based on the channel being idle for the predefined time period, determine that the first wireless transmitter has a transmission opportunity on the channel; measure an amount of time until a next frame boundary on the channel; based on the amount of time until the next frame boundary being below a threshold, reserve the channel for a fixed duration of time and transmit data at the next frame boundary; and based on the amount of time until the next frame boundary being above the threshold, skip the transmission opportunity on the channel and wait for a next transmission opportunity.'] | false | [
"200",
"202",
"204",
"212",
"210",
"204",
"206",
"208",
"208",
"204",
"204",
"208",
"208",
"208",
"214",
"21"
] |
|
EP_3500042_B1 (2).png | EP3500042B1 | SYSTEM AND METHOD FOR IMPROVING TRANSMISSION IN WIRELESS NETWORKS | [
"FIG3"
] | [
"FIG3 is a flow diagram for data transmission according to an embodiment of the invention"
] | [
"FIG3 is a flow diagram 300 for data transmission according to an embodiment of the disclosure. At step 302, the first network device 204 monitors activity in the overlapping frequency bands, for example, in one channel of the overlapping network channels 210. At step 304, the first network device 204 determines whether the channel in the overlapping network channels 210 is idle for a predefined time period as discussed above with respect to several time periods, for example, LIFS, DIFS, AIFS, etc."
] | 15 | 94 | flow diagram | H | [
{
"element_identifier": "802",
"terms": [
"IEEE"
]
},
{
"element_identifier": "8",
"terms": [
"andFIG."
]
},
{
"element_identifier": "301",
"terms": [
"ETSI's EN"
]
},
{
"element_identifier": "18",
"terms": [
"clause"
]
},
{
"element_identifier": "4",
"terms": [
"busy channel within",
"ρ that makes",
"Rearranging terms in"
]
},
{
"element_identifier": "34",
"terms": [
"DIFS/AIFS"
]
},
{
"element_identifier": "20",
"terms": [
"CCA minimum time"
]
},
{
"element_identifier": "0",
"terms": [
"between"
]
},
{
"element_identifier": "200",
"terms": [
"system"
]
},
{
"element_identifier": "202",
"terms": [
"first network"
]
},
{
"element_identifier": "206",
"terms": [
"second network"
]
},
{
"element_identifier": "204",
"terms": [
"first network device",
"first network devices"
]
},
{
"element_identifier": "212",
"terms": [
"have first network channels"
]
},
{
"element_identifier": "214",
"terms": [
"have second network channels"
]
},
{
"element_identifier": "210",
"terms": [
"overlapping network channels"
]
},
{
"element_identifier": "2",
"terms": [
"unlicensed",
"orthogonal LBT transmissions. Using",
"airtime ALBT given in",
"follows. With Lemma"
]
},
{
"element_identifier": "300",
"terms": [
"flow diagram"
]
},
{
"element_identifier": "302",
"terms": [
"disclosure. At step"
]
},
{
"element_identifier": "304",
"terms": [
"At step"
]
},
{
"element_identifier": "306",
"terms": [
"etc. At step"
]
},
{
"element_identifier": "308",
"terms": [
"channel. At step"
]
},
{
"element_identifier": "310",
"terms": [
"At step"
]
},
{
"element_identifier": "312",
"terms": [
"threshold. At step"
]
},
{
"element_identifier": "314",
"terms": [
"frame boundary. At step"
]
},
{
"element_identifier": "3",
"terms": [
"provided ρ in"
]
},
{
"element_identifier": "7",
"terms": [
"where in",
"if"
]
},
{
"element_identifier": "5",
"terms": [
"with"
]
},
{
"element_identifier": "9",
"terms": [
"numerator in"
]
},
{
"element_identifier": "15",
"terms": [
"between"
]
},
{
"element_identifier": "10",
"terms": [
"subsequently aggregating"
]
},
{
"element_identifier": "1500",
"terms": [
"different Wi-Fi burst sizes"
]
},
{
"element_identifier": "16",
"terms": [
"namely"
]
},
{
"element_identifier": "6",
"terms": [
"level"
]
}
] | ['8. The method according to any of claims 1 to 7, wherein the threshold is determined based on an activity level in the overlapping frequency bands.', '9. The method according to any of claims 1 to 8, wherein the threshold is determined based on evaluating min ( T LBT (1 - λ ), π ( ρ ) T LBT ), wherein T LBT is the fixed duration of time, λ is a load of the first network transmitter, and π ( ρ ) is a fraction of transmission opportunities on the channel.', '10. The method according to any of claims 1 to 9, wherein the first wireless network is a Long-Term Evolution, LTE, network and the overlapping frequency bands comprises unlicensed National Information Infrastructure, NII, channels.', '14. A system for operating a plurality of wireless networks, comprising: at least a first wireless transmitter operable in at least a first wireless network which has overlapping frequency bands with a second wireless network, the first wireless transmitter being configured to: monitor activity in the overlapping frequency bands; determine whether a channel in the overlapping frequency bands is idle for a predefined time period; based on the channel being idle for the predefined time period, determine that the first wireless transmitter has a transmission opportunity on the channel; measure an amount of time until a next frame boundary on the channel; based on the amount of time until the next frame boundary being below a threshold, reserve the channel for a fixed duration of time and transmit data at the next frame boundary; and based on the amount of time until the next frame boundary being above the threshold, skip the transmission opportunity on the channel and wait for a next transmission opportunity.'] | false | [
"300",
"302",
"304",
"306",
"308",
"310",
"314",
"312",
"22"
] |
|
EP_3500042_B1 (6).png | EP3500042B1 | SYSTEM AND METHOD FOR IMPROVING TRANSMISSION IN WIRELESS NETWORKS | [
"FIG7"
] | [
"FIG7 shows exemplary simulation results according to an embodiment of the invention"
] | [
"The obtained results are plotted in FIG7. FIG7 shows individual throughput gain with respect to legacy Wi-Fi when an LBT WN shares the medium with 5 background Wi-Fi WNs, whose offered load increases. It can be seen that 3GPP LAA negatively impacts on Wi-Fi even when lightly loaded. This is more obvious when the frame duration is long (10ms). When the TLBT = 1ms, 3GPP LAA leaves Wi-Fi unaffected but exhibits decreasing performance up to the point where the relative load is precisely 50% (observe the LBT minimum), following which the LBT gain grows at the expense of Wi-Fi. ORLA and OLAA policies do not affect non-saturated Wi-Fi WNs. ORLA provides steady throughput gains above 100% up to the point where the WLAN saturates, and OLAA's performance grows with Wi-Fi activity level, again exceeding 100% improvements."
] | 12 | 172 | null | H | [
{
"element_identifier": "300",
"terms": [
"flow diagram"
]
},
{
"element_identifier": "7",
"terms": [
"where in",
"if"
]
},
{
"element_identifier": "200",
"terms": [
"system"
]
}
] | ['14. A system for operating a plurality of wireless networks, comprising: at least a first wireless transmitter operable in at least a first wireless network which has overlapping frequency bands with a second wireless network, the first wireless transmitter being configured to: monitor activity in the overlapping frequency bands; determine whether a channel in the overlapping frequency bands is idle for a predefined time period; based on the channel being idle for the predefined time period, determine that the first wireless transmitter has a transmission opportunity on the channel; measure an amount of time until a next frame boundary on the channel; based on the amount of time until the next frame boundary being below a threshold, reserve the channel for a fixed duration of time and transmit data at the next frame boundary; and based on the amount of time until the next frame boundary being above the threshold, skip the transmission opportunity on the channel and wait for a next transmission opportunity.'] | false | [
"400",
"300",
"200",
"600",
"200",
"150",
"100",
"50",
"600",
"400",
"7",
"26"
] |
|
EP_3500065_B1 (3).png | EP3500065B1 | INDUCTION HEATING CELLS COMPRISING TENSIONING MEMBERS WITH NON-MAGNETIC METAL CORES | [
"FIG4"
] | [
"FIG4 illustrates an example of arranging multiple tensioning members in a die, in accordance with some examples"
] | [
"In some examples, first tensioning member 130 is a part of first group 137 as, for example, schematically shown in FIG4. All tensioning members 130 of first group 137 are parallel to each other (e.g., extend in X direction). Furthermore, tensioning members 130 of first group 137 may be distributed throughout die in accordance with profile of forming surface 126."
] | 18 | 70 | schematic | B | [
{
"element_identifier": "137",
"terms": [
"first group"
]
},
{
"element_identifier": "126",
"terms": [
"forming surface"
]
},
{
"element_identifier": "120",
"terms": [
"die"
]
},
{
"element_identifier": "130",
"terms": [
"tensioning member",
"tensioning members"
]
}
] | ['1. An induction heating cell (100) comprising: a die (120), wherein the die comprises a first side (122) and a second side (124), the die further comprising a forming surface (126); an induction heater (140), wherein at least a portion of the induction heater is disposed adjacent to the forming surface of the die, the induction heater being configured to generate heat using a magnetic field; and a first tensioning member (130), wherein: the first tensioning member extends through the die between and past the first side and the second side of the die and along a first direction (102), the first tensioning member comprises multiple strands (132), each of the multiple strands comprises a non-magnetic metal core (134), a largest cross-sectional dimension of the non-magnetic metal core is less than an induction heating threshold for the magnetic field, and each of the multiple strands is electrically insulated from any other one of the multiple strands.', '10. The induction heating cell according to any of claims 1-9, wherein the first tensioning member is a part of a first group (137) of tensioning members, and wherein the first tensioning members of the first group of tensioning members are parallel to each other.'] | false | [
"126",
"120",
"16",
"120",
"130",
"130",
"130",
"137",
"4"
] |
|
EP_3500065_B1 (4).png | EP3500065B1 | INDUCTION HEATING CELLS COMPRISING TENSIONING MEMBERS WITH NON-MAGNETIC METAL CORES | [
"FIG5"
] | [
"FIG5 illustrates an example of arranging two sets of tensioning members in a die, in accordance with some examples"
] | [
"In some examples, induction heating cell 100 further comprises second tensioning member 160 extending through die 120 parallel to plane 104 as, for example, shown in FIG5. The direction, along which second tensioning member 160 extends, is referred to as a transverse direction or the Y-direction. The projection of first tensioning member 130 onto forming surface 126 of die 120 and projection of second tensioning member 160 onto forming surface 126 of die 120 are substantially perpendicular. The design of first tensioning member 130 is the same or different from the design of second tensioning member 160.",
"In some examples, induction heating cell 100 further comprises second tensioning member 160 as, for example, schematically shown in FIG5. For example, second tensioning member 160 extends through die parallel to plane 104. More specifically, the projection of first tensioning member 130 onto forming surface 126 of die 120 and the projection of second tensioning member 160 onto forming surface 126 of die 120 is substantially perpendicular."
] | 20 | 184 | schematic | B | [
{
"element_identifier": "17",
"terms": [
"supports INTERNATIONAL PAPER CO"
]
},
{
"element_identifier": "5",
"terms": [
"about",
"second side can be"
]
},
{
"element_identifier": "160",
"terms": [
"second tensioning member"
]
},
{
"element_identifier": "130",
"terms": [
"tensioning member",
"tensioning members"
]
},
{
"element_identifier": "104",
"terms": [
"plane"
]
},
{
"element_identifier": "120",
"terms": [
"die"
]
}
] | ['1. An induction heating cell (100) comprising: a die (120), wherein the die comprises a first side (122) and a second side (124), the die further comprising a forming surface (126); an induction heater (140), wherein at least a portion of the induction heater is disposed adjacent to the forming surface of the die, the induction heater being configured to generate heat using a magnetic field; and a first tensioning member (130), wherein: the first tensioning member extends through the die between and past the first side and the second side of the die and along a first direction (102), the first tensioning member comprises multiple strands (132), each of the multiple strands comprises a non-magnetic metal core (134), a largest cross-sectional dimension of the non-magnetic metal core is less than an induction heating threshold for the magnetic field, and each of the multiple strands is electrically insulated from any other one of the multiple strands.', '9. The induction heating cell according to any of claims 1-8, wherein the non-magnetic metal core has a resistivity of at least about 2.6 × 10 -8 Ohm-meter.'] | false | [
"17",
"104",
"120",
"130",
"5",
"160"
] |
|
EP_3500065_B1 (6).png | EP3500065B1 | INDUCTION HEATING CELLS COMPRISING TENSIONING MEMBERS WITH NON-MAGNETIC METAL CORES | [
"FIG8"
] | [
"FIG8 illustrates a block diagram of an example of an aircraft, in accordance with some examples "
] | [
"As shown in FIG8, aircraft 902 produced by illustrative method 900 includes airframe 918 with plurality of systems 920, and interior 922. Examples of high-level systems 920 include one or more of propulsion system 924, electrical system 926, hydraulic system 928, and environmental system 930. Any number of other systems can be included. Although an aerospace example is shown, the principles of the examples disclosed herein may be applied to other industries, such as the automotive industry."
] | 17 | 90 | block diagram | B | [
{
"element_identifier": "926",
"terms": [
"electrical system"
]
},
{
"element_identifier": "900",
"terms": [
"method"
]
},
{
"element_identifier": "908",
"terms": [
"manufacturing"
]
},
{
"element_identifier": "904",
"terms": [
"design"
]
},
{
"element_identifier": "928",
"terms": [
"hydraulic system"
]
},
{
"element_identifier": "920",
"terms": [
"systems"
]
},
{
"element_identifier": "922",
"terms": [
"interior"
]
},
{
"element_identifier": "902",
"terms": [
"aircraft"
]
},
{
"element_identifier": "912",
"terms": [
"delivery"
]
},
{
"element_identifier": "930",
"terms": [
"environmental system"
]
},
{
"element_identifier": "906",
"terms": [
"material procurement"
]
},
{
"element_identifier": "914",
"terms": [
"be placed in service"
]
},
{
"element_identifier": "916",
"terms": [
"service"
]
}
] | ['14. A method of operating an induction heating cell of any of claims 1-13, the method comprising: a step of applying heat to a part (190) disposed inside the induction heating cell, wherein: the heat is applied by the induction heater using a magnetic field; and a step of applying pressure to the part disposed over a forming surface of the die, wherein the first tensioning member applies a compressive force to the die while applying the pressure to the part.'] | true | [
"900",
"7",
"904",
"906",
"908",
"912",
"914",
"916",
"920",
"1924",
"926",
"922",
"902",
"8",
"928",
"930",
"19"
] |
|
EP_3500146_B1.png | EP3500146B1 | VACUUM CLEANER NOZZLE HAVING ROTATABLE BRUSH | [
"FIG1",
" FIG3"
] | [
"FIG1 shows a first embodiment of a rotatable brush for use in a vacuum cleaner nozzle in accordance with the invention ",
"FIG3 shows an embodiment of a vacuum cleaner comprising a vacuum cleaner nozzle in accordance with the invention "
] | [
"A first embodiment of a rotatable brush for use in a vacuum cleaner nozzle in accordance with the invention is shown in FIG1. The rotation around an axis A is caused by a motor which is connected to the rotatable brush B by way of gears or pulley that drive a wheel W. The rotatable brush B has a transparent light conducting material in its core that acts as a light guide LG. Further, the core has radially placed holes or light guides in the core in order to guide the light from the core to the outer part of the rotatable brush roll where it can radiate to the ambience via a plurality of openings L. Further, one or more LEDs are positioned in the vacuum cleaner nozzle in such a place that the LED does not rotate but shines light in axial direction into the transparent core of the rotatable brush B. The LED is therefore positioned in a static part of the vacuum cleaner nozzle, and the LED is thus not vulnerable to high rotation speed or pollution of connection. Also, as the LED is in a static part, no expensive sliding contacts are needed to apply power to the LED. ",
"FIG3 shows an embodiment of a vacuum cleaner VC comprising a vacuum cleaner nozzle N having a rotatable brush B in accordance with the invention. The vacuum cleaner nozzle N has a transparent screen S through which a user can see the rotatable brush B. If the rotatable brush B rotates, the user will see the rotating lights from the rotatable brush B through the screen S. The vacuum cleaner nozzle N comprises a drive unit to make the rotatable brush B rotate. The drive unit may be formed by e.g. a motor or a turbo brush execution which uses the intake air to drive the rotatable brush B. As usual, the rotatable brush B may be suspended at both ends in the nozzle N. As usual, the vacuum cleaner VC has a dirt collection unit for collecting dirt. The vacuum cleaner VC may be a bagless vacuum cleaner that separates dirt from air by means of a cyclone, or a more classical vacuum cleaner having a bag to collect the dirt. While FIG3 shows a vacuum cleaner VC having a canister, the invention can alternatively be applied to a stick-formed vacuum cleaner or a robot vacuum cleaner or a handheld vacuum cleaner."
] | 39 | 428 | embodiment | A | [] | ['1. A vacuum cleaner nozzle (N) comprising: a rotatable brush (B) comprising a light distribution mechanism for distributing light from the rotatable brush (B); a transparent screen (S) through which a user can see the rotatable brush (B); and a drive unit for rotating the rotatable brush (B); characterized by a sensor for measuring a rotation speed of the rotatable brush (B), and a controller for controlling the light distributed from the rotatable brush (B) in dependence on the rotation speed of the rotatable brush (B).'] | true | [
"97",
"1",
"2",
"3"
] |
|
EP_3500158_B1 (2).png | EP3500158B1 | CATHETER WITH VARIABLE RADIUS LOOP AND METHOD OF MANUFACTURE | [
"FIG4"
] | [
"FIG4 is a transverse cross-section taken along line A-A in FIG1 "
] | [
"It is contemplated that the radius of curvature of the loop of distal region 16 may be adjustable, for example to conform to the varying sizes of pulmonary vein ostia of patients of different ages. This additional control may be provided, for example, via the use of an activation wire 26, shown in FIG4, that is adapted to alter the radius of curvature of the loop of distal region 16. One suitable material for activation wire 26 is stainless steel, though other materials can be employed without departing from the spirit and scope of the instant disclosure.",
"FIG4 also depicts a shaping wire 28. Shaping wire 28 extends through neck region 18 and at least partially through distal region 16 in order to help predispose distal region 16 into the loop shape depicted throughout the Figures. Shaping wire 28 can be made from a shape memory material such as nitinol."
] | 15 | 163 | transverse cross-sectional view | A | [
{
"element_identifier": "18",
"terms": [
"neck region"
]
},
{
"element_identifier": "28",
"terms": [
"wire"
]
},
{
"element_identifier": "30",
"terms": [
"constraint"
]
},
{
"element_identifier": "26",
"terms": [
"wire"
]
}
] | ['1. A catheter (10) comprising: a catheter body (12) having a proximal region (14), a neck region (18), and a distal region (16) predisposed into at least a partial loop disposed in a plane; a handle (22) joined to the proximal region and including an actuator (24); an activation wire (26) coupled to the actuator (24) and to the distal region (16) such that, when a user actuates the actuator (24), the activation wire (26) is activated to cause the at least a partial loop of the distal region (16) to vary in radius; a shape memory wire (28) extending through the neck region (18) and at least a portion of the distal region (16) and shaping the portion of the distal region (16) into the at least a partial loop; and a tube-shaped constraint (30) within the neck region (18) that prevents nodding of the neck region (18) when the activation wire (26) is activated, characterized in that the activation wire (26) and the shape memory wire (28) are constrained within the constraint (30).'] | false | [
"18",
"28",
"30",
"26",
"11"
] |
|
EP_3500171_B1 (2).png | EP3500171B1 | MODEL REGULARIZED MOTION COMPENSATED MEDICAL IMAGE RECONSTRUCTION | [
"FIG3",
" FIG4"
] | [
"FIG3 diagrammatically illustrates an embodiment of masked reconstructed motion phase image ",
"FIG4 illustrates an example in a frontal view and a side view of a visceral cavity model fitted in an image of a subject and the corresponding visceral cavity model in a separate view"
] | [
"With reference to FIG3, an embodiment of masked reconstructed motion phase image 300 is diagrammatically illustrated. The masked reconstructed motion phase image 300 is constructed from a reconstructed motion phase volumetric image 228. The masked reconstructed motion phase image 300 includes the segmented anatomical structure 220 according to a fitted anatomical model. For example, in a cardiac phase image at a selected phase, the image includes the heart with portions of the image external to the heart masked. The masked portions 310 of the image can include images values set to zero Hounsfield Units (HU), null values or the like. ",
"With reference to FIG4, an example in a front view 400 and a side view 410 of a visceral cavity model 420 fitted in an image cross section of a subject and the corresponding visceral model in a separate view 430 is illustrated. The visceral cavity model 420 includes a mesh surface model confining inner organs of a subject, such as.lungs, a liver, a heart, a colon, a stomach, a prostate, and the like, while excluding surrounding tissues of muscle, fat and bones, such as ribs, vertebrae, pelvic bone, hips, and the like. The visceral cavity model 420 fitted to the anatomy of the subject constrains or regularizes the motion by motion estimated according to the masked registrations, that is, limited to the volume of the fitted model or dilated fitted model."
] | 45 | 263 | embodiment, nan | A | [
{
"element_identifier": "310",
"terms": [
"masked portions"
]
},
{
"element_identifier": "420",
"terms": [
"visceral cavity model"
]
},
{
"element_identifier": "430",
"terms": [
"separate view"
]
},
{
"element_identifier": "220",
"terms": [
"anatomical structure"
]
},
{
"element_identifier": "400",
"terms": [
"front view"
]
},
{
"element_identifier": "300",
"terms": [
"reconstructed motion phase image"
]
},
{
"element_identifier": "320",
"terms": [
"margin"
]
},
{
"element_identifier": "410",
"terms": [
"side view"
]
}
] | ['1. A medical imaging system (200), comprising: a masking unit (234) configured to construct a mask for each reconstructed volumetric phase image of a plurality of reconstructed volumetric phase images that masks portions of a corresponding image external to an anatomical model fitted to a segmented at least one anatomical structure, wherein the plurality of reconstructed volumetric phase images include a target phase and a plurality of temporal neighboring phases reconstructed from projection data; an image registration unit (238) configured to register the masked reconstructed volumetric phase images; a motion estimator (240) configured to estimate motion between the target phase and the plurality of temporal neighboring phases according to the model based on the registered masked reconstructed volumetric phase images; and a motion compensating reconstructor (244) configured to reconstruct a motion compensated medical image from the projection data using the estimated motion of the registered masked reconstructed volumetric phase images.', '7. The system according to claim 6, wherein the visceral cavity model includes a surface that encloses inner organs of a subject and excludes bones and surrounding tissues.'] | true | [
"300",
"310",
"320",
"220",
"3",
"400",
"420",
"420",
"410",
"430",
"430",
"4",
"12"
] |
|
EP_3500171_B1 (3).png | EP3500171B1 | MODEL REGULARIZED MOTION COMPENSATED MEDICAL IMAGE RECONSTRUCTION | [
"FIG5"
] | [
"FIG5 flowcharts an embodiment of a method of model regularized motion compensated medical image reconstruction "
] | [
"With reference to FIG5, an embodiment of a method of model regularized motion compensated CT reconstruction is flowcharted. At 500, projection data 212 is received. The projection data 212 can be received directly from the CT scanner 210. The projection data 212 can be received from a storage subsystem, such as the PACS, RIS, EMS, and the like."
] | 15 | 68 | null | A | [
{
"element_identifier": "100",
"terms": [
"torso"
]
},
{
"element_identifier": "102",
"terms": [
"visceral cavity"
]
},
{
"element_identifier": "104",
"terms": [
"metal object"
]
},
{
"element_identifier": "106",
"terms": [
"streak artifacts"
]
},
{
"element_identifier": "2",
"terms": [
"two dimensional view ofFIGURE"
]
},
{
"element_identifier": "200",
"terms": [
"medical imaging system"
]
},
{
"element_identifier": "202",
"terms": [
"exploded cross section view"
]
},
{
"element_identifier": "204",
"terms": [
"subject"
]
},
{
"element_identifier": "206",
"terms": [
"metal objects"
]
},
{
"element_identifier": "208",
"terms": [
"ECG monitoring device"
]
},
{
"element_identifier": "210",
"terms": [
"CT scanner"
]
},
{
"element_identifier": "212",
"terms": [
"projection data"
]
},
{
"element_identifier": "214",
"terms": [
"source"
]
},
{
"element_identifier": "216",
"terms": [
"detectors"
]
},
{
"element_identifier": "220",
"terms": [
"anatomical structure"
]
},
{
"element_identifier": "222",
"terms": [
"temporal neighboring motion phases"
]
},
{
"element_identifier": "7",
"terms": [
"January"
]
},
{
"element_identifier": "226",
"terms": [
"phase reconstructor"
]
},
{
"element_identifier": "228",
"terms": [
"phase images"
]
},
{
"element_identifier": "230",
"terms": [
"segmenter"
]
},
{
"element_identifier": "232",
"terms": [
"model"
]
},
{
"element_identifier": "234",
"terms": [
"masking unit"
]
},
{
"element_identifier": "236",
"terms": [
"volumetric mask"
]
},
{
"element_identifier": "238",
"terms": [
"image registration unit"
]
},
{
"element_identifier": "8",
"terms": [
"U.S. Pat."
]
},
{
"element_identifier": "240",
"terms": [
"motion estimator"
]
},
{
"element_identifier": "242",
"terms": [
"vessel enhancing filter"
]
},
{
"element_identifier": "244",
"terms": [
"reconstructor"
]
},
{
"element_identifier": "256",
"terms": [
"display device"
]
},
{
"element_identifier": "250",
"terms": [
"processors"
]
},
{
"element_identifier": "252",
"terms": [
"computing device"
]
},
{
"element_identifier": "254",
"terms": [
"memory"
]
},
{
"element_identifier": "258",
"terms": [
"input devices"
]
},
{
"element_identifier": "300",
"terms": [
"reconstructed motion phase image"
]
},
{
"element_identifier": "310",
"terms": [
"masked portions"
]
},
{
"element_identifier": "320",
"terms": [
"margin"
]
},
{
"element_identifier": "400",
"terms": [
"front view"
]
},
{
"element_identifier": "410",
"terms": [
"side view"
]
},
{
"element_identifier": "420",
"terms": [
"visceral cavity model"
]
},
{
"element_identifier": "430",
"terms": [
"separate view"
]
},
{
"element_identifier": "500",
"terms": [
"reconstruction is flowcharted. At"
]
},
{
"element_identifier": "510",
"terms": [
"like. At"
]
},
{
"element_identifier": "520",
"terms": [
"like. At"
]
},
{
"element_identifier": "530",
"terms": [
"segmented anatomical structure at"
]
},
{
"element_identifier": "540",
"terms": [
"anatomical model. At"
]
},
{
"element_identifier": "550",
"terms": [
"motion phase images. At"
]
},
{
"element_identifier": "560",
"terms": [
"elastic registration. At"
]
},
{
"element_identifier": "570",
"terms": [
"every other phase. At"
]
},
{
"element_identifier": "580",
"terms": [
"volumetric phase images. At"
]
}
] | ['1. A medical imaging system (200), comprising: a masking unit (234) configured to construct a mask for each reconstructed volumetric phase image of a plurality of reconstructed volumetric phase images that masks portions of a corresponding image external to an anatomical model fitted to a segmented at least one anatomical structure, wherein the plurality of reconstructed volumetric phase images include a target phase and a plurality of temporal neighboring phases reconstructed from projection data; an image registration unit (238) configured to register the masked reconstructed volumetric phase images; a motion estimator (240) configured to estimate motion between the target phase and the plurality of temporal neighboring phases according to the model based on the registered masked reconstructed volumetric phase images; and a motion compensating reconstructor (244) configured to reconstruct a motion compensated medical image from the projection data using the estimated motion of the registered masked reconstructed volumetric phase images.', '3. The system according to either one of claims 1 and 2, further including: a vessel enhancing filter (242) configured to enhance vascular structures in the reconstructed volumetric phase images.', '7. The system according to claim 6, wherein the visceral cavity model includes a surface that encloses inner organs of a subject and excludes bones and surrounding tissues.', '8. The system according to any one claims 1-7, further including: a CT scanner (210) configured to acquire the projection data within a single rotation of an x-ray radiation source about a subject.', '14. A non-transitory computer-readable storage medium carrying software which controls one or more processors (250) to perform the method according to any one of claims 11-'] | false | [
"500",
"510",
"520",
"530",
"540",
"550",
"560",
"570",
"580",
"5",
"13"
] |
|
EP_3500223_B1.png | EP3500223B1 | BACKSTOP AND GEAR-SHIFT ARRANGEMENT FOR A WHEELCHAIR WHEEL | [
"FIG1"
] | [
"FIG1 illustrates schematically a wheelchair with a wheel provided with a backstop arrangement according to the present invention"
] | [
"The present invention relates to a wheelchair and more specifically to the main driving wheels of a wheelchair. An exemplifying wheelchair is depicted in FIG1, wherein a wheelchair 1 essentially comprises a seat 2, a back 3, a foot support 4, and two wheels 5. Each of the two wheels 5 is provided with an outer gripping ring 6 and an internal backstop arrangement 7. In FIG1 only one of the two backstop arrangements 7 is visible. By providing the wheels 5 with backstop arrangements 7, a wheelchair user can rest without risking that the wheelchair 1 moves backwards, which is a feature that is extremely helpful when, for example, travelling uphill. As will be demonstrated below, the backstop arrangement 7 is selectively engageable, which provides the advantages of a backstop function without impairing the user's ability to, e.g., maneuver the wheelchair 1 in narrow spaces and without preventing the user from moving backwards when the user so wishes, something which is more or less necessary when, for example, negotiating an obstacle such as a pavement edge or a curb. A selectively engageable backstop arrangement 7 has also positive effects on the amount of energy needed to propel the wheelchair 1 and reduces the wear of the backstop arrangement 7, as was explained above.",
"Still with reference to FIG1, the backstop arrangement 7 comprises further a wheel hub 8 with a wheel axle (not visible in the figure) and a backstop selector 9, which, due to the present invention, effectively works as a combined gear and backstop selector 9. As will be seen and explained below, a combination of a backstop arrangement, such as backstop arrangement 7, and a gear-shift arrangement provides several advantages; and in such a case the wheel hub 8 is preferably an internal-gear hub 8 comprising a planetary gear system, which as such is well-known in the art. Suitable internal-gear hubs are, for example, commercially available from the company Sturmey-Archer, e.g. the model S3X."
] | 18 | 379 | schematic | A | [
{
"element_identifier": "14",
"terms": [
"space"
]
},
{
"element_identifier": "3",
"terms": [
"back"
]
},
{
"element_identifier": "2",
"terms": [
"Canadian patent publication No.",
"seat"
]
},
{
"element_identifier": "5",
"terms": [
"wheels"
]
}
] | ['1. A wheel assembly comprising a wheel (5) for a wheelchair (1) and a backstop arrangement (10; 30; 70), the wheel (5) being provided with a wheel hub (11; 31; 71) and a wheel axle (12; 32; 72), the backstop arrangement (10; 30; 70) being configured to selectively engage and disengage, respectively, a backstop function, the backstop arrangement comprising a backstop selector (15; 35; 75) and a backstop member (18; 38; 78), wherein the wheel hub (11; 31; 71) has an inner rotatable circumferential surface (13; 33; 73), which faces the wheel axle (12; 32; 72) and is arranged with a radial space (14; 34; 74) therefrom, and the backstop selector (15; 35; 75) is operatively connected to the backstop member (18; 38; 78), which is radially moveable within the radial space (14; 34; 74), to, upon movement of the backstop selector (15; 35; 75), be selectively engaged with or disengaged from the inner circumferential surface (13; 33; 73), and that the backstop member (18; 38; 78) is configured, when in engagement with the inner circumferential surface (13; 33; 73), to allow the inner circumferential surface (13; 33;73) to rotate in a first direction and to prevent the inner circumferential surface (13; 33; 73) from rotating in a second, opposite direction, wherein the wheel assembly further comprises a gear-shift arrangement, characterized in that the wheel hub (11; 31; 71) is an internal-gear hub (11; 31; 71) comprising a number of internal gears (57, 58); the gear-shift arrangement comprises a shift member (54), which is axially moveable within the internal-gear hub (31) to engage a specific gear of said number of internal gears (57, 58), and wherein the shift member (54) via a connector member (55) is operatively connected to the backstop selector (15; 35; 75 ), such that the backstop selector (15, 35, 75) can be regarded as a gear and backstop selector.'] | false | [
"5",
"3",
"2",
"14"
] |
|
EP_3500226_B1 (6).png | EP3500226B1 | SECURED MEDICATION TRANSFER SYSTEM | [
"FIG15"
] | [
"FIG15 is a perspective view of a fourth exemplary vial adaptor coupled to a vial"
] | [
"Referring next to FIG15, a fourth exemplary vial adaptor 400 is shown for use with vial 10. Vial adaptor 400 is similar to the above-described vial adaptor 300, with like reference numerals identifying like elements, except as described below. The illustrative vial adaptor 400 includes a cleaning passageway 430 in side wall 402 that is distinct from needle opening 420, Cleaning passageway 430 is sized and shaped to allow a cleaning device (e.g., pad, wipe, swab) containing a disinfectant (e.g., alcohol), along with a user's finger (shown in broken lines), to access and clean stopper 18 of vial 10 before use."
] | 15 | 123 | perspective view | A | [
{
"element_identifier": "400",
"terms": [
"vial adaptor"
]
},
{
"element_identifier": "25",
"terms": [
"about"
]
}
] | ['1. A vial adaptor (100) configured for use with a vial (10) containing a medication and a needle assembly (150) having a needle, the vial adaptor comprising: a substantially hollow body (101) configured to couple with the vial, the body including a side wall (102) and an upper wall (108); a needle opening (120) in the body, the needle opening being arranged along an axis and being sized and shaped to receive the needle along the axis to withdraw the medication from the vial; a cleaning passageway (130) in the body, the cleaning passageway having an inlet (131) in the side wall and being sized and shaped to receive a cleaning device to clean the vial; and a shroud (132) extending outward from the body to block needle insertion into the vial through the cleaning passageway, the side wall deviating radially outwardly to follow the path of the shroud wherein the inlet deviates radially outwardly from a lower end (136) of the inlet to an upper end (138) of the inlet.', '4. The vial adaptor of claim 1, wherein the shroud extends from the axis of the needle opening by a distance of about 20 millimeters to about 30 millimeters.'] | false | [
"400",
"15",
"25"
] |
|
EP_3500306_B1 (2).png | EP3500306B1 | TRIPLE COMBINATION OF HISTAMINE-3 RECEPTOR INVERSE AGONISTS, ACETYLCHOLINESTERASE INHIBITORS AND NMDA RECEPTOR ANTAGONIST | [
"FIG2"
] | [
"FIG2 depicts the effect of compound 1 in combination with donepezil and memantine on extracellular levels of acetylcholine in medial prefrontal cortex of male Wistar rats"
] | [
"Treatment with donepezil and memantine produced increase in acetylcholine levels to the maximum of 1726 ± 297 % of basal levels. The increase in acetylcholine after combination of compound 1, donepezil and memantine was significantly higher compared to donepezil and memantine combination. Mean maximum increase in acetylcholine was observed to be 2968 ± 585 of pre-dose levels after triple combination (FIG2(a)).",
"Mean area under the curve values (AUC) calculated after the treatment of compound 1, donepezil and memantine were significantly higher compared to donepezil and memantine combination (FIG2(b))."
] | 26 | 105 | null | A | [
{
"element_identifier": "1",
"terms": [
"compound",
"compounds"
]
},
{
"element_identifier": "3",
"terms": [
"compound",
"compounds"
]
},
{
"element_identifier": "2",
"terms": [
"compound"
]
},
{
"element_identifier": "0",
"terms": [
"from about",
"patient"
]
},
{
"element_identifier": "100",
"terms": [
"about",
"R-α-methylhistamine",
"dialysate basal concentrations with"
]
},
{
"element_identifier": "60",
"terms": [
"about",
"another"
]
},
{
"element_identifier": "30",
"terms": [
"administered"
]
},
{
"element_identifier": "5",
"terms": [
"patient"
]
},
{
"element_identifier": "7",
"terms": [
"pH"
]
},
{
"element_identifier": "20",
"terms": [
"buffer",
"samples were collected at"
]
},
{
"element_identifier": "10",
"terms": [
"were positioned"
]
},
{
"element_identifier": "24",
"terms": [
"wall."
]
},
{
"element_identifier": "147",
"terms": [
"NaCl"
]
},
{
"element_identifier": "2004",
"terms": [
"Watson C."
]
},
{
"element_identifier": "297",
"terms": [
"±"
]
},
{
"element_identifier": "2968",
"terms": [
"be"
]
},
{
"element_identifier": "585",
"terms": [
"±"
]
},
{
"element_identifier": "249",
"terms": [
"±"
]
},
{
"element_identifier": "2696",
"terms": [
"be"
]
},
{
"element_identifier": "504",
"terms": [
"±"
]
},
{
"element_identifier": "461",
"terms": [
"±"
]
},
{
"element_identifier": "2674",
"terms": [
"be"
]
},
{
"element_identifier": "11",
"terms": [
"±"
]
}
] | ["8. The compound, N-[4-(1-Cyclobutylpiperidin-4-yloxy)phenyl]-2-(morpholin-4-yl)acetamide or a pharmaceutically acceptable salt thereof for use in combination with acetylcholinesterase inhibitor and NMDA receptor antagonist for the treatment of Alzheimer's disease in a patient, and preferably wherein the use is an adjunct treatment for Alzheimer's disease in a patient on stable treatment with acetylcholinesterase inhibitor and NMDA receptor antagonist."] | false | [
"40",
"20",
"20",
"40",
"60",
"80",
"100",
"120",
"140",
"160",
"180",
"200",
"220",
"240",
"2000",
"23"
] |
|
EP_3500306_B1 (3).png | EP3500306B1 | TRIPLE COMBINATION OF HISTAMINE-3 RECEPTOR INVERSE AGONISTS, ACETYLCHOLINESTERASE INHIBITORS AND NMDA RECEPTOR ANTAGONIST | [
"FIG3"
] | [
"FIG3 depicts the effect of compound 2 in combination with donepezil and memantine on extracellular levels of acetylcholine in medial prefrontal cortex of male Wistar rats"
] | [
"Treatment with donepezil and memantine produced increase in acetylcholine levels to the maximum of 1365 ± 249 % of basal levels. The increase in acetylcholine after combination of compound 2, donepezil and memantine was significantly higher compared to donepezil and memantine combination. Mean maximum increase in acetylcholine was observed to be 2696 ± 504 % of pre-dose levels after triple combination (FIG3(a)).",
"Mean area under the curve values (AUC) calculated after treatment of compound 2, donepezil and memantine were significantly higher compared to donepezil and memantine combination (FIG3(b))."
] | 26 | 105 | null | A | [
{
"element_identifier": "24",
"terms": [
"wall."
]
},
{
"element_identifier": "3",
"terms": [
"compound",
"compounds"
]
},
{
"element_identifier": "10",
"terms": [
"were positioned"
]
},
{
"element_identifier": "1",
"terms": [
"compound",
"compounds"
]
}
] | ["8. The compound, N-[4-(1-Cyclobutylpiperidin-4-yloxy)phenyl]-2-(morpholin-4-yl)acetamide or a pharmaceutically acceptable salt thereof for use in combination with acetylcholinesterase inhibitor and NMDA receptor antagonist for the treatment of Alzheimer's disease in a patient, and preferably wherein the use is an adjunct treatment for Alzheimer's disease in a patient on stable treatment with acetylcholinesterase inhibitor and NMDA receptor antagonist."] | false | [
"3",
"4",
"1",
"1",
"10",
"40",
"40",
"80",
"120",
"160",
"200",
"240",
"2000",
"24"
] |
|
EP_3500306_B1 (4).png | EP3500306B1 | TRIPLE COMBINATION OF HISTAMINE-3 RECEPTOR INVERSE AGONISTS, ACETYLCHOLINESTERASE INHIBITORS AND NMDA RECEPTOR ANTAGONIST | [
"FIG4"
] | [
"FIG4 depicts the effect of compound 3 in combination with donepezil and memantine on extracellular levels of acetylcholine in medial prefrontal cortex of male Wistar rats"
] | [
"Treatment with donepezil and memantine produced increase in acetylcholine levels to the maximum of 1375 ± 461 % of basal levels. The increase in acetylcholine after combination of compound 3, donepezil and memantine was significantly higher compared to donepezil and memantine combination. Mean maximum increase in acetylcholine was observed to be 2674 ±271 of pre-dose levels after triple combination (FIG4(a)).",
"Mean area under the curve values (AUC) calculated after treatment of compound 3, donepezil and memantine were significantly higher compared to donepezil and memantine combination (FIG4(b))."
] | 26 | 103 | null | A | [
{
"element_identifier": "5",
"terms": [
"patient"
]
},
{
"element_identifier": "10",
"terms": [
"were positioned"
]
}
] | ["7. The combination as claimed in any one of the claim 1 to 6, for use in the treatment of cognitive disorders in a patient, preferably wherein the cognitive disorder is selected from Alzheimer's disease, schizophrenia, Parkinson's disease, Lewy body dementia, vascular dementia, frontotemporal dementia, Down syndrome and Tourette's syndrome."] | false | [
"4000",
"3000",
"2000",
"1000",
"5",
"10",
"40",
"80",
"120",
"160",
"200",
"240",
"2400",
"25"
] |
|
EP_3500306_B1 (5).png | EP3500306B1 | TRIPLE COMBINATION OF HISTAMINE-3 RECEPTOR INVERSE AGONISTS, ACETYLCHOLINESTERASE INHIBITORS AND NMDA RECEPTOR ANTAGONIST | [
"FIG5"
] | [
"FIG5 depicts the effect of compound 1 in combination with donepezil and memantine on evoked theta levels in dorsal hippocampus of anesthetized male Wistar rats "
] | [
"Treatment with donepezil and memantine combination produced moderate increase in hippocampal θ power. Compound 1 in combination with donepezil and memantine produced significant increase in θ power levels and peak levels reached up to 167 ± 11 % of pre-dose levels. The effect in triple combination was observed to be significantly higher than the combination of donepezil and memantine (FIG5(a)).",
"Mean area under the curve values (AUC) calculated after the treatment of compound 1, donepezil and memantine were significantly higher compared to donepezil and memantine combination (FIG5(b))."
] | 25 | 103 | null | A | [
{
"element_identifier": "100",
"terms": [
"about",
"R-α-methylhistamine",
"dialysate basal concentrations with"
]
},
{
"element_identifier": "5",
"terms": [
"patient"
]
},
{
"element_identifier": "60",
"terms": [
"about",
"another"
]
},
{
"element_identifier": "20",
"terms": [
"buffer",
"samples were collected at"
]
}
] | ["7. The combination as claimed in any one of the claim 1 to 6, for use in the treatment of cognitive disorders in a patient, preferably wherein the cognitive disorder is selected from Alzheimer's disease, schizophrenia, Parkinson's disease, Lewy body dementia, vascular dementia, frontotemporal dementia, Down syndrome and Tourette's syndrome."] | false | [
"5",
"20",
"40",
"50",
"60",
"70",
"80",
"90",
"100",
"110",
"120",
"100",
"47",
"26"
] |
|
EP_3500379_B1 (5).png | EP3500379B1 | PROCESSES FOR RECOVERING SAND AND ACTIVE CLAY FROM FOUNDRY WASTE | [
"FIG9"
] | [
"FIG9 depicts visual results of an evaluation of rinser/shaker tests on a Plant A sand stream using a pre-slurry"
] | [
"FIG9 depicts visual results of an evaluation of rinser/shaker tests on a Plant A sand stream using a pre-slurry. The feed to the rinser/shaker table was a slurry of the sand that was 30% solids. As in the no pre-slurry case, as the sand moves through each rinse, the clay and carbon are removed from the surface of the sand and the sand appears to become progressively coarser from the first to the fifth rinse."
] | 23 | 89 | null | B | [
{
"element_identifier": "50",
"terms": [
"about"
]
},
{
"element_identifier": "10",
"terms": [
"stream"
]
},
{
"element_identifier": "2",
"terms": [
"stream"
]
},
{
"element_identifier": "1",
"terms": [
"stream",
"Set"
]
},
{
"element_identifier": "600",
"terms": [
"about"
]
},
{
"element_identifier": "1a",
"terms": [
"forming process as stream"
]
},
{
"element_identifier": "3",
"terms": [
"stream",
"Table",
"Set"
]
},
{
"element_identifier": "4",
"terms": [
"stream"
]
},
{
"element_identifier": "5",
"terms": [
"stream"
]
},
{
"element_identifier": "6",
"terms": [
"stream"
]
},
{
"element_identifier": "7",
"terms": [
"stream"
]
},
{
"element_identifier": "9",
"terms": [
"stream"
]
},
{
"element_identifier": "10a",
"terms": [
"stream"
]
},
{
"element_identifier": "10b",
"terms": [
"be fed as stream"
]
},
{
"element_identifier": "8",
"terms": [
"stream"
]
},
{
"element_identifier": "10c",
"terms": [
"is fed as stream"
]
},
{
"element_identifier": "11",
"terms": [
"stream"
]
},
{
"element_identifier": "12",
"terms": [
"stream"
]
},
{
"element_identifier": "13",
"terms": [
"stream"
]
},
{
"element_identifier": "14",
"terms": [
"stream"
]
},
{
"element_identifier": "15",
"terms": [
"stream"
]
},
{
"element_identifier": "17",
"terms": [
"stream"
]
},
{
"element_identifier": "16",
"terms": [
"stream"
]
},
{
"element_identifier": "18",
"terms": [
"stream"
]
},
{
"element_identifier": "4a",
"terms": [
"stream"
]
},
{
"element_identifier": "4b",
"terms": [
"dust as stream"
]
},
{
"element_identifier": "20",
"terms": [
"combined water/blackwater stream",
"Set",
"washed samples Table",
"Plant B.Table"
]
},
{
"element_identifier": "13a",
"terms": [
"hydrocyclone as stream"
]
},
{
"element_identifier": "19",
"terms": [
"foundry. Blackwater as stream",
"solids contained",
"D.Table"
]
},
{
"element_identifier": "100",
"terms": [
"over"
]
},
{
"element_identifier": "31",
"terms": [
"Set"
]
},
{
"element_identifier": "41",
"terms": [
"Set"
]
},
{
"element_identifier": "0",
"terms": [
"sand stream is"
]
},
{
"element_identifier": "148",
"terms": [
"TotalSample"
]
},
{
"element_identifier": "149",
"terms": [
"TotalBelt"
]
},
{
"element_identifier": "21",
"terms": [
"Plant B over time.Table"
]
},
{
"element_identifier": "22",
"terms": [
"calcination.Table"
]
},
{
"element_identifier": "23",
"terms": [
"binding strength. Table",
"value than active clay.Table"
]
},
{
"element_identifier": "24",
"terms": [
"current landfilling cost.Table"
]
},
{
"element_identifier": "25",
"terms": [
"current landfilling cost.Table"
]
}
] | ['1. A method of reclaiming clean sand and active clay from foundry waste comprising: providing dust and sand from a molding process in a foundry, wherein the dust and sand comprise clay including active clay and dead clay; rinsing a slurry comprising the dust and sand to remove clay from the sand and dust, wherein the rinsing comprises rinsing the slurry at least one time, wherein the clay is separated as a first clay slurry; removing additional clay from the rinsed slurry by shaking the rinsed slurry on a shaker table, wherein the additional clay is separated as a second clay slurry, wherein a clean sand slurry is removed from an end of the shaker table; allowing the dead clay to separate as solids from the first and second clay slurry to form an active clay slurry; recycling the active clay slurry to a muller in a foundry; and recycling clean sand from the clean sand slurry to the foundry.'] | false | [
"38"
] |
|
EP_3500379_B1 (6).png | EP3500379B1 | PROCESSES FOR RECOVERING SAND AND ACTIVE CLAY FROM FOUNDRY WASTE | [
"FIG10"
] | [
"FIG10 depicts visual results of an evaluation of rinser/shaker tests on a Plant A dust stream with no pre-slurry"
] | [
"FIG10 depicts visual results of an evaluation of rinser/shaker tests on a Plant A dust stream with no pre-slurry. The feed to the rinser/shake table was dry dust feed. Raw dust was used as input to the rinser/shaker and samples were taken and tested after the first, second, third, fourth, and fifth rinse. The raw dust is shown to be relatively fine. However, clumps of dust are apparent after the first rinse and the clumps become smaller after the second rinse. These images that show the clumping suggest the removal of clay is not efficient. The clumps become less apparent after the third, fourth, and fifth rinses."
] | 23 | 129 | null | B | [
{
"element_identifier": "50",
"terms": [
"about"
]
},
{
"element_identifier": "10",
"terms": [
"stream"
]
},
{
"element_identifier": "2",
"terms": [
"stream"
]
},
{
"element_identifier": "1",
"terms": [
"stream",
"Set"
]
},
{
"element_identifier": "600",
"terms": [
"about"
]
},
{
"element_identifier": "1a",
"terms": [
"forming process as stream"
]
},
{
"element_identifier": "3",
"terms": [
"stream",
"Table",
"Set"
]
},
{
"element_identifier": "4",
"terms": [
"stream"
]
},
{
"element_identifier": "5",
"terms": [
"stream"
]
},
{
"element_identifier": "6",
"terms": [
"stream"
]
},
{
"element_identifier": "7",
"terms": [
"stream"
]
},
{
"element_identifier": "9",
"terms": [
"stream"
]
},
{
"element_identifier": "10a",
"terms": [
"stream"
]
},
{
"element_identifier": "10b",
"terms": [
"be fed as stream"
]
},
{
"element_identifier": "8",
"terms": [
"stream"
]
},
{
"element_identifier": "10c",
"terms": [
"is fed as stream"
]
},
{
"element_identifier": "11",
"terms": [
"stream"
]
},
{
"element_identifier": "12",
"terms": [
"stream"
]
},
{
"element_identifier": "13",
"terms": [
"stream"
]
},
{
"element_identifier": "14",
"terms": [
"stream"
]
},
{
"element_identifier": "15",
"terms": [
"stream"
]
},
{
"element_identifier": "17",
"terms": [
"stream"
]
},
{
"element_identifier": "16",
"terms": [
"stream"
]
},
{
"element_identifier": "18",
"terms": [
"stream"
]
},
{
"element_identifier": "4a",
"terms": [
"stream"
]
},
{
"element_identifier": "4b",
"terms": [
"dust as stream"
]
},
{
"element_identifier": "20",
"terms": [
"combined water/blackwater stream",
"Set",
"washed samples Table",
"Plant B.Table"
]
},
{
"element_identifier": "13a",
"terms": [
"hydrocyclone as stream"
]
},
{
"element_identifier": "19",
"terms": [
"foundry. Blackwater as stream",
"solids contained",
"D.Table"
]
},
{
"element_identifier": "100",
"terms": [
"over"
]
},
{
"element_identifier": "31",
"terms": [
"Set"
]
},
{
"element_identifier": "41",
"terms": [
"Set"
]
},
{
"element_identifier": "0",
"terms": [
"sand stream is"
]
},
{
"element_identifier": "148",
"terms": [
"TotalSample"
]
},
{
"element_identifier": "149",
"terms": [
"TotalBelt"
]
},
{
"element_identifier": "21",
"terms": [
"Plant B over time.Table"
]
},
{
"element_identifier": "22",
"terms": [
"calcination.Table"
]
},
{
"element_identifier": "23",
"terms": [
"binding strength. Table",
"value than active clay.Table"
]
},
{
"element_identifier": "24",
"terms": [
"current landfilling cost.Table"
]
},
{
"element_identifier": "25",
"terms": [
"current landfilling cost.Table"
]
}
] | ['1. A method of reclaiming clean sand and active clay from foundry waste comprising: providing dust and sand from a molding process in a foundry, wherein the dust and sand comprise clay including active clay and dead clay; rinsing a slurry comprising the dust and sand to remove clay from the sand and dust, wherein the rinsing comprises rinsing the slurry at least one time, wherein the clay is separated as a first clay slurry; removing additional clay from the rinsed slurry by shaking the rinsed slurry on a shaker table, wherein the additional clay is separated as a second clay slurry, wherein a clean sand slurry is removed from an end of the shaker table; allowing the dead clay to separate as solids from the first and second clay slurry to form an active clay slurry; recycling the active clay slurry to a muller in a foundry; and recycling clean sand from the clean sand slurry to the foundry.'] | false | [
"39",
"10"
] |
|
EP_3500383_B1 (5).png | EP3500383B1 | POWER SKIVING PRESSURE ANGLE CORRECTION WITHOUT TOOL GEOMETRY CHANGE | [
"FIG6"
] | [
"FIG6 shows the reference profile and one involute of a cutting blade before and after a corrective radial shift"
] | [
"FIG6 shows the reference profile 34 and the involute 30 generated by the reference profile 34, respectively by unrolling the virtual cord I*b from the base circle 39. The involute triangle I*b → R*b → (DOtool/2-ΔR) enables the determination of the pressure angle at point 32 with: α+Δα = arccos[Rb* / (DOtool/2-ΔR)]."
] | 19 | 66 | null | B | [
{
"element_identifier": "35",
"terms": [
"involute"
]
},
{
"element_identifier": "30",
"terms": [
"involute"
]
},
{
"element_identifier": "39",
"terms": [
"base circle"
]
},
{
"element_identifier": "37",
"terms": [
"involute reference line direction"
]
},
{
"element_identifier": "34",
"terms": [
"profile"
]
},
{
"element_identifier": "33",
"terms": [
"large circle"
]
},
{
"element_identifier": "26",
"terms": [
"direction"
]
},
{
"element_identifier": "15",
"terms": [
"work gear"
]
},
{
"element_identifier": "36",
"terms": [
"profile"
]
},
{
"element_identifier": "31",
"terms": [
"point"
]
},
{
"element_identifier": "32",
"terms": [
"point"
]
}
] | ['4. The method of claim 1 wherein changing said initial radial position of said cutting blades comprises shifting the position of each of said plurality of cutting blades in the lengthwise direction thereof.'] | false | [
"36",
"37",
"31",
"35",
"30",
"34",
"33",
"39",
"32",
"2",
"26",
"2",
"15"
] |
|
EP_3500422_B1 (1).png | EP3500422B1 | A METHOD FOR MANUFACTURING CONTACT LENSES | [
"FIG2"
] | [
"FIG2 is a flow chart showing a method of manufacturing a contact lens in accordance with a first example method"
] | [
"FIG2 shows a flow chart of an example method of manufacturing a contact lens. In a first step a tubular mold having a diameter corresponding to the diameter of the finished contact lens is assembled 50. To produce the rod a predetermined quantity of liquid lens precursor composition is first poured 52a into the mold while the mold is held upright. The lens precursor composition is then heat cured 52b to form a solid end portion of the rod. The remainder of the rod is then built-up in stages by repeating a process of (i) placing 54a an electronic device on top of the previously cured portion of rod, (ii) covering 54b that electronic device with liquid lens precursor composition and (iii) curing 54c that liquid lens precursor composition. The process of 'placing' 54a, 'pouring' 54b and 'curing '54c' is repeated for each electronic device. By using the same quantity of liquid lens precursor in each stage, methods in accordance with the present example may result in a rod having a plurality of electronic devices equidistantly spaced apart along its length. Provided a sufficient quantity of lens precursor composition is used, the final stage will also produce a second end portion of the rod in which no electronic devices are located."
] | 20 | 238 | flowchart | B | [
{
"element_identifier": "103",
"terms": [
"mold"
]
},
{
"element_identifier": "2",
"terms": [
"electronic devices"
]
},
{
"element_identifier": "56",
"terms": [
"is removed"
]
},
{
"element_identifier": "104",
"terms": [
"device",
"devices"
]
},
{
"element_identifier": "105",
"terms": [
"liquid precursor composition"
]
},
{
"element_identifier": "50",
"terms": [
"is assembled"
]
},
{
"element_identifier": "10",
"terms": [
"than"
]
},
{
"element_identifier": "58",
"terms": [
"rod are cut off"
]
},
{
"element_identifier": "62",
"terms": [
"button is then lathed"
]
}
] | ['3. A method according to any previous claim, wherein manufacturing the rod (101) of lens material comprises curing a quantity of liquid lens precursor composition (105) containing an electronic component (104) in a mold (103).', '7. A method according to any previous claim, wherein the electronic component (104) forms part of a curved electronic device.', '8. A method according to claim 4, further comprising a final cure in which the curing process is completed for more than one of the lengths of the rod (101) simultaneously.'] | true | [
"50",
"103",
"105",
"56",
"104",
"104",
"58",
"09",
"62",
"2",
"10"
] |
|
EP_3500422_B1.png | EP3500422B1 | A METHOD FOR MANUFACTURING CONTACT LENSES | [
"FIG1"
] | [
"FIG1 is a schematic view of a rod of contact lens material in accordance with a first example embodiment"
] | [
"With reference to the drawings, FIG1 shows a schematic view of a rod 1 of lens material in accordance with a first example embodiment. The rod has a circular cross section and incorporates four electronic devices 2. The electronic devices 2 are spaced equidistantly apart along the longitudinal axis of the rod 1. Located adjacent to each end of the rod 2 is a region within which no electronic devices are located."
] | 19 | 77 | schematic view | B | [
{
"element_identifier": "2",
"terms": [
"electronic devices"
]
},
{
"element_identifier": "1",
"terms": [
"rod"
]
}
] | ['1. A method of manufacturing a contact lens, the method comprising manufacturing a rod (101) of lens material, the rod (101) containing a plurality of electronic components (104) spaced apart along its length, separating the rod (101) into at least one lens blank containing at least one of said electronic components (104), and machining the front and/or back surface of the lens blank to produce a contact lens (110) containing the at least one electronic component (104), CHARACTERISED IN THAT : manufacturing the rod (101) of lens material comprises producing a first length of rod (101a) including a first one of a plurality of electronic components (104) and then producing a second length of the rod (101b), said second length including a second one of the plurality of electronic components (104).'] | false | [
"2",
"1"
] |
|
EP_3500497_B1 (2).png | EP3500497B1 | OPEN-WALLED PACK | [
"FIG3"
] | [
"FIG3 is a side view of the pack of FIG1"
] | [
"FIG3 is a view of the pack 100 showing the second wall 108 and first opening 114. The first opening 114 is primarily in the side of the cuboid corresponding to the second wall 108. As shown, the first opening 114 extends from the top 102 of the pack 100 downward to an upper edge 302 of the second wall 108 in a direction normal to the bottom plane 120 of the pack. The first opening 114 extends from the first wall 106 to the third wall 110 in a direction parallel to the bottom plane 120. Accordingly, the first opening 114 can have a generally rectangular shape, or any other shape that may be defined first wall 106, second wall 108, third wall 110 and fourth wall 112."
] | 10 | 139 | side view | B | [
{
"element_identifier": "306",
"terms": [
"diagonal"
]
},
{
"element_identifier": "304",
"terms": [
"distance"
]
},
{
"element_identifier": "118",
"terms": [
"product",
"products"
]
},
{
"element_identifier": "102",
"terms": [
"top"
]
},
{
"element_identifier": "108",
"terms": [
"second wall"
]
},
{
"element_identifier": "106",
"terms": [
"wall",
"walls"
]
},
{
"element_identifier": "110",
"terms": [
"third wall",
"third walls"
]
},
{
"element_identifier": "114",
"terms": [
"opening",
"openings"
]
}
] | ['1. A pack (100) comprising: a unitary blank (400) folded into a rectangular cuboid, the rectangular cuboid defining: a bottom (104); a top (102) approximately parallel to and opposite of the bottom; and four walls (106,108,110,112) approximately perpendicular to and disposed between the top and the bottom, the four walls including a first wall (106), a second wall (108), a third wall (110), and a fourth wall (112), the first wall opposite of the third wall, and the second wall opposite of the fourth wall, wherein the second wall defines a first opening (114) into the interior of the cuboid and the fourth wall defines a second opening (116) into the interior of the cuboid, and characterised in that the first and second openings extend from the first wall to the third wall of the cuboid in a direction parallel to a bottom plane of the cuboid and from the top to an upper edge of the second and fourth walls respectively in a direction normal to the bottom plane of the cuboid and wherein the upper edge of the second and fourth walls is disposed at a height of 50 percent or greater of a distance from the bottom to the top of the cuboid.'] | false | [
"102",
"118",
"306",
"114",
"106",
"110",
"304",
"108",
"14"
] |
|
EP_3500497_B1 (6).png | EP3500497B1 | OPEN-WALLED PACK | [
"FIG9"
] | [
"FIG9 is a top view of the pack of FIG1 with the first and second top flap folded over the top"
] | [
"Once the first top flap 432 is folded inward, the second top flap 434 can be folded inward over the first top flap 432. In particular, the second top flap 434 can be folded to an orientation that is perpendicular to the wall panels 406, 408, 410, 412 and covers at least a portion of the products in the pack 100, which is parallel with the first top flap 432. FIG9 is a view of the pack with the second top flap 434 folded over in this position. In this example, the second top flap 434 includes an intermediate panel 436 and a distal panel 438. The intermediate panel 436 is disposed over at least a portion of the first top flap 432 when the second top flap 434 is folded perpendicular to the wall panels 406, 408, 410, 412 as shown in FIG9. In this position, the distal panel 438 extends beyond the top 102 of the pack 100 and can be folded downward to be parallel with, and lie against, the third wall panel 410."
] | 21 | 196 | view | B | [
{
"element_identifier": "420",
"terms": [
"wall fold lines"
]
},
{
"element_identifier": "440",
"terms": [
"tab"
]
},
{
"element_identifier": "416",
"terms": [
"top fold line",
"top fold lines"
]
},
{
"element_identifier": "452",
"terms": [
"weakness"
]
},
{
"element_identifier": "422",
"terms": [
"second-third fold line"
]
},
{
"element_identifier": "104",
"terms": [
"bottom"
]
},
{
"element_identifier": "112",
"terms": [
"fourth wall"
]
},
{
"element_identifier": "436",
"terms": [
"intermediate panel"
]
},
{
"element_identifier": "102",
"terms": [
"top"
]
},
{
"element_identifier": "108",
"terms": [
"second wall"
]
},
{
"element_identifier": "106",
"terms": [
"wall",
"walls"
]
},
{
"element_identifier": "438",
"terms": [
"distal panel"
]
},
{
"element_identifier": "408",
"terms": [
"second wall panel"
]
}
] | ['1. A pack (100) comprising: a unitary blank (400) folded into a rectangular cuboid, the rectangular cuboid defining: a bottom (104); a top (102) approximately parallel to and opposite of the bottom; and four walls (106,108,110,112) approximately perpendicular to and disposed between the top and the bottom, the four walls including a first wall (106), a second wall (108), a third wall (110), and a fourth wall (112), the first wall opposite of the third wall, and the second wall opposite of the fourth wall, wherein the second wall defines a first opening (114) into the interior of the cuboid and the fourth wall defines a second opening (116) into the interior of the cuboid, and characterised in that the first and second openings extend from the first wall to the third wall of the cuboid in a direction parallel to a bottom plane of the cuboid and from the top to an upper edge of the second and fourth walls respectively in a direction normal to the bottom plane of the cuboid and wherein the upper edge of the second and fourth walls is disposed at a height of 50 percent or greater of a distance from the bottom to the top of the cuboid.', '2. The pack of claim 1, wherein the top (102) includes a first top flap (432) and a second top flap (434) disposed over at least a portion of the first top flap, the first top flap integral with a third wall (110) of the cuboid and the second top flap integral with a first wall (106) of the cuboid, wherein the second top flap includes an intermediate panel (436) parallel with the first top flap and defined by a fold with the third wall and by a mid-flap fold (446) with a distal panel (438) of the second top flap, the distal panel of the second top flap disposed over at least a portion of and parallel to the third wall and fastened thereto.', '3. The pack of claim 2, wherein the distal panel (438) of the second top flap (434) defines a tab (440), wherein the third wall (110) of the cuboid defines a slot (442), wherein the distal panel is fastened to the third wall by insertion of the tab into the slot.', '10. The pack of any of claims 2-9, comprising: a line of weakness (452) defined between the tab (440) and a remaining portion of the distal panel (438), the line of weakness configured to break to separate the tab from the remaining portion of the distal panel thereby unfastening the second top flap (434) from the third wall (110).'] | false | [
"112",
"102",
"416",
"436",
"438",
"452",
"440",
"106",
"420",
"408",
"422",
"108",
"10",
"104",
"20"
] |
|
EP_3500682_B1 (4).png | EP3500682B1 | CLOSED LINEAR DNA PRODUCTION | [
"FIG10A",
" FIG10B"
] | [
"FIG10A shows the linear sequence of introduced stem loop used in Example 1 This also shows the primers used in Example 1 and the binding position in the loop is shown ",
"FIG10B is a photograph of an 0 8% agarose gel of TelN digest of amplified products produced from different priming strategies"
] | [
"Preferably, the central section of the motif or loop includes a sequence for a primer binding site. A primer binding site is a region of a nucleotide sequence where a primer binds or anneals to start replication. The primer specifically anneals to the primer binding site due to the complementary nature of their sequences. The primer binding site may be designed such that primers can anneal which are complementary to a part or portion of the primer binding site, see for example FIG10A Alternatively, the primer binding site and primer may be the same length. Primer design, and thus the sequence of the primer binding site are discussed in more detail further below. The primer binding site is at least 5 residues in length, but can be 5 to 50 residues (bases) in length. Ideally, the primer binding site is 5 to 30 or 5 to 20 residues in length, optionally 5 to 16 residues in length. The primer binding site may be at least 5, 6, 7, 8, 9, 10, 11, 12, 13, 14, 15, 16, 17, 18, 19, 20, 21, 22, 23, 24, 25, 26, 27, 28, 29 or 30 residues in length. It is preferred that the primer binding site forms a part or portion of the central section, adjoined by at least one sequence which separates the primer binding site from the flanking sequences. The adjoining sequence may be present on the 3' or 5' side of the primer binding site, or be present on both sides of the primer binding site. The adjoining sequences may be of any suitable length, and each of the adjoining sequences is independent - i.e. the presence, length or nature of the adjoining sequence may be different on either side of the primer binding site, if present. Each adjoining sequence may be up to 50 residues in length, preferably up to 40, up to 30 or up to 20, most preferably, 15 residues in length. The adjoining sequences may therefore be at least 1, 2, 3, 4, 5, 6, 7, 8, 9, 10, 11, 12, 131, 14, 15, 16, 17, 18, 19 or 20 residues (bases) in length. ",
"Table 3 show the dsDNA reaction yield of amplified closed linear DNA after feeding of reactions with dNTPs. In contrast to a standard closed linear DNA amplification (Table 2), it can be seen that for all primers tested, the yield of dsDNA product increases with dNTP additions. This indicates that the concatameric product produced by amplification of the closed linear DNA template (db_eGFP 53SL) is primable and is further amplified to produce more dsDNA product. FIG10B shows that the dsDNA product is converted to a closed linear DNA (db_eGFP 53SL) by treatment with TelN protelomerase. This show that all the primers are specific and are capable of producing the desired closed linear DNA end-product (with included stem loop motif)Table 4. dsDNA yield results from feeding of a stem loop closed linear DNA (db_eGFP) primed with different stem loop specific primersNo of 2.5mM dNTP feeds Total [dNTP]None 2.5mM1 5.0mM2 7.5mM3 10mM[dsDNA] µg/ml from 4to11 primer208356430810[dsDNA] µg/ml from 3to12 primer193364430890[dsDNA] µg/ml from 2to13 primer3826727542400[dsDNA] µg/ml from 1to14 primer3827346644620[dsDNA] µg/ml from 0to15 primer3004265522560"
] | 53 | 639 | null | C | [
{
"element_identifier": "15",
"terms": [
"priming site",
"ID NO",
"DNA concentrations determined at"
]
},
{
"element_identifier": "3",
"terms": [
"protelomerase recognition sequences",
"Version",
"Table"
]
},
{
"element_identifier": "2",
"terms": [
"protelomerase recognition sequences",
"Example",
"reaction was then diluted"
]
},
{
"element_identifier": "1",
"terms": [
"in Example"
]
}
] | ['9. A method as claimed in any preceding claim wherein said template comprises one or more additional protelomerase recognition sequences.'] | true | [
"15",
"1",
"2",
"3",
"3",
"6",
"75"
] |
|
EP_3500682_B1 (5).png | EP3500682B1 | CLOSED LINEAR DNA PRODUCTION | [
"FIG11"
] | [
"FIG11 depicts a plasmid map for the vectors used in Example 1 Various components are depicted"
] | [
"Production of stem loop closed linear DNA from a plasmid template. Table 1 below shows the conditions under which plasmid proTLx-K B5X4 eGFP 53SL (see FIG11) was amplified. RCA reactions were setup at room temperature and reagents added in the order indicated. Reactions were carried out in polypropylene tubes and incubated overnight at 30 °C.Table 1. Setup conditions for plasmid amplificationReaction ComponentStock concentrationReaction concentrationVolume added1Template1000µg/ml2ng/µl10µlproTLx-K B5X4 eGFP 53SL(see FIG11)2NaOH1M5mM25µl310xTLG pH 7.9 buffer10x1x500µl(300 mM Tris-HCl), 300 mM KCl, 75 mM MgCl2, 50 mM (NH4)2SO4, 20 mM DTT)4Watern/an/a4200µl5dNTPs100m M4mM200µl6Phi29 DNA polymerase100,000U/ml200U/ml10µl7N0-11 primer (SEQ ID NO: 37) (primer binding site is within the palindromic sequence of the protelomerase recognition sequence)5mM50µM50µl8Pyrophosphatase2U/ml0.0002U/ml0.5µl"
] | 16 | 147 | null | C | [
{
"element_identifier": "1",
"terms": [
"in Example"
]
},
{
"element_identifier": "2",
"terms": [
"protelomerase recognition sequences",
"Example",
"reaction was then diluted"
]
},
{
"element_identifier": "3",
"terms": [
"protelomerase recognition sequences",
"Version",
"Table"
]
},
{
"element_identifier": "4",
"terms": [
"protelomerase recognition sequences",
"This was centrifuged at",
"Table"
]
},
{
"element_identifier": "20",
"terms": [
"recognition sequence may be",
"Tween",
"ID NO"
]
},
{
"element_identifier": "30",
"terms": [
"about"
]
},
{
"element_identifier": "5",
"terms": [
"is",
"particularly",
"be"
]
},
{
"element_identifier": "10",
"terms": [
"particularly",
"second spacer"
]
},
{
"element_identifier": "15",
"terms": [
"priming site",
"ID NO",
"DNA concentrations determined at"
]
},
{
"element_identifier": "0",
"terms": [
"first spacer"
]
},
{
"element_identifier": "100",
"terms": [
"DNA template may be",
"stock concentration"
]
},
{
"element_identifier": "200",
"terms": [
"preferably",
"mins."
]
},
{
"element_identifier": "29",
"terms": [
"displacement-type polymerases are Phi"
]
},
{
"element_identifier": "7",
"terms": [
"pH"
]
},
{
"element_identifier": "40",
"terms": [
"about"
]
},
{
"element_identifier": "25",
"terms": [
"about"
]
},
{
"element_identifier": "35",
"terms": [
"about"
]
},
{
"element_identifier": "32",
"terms": [
"invention is T4 gene"
]
},
{
"element_identifier": "14",
"terms": [
"ID NO"
]
},
{
"element_identifier": "16",
"terms": [
"ID NO"
]
},
{
"element_identifier": "17",
"terms": [
"ID NO"
]
},
{
"element_identifier": "18",
"terms": [
"ID NO"
]
},
{
"element_identifier": "19",
"terms": [
"ID NO"
]
},
{
"element_identifier": "21",
"terms": [
"ID NO"
]
},
{
"element_identifier": "22",
"terms": [
"ID NO"
]
},
{
"element_identifier": "8000",
"terms": [
"polyethylene glycol"
]
},
{
"element_identifier": "300",
"terms": [
"buffer10x1x500 µl"
]
},
{
"element_identifier": "500",
"terms": [
"fold in"
]
}
] | ['1. A cell-free method of producing closed linear deoxyribose nucleic acid (DNA) molecules comprising: (a) contacting a template comprising linear, double stranded DNA molecule covalently closed at each end by a portion of a protelomerase recognition sequence and comprising at least one stem loop motif with a strand-displacing polymerase under conditions promoting amplification of said template in the presence of at least one primer which is capable of binding specifically to a primer binding site within said stem loop motif; (b) contacting the DNA produced in (a) with at least one protelomerase under conditions promoting production of closed linear DNA.', '9. A method as claimed in any preceding claim wherein said template comprises one or more additional protelomerase recognition sequences.', '11. A linear, double stranded DNA molecule covalently closed at each end by a portion of a protelomerase recognition sequence, wherein the sequence of said linear, double stranded DNA molecule includes at least one stem loop motif, preferably wherein said stem loop motif is as described in any one of claims 2 to'] | false | [
"3500",
"3500",
"3000",
"500",
"3680",
"500",
"3762",
"76",
"11"
] |
|
EP_3500867_B1 (1).png | EP3500867B1 | BUILT-IN EYE SCAN FOR ADC-BASED RECEIVER | [
"FIG2"
] | [
"FIG2 is a block diagram depicting the receiver according to an example"
] | [
"The receiver 126 generally includes analog-to-digital converter (ADC) circuitry 104 and eye scan circuitry 106. An example structure of the receiver 126 is described further below with respect to FIG2. The receiver 126 receives an analog signal from the transmission medium 160. The ADC circuitry 104 generates a digital signal from the analog signal. As used herein, a digital signal is a sequence of k-bit codes, where k is a positive integer. A k-bit code may be referred to as a digital sample. The number of codes per second is the data rate (also referred to as sample rate). A digital signal can also be conceptually viewed as a discrete-time, discrete-amplitude signal, where the amplitude of the signal at each discrete time is selected from 2k discrete values.",
"FIG2 is a block diagram depicting the receiver 126 according to an example. The receiver 126 includes a front end 202, the ADC circuitry 104, a digital signal processor (DSP) 204, an adaptation circuit 205, a clock recovery circuit 206, a phase interpolator (PI) 208, a clock generator 210, and the eye scan circuitry 106. An input of the front end 202 is coupled to the transmission medium 160. An output of the front end 202 is coupled to one input of the ADC circuitry 104. An output of the ADC circuitry 104 is coupled to an input of the DSP 204. An output of the DSP 204 is coupled to an input of the clock recovery circuit 206. An output of the clock recovery circuit 206 is coupled to one input of the PI 208. An output of the clock generator 210 is coupled to another input of the PI 208. An output of the PI 208 is coupled to another input of the ADC circuitry 104."
] | 12 | 345 | block diagram | G | [
{
"element_identifier": "210",
"terms": [
"clock generator"
]
},
{
"element_identifier": "214",
"terms": [
"CTLE"
]
},
{
"element_identifier": "202",
"terms": [
"front end"
]
},
{
"element_identifier": "216",
"terms": [
"ADCs"
]
},
{
"element_identifier": "218",
"terms": [
"FFE"
]
},
{
"element_identifier": "220",
"terms": [
"DFE"
]
},
{
"element_identifier": "208",
"terms": [
"PI"
]
},
{
"element_identifier": "206",
"terms": [
"clock recovery circuit"
]
},
{
"element_identifier": "126",
"terms": [
"receiver"
]
},
{
"element_identifier": "204",
"terms": [
"DSP"
]
},
{
"element_identifier": "104",
"terms": [
"circuitry"
]
},
{
"element_identifier": "106",
"terms": [
"eye scan circuitry"
]
},
{
"element_identifier": "205",
"terms": [
"adaptation circuit"
]
},
{
"element_identifier": "212",
"terms": [
"circuit"
]
}
] | ['1. A method of performing an eye-scan in a receiver (126), comprising: generating digital samples from an analog signal input to the receiver (126) based on a sampling clock, the sampling clock phase-shifted with respect to a reference clock based on a phase interpolator, PI, code; equalizing the digital samples based on first equalization parameters of a plurality of equalization parameters of the receiver (126); adapting the plurality of equalization parameters and performing clock recovery based on the digital samples to generate the PI code; performing a plurality of cycles of locking the plurality of equalization parameters, suspending phase detection in the clock recovery, offsetting the PI code by different amounts across the plurality of cycles, collecting an output of the receiver (126), resuming the phase detection in the clock recovery, and unlocking the equalization parameters to perform the eye scan.', '8. A receiver (126), comprising: a front end (202) configured to receive an analog signal; analog-to-digital converter, ADC, circuitry (104) configured to generate digital samples from the analog signal based on a sampling clock; a digital signal processor, DSP (204) configured to equalize the digital samples based on first equalization parameters of a plurality of equalization parameters; a clock recovery circuit (206) configured to perform clock recovery based on the digital samples to generate a phase interpolator, PI, code; a PI (208) configured to generate the sampling clock based on the PI code; an adaptation circuit (205) configured to adapt the plurality of equalization parameters; and an eye scan circuit (106) configured to control a plurality of cycles of locking the plurality of equalization parameters, suspending phase detection in the clock recovery of the clock recovery circuit (206), offsetting the PI code by different amounts across the plurality of cycles, collecting the digital samples, resuming the phase detection in the clock recovery of the clock recovery circuit (206), and unlocking the equalization parameters.'] | false | [
"126",
"106",
"210",
"208",
"206",
"202",
"212",
"104",
"216",
"204",
"218",
"220",
"214",
"205",
"13"
] |
|
EP_3500867_B1 (2).png | EP3500867B1 | BUILT-IN EYE SCAN FOR ADC-BASED RECEIVER | [
"FIG3"
] | [
"FIG3 is a block diagram depicting clock recovery and eye scan circuitry according to an example"
] | [
"FIG3 is a block diagram depicting clock recovery and eye scan circuitry according to an example. The clock recovery circuit 206 includes a phase detector 302 and a digital loop filter 330. The eye scan circuitry 106 includes a control circuit 316, a multiplexer 304, and a multiplexer 326. An input of the phase detector 302 is coupled to the output of the DSP 204. An output of the phase detector 302 is coupled to the digital loop filter 330 through the multiplexer 304. An output of the digital loop filter 330 provides a PI code, which is coupled to the input of the PI 208. The output of the PI 208 provides the sampling clock, as described above."
] | 16 | 130 | block diagram | G | [
{
"element_identifier": "327",
"terms": [
"phase path"
]
},
{
"element_identifier": "310",
"terms": [
"adder"
]
},
{
"element_identifier": "306",
"terms": [
"gain circuit",
"gain circuits"
]
},
{
"element_identifier": "304",
"terms": [
"multiplexer",
"multiplexers"
]
},
{
"element_identifier": "208",
"terms": [
"PI"
]
},
{
"element_identifier": "328",
"terms": [
"frequency path"
]
},
{
"element_identifier": "302",
"terms": [
"phase detector"
]
},
{
"element_identifier": "326",
"terms": [
"multiplexer",
"multiplexers"
]
},
{
"element_identifier": "324",
"terms": [
"adder"
]
},
{
"element_identifier": "308",
"terms": [
"gain circuit",
"gain circuits"
]
},
{
"element_identifier": "318",
"terms": [
"adder"
]
},
{
"element_identifier": "320",
"terms": [
"adder"
]
},
{
"element_identifier": "316",
"terms": [
"control circuit"
]
},
{
"element_identifier": "312",
"terms": [
"delay element"
]
},
{
"element_identifier": "330",
"terms": [
"digital loop filter"
]
},
{
"element_identifier": "322",
"terms": [
"delay element"
]
}
] | ['1. A method of performing an eye-scan in a receiver (126), comprising: generating digital samples from an analog signal input to the receiver (126) based on a sampling clock, the sampling clock phase-shifted with respect to a reference clock based on a phase interpolator, PI, code; equalizing the digital samples based on first equalization parameters of a plurality of equalization parameters of the receiver (126); adapting the plurality of equalization parameters and performing clock recovery based on the digital samples to generate the PI code; performing a plurality of cycles of locking the plurality of equalization parameters, suspending phase detection in the clock recovery, offsetting the PI code by different amounts across the plurality of cycles, collecting an output of the receiver (126), resuming the phase detection in the clock recovery, and unlocking the equalization parameters to perform the eye scan.', '2. The method of claim 1, wherein the step of performing the clock recovery comprises: performing the phase detection based on the digital samples to generate a phase error signal; filtering the phase error signal through a digital loop filter (330) to generate the PI code.', '3. The method of claim 2, wherein the step of suspending the phase detection comprises: disconnecting an output of a phase detector (302) configured to perform the phase detection from an input of the digital loop filter (330).'] | false | [
"327",
"306",
"330",
"304",
"324",
"208",
"326",
"302",
"318",
"310",
"312",
"308",
"320",
"322",
"14",
"328",
"316"
] |
|
EP_3500867_B1 (3).png | EP3500867B1 | BUILT-IN EYE SCAN FOR ADC-BASED RECEIVER | [
"FIG4"
] | [
"FIG4 is a flow diagram depicting a method of performing an eye scan in a receiver according to an example"
] | [
"FIG4 is a flow diagram depicting a method 400 of performing an eye scan in a receiver according to an example. The method 400 can be performed by the SerDes 122 described above. The method 400 begins at step 402, where the control circuit 316 selects an initial offset for the PI code to be used during the eye scan mode (e.g., the control circuit 316 selects value for dn)."
] | 20 | 77 | flow diagram | G | [
{
"element_identifier": "420",
"terms": [
"step"
]
},
{
"element_identifier": "416",
"terms": [
"adaptation process. At step"
]
},
{
"element_identifier": "412",
"terms": [
"at step"
]
},
{
"element_identifier": "422",
"terms": [
"step"
]
},
{
"element_identifier": "400",
"terms": [
"method"
]
},
{
"element_identifier": "414",
"terms": [
"/ rfo. At step"
]
},
{
"element_identifier": "4",
"terms": [
"IOB"
]
},
{
"element_identifier": "402",
"terms": [
"step"
]
},
{
"element_identifier": "406",
"terms": [
"threshold. At step"
]
},
{
"element_identifier": "15",
"terms": [
"logic element"
]
},
{
"element_identifier": "404",
"terms": [
"step"
]
},
{
"element_identifier": "418",
"terms": [
"step"
]
},
{
"element_identifier": "410",
"terms": [
"scan mode. At step"
]
},
{
"element_identifier": "408",
"terms": [
"scan mode. At step"
]
}
] | ['1. A method of performing an eye-scan in a receiver (126), comprising: generating digital samples from an analog signal input to the receiver (126) based on a sampling clock, the sampling clock phase-shifted with respect to a reference clock based on a phase interpolator, PI, code; equalizing the digital samples based on first equalization parameters of a plurality of equalization parameters of the receiver (126); adapting the plurality of equalization parameters and performing clock recovery based on the digital samples to generate the PI code; performing a plurality of cycles of locking the plurality of equalization parameters, suspending phase detection in the clock recovery, offsetting the PI code by different amounts across the plurality of cycles, collecting an output of the receiver (126), resuming the phase detection in the clock recovery, and unlocking the equalization parameters to perform the eye scan.', '2. The method of claim 1, wherein the step of performing the clock recovery comprises: performing the phase detection based on the digital samples to generate a phase error signal; filtering the phase error signal through a digital loop filter (330) to generate the PI code.'] | false | [
"400",
"402",
"404",
"406",
"408",
"410",
"412",
"414",
"416",
"418",
"420",
"422",
"4",
"15"
] |
|
EP_3500867_B1 (4).png | EP3500867B1 | BUILT-IN EYE SCAN FOR ADC-BASED RECEIVER | [
"FIG5"
] | [
"FIG5 illustrates an example eye plot for a binary non-return-to-zero (NRZ) signal"
] | [
"FIG5 illustrates an example eye plot 500 for a binary NRZ signal. The eye plot 500 is formed from the various digital samples collected during the eye scan cycles described above. The eye plot 500 shows the data eye for a UI 502. During each eye scan cycle, the PI code is offset to scan across an axis 504 representing time. An axis 506 represents amplitude. Since the receiver is ADC-based, the collected digital samples can include enough resolution that no scanning is necessary across the axis 504. While the example shows a binary NRZ signal, eye plots for multi-level PAM signals and the like can also be formed using the techniques described above."
] | 20 | 128 | plot | G | [
{
"element_identifier": "504",
"terms": [
"axis"
]
},
{
"element_identifier": "500",
"terms": [
"eye plot"
]
},
{
"element_identifier": "502",
"terms": [
"UI"
]
}
] | ['7. The method of any of claims 1-6, wherein the plurality of cycles are performed until the PI code has been updated to cover at least one unit interval, UI, of the analog signal.'] | false | [
"500",
"502",
"5",
"504",
"16"
] |
|
EP_3500867_B1.png | EP3500867B1 | BUILT-IN EYE SCAN FOR ADC-BASED RECEIVER | [
"FIG1"
] | [
"FIG1 is a block diagram depicting an example of a serial communication system"
] | [
"FIG1 is a block diagram depicting an example of a serial communication system 100. The serial communication system 100 comprises a transmitter 112 coupled to a receiver 126 over transmission medium 160. The transmitter 112 can be part of a serializer-deserializer (SerDes) 116. The receiver 126 can be part of a SerDes 122. The transmission medium 160 comprises an electrical path between the transmitter 112 and the receiver 126 and can include printed circuit board (PCB) traces, vias, cables, connectors, decoupling capacitors, and the like. The receiver of the SerDes 116, and the transmitter of the SerDes 122, are omitted for clarity. In some examples, the SerDes 116 can be disposed in an integrated circuit (IC) 110, and the SerDes 122 can be disposed in an IC 120.",
"In some FPGAs, each programmable tile can include at least one programmable interconnect element (\"INT\") 11 having connections to input and output terminals 20 of a programmable logic element within the same tile, as shown by examples included at the top of FIG1. Each programmable interconnect element 11 can also include connections to interconnect segments 22 of adjacent programmable interconnect element(s) in the same tile or other tile(s). Each programmable interconnect element 11 can also include connections to interconnect segments 24 of general routing resources between logic blocks (not shown). The general routing resources can include routing channels between logic blocks (not shown) comprising tracks of interconnect segments (e.g., interconnect segments 24) and switch blocks (not shown) for connecting interconnect segments. The interconnect segments of the general routing resources (e.g., interconnect segments 24) can span one or more logic blocks. The programmable interconnect elements 11 taken together with the general routing resources implement a programmable interconnect structure (\"programmable interconnect\") for the illustrated FPGA."
] | 13 | 346 | block diagram | G | [
{
"element_identifier": "122",
"terms": [
"SerDes"
]
},
{
"element_identifier": "160",
"terms": [
"transmission medium"
]
},
{
"element_identifier": "128",
"terms": [
"circuitry"
]
},
{
"element_identifier": "116",
"terms": [
"SerDes"
]
},
{
"element_identifier": "100",
"terms": [
"serial communication system"
]
},
{
"element_identifier": "126",
"terms": [
"receiver"
]
},
{
"element_identifier": "104",
"terms": [
"circuitry"
]
},
{
"element_identifier": "112",
"terms": [
"transmitter"
]
},
{
"element_identifier": "106",
"terms": [
"eye scan circuitry"
]
},
{
"element_identifier": "120",
"terms": [
"IC"
]
}
] | ['1. A method of performing an eye-scan in a receiver (126), comprising: generating digital samples from an analog signal input to the receiver (126) based on a sampling clock, the sampling clock phase-shifted with respect to a reference clock based on a phase interpolator, PI, code; equalizing the digital samples based on first equalization parameters of a plurality of equalization parameters of the receiver (126); adapting the plurality of equalization parameters and performing clock recovery based on the digital samples to generate the PI code; performing a plurality of cycles of locking the plurality of equalization parameters, suspending phase detection in the clock recovery, offsetting the PI code by different amounts across the plurality of cycles, collecting an output of the receiver (126), resuming the phase detection in the clock recovery, and unlocking the equalization parameters to perform the eye scan.', '8. A receiver (126), comprising: a front end (202) configured to receive an analog signal; analog-to-digital converter, ADC, circuitry (104) configured to generate digital samples from the analog signal based on a sampling clock; a digital signal processor, DSP (204) configured to equalize the digital samples based on first equalization parameters of a plurality of equalization parameters; a clock recovery circuit (206) configured to perform clock recovery based on the digital samples to generate a phase interpolator, PI, code; a PI (208) configured to generate the sampling clock based on the PI code; an adaptation circuit (205) configured to adapt the plurality of equalization parameters; and an eye scan circuit (106) configured to control a plurality of cycles of locking the plurality of equalization parameters, suspending phase detection in the clock recovery of the clock recovery circuit (206), offsetting the PI code by different amounts across the plurality of cycles, collecting the digital samples, resuming the phase detection in the clock recovery of the clock recovery circuit (206), and unlocking the equalization parameters.'] | false | [
"100",
"116",
"112",
"122",
"126",
"104",
"106",
"128",
"160",
"110",
"120",
"12"
] |
|
EP_3500908_B1 (4).png | EP3500908B1 | SUPPORTING AN AUGMENTED-REALITY SOFTWARE APPLICATION | [
"FIG8"
] | [
"FIG8 shows another embodiment of the processing means comprised in the computing device for supporting an AR software application"
] | [
"In FIG8 an alternative embodiment 800 of processing means 125 is illustrated. Similar to processing means 700, processing means 800 comprises one or more interfaces 801 (\"I/O\" in FIG8) for controlling and/or receiving information from other components comprised in computing device 120/500/600, such as camera 121, display 124, and communications module 126. Processing means 800 further comprises a location selection module 803 which is configured for causing computing device 120/500/600 to perform in accordance with embodiments of the invention as described herein. In particular, location selection module 803 is configured for selecting a physical location for placing a current virtual object based on an expected physical location which a user of the AR software application assumes in response to displaying the physical scene and the overlaid current virtual object to the user, and an attribute which is spatially dependent in the surroundings of the user and which has an impact on a user experience of the AR software application. For instance, the physical location for placing the current virtual object may be selected by determining, for at least one candidate physical location for placing the current virtual object, the expected physical location which the user assumes in response to displaying the physical scene and the current virtual object to the user, and evaluating a value of the spatially-dependent attribute at the expected physical location. The physical location for placing the current virtual object is then selected based on the plurality of values of the spatially-dependent attribute evaluated at the at least one candidate physical location. The expected physical location which the user assumes in response to displaying the physical scene and the overlaid current virtual object to the user may, e.g., be within a predetermined range of, or equal to, the candidate physical location."
] | 19 | 325 | embodiment | G | [
{
"element_identifier": "801",
"terms": [
"interfaces"
]
},
{
"element_identifier": "704",
"terms": [
"computer-executable instructions"
]
},
{
"element_identifier": "701",
"terms": [
"interfaces"
]
},
{
"element_identifier": "802",
"terms": [
"AR module"
]
},
{
"element_identifier": "800",
"terms": [
"processing means"
]
},
{
"element_identifier": "700",
"terms": [
"processing means"
]
}
] | ['1. A computing device (120; 500; 600) for supporting an Augmented-Reality, AR, software application, the computing device comprising processing means (125) being operative to: for each one of at least two candidate physical locations (131, 132; 231, 232) for placing a current virtual object (104; 204), where the current virtual object appears to be placed when overlaid onto a video sequence capturing a physical scene (100; 200) in the surroundings of a user (110) of the AR software application: determine an expected physical location to which the user moves, or where the user remains, in response to displaying (123; 223) the physical scene and the overlaid current virtual object to the user, and evaluate a value of an attribute which is related to a performance of a wireless connection utilized by the AR software application, and which is spatially dependent in the surroundings of the user, at the expected physical location, and select the physical location for placing the current virtual object from the at least two candidate physical locations based on a superior performance of the wireless connection for the selected physical location.', '17. A computer program (704) comprising computer-executable instructions for causing a device to perform the method according to claim 16, when the computer-executable instructions are executed on a processing unit (702) comprised in the device.'] | true | [
"7",
"700",
"704",
"701",
"8",
"800",
"802",
"801",
"21"
] |
|
EP_3500923_B1 (1).png | EP3500923B1 | COLLECTING ENTROPY FROM DIVERSE SOURCES | [
"FIG2"
] | [
"FIG2 illustrates foiling an eavesdropper in accordance with an embodiment"
] | [
"FIG2 illustrates foiling an eavesdropper in a typical use case. Entropy source 202 is compromised by a determined entity. For example, the manufacturer of a hardware-based entropy generator 202 may have conceded data to a government that shows that the entropy generator is slightly skewed. The government may be able to actively force the entropy generator to skew by judicial or other means."
] | 10 | 70 | null | G | [
{
"element_identifier": "210",
"terms": [
"timers"
]
},
{
"element_identifier": "202",
"terms": [
"source",
"entropy generator"
]
},
{
"element_identifier": "242",
"terms": [
"PRNG"
]
},
{
"element_identifier": "262",
"terms": [
"computer"
]
},
{
"element_identifier": "208",
"terms": [
"timers"
]
},
{
"element_identifier": "204",
"terms": [
"source"
]
},
{
"element_identifier": "254",
"terms": [
"document"
]
},
{
"element_identifier": "258",
"terms": [
"network"
]
},
{
"element_identifier": "256",
"terms": [
"decryption key"
]
},
{
"element_identifier": "260",
"terms": [
"computer"
]
}
] | ['1. A method for generating entropy in a computing device, the method comprising: setting a repeating first timer for a first frequency; setting a repeating second timer for a second frequency; collecting a predetermined number of first bits from a first entropy source at the first frequency, the predetermined number based on an amount of entropy per bit attributable to the first entropy source; presenting the first bits to a pseudo-random number generator; gathering a specified number of second bits from a second entropy source at the second frequency, the specified number based on an amount of entropy per bit attributable to the second entropy source; and presenting the second bits to the pseudo-random number generator, whereby the first and second bits can be used to seed the pseudo-random number generator.', '14. A method for seeding entropy in a pseudo-random number generator, the method comprising: setting asynchronous timers of different frequencies; collecting a predetermined number of first bits from a first entropy source according to a first timer of the asynchronous timers; calculating a Hamming distance between successive collected first bits; accepting the first bits into a first accumulation buffer based on the Hamming distance exceeding a minimum; summing Hamming distances between successive collections of first bits into an accumulated value of entropy attributed to contents of the first accumulation buffer; presenting contents of the first accumulation buffer to a pseudo-random number generator; gathering a specified number of second bits from a second entropy source according to a second timer of the asynchronous timers; accepting the second bits into a second accumulation buffer, the second accumulation buffer having a different size than a size of the first accumulation buffer; and presenting contents of the second accumulation buffer to the pseudo-random number generator.'] | false | [
"200",
"202",
"204",
"210",
"242",
"208",
"260",
"258",
"256",
"254",
"262",
"47"
] |
|
EP_3500923_B1 (2).png | EP3500923B1 | COLLECTING ENTROPY FROM DIVERSE SOURCES | [
"FIG3"
] | [
"FIG3 is a sequence diagram in accordance with an embodiment"
] | [
"FIG3 is a sequence diagram for system 300 with time running from top to bottom. At a first time, source 302 supplies entropy 318a to entropy collector 306. That entropy is forwarded as seed 336a immediately to PRNG 342. At periodic time intervals following, at frequency 308, entropies 318b, 318c, 318d, 318e, 318f, 318g, 318h, and beyond from entropy source 302 are forwarded as 336b, 336c, 336d, 336e, 336f, 336g, 336h, and beyond to PRNG 342."
] | 10 | 99 | sequence diagram | G | [
{
"element_identifier": "310",
"terms": [
"at frequency",
"frequencies",
"frequency"
]
},
{
"element_identifier": "338",
"terms": [
"seed"
]
},
{
"element_identifier": "334",
"terms": [
"accumulation buffer"
]
},
{
"element_identifier": "300",
"terms": [
"system"
]
},
{
"element_identifier": "308",
"terms": [
"at frequency",
"frequencies",
"frequency"
]
}
] | ['1. A method for generating entropy in a computing device, the method comprising: setting a repeating first timer for a first frequency; setting a repeating second timer for a second frequency; collecting a predetermined number of first bits from a first entropy source at the first frequency, the predetermined number based on an amount of entropy per bit attributable to the first entropy source; presenting the first bits to a pseudo-random number generator; gathering a specified number of second bits from a second entropy source at the second frequency, the specified number based on an amount of entropy per bit attributable to the second entropy source; and presenting the second bits to the pseudo-random number generator, whereby the first and second bits can be used to seed the pseudo-random number generator.', '8. The method of claim 1 further comprising: accepting the first bits into an accumulation buffer upon the collecting; and presenting the first bits from the accumulation buffer to the pseudo-random number generator upon the accumulation buffer becoming full, thereby providing a greater amount of sudden entropy than in a single collection of first bits.'] | false | [
"300",
"30",
"334",
"308",
"3189",
"34",
"310",
"334",
"348",
"334",
"334",
"338",
"334",
"48"
] |
|
EP_3500923_B1 (3).png | EP3500923B1 | COLLECTING ENTROPY FROM DIVERSE SOURCES | [
"FIG4"
] | [
"FIG4 is a timing diagram with two entropy source sampling frequencies in accordance with an embodiment"
] | [
"FIG4 is a timing diagram with two entropy source sampling frequencies in accordance with an embodiment. A representation of first timer 408 is shown at the top of the figure. Every leading edge or downward edge represents a timer event. Nominally, first timer 408 fires at every vertical line. In the figure, the pulses of first timer 408 are delayed or accelerated by random jitter 414. The amount of the delay or acceleration is determined the output of a pseudo-random number generator."
] | 16 | 92 | diagram | G | [
{
"element_identifier": "4",
"terms": [
"required"
]
},
{
"element_identifier": "414",
"terms": [
"random jitter"
]
},
{
"element_identifier": "410",
"terms": [
"second timer"
]
},
{
"element_identifier": "408",
"terms": [
"first timer"
]
}
] | ['1. A method for generating entropy in a computing device, the method comprising: setting a repeating first timer for a first frequency; setting a repeating second timer for a second frequency; collecting a predetermined number of first bits from a first entropy source at the first frequency, the predetermined number based on an amount of entropy per bit attributable to the first entropy source; presenting the first bits to a pseudo-random number generator; gathering a specified number of second bits from a second entropy source at the second frequency, the specified number based on an amount of entropy per bit attributable to the second entropy source; and presenting the second bits to the pseudo-random number generator, whereby the first and second bits can be used to seed the pseudo-random number generator.'] | false | [
"414",
"408",
"49",
"410",
"4"
] |
|
EP_3500923_B1 (4).png | EP3500923B1 | COLLECTING ENTROPY FROM DIVERSE SOURCES | [
"FIG5"
] | [
"FIG5 is a flowchart illustrating a process in accordance with an embodiment"
] | [
"FIG5 is a flowchart illustrating process 500 in accordance with an embodiment. The process can be implemented by computer by executing instructions in a processor or otherwise. In operation 501, a repeating time for a first frequency is set. In operation 502, a repeating second timer for a second frequency is set, the second frequency being different from the first frequency and not, in this case, at a harmonic of the first frequency. In operation 503, a predetermined number of first bits from a first entropy source are collected at the first frequency, the predetermined number based on an amount of entropy per bit attributable to the first entropy source. In operation 504, the first bits are presented to a pseudo-random number generator. In operation 505, a specified number of second bits from a second entropy source are gathered at the second frequency, the specified number based on an amount of entropy per bit attributable to the second entropy source. In operation 506, the second bits are presented to the pseudo-random number generator. The first and second bits can be used to seed the pseudo-random number generator. In operation 507, the first and/or second frequency is periodically adjusted based on an output from the pseudo-random number generator."
] | 12 | 237 | flowchart | G | [
{
"element_identifier": "32",
"terms": [
"OpenSSL reads"
]
},
{
"element_identifier": "256",
"terms": [
"decryption key"
]
},
{
"element_identifier": "1",
"terms": [
"OpenSSL version"
]
},
{
"element_identifier": "0",
"terms": [
">"
]
},
{
"element_identifier": "100",
"terms": [
"entropy module in system"
]
},
{
"element_identifier": "106",
"terms": [
"In entropy module"
]
},
{
"element_identifier": "108",
"terms": [
"timers"
]
},
{
"element_identifier": "110",
"terms": [
"timers"
]
},
{
"element_identifier": "102",
"terms": [
"from first entropy source"
]
},
{
"element_identifier": "104",
"terms": [
"second entropy source"
]
},
{
"element_identifier": "3",
"terms": [
"frequency may be at",
"few specific valuessysconf"
]
},
{
"element_identifier": "126",
"terms": [
"modified Hamming distance"
]
},
{
"element_identifier": "118",
"terms": [
"entropy"
]
},
{
"element_identifier": "130",
"terms": [
"as bits"
]
},
{
"element_identifier": "136",
"terms": [
"immediately forwarded as bits"
]
},
{
"element_identifier": "128",
"terms": [
"modified Hamming distance"
]
},
{
"element_identifier": "120",
"terms": [
"entropy"
]
},
{
"element_identifier": "334",
"terms": [
"accumulation buffer"
]
},
{
"element_identifier": "142",
"terms": [
"PRNG"
]
},
{
"element_identifier": "140",
"terms": [
"module may be forwarded"
]
},
{
"element_identifier": "144",
"terms": [
"seed memory location"
]
},
{
"element_identifier": "146",
"terms": [
"output"
]
},
{
"element_identifier": "112",
"terms": [
"timer"
]
},
{
"element_identifier": "148",
"terms": [
"random bits"
]
},
{
"element_identifier": "789",
"terms": [
"number"
]
},
{
"element_identifier": "32767",
"terms": [
"/"
]
},
{
"element_identifier": "2",
"terms": [
"getentropy"
]
},
{
"element_identifier": "202",
"terms": [
"source",
"entropy generator"
]
},
{
"element_identifier": "204",
"terms": [
"source"
]
},
{
"element_identifier": "208",
"terms": [
"timers"
]
},
{
"element_identifier": "210",
"terms": [
"timers"
]
},
{
"element_identifier": "242",
"terms": [
"PRNG"
]
},
{
"element_identifier": "260",
"terms": [
"computer"
]
},
{
"element_identifier": "252",
"terms": [
"encryption key"
]
},
{
"element_identifier": "254",
"terms": [
"document"
]
},
{
"element_identifier": "258",
"terms": [
"network"
]
},
{
"element_identifier": "262",
"terms": [
"computer"
]
},
{
"element_identifier": "10",
"terms": [
"keys are changed every",
"BlackBerry®"
]
},
{
"element_identifier": "300",
"terms": [
"system"
]
},
{
"element_identifier": "302",
"terms": [
"source"
]
},
{
"element_identifier": "318a",
"terms": [
"supplies entropy"
]
},
{
"element_identifier": "306",
"terms": [
"entropy collector"
]
},
{
"element_identifier": "336a",
"terms": [
"is forwarded as seed"
]
},
{
"element_identifier": "342",
"terms": [
"PRNG"
]
},
{
"element_identifier": "308",
"terms": [
"at frequency",
"frequencies",
"frequency"
]
},
{
"element_identifier": "318b",
"terms": [
"entropies"
]
},
{
"element_identifier": "304",
"terms": [
"source"
]
},
{
"element_identifier": "320a",
"terms": [
"supplies entropy"
]
},
{
"element_identifier": "310",
"terms": [
"at frequency",
"frequencies",
"frequency"
]
},
{
"element_identifier": "320e",
"terms": [
"exemplary case when entropy"
]
},
{
"element_identifier": "338",
"terms": [
"seed"
]
},
{
"element_identifier": "408",
"terms": [
"first timer"
]
},
{
"element_identifier": "414",
"terms": [
"random jitter"
]
},
{
"element_identifier": "410",
"terms": [
"second timer"
]
},
{
"element_identifier": "28",
"terms": [
"in"
]
},
{
"element_identifier": "248",
"terms": [
"· 128C8 ≈"
]
},
{
"element_identifier": "2128",
"terms": [
"pool containing"
]
},
{
"element_identifier": "33",
"terms": [
"default this size is",
"provide",
"generator chosen. We use"
]
},
{
"element_identifier": "8",
"terms": [
"×"
]
},
{
"element_identifier": "4",
"terms": [
"required"
]
},
{
"element_identifier": "17",
"terms": [
"NSE Entropy Module Page"
]
},
{
"element_identifier": "16",
"terms": [
"mode only benefits from"
]
},
{
"element_identifier": "20",
"terms": [
"bytes. Non-FIPS mode"
]
},
{
"element_identifier": "64",
"terms": [
"usefully as large as",
"less than"
]
},
{
"element_identifier": "4096",
"terms": [
"first"
]
},
{
"element_identifier": "500",
"terms": [
"flowchart illustrating process"
]
},
{
"element_identifier": "501",
"terms": [
"otherwise. In operation"
]
},
{
"element_identifier": "503",
"terms": [
"first frequency. In operation"
]
},
{
"element_identifier": "504",
"terms": [
"entropy source. In operation"
]
},
{
"element_identifier": "505",
"terms": [
"number generator. In operation"
]
},
{
"element_identifier": "506",
"terms": [
"entropy source. In operation"
]
},
{
"element_identifier": "507",
"terms": [
"number generator. In operation"
]
},
{
"element_identifier": "600",
"terms": [
"flowchart illustrating process"
]
},
{
"element_identifier": "601",
"terms": [
"otherwise. In operation"
]
},
{
"element_identifier": "603",
"terms": [
"asynchronous timers. In operation"
]
},
{
"element_identifier": "604",
"terms": [
"first bits. In operation"
]
},
{
"element_identifier": "605",
"terms": [
"minimum. In operation"
]
},
{
"element_identifier": "606",
"terms": [
"accumulation buffer. In operation"
]
},
{
"element_identifier": "607",
"terms": [
"number generator. In operation"
]
},
{
"element_identifier": "608",
"terms": [
"asynchronous timers. In operation"
]
},
{
"element_identifier": "609",
"terms": [
"accumulation buffer. In operation"
]
},
{
"element_identifier": "700",
"terms": [
"system"
]
},
{
"element_identifier": "704",
"terms": [
"processing unit"
]
},
{
"element_identifier": "702",
"terms": [
"bus subsystem"
]
},
{
"element_identifier": "706",
"terms": [
"processing acceleration unit"
]
},
{
"element_identifier": "708",
"terms": [
"I/O subsystem"
]
},
{
"element_identifier": "718",
"terms": [
"storage subsystem"
]
},
{
"element_identifier": "724",
"terms": [
"communications subsystem"
]
},
{
"element_identifier": "722",
"terms": [
"computer-readable storage media"
]
},
{
"element_identifier": "710",
"terms": [
"system memory"
]
},
{
"element_identifier": "732",
"terms": [
"independent processing units"
]
},
{
"element_identifier": "360",
"terms": [
"Microsoft Xbox®"
]
},
{
"element_identifier": "714",
"terms": [
"program data"
]
},
{
"element_identifier": "716",
"terms": [
"operating system"
]
},
{
"element_identifier": "720",
"terms": [
"computer-readable storage media reader"
]
},
{
"element_identifier": "726",
"terms": [
"data feeds"
]
},
{
"element_identifier": "728",
"terms": [
"event streams"
]
},
{
"element_identifier": "730",
"terms": [
"event updates"
]
}
] | ['1. A method for generating entropy in a computing device, the method comprising: setting a repeating first timer for a first frequency; setting a repeating second timer for a second frequency; collecting a predetermined number of first bits from a first entropy source at the first frequency, the predetermined number based on an amount of entropy per bit attributable to the first entropy source; presenting the first bits to a pseudo-random number generator; gathering a specified number of second bits from a second entropy source at the second frequency, the specified number based on an amount of entropy per bit attributable to the second entropy source; and presenting the second bits to the pseudo-random number generator, whereby the first and second bits can be used to seed the pseudo-random number generator.', '3. The method of claim 2 wherein the adjusting of the first frequency is based on an output from the pseudo-random number generator.', '14. A method for seeding entropy in a pseudo-random number generator, the method comprising: setting asynchronous timers of different frequencies; collecting a predetermined number of first bits from a first entropy source according to a first timer of the asynchronous timers; calculating a Hamming distance between successive collected first bits; accepting the first bits into a first accumulation buffer based on the Hamming distance exceeding a minimum; summing Hamming distances between successive collections of first bits into an accumulated value of entropy attributed to contents of the first accumulation buffer; presenting contents of the first accumulation buffer to a pseudo-random number generator; gathering a specified number of second bits from a second entropy source according to a second timer of the asynchronous timers; accepting the second bits into a second accumulation buffer, the second accumulation buffer having a different size than a size of the first accumulation buffer; and presenting contents of the second accumulation buffer to the pseudo-random number generator.'] | false | [
"500",
"501",
"502",
"503",
"505",
"504",
"506",
"507",
"50"
] |
|
EP_3500923_B1 (5).png | EP3500923B1 | COLLECTING ENTROPY FROM DIVERSE SOURCES | [
"FIG6"
] | [
"FIG6 is a flowchart illustrating a process in accordance with an embodiment"
] | [
"FIG6 is a flowchart illustrating process 600 in accordance with an embodiment. The process can be implemented by computer by executing instructions in a processor or otherwise. In operation 601, asynchronous timers of different frequencies from one another that are not, in this case, harmonics of each other are set. In operation 602, a predetermined number of first bits from a first entropy source are collected according to a first timer of the asynchronous timers. In operation 603, a Hamming distance is calculated between successive collected first bits. In operation 604, the first bits are accepted into a first accumulation buffer based on the Hamming distance exceeding a minimum. In operation 605, Hamming distances between successive collections of first bits are summed into an accumulated value of entropy attributed to contents of the first accumulation buffer. In operation 606, contents of the first accumulation buffer are presented to a pseudo-random number generator. In operation 607, a specified number of second bits from a second entropy source are gathered according to a second timer of the asynchronous timers. In operation 608, the second bits are accepted into a second accumulation buffer, the second accumulation buffer having a different size than a size of the first accumulation buffer. In operation 609, the contents of the second accumulation buffer are presented to the pseudo-random number generator"
] | 12 | 249 | flowchart | G | [
{
"element_identifier": "32",
"terms": [
"OpenSSL reads"
]
},
{
"element_identifier": "256",
"terms": [
"decryption key"
]
},
{
"element_identifier": "1",
"terms": [
"OpenSSL version"
]
},
{
"element_identifier": "0",
"terms": [
">"
]
},
{
"element_identifier": "100",
"terms": [
"entropy module in system"
]
},
{
"element_identifier": "106",
"terms": [
"In entropy module"
]
},
{
"element_identifier": "108",
"terms": [
"timers"
]
},
{
"element_identifier": "110",
"terms": [
"timers"
]
},
{
"element_identifier": "102",
"terms": [
"from first entropy source"
]
},
{
"element_identifier": "104",
"terms": [
"second entropy source"
]
},
{
"element_identifier": "3",
"terms": [
"frequency may be at",
"few specific valuessysconf"
]
},
{
"element_identifier": "126",
"terms": [
"modified Hamming distance"
]
},
{
"element_identifier": "118",
"terms": [
"entropy"
]
},
{
"element_identifier": "130",
"terms": [
"as bits"
]
},
{
"element_identifier": "136",
"terms": [
"immediately forwarded as bits"
]
},
{
"element_identifier": "128",
"terms": [
"modified Hamming distance"
]
},
{
"element_identifier": "120",
"terms": [
"entropy"
]
},
{
"element_identifier": "334",
"terms": [
"accumulation buffer"
]
},
{
"element_identifier": "142",
"terms": [
"PRNG"
]
},
{
"element_identifier": "140",
"terms": [
"module may be forwarded"
]
},
{
"element_identifier": "144",
"terms": [
"seed memory location"
]
},
{
"element_identifier": "146",
"terms": [
"output"
]
},
{
"element_identifier": "112",
"terms": [
"timer"
]
},
{
"element_identifier": "148",
"terms": [
"random bits"
]
},
{
"element_identifier": "789",
"terms": [
"number"
]
},
{
"element_identifier": "32767",
"terms": [
"/"
]
},
{
"element_identifier": "2",
"terms": [
"getentropy"
]
},
{
"element_identifier": "202",
"terms": [
"source",
"entropy generator"
]
},
{
"element_identifier": "204",
"terms": [
"source"
]
},
{
"element_identifier": "208",
"terms": [
"timers"
]
},
{
"element_identifier": "210",
"terms": [
"timers"
]
},
{
"element_identifier": "242",
"terms": [
"PRNG"
]
},
{
"element_identifier": "260",
"terms": [
"computer"
]
},
{
"element_identifier": "252",
"terms": [
"encryption key"
]
},
{
"element_identifier": "254",
"terms": [
"document"
]
},
{
"element_identifier": "258",
"terms": [
"network"
]
},
{
"element_identifier": "262",
"terms": [
"computer"
]
},
{
"element_identifier": "10",
"terms": [
"keys are changed every",
"BlackBerry®"
]
},
{
"element_identifier": "300",
"terms": [
"system"
]
},
{
"element_identifier": "302",
"terms": [
"source"
]
},
{
"element_identifier": "318a",
"terms": [
"supplies entropy"
]
},
{
"element_identifier": "306",
"terms": [
"entropy collector"
]
},
{
"element_identifier": "336a",
"terms": [
"is forwarded as seed"
]
},
{
"element_identifier": "342",
"terms": [
"PRNG"
]
},
{
"element_identifier": "308",
"terms": [
"at frequency",
"frequencies",
"frequency"
]
},
{
"element_identifier": "318b",
"terms": [
"entropies"
]
},
{
"element_identifier": "304",
"terms": [
"source"
]
},
{
"element_identifier": "320a",
"terms": [
"supplies entropy"
]
},
{
"element_identifier": "310",
"terms": [
"at frequency",
"frequencies",
"frequency"
]
},
{
"element_identifier": "320e",
"terms": [
"exemplary case when entropy"
]
},
{
"element_identifier": "338",
"terms": [
"seed"
]
},
{
"element_identifier": "408",
"terms": [
"first timer"
]
},
{
"element_identifier": "414",
"terms": [
"random jitter"
]
},
{
"element_identifier": "410",
"terms": [
"second timer"
]
},
{
"element_identifier": "28",
"terms": [
"in"
]
},
{
"element_identifier": "248",
"terms": [
"· 128C8 ≈"
]
},
{
"element_identifier": "2128",
"terms": [
"pool containing"
]
},
{
"element_identifier": "33",
"terms": [
"default this size is",
"provide",
"generator chosen. We use"
]
},
{
"element_identifier": "8",
"terms": [
"×"
]
},
{
"element_identifier": "4",
"terms": [
"required"
]
},
{
"element_identifier": "17",
"terms": [
"NSE Entropy Module Page"
]
},
{
"element_identifier": "16",
"terms": [
"mode only benefits from"
]
},
{
"element_identifier": "20",
"terms": [
"bytes. Non-FIPS mode"
]
},
{
"element_identifier": "64",
"terms": [
"usefully as large as",
"less than"
]
},
{
"element_identifier": "4096",
"terms": [
"first"
]
},
{
"element_identifier": "500",
"terms": [
"flowchart illustrating process"
]
},
{
"element_identifier": "501",
"terms": [
"otherwise. In operation"
]
},
{
"element_identifier": "503",
"terms": [
"first frequency. In operation"
]
},
{
"element_identifier": "504",
"terms": [
"entropy source. In operation"
]
},
{
"element_identifier": "505",
"terms": [
"number generator. In operation"
]
},
{
"element_identifier": "506",
"terms": [
"entropy source. In operation"
]
},
{
"element_identifier": "507",
"terms": [
"number generator. In operation"
]
},
{
"element_identifier": "600",
"terms": [
"flowchart illustrating process"
]
},
{
"element_identifier": "601",
"terms": [
"otherwise. In operation"
]
},
{
"element_identifier": "603",
"terms": [
"asynchronous timers. In operation"
]
},
{
"element_identifier": "604",
"terms": [
"first bits. In operation"
]
},
{
"element_identifier": "605",
"terms": [
"minimum. In operation"
]
},
{
"element_identifier": "606",
"terms": [
"accumulation buffer. In operation"
]
},
{
"element_identifier": "607",
"terms": [
"number generator. In operation"
]
},
{
"element_identifier": "608",
"terms": [
"asynchronous timers. In operation"
]
},
{
"element_identifier": "609",
"terms": [
"accumulation buffer. In operation"
]
},
{
"element_identifier": "700",
"terms": [
"system"
]
},
{
"element_identifier": "704",
"terms": [
"processing unit"
]
},
{
"element_identifier": "702",
"terms": [
"bus subsystem"
]
},
{
"element_identifier": "706",
"terms": [
"processing acceleration unit"
]
},
{
"element_identifier": "708",
"terms": [
"I/O subsystem"
]
},
{
"element_identifier": "718",
"terms": [
"storage subsystem"
]
},
{
"element_identifier": "724",
"terms": [
"communications subsystem"
]
},
{
"element_identifier": "722",
"terms": [
"computer-readable storage media"
]
},
{
"element_identifier": "710",
"terms": [
"system memory"
]
},
{
"element_identifier": "732",
"terms": [
"independent processing units"
]
},
{
"element_identifier": "360",
"terms": [
"Microsoft Xbox®"
]
},
{
"element_identifier": "714",
"terms": [
"program data"
]
},
{
"element_identifier": "716",
"terms": [
"operating system"
]
},
{
"element_identifier": "720",
"terms": [
"computer-readable storage media reader"
]
},
{
"element_identifier": "726",
"terms": [
"data feeds"
]
},
{
"element_identifier": "728",
"terms": [
"event streams"
]
},
{
"element_identifier": "730",
"terms": [
"event updates"
]
}
] | ['1. A method for generating entropy in a computing device, the method comprising: setting a repeating first timer for a first frequency; setting a repeating second timer for a second frequency; collecting a predetermined number of first bits from a first entropy source at the first frequency, the predetermined number based on an amount of entropy per bit attributable to the first entropy source; presenting the first bits to a pseudo-random number generator; gathering a specified number of second bits from a second entropy source at the second frequency, the specified number based on an amount of entropy per bit attributable to the second entropy source; and presenting the second bits to the pseudo-random number generator, whereby the first and second bits can be used to seed the pseudo-random number generator.', '3. The method of claim 2 wherein the adjusting of the first frequency is based on an output from the pseudo-random number generator.', '14. A method for seeding entropy in a pseudo-random number generator, the method comprising: setting asynchronous timers of different frequencies; collecting a predetermined number of first bits from a first entropy source according to a first timer of the asynchronous timers; calculating a Hamming distance between successive collected first bits; accepting the first bits into a first accumulation buffer based on the Hamming distance exceeding a minimum; summing Hamming distances between successive collections of first bits into an accumulated value of entropy attributed to contents of the first accumulation buffer; presenting contents of the first accumulation buffer to a pseudo-random number generator; gathering a specified number of second bits from a second entropy source according to a second timer of the asynchronous timers; accepting the second bits into a second accumulation buffer, the second accumulation buffer having a different size than a size of the first accumulation buffer; and presenting contents of the second accumulation buffer to the pseudo-random number generator.'] | false | [
"009",
"01",
"601",
"602",
"603",
"604",
"605",
"8",
"606",
"607",
"608",
"609",
"6",
"51"
] |
|
EP_3500923_B1 (6).png | EP3500923B1 | COLLECTING ENTROPY FROM DIVERSE SOURCES | [
"FIG7"
] | [
"FIG7 illustrates an exemplary computer system, in which various embodiments of the present invention may be implemented "
] | [
"FIG7 illustrates an exemplary computer system 700, in which various embodiments of the present invention may be implemented. The system 700 may be used to implement any of the computer systems described above. As shown in the figure, computer system 700 includes a processing unit 704 that communicates with a number of peripheral subsystems via a bus subsystem 702. These peripheral subsystems may include a processing acceleration unit 706, an I/O subsystem 708, a storage subsystem 718 and a communications subsystem 724. Storage subsystem 718 includes tangible computer-readable storage media 722 and a system memory 710."
] | 18 | 109 | null | G | [
{
"element_identifier": "32",
"terms": [
"OpenSSL reads"
]
},
{
"element_identifier": "256",
"terms": [
"decryption key"
]
},
{
"element_identifier": "1",
"terms": [
"OpenSSL version"
]
},
{
"element_identifier": "0",
"terms": [
">"
]
},
{
"element_identifier": "100",
"terms": [
"entropy module in system"
]
},
{
"element_identifier": "106",
"terms": [
"In entropy module"
]
},
{
"element_identifier": "108",
"terms": [
"timers"
]
},
{
"element_identifier": "110",
"terms": [
"timers"
]
},
{
"element_identifier": "102",
"terms": [
"from first entropy source"
]
},
{
"element_identifier": "104",
"terms": [
"second entropy source"
]
},
{
"element_identifier": "3",
"terms": [
"frequency may be at",
"few specific valuessysconf"
]
},
{
"element_identifier": "126",
"terms": [
"modified Hamming distance"
]
},
{
"element_identifier": "118",
"terms": [
"entropy"
]
},
{
"element_identifier": "130",
"terms": [
"as bits"
]
},
{
"element_identifier": "136",
"terms": [
"immediately forwarded as bits"
]
},
{
"element_identifier": "128",
"terms": [
"modified Hamming distance"
]
},
{
"element_identifier": "120",
"terms": [
"entropy"
]
},
{
"element_identifier": "334",
"terms": [
"accumulation buffer"
]
},
{
"element_identifier": "142",
"terms": [
"PRNG"
]
},
{
"element_identifier": "140",
"terms": [
"module may be forwarded"
]
},
{
"element_identifier": "144",
"terms": [
"seed memory location"
]
},
{
"element_identifier": "146",
"terms": [
"output"
]
},
{
"element_identifier": "112",
"terms": [
"timer"
]
},
{
"element_identifier": "148",
"terms": [
"random bits"
]
},
{
"element_identifier": "789",
"terms": [
"number"
]
},
{
"element_identifier": "32767",
"terms": [
"/"
]
},
{
"element_identifier": "2",
"terms": [
"getentropy"
]
},
{
"element_identifier": "202",
"terms": [
"source",
"entropy generator"
]
},
{
"element_identifier": "204",
"terms": [
"source"
]
},
{
"element_identifier": "208",
"terms": [
"timers"
]
},
{
"element_identifier": "210",
"terms": [
"timers"
]
},
{
"element_identifier": "242",
"terms": [
"PRNG"
]
},
{
"element_identifier": "260",
"terms": [
"computer"
]
},
{
"element_identifier": "252",
"terms": [
"encryption key"
]
},
{
"element_identifier": "254",
"terms": [
"document"
]
},
{
"element_identifier": "258",
"terms": [
"network"
]
},
{
"element_identifier": "262",
"terms": [
"computer"
]
},
{
"element_identifier": "10",
"terms": [
"keys are changed every",
"BlackBerry®"
]
},
{
"element_identifier": "300",
"terms": [
"system"
]
},
{
"element_identifier": "302",
"terms": [
"source"
]
},
{
"element_identifier": "318a",
"terms": [
"supplies entropy"
]
},
{
"element_identifier": "306",
"terms": [
"entropy collector"
]
},
{
"element_identifier": "336a",
"terms": [
"is forwarded as seed"
]
},
{
"element_identifier": "342",
"terms": [
"PRNG"
]
},
{
"element_identifier": "308",
"terms": [
"at frequency",
"frequencies",
"frequency"
]
},
{
"element_identifier": "318b",
"terms": [
"entropies"
]
},
{
"element_identifier": "304",
"terms": [
"source"
]
},
{
"element_identifier": "320a",
"terms": [
"supplies entropy"
]
},
{
"element_identifier": "310",
"terms": [
"at frequency",
"frequencies",
"frequency"
]
},
{
"element_identifier": "320e",
"terms": [
"exemplary case when entropy"
]
},
{
"element_identifier": "338",
"terms": [
"seed"
]
},
{
"element_identifier": "408",
"terms": [
"first timer"
]
},
{
"element_identifier": "414",
"terms": [
"random jitter"
]
},
{
"element_identifier": "410",
"terms": [
"second timer"
]
},
{
"element_identifier": "28",
"terms": [
"in"
]
},
{
"element_identifier": "248",
"terms": [
"· 128C8 ≈"
]
},
{
"element_identifier": "2128",
"terms": [
"pool containing"
]
},
{
"element_identifier": "33",
"terms": [
"default this size is",
"provide",
"generator chosen. We use"
]
},
{
"element_identifier": "8",
"terms": [
"×"
]
},
{
"element_identifier": "4",
"terms": [
"required"
]
},
{
"element_identifier": "17",
"terms": [
"NSE Entropy Module Page"
]
},
{
"element_identifier": "16",
"terms": [
"mode only benefits from"
]
},
{
"element_identifier": "20",
"terms": [
"bytes. Non-FIPS mode"
]
},
{
"element_identifier": "64",
"terms": [
"usefully as large as",
"less than"
]
},
{
"element_identifier": "4096",
"terms": [
"first"
]
},
{
"element_identifier": "500",
"terms": [
"flowchart illustrating process"
]
},
{
"element_identifier": "501",
"terms": [
"otherwise. In operation"
]
},
{
"element_identifier": "503",
"terms": [
"first frequency. In operation"
]
},
{
"element_identifier": "504",
"terms": [
"entropy source. In operation"
]
},
{
"element_identifier": "505",
"terms": [
"number generator. In operation"
]
},
{
"element_identifier": "506",
"terms": [
"entropy source. In operation"
]
},
{
"element_identifier": "507",
"terms": [
"number generator. In operation"
]
},
{
"element_identifier": "600",
"terms": [
"flowchart illustrating process"
]
},
{
"element_identifier": "601",
"terms": [
"otherwise. In operation"
]
},
{
"element_identifier": "603",
"terms": [
"asynchronous timers. In operation"
]
},
{
"element_identifier": "604",
"terms": [
"first bits. In operation"
]
},
{
"element_identifier": "605",
"terms": [
"minimum. In operation"
]
},
{
"element_identifier": "606",
"terms": [
"accumulation buffer. In operation"
]
},
{
"element_identifier": "607",
"terms": [
"number generator. In operation"
]
},
{
"element_identifier": "608",
"terms": [
"asynchronous timers. In operation"
]
},
{
"element_identifier": "609",
"terms": [
"accumulation buffer. In operation"
]
},
{
"element_identifier": "700",
"terms": [
"system"
]
},
{
"element_identifier": "704",
"terms": [
"processing unit"
]
},
{
"element_identifier": "702",
"terms": [
"bus subsystem"
]
},
{
"element_identifier": "706",
"terms": [
"processing acceleration unit"
]
},
{
"element_identifier": "708",
"terms": [
"I/O subsystem"
]
},
{
"element_identifier": "718",
"terms": [
"storage subsystem"
]
},
{
"element_identifier": "724",
"terms": [
"communications subsystem"
]
},
{
"element_identifier": "722",
"terms": [
"computer-readable storage media"
]
},
{
"element_identifier": "710",
"terms": [
"system memory"
]
},
{
"element_identifier": "732",
"terms": [
"independent processing units"
]
},
{
"element_identifier": "360",
"terms": [
"Microsoft Xbox®"
]
},
{
"element_identifier": "714",
"terms": [
"program data"
]
},
{
"element_identifier": "716",
"terms": [
"operating system"
]
},
{
"element_identifier": "720",
"terms": [
"computer-readable storage media reader"
]
},
{
"element_identifier": "726",
"terms": [
"data feeds"
]
},
{
"element_identifier": "728",
"terms": [
"event streams"
]
},
{
"element_identifier": "730",
"terms": [
"event updates"
]
}
] | ['1. A method for generating entropy in a computing device, the method comprising: setting a repeating first timer for a first frequency; setting a repeating second timer for a second frequency; collecting a predetermined number of first bits from a first entropy source at the first frequency, the predetermined number based on an amount of entropy per bit attributable to the first entropy source; presenting the first bits to a pseudo-random number generator; gathering a specified number of second bits from a second entropy source at the second frequency, the specified number based on an amount of entropy per bit attributable to the second entropy source; and presenting the second bits to the pseudo-random number generator, whereby the first and second bits can be used to seed the pseudo-random number generator.', '3. The method of claim 2 wherein the adjusting of the first frequency is based on an output from the pseudo-random number generator.', '14. A method for seeding entropy in a pseudo-random number generator, the method comprising: setting asynchronous timers of different frequencies; collecting a predetermined number of first bits from a first entropy source according to a first timer of the asynchronous timers; calculating a Hamming distance between successive collected first bits; accepting the first bits into a first accumulation buffer based on the Hamming distance exceeding a minimum; summing Hamming distances between successive collections of first bits into an accumulated value of entropy attributed to contents of the first accumulation buffer; presenting contents of the first accumulation buffer to a pseudo-random number generator; gathering a specified number of second bits from a second entropy source according to a second timer of the asynchronous timers; accepting the second bits into a second accumulation buffer, the second accumulation buffer having a different size than a size of the first accumulation buffer; and presenting contents of the second accumulation buffer to the pseudo-random number generator.'] | false | [
"704",
"734",
"700",
"732",
"706",
"708",
"702",
"724",
"52",
"720",
"722",
"710",
"712",
"714",
"716",
"718",
"726",
"728",
"730"
] |
|
EP_3500923_B1.png | EP3500923B1 | COLLECTING ENTROPY FROM DIVERSE SOURCES | [
"FIG1"
] | [
"FIG1 illustrates an entropy module in accordance with an embodiment"
] | [
"FIG1 illustrates an entropy module in system 100. In entropy module 106, timers 108 and 110 are set up to periodically poll, or otherwise collect or gather, entropy (i.e., random bits or as otherwise known in the art) from first entropy source 102 or second entropy source 104, respectively. The frequencies of polling for the entropy sources are different from one another. One frequency may be at 0.751 seconds between gatherings, which the other frequency may be at 3.3 seconds between gatherings."
] | 10 | 94 | null | G | [
{
"element_identifier": "142",
"terms": [
"PRNG"
]
},
{
"element_identifier": "104",
"terms": [
"second entropy source"
]
},
{
"element_identifier": "118",
"terms": [
"entropy"
]
},
{
"element_identifier": "112",
"terms": [
"timer"
]
},
{
"element_identifier": "108",
"terms": [
"timers"
]
},
{
"element_identifier": "144",
"terms": [
"seed memory location"
]
},
{
"element_identifier": "120",
"terms": [
"entropy"
]
},
{
"element_identifier": "128",
"terms": [
"modified Hamming distance"
]
},
{
"element_identifier": "16",
"terms": [
"mode only benefits from"
]
},
{
"element_identifier": "140",
"terms": [
"module may be forwarded"
]
},
{
"element_identifier": "110",
"terms": [
"timers"
]
},
{
"element_identifier": "146",
"terms": [
"output"
]
},
{
"element_identifier": "130",
"terms": [
"as bits"
]
},
{
"element_identifier": "334",
"terms": [
"accumulation buffer"
]
},
{
"element_identifier": "100",
"terms": [
"entropy module in system"
]
},
{
"element_identifier": "148",
"terms": [
"random bits"
]
},
{
"element_identifier": "102",
"terms": [
"from first entropy source"
]
},
{
"element_identifier": "106",
"terms": [
"In entropy module"
]
}
] | ['1. A method for generating entropy in a computing device, the method comprising: setting a repeating first timer for a first frequency; setting a repeating second timer for a second frequency; collecting a predetermined number of first bits from a first entropy source at the first frequency, the predetermined number based on an amount of entropy per bit attributable to the first entropy source; presenting the first bits to a pseudo-random number generator; gathering a specified number of second bits from a second entropy source at the second frequency, the specified number based on an amount of entropy per bit attributable to the second entropy source; and presenting the second bits to the pseudo-random number generator, whereby the first and second bits can be used to seed the pseudo-random number generator.', '3. The method of claim 2 wherein the adjusting of the first frequency is based on an output from the pseudo-random number generator.', '14. A method for seeding entropy in a pseudo-random number generator, the method comprising: setting asynchronous timers of different frequencies; collecting a predetermined number of first bits from a first entropy source according to a first timer of the asynchronous timers; calculating a Hamming distance between successive collected first bits; accepting the first bits into a first accumulation buffer based on the Hamming distance exceeding a minimum; summing Hamming distances between successive collections of first bits into an accumulated value of entropy attributed to contents of the first accumulation buffer; presenting contents of the first accumulation buffer to a pseudo-random number generator; gathering a specified number of second bits from a second entropy source according to a second timer of the asynchronous timers; accepting the second bits into a second accumulation buffer, the second accumulation buffer having a different size than a size of the first accumulation buffer; and presenting contents of the second accumulation buffer to the pseudo-random number generator.'] | false | [
"100",
"118",
"102",
"108",
"26",
"118",
"130",
"114",
"112",
"106",
"140",
"142",
"150",
"144",
"146",
"148",
"16",
"128",
"110",
"238",
"120",
"46",
"120",
"104",
"138",
"334",
"132"
] |
|
EP_3500965_B1 (3).png | EP3500965B1 | SPEED CONTROL FOR A FULL STOP OF AN AUTONOMOUS DRIVING VEHICLE | [
"FIG6"
] | [
"FIG6 is a flow diagram illustrating a process of making a full stop of an autonomous vehicle according to a comparative example suitable for understanding the invention"
] | [
"FIG6 is a flow diagram illustrating a process of making a full stop of an autonomous vehicle according to a comparative example suitable for understanding the invention. Process 600 may be performed by processing logic which may include software, hardware, or a combination thereof. For example, process 600 may be performed by speed planning module 321 and/or speed re-planning module 322. Referring to FIG6, in operation 601, processing logic receives a request to decelerate an autonomous vehicle from a first location and to stop at a second location. In operation 602, processing logic determines a first zone and a second zone within a distance from the first location to the second location. In operation 603, processing logic decelerates the autonomous vehicle based on a first deceleration rate from a current speed of the autonomous vehicle to a predetermined speed within the first zone. In operation 604, processing logic decelerates the autonomous vehicle based on a second deceleration rate from the predetermined speed to a stop within the second zone. The first deceleration rate is different than the second deceleration rate."
] | 27 | 198 | flow diagram | B | [
{
"element_identifier": "10",
"terms": [
"given stop location.DE",
"move"
]
},
{
"element_identifier": "2",
"terms": [
"second vehicle.EP"
]
},
{
"element_identifier": "100",
"terms": [
"network configuration"
]
},
{
"element_identifier": "101",
"terms": [
"vehicle"
]
},
{
"element_identifier": "102",
"terms": [
"network"
]
},
{
"element_identifier": "110",
"terms": [
"planning system"
]
},
{
"element_identifier": "111",
"terms": [
"control system"
]
},
{
"element_identifier": "112",
"terms": [
"wireless communication system"
]
},
{
"element_identifier": "113",
"terms": [
"user interface system"
]
},
{
"element_identifier": "114",
"terms": [
"infotainment system"
]
},
{
"element_identifier": "115",
"terms": [
"sensor system"
]
},
{
"element_identifier": "211",
"terms": [
"Cameras"
]
},
{
"element_identifier": "212",
"terms": [
"unit",
"GPS system"
]
},
{
"element_identifier": "214",
"terms": [
"radar unit"
]
},
{
"element_identifier": "215",
"terms": [
"unit"
]
},
{
"element_identifier": "213",
"terms": [
"autonomous vehicle. IMU unit"
]
},
{
"element_identifier": "201",
"terms": [
"steering unit"
]
},
{
"element_identifier": "202",
"terms": [
"throttle unit"
]
},
{
"element_identifier": "203",
"terms": [
"braking unit"
]
},
{
"element_identifier": "103",
"terms": [
"efficiently. Server",
"data analytics system"
]
},
{
"element_identifier": "121",
"terms": [
"data collector"
]
},
{
"element_identifier": "122",
"terms": [
"engine"
]
},
{
"element_identifier": "123",
"terms": [
"driving statistics"
]
},
{
"element_identifier": "124",
"terms": [
"speed re-planning algorithms"
]
},
{
"element_identifier": "300",
"terms": [
"vehicle"
]
},
{
"element_identifier": "301",
"terms": [
"localization module"
]
},
{
"element_identifier": "302",
"terms": [
"perception module"
]
},
{
"element_identifier": "303",
"terms": [
"decision module"
]
},
{
"element_identifier": "304",
"terms": [
"module"
]
},
{
"element_identifier": "305",
"terms": [
"control module"
]
},
{
"element_identifier": "351",
"terms": [
"loaded into memory"
]
},
{
"element_identifier": "311",
"terms": [
"route information"
]
},
{
"element_identifier": "321",
"terms": [
"speed planning module"
]
},
{
"element_identifier": "322",
"terms": [
"speed re-planning module"
]
},
{
"element_identifier": "501",
"terms": [
"zone"
]
},
{
"element_identifier": "502",
"terms": [
"adjustment zone"
]
},
{
"element_identifier": "503",
"terms": [
"stop zone"
]
},
{
"element_identifier": "1",
"terms": [
"k is approximately"
]
},
{
"element_identifier": "0",
"terms": [
"is approximately"
]
},
{
"element_identifier": "600",
"terms": [
"Process"
]
},
{
"element_identifier": "601",
"terms": [
"in operation"
]
},
{
"element_identifier": "602",
"terms": [
"second location. In operation"
]
},
{
"element_identifier": "603",
"terms": [
"second location. In operation"
]
},
{
"element_identifier": "604",
"terms": [
"first zone. In operation"
]
},
{
"element_identifier": "700",
"terms": [
"Process"
]
},
{
"element_identifier": "701",
"terms": [
"in operation"
]
},
{
"element_identifier": "702",
"terms": [
"current speed. In operation"
]
},
{
"element_identifier": "703",
"terms": [
"stop location. In operation"
]
},
{
"element_identifier": "704",
"terms": [
"In operation"
]
},
{
"element_identifier": "705",
"terms": [
"adjustment zone. In operation"
]
},
{
"element_identifier": "1500",
"terms": [
"system"
]
},
{
"element_identifier": "1501",
"terms": [
"processor"
]
},
{
"element_identifier": "1503",
"terms": [
"memory"
]
},
{
"element_identifier": "1510",
"terms": [
"interconnect"
]
},
{
"element_identifier": "1504",
"terms": [
"with optional graphics subsystem",
"integrated with display device"
]
},
{
"element_identifier": "1505",
"terms": [
"Network interface device"
]
},
{
"element_identifier": "1506",
"terms": [
"input device"
]
},
{
"element_identifier": "1507",
"terms": [
"devices"
]
},
{
"element_identifier": "1508",
"terms": [
"system. Storage device"
]
},
{
"element_identifier": "1509",
"terms": [
"storage medium"
]
},
{
"element_identifier": "1528",
"terms": [
"Processing module/unit/logic"
]
}
] | ['3. The method of claim 2, wherein the first deceleration rate (A) is determined based on the following formula: A = k ∗ V 2 /2S, wherein k is a constant, V represents the current speed (V C ), and S represents the distance (S) between the first location and the second location, preferably, the constant k is approximately 1.', '14. A data processing system, comprising: a processor (1501); and a memory (1503) coupled to the processor (1501) to store instructions, which when executed by the processor (1501), cause the processor (1501) to perform operations of operating an autonomous vehicle (101), the operations including rece iving (601) a request to decelerate an autonomous vehicle from a first location and to stop at a second location, determining (602) a first zone (501) and a second zone (503) within a distance (S) from the first location to the second location, determining a third zone (502) between the first zone (501) and the second zone (503), decelerating (603) the autonomous vehicle (101) based on a first deceleration rate from a current speed (V C ) to a predetermined speed (Vi) during the first zone (501), maintaining the predetermined speed (Vi) of the autonomous vehicle (101) as a relatively constant speed within the third zone (502), and decelerating (604) the autonomous vehicle (101) based on a second deceleration rate from the predetermined speed (Vi) to a stop during the second zone (503), wherein the first deceleration rate and the second deceleration rate are different.'] | false | [
"009",
"601",
"602",
"3",
"603",
"604",
"20"
] |
|
EP_3500968_B1 (1).png | EP3500968B1 | METHOD AND APPARATUS TO SECURE AND PROTECT DATA-CENTERS AND GENERALIZED UTILITY-BASED CLOUD COMPUTING ENVIRONMENTS FROM UNINVITED GUESTS IN THE FORM OF BOTH HARDWARE AND SOFTWARE | [
"FIG2"
] | [
"FIG2 is a block diagram illustrating a node that is executing a virtual agent, according to some embodiments"
] | [
"FIG2 is a block diagram illustrating a node that is executing a virtual agent, according to some embodiments. The node 130 includes hardware resources 140 such as computing hardware 210, storage hardware 220, and networking hardware 230. The node 130 executes a hypervisor 150 or VMM that allows a virtual agent 160 and one or more VMs (e.g., VM 165 or other type of virtual appliance) executing on the node 130 to share the hardware resources 140 of the node 130. In one embodiment, the virtual agent 160 is implemented as a unikernel. The virtual agent 160 may include a security scan application 240 that performs a security scan of the node 130. The security scan application 240 may perform a security scan to detect the presence of unauthorized hardware, unauthorized software, unauthorized changes in configuration at the node 130, or any combination thereof. In one embodiment, the virtual agent 160 may include a hardware access key 260. The virtual agent 160 may use the hardware access key 260 to gain access to one or more hardware resources 140 of the node 130 (e.g., to perform a bus scan). The security scan application 240 may store the results of the security scan in storage hardware 220 allocated to the virtual agent 160 (e.g., the slice of storage hardware 220 that is allocated to the virtual agent 160). For example, the results of the security scan may be stored in RAM allocated to the virtual agent 160. The virtual agent 160 may also include a data encryption key 250. The virtual agent 160 may use the data encryption key 250 to encrypt the results of the security scan (e.g., encrypted results of security scan 270)."
] | 19 | 317 | block diagram | G | [
{
"element_identifier": "230",
"terms": [
"networking hardware"
]
},
{
"element_identifier": "160",
"terms": [
"virtual agent",
"virtual agents"
]
},
{
"element_identifier": "130",
"terms": [
"node",
"nodes"
]
},
{
"element_identifier": "220",
"terms": [
"storage hardware"
]
},
{
"element_identifier": "2",
"terms": [
"Layer"
]
},
{
"element_identifier": "250",
"terms": [
"data encryption key"
]
},
{
"element_identifier": "270",
"terms": [
"security scan"
]
},
{
"element_identifier": "240",
"terms": [
"security scan application"
]
},
{
"element_identifier": "260",
"terms": [
"hardware access key"
]
},
{
"element_identifier": "140",
"terms": [
"hardware resources"
]
},
{
"element_identifier": "150",
"terms": [
"hypervisor"
]
},
{
"element_identifier": "165",
"terms": [
"VM"
]
}
] | ['1. A method implemented by a network device communicatively coupled to a datacenter to detect a presence of unauthorized software and hardware in the datacenter, the method comprising: initiating (310) deployment of a virtual agent on a node in the datacenter, wherein the virtual agent is to perform a security scan of the node and store results of the security scan in a memory allocated to the virtual agent at the node, and wherein the results of the security scan are to be encrypted by the virtual agent using a data encryption key; and initiating (320) migration of the virtual agent to a preconfigured location that has a data decryption key for decrypting the results of the security scan, wherein the results of the security scan are to be extracted from the virtual agent and decrypted at the preconfigured location using the data decryption key.', '6. The method of claim 1, wherein the virtual agent includes a hardware access key that provides the virtual agent with permission to access one or more hardware resources of the node.', '8. The method of claim 1, wherein the security scan includes a scan of any one of a Basic Input/Output System (BIOS), a Unified Extensible Firmware Interface (UEFI), a System Center Configuration Manager or Systems Management Server (SCCM/SMS), and hypervisor installed on the node.'] | false | [
"130",
"160",
"240",
"250",
"260",
"165",
"150",
"140",
"210",
"220",
"270",
"230",
"2",
"13"
] |
|
EP_3500968_B1 (2).png | EP3500968B1 | METHOD AND APPARATUS TO SECURE AND PROTECT DATA-CENTERS AND GENERALIZED UTILITY-BASED CLOUD COMPUTING ENVIRONMENTS FROM UNINVITED GUESTS IN THE FORM OF BOTH HARDWARE AND SOFTWARE | [
"FIG3"
] | [
"FIG3 is a flow diagram of a process for detecting unauthorized software and hardware in a datacenter using a virtual agent, according to some embodiments"
] | [
"FIG3 is a flow diagram of a process for detecting unauthorized software and hardware in a datacenter using a virtual agent, according to some embodiments. In one embodiment, the process may be implemented by a network device 100 (e.g., cloud orchestration component 110 of network device 100) that is communicatively coupled to the datacenter 120. The operations in this flow diagrams will be described with reference to the exemplary embodiments of the other figures. However, it should be understood that the operations of the flow diagram can be performed by embodiments other than those discussed with reference to the other figures, and the embodiments discussed with reference to these other figures can perform operations different than those discussed with reference to the flow diagram."
] | 26 | 135 | flow diagram | G | [
{
"element_identifier": "2",
"terms": [
"Layer"
]
},
{
"element_identifier": "120",
"terms": [
"datacenter"
]
},
{
"element_identifier": "130",
"terms": [
"node",
"nodes"
]
},
{
"element_identifier": "140",
"terms": [
"hardware resources"
]
},
{
"element_identifier": "165",
"terms": [
"VM"
]
},
{
"element_identifier": "150",
"terms": [
"hypervisor"
]
},
{
"element_identifier": "100",
"terms": [
"network device"
]
},
{
"element_identifier": "110",
"terms": [
"cloud orchestration component"
]
},
{
"element_identifier": "160",
"terms": [
"virtual agent",
"virtual agents"
]
},
{
"element_identifier": "115",
"terms": [
"image"
]
},
{
"element_identifier": "220",
"terms": [
"storage hardware"
]
},
{
"element_identifier": "230",
"terms": [
"networking hardware"
]
},
{
"element_identifier": "240",
"terms": [
"security scan application"
]
},
{
"element_identifier": "260",
"terms": [
"hardware access key"
]
},
{
"element_identifier": "250",
"terms": [
"data encryption key"
]
},
{
"element_identifier": "270",
"terms": [
"security scan"
]
},
{
"element_identifier": "310",
"terms": [
"flow diagram. At block"
]
},
{
"element_identifier": "320",
"terms": [
"threshold load. At block"
]
},
{
"element_identifier": "330",
"terms": [
"At block"
]
},
{
"element_identifier": "430",
"terms": [
"machine readable storage medium"
]
}
] | ['4. The method of claim 3, wherein the corrective action includes any one of migrating a tenant on the node to another node in the datacenter, installing a honeypot, decommissioning of the node, moving a tenant off the node, reinstalling an image on the node, and deploying another virtual agent in the datacenter.', '6. The method of claim 1, wherein the virtual agent includes a hardware access key that provides the virtual agent with permission to access one or more hardware resources of the node.', '8. The method of claim 1, wherein the security scan includes a scan of any one of a Basic Input/Output System (BIOS), a Unified Extensible Firmware Interface (UEFI), a System Center Configuration Manager or Systems Management Server (SCCM/SMS), and hypervisor installed on the node.', '12. A network device (100) configured to detect a presence of unauthorized software and hardware in a datacenter, the network device comprising: a set of one or more processors (410); and a non-transitory machine-readable storage medium (430) having stored therein a cloud orchestration component (110), which when executed by the set of one or more processors, causes the network device to initiate deployment of a virtual agent on a node in the datacenter, wherein the virtual agent is to perform a security scan of the node and store results of the security scan in a memory allocated to the virtual agent at the node, and wherein the results of the security scan are to be encrypted by the virtual agent using a data encryption key and initiate migration of the virtual agent to a preconfigured location that has a data decryption key for decrypting the results of the security scan, wherein the results of the security scan are to be extracted from the virtual agent and decrypted at the preconfigured location using the data decryption key.'] | false | [
"14"
] |
|
EP_3500968_B1 (3).png | EP3500968B1 | METHOD AND APPARATUS TO SECURE AND PROTECT DATA-CENTERS AND GENERALIZED UTILITY-BASED CLOUD COMPUTING ENVIRONMENTS FROM UNINVITED GUESTS IN THE FORM OF BOTH HARDWARE AND SOFTWARE | [
"FIG4"
] | [
"FIG4 is block diagram of a network device that can implement the detection of the presence of unauthorized software and hardware in a datacenter using a virtual agent, according to some embodiments "
] | [
"FIG4 is block diagram of a network device that can implement the detection of the presence of unauthorized software and hardware in a datacenter using a virtual agent, according to some embodiments. The network device 100 includes a set of one or more processor(s) 410, which may be general purpose and/or a special purpose processor(s) (e.g., microprocessor). The network device 100 also includes a set of network interface card(s) (NICs) 420 to establish network connections (e.g., to transmit and/or receive code and/or data using propagating signals) with other computing devices such as nodes 130 in a datacenter 120 over a wired or wireless network. The network device 100 also includes a non-transitory machine readable storage medium 430 having stored therein a cloud orchestration component 110, which when executed by the processor(s) 410, causes the network device 100 to perform operations of one or more embodiments described herein above."
] | 33 | 170 | block diagram | G | [
{
"element_identifier": "430",
"terms": [
"machine readable storage medium"
]
},
{
"element_identifier": "100",
"terms": [
"network device"
]
},
{
"element_identifier": "110",
"terms": [
"cloud orchestration component"
]
}
] | ['12. A network device (100) configured to detect a presence of unauthorized software and hardware in a datacenter, the network device comprising: a set of one or more processors (410); and a non-transitory machine-readable storage medium (430) having stored therein a cloud orchestration component (110), which when executed by the set of one or more processors, causes the network device to initiate deployment of a virtual agent on a node in the datacenter, wherein the virtual agent is to perform a security scan of the node and store results of the security scan in a memory allocated to the virtual agent at the node, and wherein the results of the security scan are to be encrypted by the virtual agent using a data encryption key and initiate migration of the virtual agent to a preconfigured location that has a data decryption key for decrypting the results of the security scan, wherein the results of the security scan are to be extracted from the virtual agent and decrypted at the preconfigured location using the data decryption key.'] | false | [
"100",
"410",
"420",
"430",
"110",
"4",
"15"
] |
|
EP_3500968_B1.png | EP3500968B1 | METHOD AND APPARATUS TO SECURE AND PROTECT DATA-CENTERS AND GENERALIZED UTILITY-BASED CLOUD COMPUTING ENVIRONMENTS FROM UNINVITED GUESTS IN THE FORM OF BOTH HARDWARE AND SOFTWARE | [
"FIG1"
] | [
"FIG1 is a block diagram of a datacenter in which a virtual agent can be deployed, according to some embodiments"
] | [
"FIG1 is a block diagram of a datacenter in which a virtual agent can be deployed, according to some embodiments. As shown, the datacenter 120 includes nodes 130A-D. Each node 130 may be an electronic device or network device that includes hardware resources such as computing hardware (e.g., processors), storage hardware (e.g., Random Access Memory (RAM) and hard disks), and networking hardware (e.g., a network interface card (NIC)). Each of the nodes 130 may be communicatively coupled to one or more of the other nodes 130 in the datacenter 120. A cloud operator may offer the various hardware resources in the datacenter 120 to tenants by slicing physical hardware resources 140 into virtualized tenant resources. Tenants can subscribe to the cloud services to obtain a required amount of virtualized computing, storage, and network resources to support their needs."
] | 21 | 164 | block diagram | G | [
{
"element_identifier": "160",
"terms": [
"virtual agent",
"virtual agents"
]
},
{
"element_identifier": "120",
"terms": [
"datacenter"
]
},
{
"element_identifier": "100",
"terms": [
"network device"
]
},
{
"element_identifier": "115",
"terms": [
"image"
]
},
{
"element_identifier": "140",
"terms": [
"hardware resources"
]
},
{
"element_identifier": "110",
"terms": [
"cloud orchestration component"
]
},
{
"element_identifier": "150",
"terms": [
"hypervisor"
]
},
{
"element_identifier": "165",
"terms": [
"VM"
]
}
] | ['4. The method of claim 3, wherein the corrective action includes any one of migrating a tenant on the node to another node in the datacenter, installing a honeypot, decommissioning of the node, moving a tenant off the node, reinstalling an image on the node, and deploying another virtual agent in the datacenter.', '6. The method of claim 1, wherein the virtual agent includes a hardware access key that provides the virtual agent with permission to access one or more hardware resources of the node.', '8. The method of claim 1, wherein the security scan includes a scan of any one of a Basic Input/Output System (BIOS), a Unified Extensible Firmware Interface (UEFI), a System Center Configuration Manager or Systems Management Server (SCCM/SMS), and hypervisor installed on the node.', '12. A network device (100) configured to detect a presence of unauthorized software and hardware in a datacenter, the network device comprising: a set of one or more processors (410); and a non-transitory machine-readable storage medium (430) having stored therein a cloud orchestration component (110), which when executed by the set of one or more processors, causes the network device to initiate deployment of a virtual agent on a node in the datacenter, wherein the virtual agent is to perform a security scan of the node and store results of the security scan in a memory allocated to the virtual agent at the node, and wherein the results of the security scan are to be encrypted by the virtual agent using a data encryption key and initiate migration of the virtual agent to a preconfigured location that has a data decryption key for decrypting the results of the security scan, wherein the results of the security scan are to be extracted from the virtual agent and decrypted at the preconfigured location using the data decryption key.'] | false | [
"100",
"115",
"110",
"4",
"160",
"165",
"150",
"140",
"120",
"1",
"12"
] |
|
EP_3500986_B1 (3).png | EP3500986B1 | METHOD AND SYSTEM FOR ESTIMATING THE MASS OF A STOCKPILE | [
"FIG5a"
] | [
"FIG5a is a table of data showing the force upon a layer influences the density, while FIG5b charts data from FIG5a"
] | [
"A representative sample of material was taken and placed in a cylindrical test cell having calibrated dimensions. Details are shown in the table of FIG5a. The volume of the cylindrical test cell was 3244cm3 and the surface area of the internal footprint was 181cm2. The mass of the wheat sample was 2707.05g. The initial height of the sample in the cell was 179.23mm (column D). The initial density was measured as 741.99kg/m3 (column F). For the purpose of this example, the stockpile had a height of around 8m. The source of the sample can often influence the estimated mass of the stockpile because variations in the material can occur. The example herein uses a 'representative sample'.",
"The sequential calculation and simulated force upon the wheat sample was repeated, as shown and tabulated in FIG5a. The purpose of the simulated force upon the representative sample is to enable the density of each layer to be estimated.",
"In the example of FIG5a the total calculated mass is 61906kg, which is 4.29% higher that the mass of 59360 that would have been calculated if the \"bulk density\" had been used. It can be seen from columns K, L and M that the difference between the known technique (no layering) and method of the invention (measurements per layer) increase as the depth of the stockpile increases.",
"In light of the teaching herein the depth of the layers can be increased or decreased by estimating the density from a previously recorded measurements, such as that shown in FIG5a. Estimates of the density for deeper or shallower layers can be determined form a \"best fit\" curve, such as a polynomial curve, through the density measurements."
] | 22 | 323 | table | G | [
{
"element_identifier": "7",
"terms": [
"andFigure"
]
},
{
"element_identifier": "4",
"terms": [
"datum"
]
},
{
"element_identifier": "2",
"terms": [
"surface"
]
},
{
"element_identifier": "6",
"terms": [
"surface"
]
},
{
"element_identifier": "0",
"terms": [
"layer depths is between"
]
},
{
"element_identifier": "13",
"terms": [
"was"
]
}
] | ['1. A method of estimating the mass of material in a stockpile, the method including: obtaining an upper surface profile of said stockpile; the method being characterised by : defining a plurality of layers in the stockpile based on the upper surface profile, wherein each layer is defined to extend parallel to the upper surface profile, and estimating the volume of each defined layer; obtaining density characteristics of the stockpile material; estimating the density of each defined layer according to the density characteristics of the stockpile material; and calculating, using the estimated volume and estimated density of each defined layer, the mass of the stockpile.'] | false | [
"0",
"13",
"3",
"742",
"7460",
"7575",
"7768",
"7793",
"7460",
"7420",
"15035",
"14840",
"22734",
"22260",
"59360",
"30502",
"29680",
"38296",
"37100",
"46126",
"44520",
"54003",
"51940",
"61906",
"59360",
"13",
"2",
"4",
"15",
"5",
"6",
"7830",
"7",
"7876",
"8",
"7903",
"7700",
"61906",
"59360",
"59360",
"61906"
] |
|
EP_3500986_B1 (5).png | EP3500986B1 | METHOD AND SYSTEM FOR ESTIMATING THE MASS OF A STOCKPILE | [
"FIG6a"
] | [
"FIG6a is a table of data showing the recorded mass of a number of stockpiles against estimated (and actual) mass values, while FIG6b charts data from FIG6a"
] | [
"FIG6a tabulates a real-world scenario in which the mass of material in a number of bunkers (column P) was to be audited for a client. The stock volume (column Q) and a density, referred to as the \"bulk density\" (column R) were provided by the client for each bunker and used to estimate the mass (column S) using known techniques."
] | 30 | 75 | table | G | [
{
"element_identifier": "2",
"terms": [
"surface"
]
},
{
"element_identifier": "4",
"terms": [
"datum"
]
},
{
"element_identifier": "6",
"terms": [
"surface"
]
},
{
"element_identifier": "1m",
"terms": [
"each layer's depth was"
]
},
{
"element_identifier": "0",
"terms": [
"layer depths is between"
]
},
{
"element_identifier": "7",
"terms": [
"andFigure"
]
},
{
"element_identifier": "10",
"terms": [
"layers",
"approximately"
]
},
{
"element_identifier": "3m",
"terms": [
"2a is almost"
]
},
{
"element_identifier": "12",
"terms": [
"boundary",
"boundaries"
]
},
{
"element_identifier": "2707",
"terms": [
"wheat sample was"
]
},
{
"element_identifier": "179",
"terms": [
"cell was"
]
},
{
"element_identifier": "741",
"terms": [
"density was measured as",
"surface i.e."
]
},
{
"element_identifier": "8m",
"terms": [
"around"
]
},
{
"element_identifier": "131",
"terms": [
"be"
]
},
{
"element_identifier": "749",
"terms": [
"is"
]
},
{
"element_identifier": "264",
"terms": [
"be"
]
},
{
"element_identifier": "764",
"terms": [
"is"
]
},
{
"element_identifier": "400",
"terms": [
"be"
]
},
{
"element_identifier": "774",
"terms": [
"L4 is"
]
},
{
"element_identifier": "696",
"terms": [
"Bunker 1A was"
]
},
{
"element_identifier": "9174",
"terms": [
"as"
]
},
{
"element_identifier": "13",
"terms": [
"was"
]
},
{
"element_identifier": "20",
"terms": [
"system"
]
},
{
"element_identifier": "22",
"terms": [
"control unit"
]
},
{
"element_identifier": "24",
"terms": [
"interface"
]
},
{
"element_identifier": "26",
"terms": [
"device"
]
},
{
"element_identifier": "28",
"terms": [
"platen"
]
},
{
"element_identifier": "30",
"terms": [
"test cylinder"
]
}
] | ['2. The method of claim 1, wherein each layer extends parallel to the upper surface profile and has a boundary, configured equidistant, in a vertical direction, from the upper surface profile.', '11. A system for estimating the mass of material in a stockpile, the system including: apparatus operable to obtaining an upper surface profile of said stockpile; the system being characterised by : a controller, configured to define a plurality of layers in the stockpile based on the upper surface profile, wherein each layer is defined to extend parallel to the upper surface profile, and estimate the volume of each defined layer; obtain density characteristics of the stockpile material; estimate the density of each defined layer, according to the density characteristics of the stockpile material; and calculate, using the estimated volume and density of each defined layer, the mass of the stockpile.', '12. A computer readable storage medium storing one or more programs, said programs having instructions, which when executed by an electronic device or system, perform a method according to any of claims 1 to'] | false | [
"7829",
"6669",
"18383",
"14317",
"37453",
"3436",
"26253",
"3476",
"14434",
"23218",
"6395",
"1595",
"7528",
"17627",
"14085",
"9187",
"11452745",
"7922",
"15"
] |
|
EP_3501017_B1 (1).png | EP3501017B1 | MOTION SENSOR WITH ANTIMASK PROTECTION | [
"FIG2"
] | [
"FIG2 is a block diagram of a controller for the motion detector of FIG1 according to one embodiment"
] | [
"FIG2 is a block diagram of the microcontroller 125 of the motion detector 100 according to one embodiment. The microcontroller 125 includes a plurality of electrical and electronic components that provide power, operational control, and protection to the components and modules within the microcontroller 125. The microcontroller 125 includes, among other things, an electronic processor 205 (such as a programmable electronic microprocessor, microcontroller, or similar device), a memory 210 (for example, non-transitory, machine readable memory), and an input/output interface 215. In some embodiments, the microcontroller 125 includes additional, fewer, or different components."
] | 18 | 117 | block diagram | G | [
{
"element_identifier": "6262661",
"terms": [
"A1. US"
]
},
{
"element_identifier": "100",
"terms": [
"motion detector"
]
},
{
"element_identifier": "105",
"terms": [
"transmission circuit"
]
},
{
"element_identifier": "110",
"terms": [
"first reception circuit"
]
},
{
"element_identifier": "115",
"terms": [
"reception circuit"
]
},
{
"element_identifier": "120",
"terms": [
"time gate circuit"
]
},
{
"element_identifier": "122",
"terms": [
"oscillator"
]
},
{
"element_identifier": "125",
"terms": [
"microcontroller"
]
},
{
"element_identifier": "127",
"terms": [
"alarm indicator"
]
},
{
"element_identifier": "129",
"terms": [
"trouble indicator"
]
},
{
"element_identifier": "130",
"terms": [
"shape generator"
]
},
{
"element_identifier": "131",
"terms": [
"transmission antenna"
]
},
{
"element_identifier": "7",
"terms": [
"centered at"
]
},
{
"element_identifier": "1",
"terms": [
"m"
]
},
{
"element_identifier": "135",
"terms": [
"reception antenna"
]
},
{
"element_identifier": "140",
"terms": [
"first amplifier"
]
},
{
"element_identifier": "145",
"terms": [
"first mixer"
]
},
{
"element_identifier": "150",
"terms": [
"circuit"
]
},
{
"element_identifier": "155",
"terms": [
"first operational amplifier"
]
},
{
"element_identifier": "160",
"terms": [
"second amplifier"
]
},
{
"element_identifier": "165",
"terms": [
"second mixer"
]
},
{
"element_identifier": "170",
"terms": [
"circuit"
]
},
{
"element_identifier": "175",
"terms": [
"second operational amplifier"
]
},
{
"element_identifier": "205",
"terms": [
"electronic processor"
]
},
{
"element_identifier": "210",
"terms": [
"memory"
]
},
{
"element_identifier": "215",
"terms": [
"input/output interface"
]
},
{
"element_identifier": "3",
"terms": [
"m"
]
},
{
"element_identifier": "191",
"terms": [
"transmission control signal"
]
},
{
"element_identifier": "192",
"terms": [
"first mixer control signal"
]
},
{
"element_identifier": "193",
"terms": [
"control signal"
]
},
{
"element_identifier": "194",
"terms": [
"second mixer control signal"
]
},
{
"element_identifier": "195",
"terms": [
"control signal"
]
},
{
"element_identifier": "50",
"terms": [
"m"
]
},
{
"element_identifier": "5",
"terms": [
"m"
]
}
] | ['1. A motion detector (100) with antimasking capability, the motion detector (100) comprising: an antenna (131, 135); a dual-channel reception circuit (110, 115), the dual-channel reception circuit (110, 115) configured to receive a reflected radio frequency (RF) signal; and an electronic processor (205) electrically connected to the dual-channel reception circuit (110, 115) and configured to receive a first signal from a first channel (110) of the dual-channel reception circuit (110, 115) indicative of motion at a first range, receive a second signal from a second channel (115) of the dual-channel reception circuit (110, 115) indicative of motion at a second range, at least a portion of the second range being shorter than the first range, and generate a notification based on the first signal and the second signal, wherein the electronic processor (205) is configured to generate the notification by generating a trouble notification indicative of a masking attempt when the second signal indicates motion at the second range, and wherein the electronic processor (205) is configured to generate the trouble notification when the second signal is greater than a first threshold, characterized in that the electronic processor (205) is configured to adjust the first threshold to a lesser value when the first signal is indicative of motion at the first range.', '7. The motion detector (100) according to Claim 1, wherein the dual-channel reception circuit (110, 115) is controlled by a time gate circuit (120) such that the first channel (110) and the second channel (115) each receive control signals from the time gate circuit (120) simultaneously.'] | false | [
"125",
"305",
"310",
"11",
"315",
"2"
] |
|
EP_3501017_B1 (2).png | EP3501017B1 | MOTION SENSOR WITH ANTIMASK PROTECTION | [
"FIG3"
] | [
"FIG3 is a timing diagram for controlling operation of the motion detector of FIG1 according to one embodiment"
] | [
"FIG3 illustrates one example of control signals for the transmission circuit 105, the first reception circuit 110, and the second reception circuit 115. The time gate circuit 120 is configured to generate multiple control signals including the transmission control signal 191 to control the shape generator 130, the first mixer control signal 192 to control the first mixer 145, the first sample-and-hold control signal 193 to control the first sample-and-hold circuit 150, the second mixer control signal 194 to control the second mixer 165, and the second sample-and-hold control signal 195 to control the second sample-and-hold circuit 170.",
"In the example of FIG3, the motion detector 100 is set to a detection range of 15.2 m (50 feet). The RF burst travels approximately 1ft/ns. Since the RF burst travels roundtrip to a target and back to the motion detector 100, it takes approximately 6.7 ns per meter (2ns per foot) of detection range. In this example, the first mixer control signal 192 activates the first mixer 145 for 100ns. This limits the maximum detection range of the first channel to 15.2 m (50 feet). RF reflections received after 100ns do not pass through the first mixer 145 due to the lack of the first mixer control signal 192 after 100ns.",
"The second reception circuit 115 is configured for a shorter detection range to provide masking detection for the motion detector 100. In the example of FIG3, the second mixer control signal 194 is activated for 10ns to limit detection to a range of 1.5 m (5 feet). In this way, any motion that occurs within the range set by the second mixer control signal 194 is likely to be indicative of masking attempts to the motion detector 100. The second mixer control signal 194 may be delayed by a small time interval (for example, 2ns) to prevent detection of motion of spiders and insects as described above."
] | 18 | 371 | diagram | G | [
{
"element_identifier": "6262661",
"terms": [
"A1. US"
]
},
{
"element_identifier": "100",
"terms": [
"motion detector"
]
},
{
"element_identifier": "105",
"terms": [
"transmission circuit"
]
},
{
"element_identifier": "110",
"terms": [
"first reception circuit"
]
},
{
"element_identifier": "115",
"terms": [
"reception circuit"
]
},
{
"element_identifier": "120",
"terms": [
"time gate circuit"
]
},
{
"element_identifier": "122",
"terms": [
"oscillator"
]
},
{
"element_identifier": "125",
"terms": [
"microcontroller"
]
},
{
"element_identifier": "127",
"terms": [
"alarm indicator"
]
},
{
"element_identifier": "129",
"terms": [
"trouble indicator"
]
},
{
"element_identifier": "130",
"terms": [
"shape generator"
]
},
{
"element_identifier": "131",
"terms": [
"transmission antenna"
]
},
{
"element_identifier": "7",
"terms": [
"centered at"
]
},
{
"element_identifier": "1",
"terms": [
"m"
]
},
{
"element_identifier": "135",
"terms": [
"reception antenna"
]
},
{
"element_identifier": "140",
"terms": [
"first amplifier"
]
},
{
"element_identifier": "145",
"terms": [
"first mixer"
]
},
{
"element_identifier": "150",
"terms": [
"circuit"
]
},
{
"element_identifier": "155",
"terms": [
"first operational amplifier"
]
},
{
"element_identifier": "160",
"terms": [
"second amplifier"
]
},
{
"element_identifier": "165",
"terms": [
"second mixer"
]
},
{
"element_identifier": "170",
"terms": [
"circuit"
]
},
{
"element_identifier": "175",
"terms": [
"second operational amplifier"
]
},
{
"element_identifier": "205",
"terms": [
"electronic processor"
]
},
{
"element_identifier": "210",
"terms": [
"memory"
]
},
{
"element_identifier": "215",
"terms": [
"input/output interface"
]
},
{
"element_identifier": "3",
"terms": [
"m"
]
},
{
"element_identifier": "191",
"terms": [
"transmission control signal"
]
},
{
"element_identifier": "192",
"terms": [
"first mixer control signal"
]
},
{
"element_identifier": "193",
"terms": [
"control signal"
]
},
{
"element_identifier": "194",
"terms": [
"second mixer control signal"
]
},
{
"element_identifier": "195",
"terms": [
"control signal"
]
},
{
"element_identifier": "50",
"terms": [
"m"
]
},
{
"element_identifier": "5",
"terms": [
"m"
]
}
] | ['1. A motion detector (100) with antimasking capability, the motion detector (100) comprising: an antenna (131, 135); a dual-channel reception circuit (110, 115), the dual-channel reception circuit (110, 115) configured to receive a reflected radio frequency (RF) signal; and an electronic processor (205) electrically connected to the dual-channel reception circuit (110, 115) and configured to receive a first signal from a first channel (110) of the dual-channel reception circuit (110, 115) indicative of motion at a first range, receive a second signal from a second channel (115) of the dual-channel reception circuit (110, 115) indicative of motion at a second range, at least a portion of the second range being shorter than the first range, and generate a notification based on the first signal and the second signal, wherein the electronic processor (205) is configured to generate the notification by generating a trouble notification indicative of a masking attempt when the second signal indicates motion at the second range, and wherein the electronic processor (205) is configured to generate the trouble notification when the second signal is greater than a first threshold, characterized in that the electronic processor (205) is configured to adjust the first threshold to a lesser value when the first signal is indicative of motion at the first range.', '7. The motion detector (100) according to Claim 1, wherein the dual-channel reception circuit (110, 115) is controlled by a time gate circuit (120) such that the first channel (110) and the second channel (115) each receive control signals from the time gate circuit (120) simultaneously.'] | false | [
"191",
"192",
"193",
"12",
"194",
"195",
"1000",
"3"
] |
PatFig Dataset
Introduction
The PatFig Dataset is a curated collection of over 18,000 patent images from more than 7,000 European patent applications, spanning the year 2020. It aims to provide a comprehensive resource for research and applications in image captioning, abstract reasoning, patent analysis, and automated documentprocessing. The overarching goal of this dataset is to advance the research in visually situated language understanding towards more hollistic consumption of the visual and textual data.
Dataset Description
Overview
This dataset includes patent figures accompanied by short and long captions, reference numerals, corresponding terms, and a minimal set of claims, offering a detailed insight into the depicted inventions.
Structure
- Image Files: Technical drawings, block diagrams, flowcharts, plots, and grayscale photographs.
- Captions: Each figure is accompanied by a short and long caption describing its content and context.
- Reference Numerals and Terms: Key components in the figures are linked to their descriptions through reference numerals.
- Minimal Set of Claims: Claims sentences summarizing the interactions among elements within each figure.
- Metadata: Includes image names, publication numbers, titles, figure identifiers, and more. The detailed descriptions of the fields are available in the Dataset Documentation.
Categories
The dataset is categorized according to the International Patent Classification (IPC) system, ensuring a diverse representation of technological domains.
Usage
The PatFig Dataset is intended for use in patent image analysis, document image processing, visual question answering tasks, and image captioning in technical contexts. Users are encouraged to explore innovative applications in related fields.
Challenges and Considerations
Users should be aware of challenges such as interpreting compound figures. PatFig was built automatically using high-performance machine-learning and deep-learning methods. Therefore, the data might contain noise, which was mentioned in the corresponding paper.
License and Usage Guidelines
The dataset is released under a Creative Commons Attribution-NonCommercial 2.0 Generic (CC BY-NC 2.0) License. It is intended for non-commercial use, and users must adhere to the license terms.
Cite as
@inproceedings{aubakirova2023patfig,
title={PatFig: Generating Short and Long Captions for Patent Figures},
author={Aubakirova, Dana and Gerdes, Kim and Liu, Lufei},
booktitle={Proceedings of the IEEE/CVF International Conference on Computer Vision},
pages={2843--2849},
year={2023}
}
- Downloads last month
- 12,036