摘要:
A balloon catheter that comprises an inner shaft, a balloon and a sleeve that defines a lumen. A portion of the inner shaft is positioned within the lumen and the balloon is engaged to the sleeve at least two engagement points.
摘要:
A balloon catheter that comprises an inner shaft, a balloon and a sleeve that defines a lumen. A portion of the inner shaft is positioned within the lumen and the balloon is engaged to the sleeve at least two engagement points.
摘要:
A balloon catheter that comprises an inner shaft, a balloon and a sleeve that defines a lumen. A portion of the inner shaft is positioned within the lumen and the balloon is engaged to the sleeve at least two engagement points.
摘要:
Medical devices including a proximal tubular member, a distal tubular member, and an intermediate tubular member connecting the proximal tubular member to the distal tubular member, and related methods.
摘要:
Medical devices including a proximal tubular member, a distal tubular member, and an intermediate tubular member connecting the proximal tubular member to the distal tubular member, and related methods.
摘要:
Implantable or insertable medical devices that have one or more composite regions. These composite regions include polymer and sol-gel derived ceramic. The polymer and sol-gel ceramic may form bi-continuous phases or separate polymeric and sol-gel derived ceramic phases.
摘要:
In one aspect, the present invention provides composite coatings for implantable or insertable medical devices. These composite coatings comprise (a) an inorganic portion and (b) a polymeric portion that comprises a poly(vinyl pyrrolidone) (PVP) block.
摘要:
The present invention provides one or more powered wireless transceivers and/or one or more passive wireless transceivers, a reader and interrogator with variable power, one or more antennas connected to a human or robotic hand and/or foot, a method for making same and the method of using these devices for process automation and verification involving one or more items in addition to locating, tracking and identifying these items in a supply chain. In one embodiment, a proximity sensing wireless system is provided which can be used to step the handler or operator through the step of a process and verify that each step in the process has been completed.
摘要:
Techniques for adapting a wireless communication device or system to support a desired functionality of the wireless communication system at an optimized performance and economic benefit are discussed. The desired functionality can be determined by defined criteria such as a maximum range of communication with the wireless communication system, quality of a transmission link in the wireless communication system, capacity of the wireless communication system, power consumption of the wireless communication system, protocols supported in the wireless communication system, modulation techniques used in the wireless communication system and processing techniques for combining signals in the wireless communication system. The system can be adapted by varying one or more of modules (e.g., components or processing techniques) used in the wireless communication system.
摘要:
The present invention relates to a system and method for providing security in an RFID system and provides a secure active RFID architecture that uses a combination of passive and active RFID circuitry and employs authentication and encryption techniques in the processing of data, at rest and over the air. In the method of communicating securely in an RFID system of the present invention, a random number is generated with the passive RFID circuitry. The random number is forwarded to a reader. The reader is authenticated by comparing a first hash value determined from a hash function of the random number generated at the RFID tag and an Authenticated Facility Group ID stored on the RFID tag with a second hash value determined from the hash function of the forwarded random number and an Authenticated Facility Group ID stored in the reader such that if the first hash value matches the second hash value the reader is authenticated. After the reader is authenticated, the tag ID stored at the RFID tag can be revealed. After authentication of the reader, a second layer of security using encryption is provided with the active RFID circuitry.