Outside access to computer resources through a firewall
    1.
    发明授权
    Outside access to computer resources through a firewall 失效
    通过防火墙外部访问计算机资源

    公开(公告)号:US5944823A

    公开(公告)日:1999-08-31

    申请号:US731800

    申请日:1996-10-21

    CPC classification number: H04L63/0272 H04L29/06 H04L63/029

    Abstract: A firewall isolates computer and network resources inside the firewall from networks, computers and computer applications outside the firewall. Typically, the inside resources could be privately owned databases and local area networks (LAN's), and outside objects could include individuals and computer applications operating through public communication networks such as the Internet. Usually, a firewall allows for an inside user or object to originate connection to an outside object or network, but does not allow for connections to be generated in the reverse direction; i.e. from outside in. The disclosed invention provides a special "tunneling" mechanism, operating on both sides of a firewall, for establishing such "outside in" connections when they are requested by certain "trusted" individuals or objects or applications outside the firewall. The intent here is to minimize the resources required for establishing "tunneled" connections (connections through the firewall that are effectively requested from outside), while also minimizing the security risk involved in permitting such connections to be made at all. The mechanism includes special tunneling applications, running on interface servers inside and outside the firewall, and a special table of "trusted sockets" created and maintained by the inside tunneling application. Entries in the trusted sockets table define objects inside the firewall consisting of special inside ports, a telecommunication protocol to be used at each port, and a host object associated with each port. Each entry is "trusted" in the sense that it is supposedly known only by individuals authorized to have "tunneling" access through the firewall from outside. These applications use the table to effect connections through the firewall in response to outside requests identifying valid table entries.

    Abstract translation: 一个防火墙将计算机和网络资源隔离在防火墙之外的网络,计算机和计算机应用程序之外。 通常,内部资源可以是私有数据库和局域网(LAN),外部对象可以包括通过公共通信网络(例如因特网)操作的个体和计算机应用。 通常,防火墙允许内部用户或对象发起与外部对象或网络的连接,但不允许在相反方向上生成连接; 所述公开的发明提供了在防火墙的两侧操作的特殊的“隧道”机制,用于当某些“受信任”的个人或防火墙之外的对象或应用程序请求时,建立这样的“外部”连接。 这里的意图是尽可能减少建立“隧道”连接所需的资源(通过外部有效请求的防火墙的连接),同时最大限度地减少允许完全进行连接的安全风险。 该机制包括在防火墙内外的接口服务器上运行的特殊隧道应用程序,以及内部隧道应用程序创建和维护的“可信套接字”特殊表。 可信套接字表中的条目定义了由特殊内部端口组成的防火墙内的对象,每个端口使用的电信协议以及与每个端口相关联的主机对象。 每个条目都是“受信任的”,因为它被认为只有被授权从外部通过防火墙进行“隧道”访问的人才知道。 这些应用程序使用该表来响应外部请求识别有效的表条目来实现通过防火墙的连接。

    Sling-based treatment of obstructive sleep apnea

    公开(公告)号:US10022263B2

    公开(公告)日:2018-07-17

    申请号:US13550065

    申请日:2012-07-16

    Abstract: Slings, kits, and methods useful in the treatment of Obstructive Sleep Apnea (OSA) are described. An exemplary sling comprises a main body extending along a lengthwise axis and having first and second opposing ends, first and second opposing sides, and first and second opposing surfaces. Each end defines an end loop that defines a passageway extending through the main body. An exemplary method of treatment comprises creating two openings in the mandible of a patient; creating two longitudinal tunnels in the tongue of the patient; creating a transverse tunnel in the tongue of the patient; advancing a sling through the transverse tunnel; pulling each end of the sling through one of the longitudinal tunnels and through one of the openings in the mandible; pulling the tongue toward the front of the mouth or mandible; and securing the sling to a tissue to support the tongue in a new position.

    Sling-Based Treatment of Obstructive Sleep Apnea
    6.
    发明申请
    Sling-Based Treatment of Obstructive Sleep Apnea 有权
    阻塞性睡眠呼吸暂停治疗

    公开(公告)号:US20130056009A1

    公开(公告)日:2013-03-07

    申请号:US13550065

    申请日:2012-07-16

    CPC classification number: A61F5/566

    Abstract: Slings, kits, and methods useful in the treatment of Obstructive Sleep Apnea (OSA) are described. An exemplary sling comprises a main body extending along a lengthwise axis and having first and second opposing ends, first and second opposing sides, and first and second opposing surfaces. Each end defines an end loop that defines a passageway extending through the main body. An exemplary method of treatment comprises creating two openings in the mandible of a patient; creating two longitudinal tunnels in the tongue of the patient; creating a transverse tunnel in the tongue of the patient; advancing a sling through the transverse tunnel; pulling each end of the sling through one of the longitudinal tunnels and through one of the openings in the mandible; pulling the tongue toward the front of the mouth or mandible; and securing the sling to a tissue to support the tongue in a new position.

    Abstract translation: 描述了用于治疗阻塞性睡眠呼吸暂停(OSA)的吊索,套件和方法。 示例性吊带包括沿着纵向轴线延伸的主体,并且具有第一和第二相对端部,第一和第二相对侧面以及第一和第二相对表面。 每个端部限定一个端部环,其限定延伸穿过主体的通道。 一种示例性的治疗方法包括在患者的下颌骨中形成两个开口; 在患者的舌头中形成两条纵向隧道; 在患者的舌头中产生横向隧道; 通过横向隧道推进吊索; 通过一个纵向隧道并通过下颌骨中的一个开口牵引吊索的每一端; 将舌头朝向嘴巴或下颌骨的前方拉扯; 并将吊带固定到组织以将舌头支撑在新的位置。

    Method and system for generating graphical medication information
    7.
    发明申请
    Method and system for generating graphical medication information 审中-公开
    生成图形药物信息的方法和系统

    公开(公告)号:US20080162188A1

    公开(公告)日:2008-07-03

    申请号:US11811778

    申请日:2007-06-12

    CPC classification number: G06Q10/10 G06Q50/24

    Abstract: A system may include a prescription card manager configured to generate medication information cards. The prescription card manager may include a pharmacy database interface configured to receive notifications associated with medication prescriptions, each notification including identifications of a patient, a medication, and instructions associated with a specific medication prescription. A prescription decoder may obtain graphical medication representations based on the identification of the medication and graphical consumption representations based on the identification of instructions associated with the specific medication prescription. A card generator may be configured to generate a representation of a medication information card including one or more of the graphical medication representations and one or more of the graphical consumption representations based on the identification of the patient included in one or more of the notifications.

    Abstract translation: 系统可以包括配置成产生药物信息卡的处方卡管理器。 处方卡管理器可以包括配置成接收与药物处方相关联的通知的药房数据库接口,每个通知包括患者的标识,药物和与特定药物处方相关的指令。 处方解码器可以基于与特定药物处方相关联的指令的识别,基于药物的识别和图形消费表示来获得图形药物表示。 卡发生器可以被配置为基于包括在一个或多个通知中的患者的识别来生成药物信息卡的表示,其包括图形药物表示中的一个或多个以及图形消耗表示中的一个或多个。

    Outside access to computer resources through a firewall
    8.
    发明授权
    Outside access to computer resources through a firewall 有权
    通过防火墙外部访问计算机资源

    公开(公告)号:US6061797A

    公开(公告)日:2000-05-09

    申请号:US132915

    申请日:1998-08-12

    CPC classification number: H04L63/0272 H04L29/06 H04L63/029

    Abstract: A firewall isolates computer and network resources inside the firewall from networks, computers and computer applications outside the firewall. Typically, the inside resources could be privately owned databases and local area networks (LAN's), and outside objects could include individuals and computer applications operating through public communication networks such as the Internet. Usually, a firewall allows for an inside user or object to originate connection to an outside object or network, but does not allow for connections to be generated in the reverse direction; i.e. from outside in. The disclosed invention provides a special "tunneling" mechanism, operating on both sides of a firewall, for establishing such "outside in" connections when they are requested by certain "trusted" individuals or objects or applications outside the firewall. The intent here is to minimize the resources required for establishing "tunneled" connections (connections through the firewall that are effectively requested from outside), while also minimizing the security risk involved in permitting such connections to be made at all. The mechanism includes special tunneling applications, running on interface servers inside and outside the firewall, and a special table of "trusted sockets" created and maintained by the inside tunneling application. Entries in the trusted sockets table define objects inside the firewall consisting of special inside ports, a telecommunication protocol to be used at each port, and a host object associated with each port. Each entry is "trusted" in the sense that it is supposedly known only by individuals authorized to have "tunneling" access through the firewall from outside.

    Abstract translation: 一个防火墙将计算机和网络资源隔离在防火墙之外的网络,计算机和计算机应用程序之外。 通常,内部资源可以是私有数据库和局域网(LAN),外部对象可以包括通过公共通信网络(例如因特网)操作的个体和计算机应用。 通常,防火墙允许内部用户或对象发起与外部对象或网络的连接,但不允许在相反方向上生成连接; 所述公开的发明提供了在防火墙的两侧操作的特殊的“隧道”机制,用于当某些“受信任”的个人或防火墙之外的对象或应用程序请求时,建立这样的“外部”连接。 这里的意图是尽可能减少建立“隧道”连接所需的资源(通过外部有效请求的防火墙的连接),同时最大限度地减少允许完全进行连接的安全风险。 该机制包括在防火墙内外的接口服务器上运行的特殊隧道应用程序,以及内部隧道应用程序创建和维护的“可信套接字”特殊表。 可信套接字表中的条目定义了由特殊内部端口组成的防火墙内的对象,每个端口使用的电信协议以及与每个端口相关联的主机对象。 每个条目都是“受信任的”,因为它被认为只有被授权从外部通过防火墙进行“隧道”访问的人才知道。

Patent Agency Ranking