会员体验
专利管家(专利管理)
工作空间(专利管理)
风险监控(情报监控)
数据分析(专利分析)
侵权分析(诉讼无效)
联系我们
交流群
官方交流:
QQ群: 891211   
微信请扫码    >>>
现在联系顾问~
热词
    • 5. 发明授权
    • Absorbent garment with top sheet impediment to liquid flow
    • 吸收性服装,顶层阻碍液体流动
    • US06222092B1
    • 2001-04-24
    • US08897621
    • 1997-07-21
    • Ebba A. HansenAndrew Baker
    • Ebba A. HansenAndrew Baker
    • A61F1315
    • A61F13/49406A61F13/49017A61F13/495A61F13/51104A61F13/512Y10T428/24331
    • A disposable absorbent garment has barrier elements on its inner liner to form barriers to flow of urine across the liner surface. In one embodiment, the barrier elements are loops formed by rows of slits through the liner material, such that the slits form rows of strips. Central portions of the strips are forced out of the plane of the liner to form wide based loops or humps on the inner surface of the garment when the garment is in place about the body of a wearer. These elevated loops form rows of raised obstructions that act as urine flow interference barriers. In other embodiments, the loops are preformed on the surface of the liner layer, or are formed from interdigitating strips. The loops are preferably provided in a target area of the garment where urine impinges the liner surface. Garments intended to be worn by males may have the loops distributed primarily throughout a front crotch region, to interfere with the substantially tangential movement of urine across the liner layer. The garment diminishes leakage of urine out of the waistband of the garment, and inhibits migration of liquid waste within the diaper. Apertures formed under the loops provide an opening through which liquid waste enters the interior of the garment.
    • 一次性吸收衣服在其内衬上具有阻挡元件,以形成尿液穿过衬垫表面的阻挡层。 在一个实施例中,阻挡元件是通过衬里材料的一排狭缝形成的环,使得狭缝形成一排条。 当衣服围绕穿着者的身体就位时,条带的中心部分被迫离开衬垫的平面,以在衣服的内表面上形成宽基的环或褶皱。 这些升高的环形成排列的作为尿液流动干扰屏障的凸起的障碍物。 在其它实施例中,环被预先形成在衬垫层的表面上,或由叉指形成。 优选地,所述环设置在所述衣服的冲击所述衬垫表面的衣服的目标区域中。 旨在由男性穿戴的衣服可以具有主要分布在整个前裆区域的环,以干扰穿过衬里层的尿液的基本上切向的移动。 衣服减少尿液从衣服的腰带渗漏,并且抑制尿布内液体废物的迁移。 在环之下形成的孔提供了液体废物进入衣服内部的开口。
    • 6. 发明授权
    • Transdermal device containing microneedles
    • 透皮装置含有微针
    • US08636696B2
    • 2014-01-28
    • US13157412
    • 2011-06-10
    • Russell Frederick RossAndrew Baker
    • Russell Frederick RossAndrew Baker
    • A61M5/00
    • A61M37/0015A61M2037/0023A61M2037/0038
    • The present invention includes a microneedle assembly having a support that includes a first surface and a second surface, the second surface further including a slanted surface. A plurality of microneedles are provided which project outwardly from the second surface of the support. A pathway through the microneedle assembly is formed and includes an aperture extending between the first surface of the support and the second surface of the support, a channel disposed on the exterior surface of at least one microneedle, the channel having a surface, the channel being in alignment with at least a portion of the aperture to form a junction through which fluids may pass.
    • 本发明包括具有包括第一表面和第二表面的支撑件的微针组件,所述第二表面还包括倾斜表面。 提供了多个微针,其从支撑件的第二表面向外突出。 形成通过微针组件的路径,并且包括在支撑件的第一表面和支撑件的第二表面之间延伸的孔,设置在至少一个微针的外表面上的通道,通道具有表面,通道为 与孔的至少一部分对准以形成流体可以通过的连接点。
    • 8. 发明授权
    • Systems and methods for determining characteristics of a network and enforcing policy
    • 用于确定网络特征和执行策略的系统和方法
    • US07949732B1
    • 2011-05-24
    • US10843459
    • 2004-05-12
    • Martin RoeschRonald A. DempsterAndrew BakerEric Gustafson
    • Martin RoeschRonald A. DempsterAndrew BakerEric Gustafson
    • G06F15/177G06F15/173G06F15/16H04L12/28
    • H04L67/125H04L63/1433
    • A packet transmitted on a network is read and decoded. A network device and its operating system are identified by analyzing the decoded packet. If more than one operating system is identified from the decoded packet, the operating system is selecting by comparing confidence values assigned to the operating systems identified. A service running on the network device is identified from the decoded packet or subsequent packets that are read, decoded and analyzed. The network topology of a network is determined by reading, decoding, and analyzing a plurality of packets. A flow between two network devices is determined by reading, decoding, and analyzing a plurality of packets. Vulnerabilities are assigned to operating systems and services identified by reading, decoding, and analyzing packets. Network configuration policy is enforced on operating systems and services identified by reading, decoding, and analyzing packets.
    • 在网络上发送的分组被读取和解码。 通过分析解码的分组来识别网络设备及其操作系统。 如果从解码的分组识别出多于一个的操作系统,则操作系统通过比较分配给所识别的操作系统的置信度来选择。 从解码的分组或被读取,解码和分析的后续分组识别在网络设备上运行的服务。 通过读取,解码和分析多个分组来确定网络的网络拓扑。 通过读取,解码和分析多个分组来确定两个网络设备之间的流。 脆弱性分配给通过读取,解码和分析数据包识别的操作系统和服务。 在通过读取,解码和分析数据包识别的操作系统和服务上实施网络配置策略。