Datasets:
image imagewidth (px) 3.51k 3.51k | image_name stringlengths 17 21 | pub_number stringlengths 11 11 | title stringlengths 4 342 | figs_norm sequencelengths 1 10 | short_description sequencelengths 1 8 | long_description sequencelengths 1 16 | short_description_token_count int64 10 216 | long_description_token_count int64 40 2.28k | draft_class stringclasses 566 values | cpc_class stringclasses 9 values | relevant_terms listlengths 0 903 | associated_claims stringlengths 78 25.7k | compound bool 2 classes | references sequencelengths 0 321 |
|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
EP_3500042_B1 (1).png | EP3500042B1 | SYSTEM AND METHOD FOR IMPROVING TRANSMISSION IN WIRELESS NETWORKS | [
"FIG2"
] | [
"FIG2 illustrates a system according to an embodiment of the invention"
] | [
"FIG2 illustrates a system 200 according to an embodiment of the disclosure. The system 200 includes a first network 202 and a second network 206. The first network 202 includes one or more first network devices 204, and the second network includes one or more second network devices 208. In FIG2, the boundary of th... | 11 | 343 | null | H | [
{
"element_identifier": "210",
"terms": [
"overlapping network channels"
]
},
{
"element_identifier": "214",
"terms": [
"have second network channels"
]
},
{
"element_identifier": "202",
"terms": [
"first network"
]
},
{
"element_identifier": "20... | ['9. The method according to any of claims 1 to 8, wherein the threshold is determined based on evaluating min ( T LBT (1 - λ ), π ( ρ ) T LBT ), wherein T LBT is the fixed duration of time, λ is a load of the first network transmitter, and π ( ρ ) is a fraction of transmission opportunities on the channel.', '14. A system for operating a plurality of wireless networks, comprising: at least a first wireless transmitter operable in at least a first wireless network which has overlapping frequency bands with a second wireless network, the first wireless transmitter being configured to: monitor activity in the overlapping frequency bands; determine whether a channel in the overlapping frequency bands is idle for a predefined time period; based on the channel being idle for the predefined time period, determine that the first wireless transmitter has a transmission opportunity on the channel; measure an amount of time until a next frame boundary on the channel; based on the amount of time until the next frame boundary being below a threshold, reserve the channel for a fixed duration of time and transmit data at the next frame boundary; and based on the amount of time until the next frame boundary being above the threshold, skip the transmission opportunity on the channel and wait for a next transmission opportunity.'] | false | [
"200",
"202",
"204",
"212",
"210",
"204",
"206",
"208",
"208",
"204",
"204",
"208",
"208",
"208",
"214",
"21"
] | |
EP_3500042_B1 (2).png | EP3500042B1 | SYSTEM AND METHOD FOR IMPROVING TRANSMISSION IN WIRELESS NETWORKS | [
"FIG3"
] | [
"FIG3 is a flow diagram for data transmission according to an embodiment of the invention"
] | [
"FIG3 is a flow diagram 300 for data transmission according to an embodiment of the disclosure. At step 302, the first network device 204 monitors activity in the overlapping frequency bands, for example, in one channel of the overlapping network channels 210. At step 304, the first network device 204 determines wh... | 15 | 94 | flow diagram | H | [
{
"element_identifier": "802",
"terms": [
"IEEE"
]
},
{
"element_identifier": "8",
"terms": [
"andFIG."
]
},
{
"element_identifier": "301",
"terms": [
"ETSI's EN"
]
},
{
"element_identifier": "18",
"terms": [
"clause"
]
},
{
... | ['8. The method according to any of claims 1 to 7, wherein the threshold is determined based on an activity level in the overlapping frequency bands.', '9. The method according to any of claims 1 to 8, wherein the threshold is determined based on evaluating min ( T LBT (1 - λ ), π ( ρ ) T LBT ), wherein T LBT is the fixed duration of time, λ is a load of the first network transmitter, and π ( ρ ) is a fraction of transmission opportunities on the channel.', '10. The method according to any of claims 1 to 9, wherein the first wireless network is a Long-Term Evolution, LTE, network and the overlapping frequency bands comprises unlicensed National Information Infrastructure, NII, channels.', '14. A system for operating a plurality of wireless networks, comprising: at least a first wireless transmitter operable in at least a first wireless network which has overlapping frequency bands with a second wireless network, the first wireless transmitter being configured to: monitor activity in the overlapping frequency bands; determine whether a channel in the overlapping frequency bands is idle for a predefined time period; based on the channel being idle for the predefined time period, determine that the first wireless transmitter has a transmission opportunity on the channel; measure an amount of time until a next frame boundary on the channel; based on the amount of time until the next frame boundary being below a threshold, reserve the channel for a fixed duration of time and transmit data at the next frame boundary; and based on the amount of time until the next frame boundary being above the threshold, skip the transmission opportunity on the channel and wait for a next transmission opportunity.'] | false | [
"300",
"302",
"304",
"306",
"308",
"310",
"314",
"312",
"22"
] | |
EP_3500042_B1 (6).png | EP3500042B1 | SYSTEM AND METHOD FOR IMPROVING TRANSMISSION IN WIRELESS NETWORKS | [
"FIG7"
] | [
"FIG7 shows exemplary simulation results according to an embodiment of the invention"
] | [
"The obtained results are plotted in FIG7. FIG7 shows individual throughput gain with respect to legacy Wi-Fi when an LBT WN shares the medium with 5 background Wi-Fi WNs, whose offered load increases. It can be seen that 3GPP LAA negatively impacts on Wi-Fi even when lightly loaded. This is more obvious when the f... | 12 | 172 | null | H | [
{
"element_identifier": "300",
"terms": [
"flow diagram"
]
},
{
"element_identifier": "7",
"terms": [
"where in",
"if"
]
},
{
"element_identifier": "200",
"terms": [
"system"
]
}
] | ['14. A system for operating a plurality of wireless networks, comprising: at least a first wireless transmitter operable in at least a first wireless network which has overlapping frequency bands with a second wireless network, the first wireless transmitter being configured to: monitor activity in the overlapping frequency bands; determine whether a channel in the overlapping frequency bands is idle for a predefined time period; based on the channel being idle for the predefined time period, determine that the first wireless transmitter has a transmission opportunity on the channel; measure an amount of time until a next frame boundary on the channel; based on the amount of time until the next frame boundary being below a threshold, reserve the channel for a fixed duration of time and transmit data at the next frame boundary; and based on the amount of time until the next frame boundary being above the threshold, skip the transmission opportunity on the channel and wait for a next transmission opportunity.'] | false | [
"400",
"300",
"200",
"600",
"200",
"150",
"100",
"50",
"600",
"400",
"7",
"26"
] | |
EP_3500065_B1 (3).png | EP3500065B1 | INDUCTION HEATING CELLS COMPRISING TENSIONING MEMBERS WITH NON-MAGNETIC METAL CORES | [
"FIG4"
] | [
"FIG4 illustrates an example of arranging multiple tensioning members in a die, in accordance with some examples"
] | [
"In some examples, first tensioning member 130 is a part of first group 137 as, for example, schematically shown in FIG4. All tensioning members 130 of first group 137 are parallel to each other (e.g., extend in X direction). Furthermore, tensioning members 130 of first group 137 may be distributed throughout die i... | 18 | 70 | schematic | B | [
{
"element_identifier": "137",
"terms": [
"first group"
]
},
{
"element_identifier": "126",
"terms": [
"forming surface"
]
},
{
"element_identifier": "120",
"terms": [
"die"
]
},
{
"element_identifier": "130",
"terms": [
"tensioning mem... | ['1. An induction heating cell (100) comprising: a die (120), wherein the die comprises a first side (122) and a second side (124), the die further comprising a forming surface (126); an induction heater (140), wherein at least a portion of the induction heater is disposed adjacent to the forming surface of the die, the induction heater being configured to generate heat using a magnetic field; and a first tensioning member (130), wherein: the first tensioning member extends through the die between and past the first side and the second side of the die and along a first direction (102), the first tensioning member comprises multiple strands (132), each of the multiple strands comprises a non-magnetic metal core (134), a largest cross-sectional dimension of the non-magnetic metal core is less than an induction heating threshold for the magnetic field, and each of the multiple strands is electrically insulated from any other one of the multiple strands.', '10. The induction heating cell according to any of claims 1-9, wherein the first tensioning member is a part of a first group (137) of tensioning members, and wherein the first tensioning members of the first group of tensioning members are parallel to each other.'] | false | [
"126",
"120",
"16",
"120",
"130",
"130",
"130",
"137",
"4"
] | |
EP_3500065_B1 (4).png | EP3500065B1 | INDUCTION HEATING CELLS COMPRISING TENSIONING MEMBERS WITH NON-MAGNETIC METAL CORES | [
"FIG5"
] | [
"FIG5 illustrates an example of arranging two sets of tensioning members in a die, in accordance with some examples"
] | [
"In some examples, induction heating cell 100 further comprises second tensioning member 160 extending through die 120 parallel to plane 104 as, for example, shown in FIG5. The direction, along which second tensioning member 160 extends, is referred to as a transverse direction or the Y-direction. The projection of... | 20 | 184 | schematic | B | [
{
"element_identifier": "17",
"terms": [
"supports INTERNATIONAL PAPER CO"
]
},
{
"element_identifier": "5",
"terms": [
"about",
"second side can be"
]
},
{
"element_identifier": "160",
"terms": [
"second tensioning member"
]
},
{
"element_... | ['1. An induction heating cell (100) comprising: a die (120), wherein the die comprises a first side (122) and a second side (124), the die further comprising a forming surface (126); an induction heater (140), wherein at least a portion of the induction heater is disposed adjacent to the forming surface of the die, the induction heater being configured to generate heat using a magnetic field; and a first tensioning member (130), wherein: the first tensioning member extends through the die between and past the first side and the second side of the die and along a first direction (102), the first tensioning member comprises multiple strands (132), each of the multiple strands comprises a non-magnetic metal core (134), a largest cross-sectional dimension of the non-magnetic metal core is less than an induction heating threshold for the magnetic field, and each of the multiple strands is electrically insulated from any other one of the multiple strands.', '9. The induction heating cell according to any of claims 1-8, wherein the non-magnetic metal core has a resistivity of at least about 2.6 × 10 -8 Ohm-meter.'] | false | [
"17",
"104",
"120",
"130",
"5",
"160"
] | |
EP_3500065_B1 (6).png | EP3500065B1 | INDUCTION HEATING CELLS COMPRISING TENSIONING MEMBERS WITH NON-MAGNETIC METAL CORES | [
"FIG8"
] | [
"FIG8 illustrates a block diagram of an example of an aircraft, in accordance with some examples "
] | [
"As shown in FIG8, aircraft 902 produced by illustrative method 900 includes airframe 918 with plurality of systems 920, and interior 922. Examples of high-level systems 920 include one or more of propulsion system 924, electrical system 926, hydraulic system 928, and environmental system 930. Any number of other s... | 17 | 90 | block diagram | B | [
{
"element_identifier": "926",
"terms": [
"electrical system"
]
},
{
"element_identifier": "900",
"terms": [
"method"
]
},
{
"element_identifier": "908",
"terms": [
"manufacturing"
]
},
{
"element_identifier": "904",
"terms": [
"design"... | ['14. A method of operating an induction heating cell of any of claims 1-13, the method comprising: a step of applying heat to a part (190) disposed inside the induction heating cell, wherein: the heat is applied by the induction heater using a magnetic field; and a step of applying pressure to the part disposed over a forming surface of the die, wherein the first tensioning member applies a compressive force to the die while applying the pressure to the part.'] | true | [
"900",
"7",
"904",
"906",
"908",
"912",
"914",
"916",
"920",
"1924",
"926",
"922",
"902",
"8",
"928",
"930",
"19"
] | |
EP_3500146_B1.png | EP3500146B1 | VACUUM CLEANER NOZZLE HAVING ROTATABLE BRUSH | [
"FIG1",
" FIG3"
] | [
"FIG1 shows a first embodiment of a rotatable brush for use in a vacuum cleaner nozzle in accordance with the invention ",
"FIG3 shows an embodiment of a vacuum cleaner comprising a vacuum cleaner nozzle in accordance with the invention "
] | [
"A first embodiment of a rotatable brush for use in a vacuum cleaner nozzle in accordance with the invention is shown in FIG1. The rotation around an axis A is caused by a motor which is connected to the rotatable brush B by way of gears or pulley that drive a wheel W. The rotatable brush B has a transparent light ... | 39 | 428 | embodiment | A | [] | ['1. A vacuum cleaner nozzle (N) comprising: a rotatable brush (B) comprising a light distribution mechanism for distributing light from the rotatable brush (B); a transparent screen (S) through which a user can see the rotatable brush (B); and a drive unit for rotating the rotatable brush (B); characterized by a sensor for measuring a rotation speed of the rotatable brush (B), and a controller for controlling the light distributed from the rotatable brush (B) in dependence on the rotation speed of the rotatable brush (B).'] | true | [
"97",
"1",
"2",
"3"
] | |
EP_3500158_B1 (2).png | EP3500158B1 | CATHETER WITH VARIABLE RADIUS LOOP AND METHOD OF MANUFACTURE | [
"FIG4"
] | [
"FIG4 is a transverse cross-section taken along line A-A in FIG1 "
] | [
"It is contemplated that the radius of curvature of the loop of distal region 16 may be adjustable, for example to conform to the varying sizes of pulmonary vein ostia of patients of different ages. This additional control may be provided, for example, via the use of an activation wire 26, shown in FIG4, that is ad... | 15 | 163 | transverse cross-sectional view | A | [
{
"element_identifier": "18",
"terms": [
"neck region"
]
},
{
"element_identifier": "28",
"terms": [
"wire"
]
},
{
"element_identifier": "30",
"terms": [
"constraint"
]
},
{
"element_identifier": "26",
"terms": [
"wire"
]
}
] | ['1. A catheter (10) comprising: a catheter body (12) having a proximal region (14), a neck region (18), and a distal region (16) predisposed into at least a partial loop disposed in a plane; a handle (22) joined to the proximal region and including an actuator (24); an activation wire (26) coupled to the actuator (24) and to the distal region (16) such that, when a user actuates the actuator (24), the activation wire (26) is activated to cause the at least a partial loop of the distal region (16) to vary in radius; a shape memory wire (28) extending through the neck region (18) and at least a portion of the distal region (16) and shaping the portion of the distal region (16) into the at least a partial loop; and a tube-shaped constraint (30) within the neck region (18) that prevents nodding of the neck region (18) when the activation wire (26) is activated, characterized in that the activation wire (26) and the shape memory wire (28) are constrained within the constraint (30).'] | false | [
"18",
"28",
"30",
"26",
"11"
] | |
EP_3500171_B1 (2).png | EP3500171B1 | MODEL REGULARIZED MOTION COMPENSATED MEDICAL IMAGE RECONSTRUCTION | [
"FIG3",
" FIG4"
] | [
"FIG3 diagrammatically illustrates an embodiment of masked reconstructed motion phase image ",
"FIG4 illustrates an example in a frontal view and a side view of a visceral cavity model fitted in an image of a subject and the corresponding visceral cavity model in a separate view"
] | [
"With reference to FIG3, an embodiment of masked reconstructed motion phase image 300 is diagrammatically illustrated. The masked reconstructed motion phase image 300 is constructed from a reconstructed motion phase volumetric image 228. The masked reconstructed motion phase image 300 includes the segmented anatomi... | 45 | 263 | embodiment, nan | A | [
{
"element_identifier": "310",
"terms": [
"masked portions"
]
},
{
"element_identifier": "420",
"terms": [
"visceral cavity model"
]
},
{
"element_identifier": "430",
"terms": [
"separate view"
]
},
{
"element_identifier": "220",
"terms": [
... | ['1. A medical imaging system (200), comprising: a masking unit (234) configured to construct a mask for each reconstructed volumetric phase image of a plurality of reconstructed volumetric phase images that masks portions of a corresponding image external to an anatomical model fitted to a segmented at least one anatomical structure, wherein the plurality of reconstructed volumetric phase images include a target phase and a plurality of temporal neighboring phases reconstructed from projection data; an image registration unit (238) configured to register the masked reconstructed volumetric phase images; a motion estimator (240) configured to estimate motion between the target phase and the plurality of temporal neighboring phases according to the model based on the registered masked reconstructed volumetric phase images; and a motion compensating reconstructor (244) configured to reconstruct a motion compensated medical image from the projection data using the estimated motion of the registered masked reconstructed volumetric phase images.', '7. The system according to claim 6, wherein the visceral cavity model includes a surface that encloses inner organs of a subject and excludes bones and surrounding tissues.'] | true | [
"300",
"310",
"320",
"220",
"3",
"400",
"420",
"420",
"410",
"430",
"430",
"4",
"12"
] | |
EP_3500171_B1 (3).png | EP3500171B1 | MODEL REGULARIZED MOTION COMPENSATED MEDICAL IMAGE RECONSTRUCTION | [
"FIG5"
] | [
"FIG5 flowcharts an embodiment of a method of model regularized motion compensated medical image reconstruction "
] | [
"With reference to FIG5, an embodiment of a method of model regularized motion compensated CT reconstruction is flowcharted. At 500, projection data 212 is received. The projection data 212 can be received directly from the CT scanner 210. The projection data 212 can be received from a storage subsystem, such as th... | 15 | 68 | null | A | [
{
"element_identifier": "100",
"terms": [
"torso"
]
},
{
"element_identifier": "102",
"terms": [
"visceral cavity"
]
},
{
"element_identifier": "104",
"terms": [
"metal object"
]
},
{
"element_identifier": "106",
"terms": [
"streak arti... | ['1. A medical imaging system (200), comprising: a masking unit (234) configured to construct a mask for each reconstructed volumetric phase image of a plurality of reconstructed volumetric phase images that masks portions of a corresponding image external to an anatomical model fitted to a segmented at least one anatomical structure, wherein the plurality of reconstructed volumetric phase images include a target phase and a plurality of temporal neighboring phases reconstructed from projection data; an image registration unit (238) configured to register the masked reconstructed volumetric phase images; a motion estimator (240) configured to estimate motion between the target phase and the plurality of temporal neighboring phases according to the model based on the registered masked reconstructed volumetric phase images; and a motion compensating reconstructor (244) configured to reconstruct a motion compensated medical image from the projection data using the estimated motion of the registered masked reconstructed volumetric phase images.', '3. The system according to either one of claims 1 and 2, further including: a vessel enhancing filter (242) configured to enhance vascular structures in the reconstructed volumetric phase images.', '7. The system according to claim 6, wherein the visceral cavity model includes a surface that encloses inner organs of a subject and excludes bones and surrounding tissues.', '8. The system according to any one claims 1-7, further including: a CT scanner (210) configured to acquire the projection data within a single rotation of an x-ray radiation source about a subject.', '14. A non-transitory computer-readable storage medium carrying software which controls one or more processors (250) to perform the method according to any one of claims 11-'] | false | [
"500",
"510",
"520",
"530",
"540",
"550",
"560",
"570",
"580",
"5",
"13"
] | |
EP_3500223_B1.png | EP3500223B1 | BACKSTOP AND GEAR-SHIFT ARRANGEMENT FOR A WHEELCHAIR WHEEL | [
"FIG1"
] | [
"FIG1 illustrates schematically a wheelchair with a wheel provided with a backstop arrangement according to the present invention"
] | [
"The present invention relates to a wheelchair and more specifically to the main driving wheels of a wheelchair. An exemplifying wheelchair is depicted in FIG1, wherein a wheelchair 1 essentially comprises a seat 2, a back 3, a foot support 4, and two wheels 5. Each of the two wheels 5 is provided with an outer gri... | 18 | 379 | schematic | A | [
{
"element_identifier": "14",
"terms": [
"space"
]
},
{
"element_identifier": "3",
"terms": [
"back"
]
},
{
"element_identifier": "2",
"terms": [
"Canadian patent publication No.",
"seat"
]
},
{
"element_identifier": "5",
"terms": [
... | ['1. A wheel assembly comprising a wheel (5) for a wheelchair (1) and a backstop arrangement (10; 30; 70), the wheel (5) being provided with a wheel hub (11; 31; 71) and a wheel axle (12; 32; 72), the backstop arrangement (10; 30; 70) being configured to selectively engage and disengage, respectively, a backstop function, the backstop arrangement comprising a backstop selector (15; 35; 75) and a backstop member (18; 38; 78), wherein the wheel hub (11; 31; 71) has an inner rotatable circumferential surface (13; 33; 73), which faces the wheel axle (12; 32; 72) and is arranged with a radial space (14; 34; 74) therefrom, and the backstop selector (15; 35; 75) is operatively connected to the backstop member (18; 38; 78), which is radially moveable within the radial space (14; 34; 74), to, upon movement of the backstop selector (15; 35; 75), be selectively engaged with or disengaged from the inner circumferential surface (13; 33; 73), and that the backstop member (18; 38; 78) is configured, when in engagement with the inner circumferential surface (13; 33; 73), to allow the inner circumferential surface (13; 33;73) to rotate in a first direction and to prevent the inner circumferential surface (13; 33; 73) from rotating in a second, opposite direction, wherein the wheel assembly further comprises a gear-shift arrangement, characterized in that the wheel hub (11; 31; 71) is an internal-gear hub (11; 31; 71) comprising a number of internal gears (57, 58); the gear-shift arrangement comprises a shift member (54), which is axially moveable within the internal-gear hub (31) to engage a specific gear of said number of internal gears (57, 58), and wherein the shift member (54) via a connector member (55) is operatively connected to the backstop selector (15; 35; 75 ), such that the backstop selector (15, 35, 75) can be regarded as a gear and backstop selector.'] | false | [
"5",
"3",
"2",
"14"
] | |
EP_3500226_B1 (6).png | EP3500226B1 | SECURED MEDICATION TRANSFER SYSTEM | [
"FIG15"
] | [
"FIG15 is a perspective view of a fourth exemplary vial adaptor coupled to a vial"
] | [
"Referring next to FIG15, a fourth exemplary vial adaptor 400 is shown for use with vial 10. Vial adaptor 400 is similar to the above-described vial adaptor 300, with like reference numerals identifying like elements, except as described below. The illustrative vial adaptor 400 includes a cleaning passageway 430 in... | 15 | 123 | perspective view | A | [
{
"element_identifier": "400",
"terms": [
"vial adaptor"
]
},
{
"element_identifier": "25",
"terms": [
"about"
]
}
] | ['1. A vial adaptor (100) configured for use with a vial (10) containing a medication and a needle assembly (150) having a needle, the vial adaptor comprising: a substantially hollow body (101) configured to couple with the vial, the body including a side wall (102) and an upper wall (108); a needle opening (120) in the body, the needle opening being arranged along an axis and being sized and shaped to receive the needle along the axis to withdraw the medication from the vial; a cleaning passageway (130) in the body, the cleaning passageway having an inlet (131) in the side wall and being sized and shaped to receive a cleaning device to clean the vial; and a shroud (132) extending outward from the body to block needle insertion into the vial through the cleaning passageway, the side wall deviating radially outwardly to follow the path of the shroud wherein the inlet deviates radially outwardly from a lower end (136) of the inlet to an upper end (138) of the inlet.', '4. The vial adaptor of claim 1, wherein the shroud extends from the axis of the needle opening by a distance of about 20 millimeters to about 30 millimeters.'] | false | [
"400",
"15",
"25"
] | |
EP_3500306_B1 (2).png | EP3500306B1 | TRIPLE COMBINATION OF HISTAMINE-3 RECEPTOR INVERSE AGONISTS, ACETYLCHOLINESTERASE INHIBITORS AND NMDA RECEPTOR ANTAGONIST | [
"FIG2"
] | [
"FIG2 depicts the effect of compound 1 in combination with donepezil and memantine on extracellular levels of acetylcholine in medial prefrontal cortex of male Wistar rats"
] | [
"Treatment with donepezil and memantine produced increase in acetylcholine levels to the maximum of 1726 ± 297 % of basal levels. The increase in acetylcholine after combination of compound 1, donepezil and memantine was significantly higher compared to donepezil and memantine combination. Mean maximum increase in ... | 26 | 105 | null | A | [
{
"element_identifier": "1",
"terms": [
"compound",
"compounds"
]
},
{
"element_identifier": "3",
"terms": [
"compound",
"compounds"
]
},
{
"element_identifier": "2",
"terms": [
"compound"
]
},
{
"element_identifier": "0",
"terms"... | ["8. The compound, N-[4-(1-Cyclobutylpiperidin-4-yloxy)phenyl]-2-(morpholin-4-yl)acetamide or a pharmaceutically acceptable salt thereof for use in combination with acetylcholinesterase inhibitor and NMDA receptor antagonist for the treatment of Alzheimer's disease in a patient, and preferably wherein the use is an adjunct treatment for Alzheimer's disease in a patient on stable treatment with acetylcholinesterase inhibitor and NMDA receptor antagonist."] | false | [
"40",
"20",
"20",
"40",
"60",
"80",
"100",
"120",
"140",
"160",
"180",
"200",
"220",
"240",
"2000",
"23"
] | |
EP_3500306_B1 (3).png | EP3500306B1 | TRIPLE COMBINATION OF HISTAMINE-3 RECEPTOR INVERSE AGONISTS, ACETYLCHOLINESTERASE INHIBITORS AND NMDA RECEPTOR ANTAGONIST | [
"FIG3"
] | [
"FIG3 depicts the effect of compound 2 in combination with donepezil and memantine on extracellular levels of acetylcholine in medial prefrontal cortex of male Wistar rats"
] | [
"Treatment with donepezil and memantine produced increase in acetylcholine levels to the maximum of 1365 ± 249 % of basal levels. The increase in acetylcholine after combination of compound 2, donepezil and memantine was significantly higher compared to donepezil and memantine combination. Mean maximum increase in ... | 26 | 105 | null | A | [
{
"element_identifier": "24",
"terms": [
"wall."
]
},
{
"element_identifier": "3",
"terms": [
"compound",
"compounds"
]
},
{
"element_identifier": "10",
"terms": [
"were positioned"
]
},
{
"element_identifier": "1",
"terms": [
"co... | ["8. The compound, N-[4-(1-Cyclobutylpiperidin-4-yloxy)phenyl]-2-(morpholin-4-yl)acetamide or a pharmaceutically acceptable salt thereof for use in combination with acetylcholinesterase inhibitor and NMDA receptor antagonist for the treatment of Alzheimer's disease in a patient, and preferably wherein the use is an adjunct treatment for Alzheimer's disease in a patient on stable treatment with acetylcholinesterase inhibitor and NMDA receptor antagonist."] | false | [
"3",
"4",
"1",
"1",
"10",
"40",
"40",
"80",
"120",
"160",
"200",
"240",
"2000",
"24"
] | |
EP_3500306_B1 (4).png | EP3500306B1 | TRIPLE COMBINATION OF HISTAMINE-3 RECEPTOR INVERSE AGONISTS, ACETYLCHOLINESTERASE INHIBITORS AND NMDA RECEPTOR ANTAGONIST | [
"FIG4"
] | [
"FIG4 depicts the effect of compound 3 in combination with donepezil and memantine on extracellular levels of acetylcholine in medial prefrontal cortex of male Wistar rats"
] | [
"Treatment with donepezil and memantine produced increase in acetylcholine levels to the maximum of 1375 ± 461 % of basal levels. The increase in acetylcholine after combination of compound 3, donepezil and memantine was significantly higher compared to donepezil and memantine combination. Mean maximum increase in ... | 26 | 103 | null | A | [
{
"element_identifier": "5",
"terms": [
"patient"
]
},
{
"element_identifier": "10",
"terms": [
"were positioned"
]
}
] | ["7. The combination as claimed in any one of the claim 1 to 6, for use in the treatment of cognitive disorders in a patient, preferably wherein the cognitive disorder is selected from Alzheimer's disease, schizophrenia, Parkinson's disease, Lewy body dementia, vascular dementia, frontotemporal dementia, Down syndrome and Tourette's syndrome."] | false | [
"4000",
"3000",
"2000",
"1000",
"5",
"10",
"40",
"80",
"120",
"160",
"200",
"240",
"2400",
"25"
] | |
EP_3500306_B1 (5).png | EP3500306B1 | TRIPLE COMBINATION OF HISTAMINE-3 RECEPTOR INVERSE AGONISTS, ACETYLCHOLINESTERASE INHIBITORS AND NMDA RECEPTOR ANTAGONIST | [
"FIG5"
] | [
"FIG5 depicts the effect of compound 1 in combination with donepezil and memantine on evoked theta levels in dorsal hippocampus of anesthetized male Wistar rats "
] | [
"Treatment with donepezil and memantine combination produced moderate increase in hippocampal θ power. Compound 1 in combination with donepezil and memantine produced significant increase in θ power levels and peak levels reached up to 167 ± 11 % of pre-dose levels. The effect in triple combination was observed to ... | 25 | 103 | null | A | [
{
"element_identifier": "100",
"terms": [
"about",
"R-α-methylhistamine",
"dialysate basal concentrations with"
]
},
{
"element_identifier": "5",
"terms": [
"patient"
]
},
{
"element_identifier": "60",
"terms": [
"about",
"another"
]
... | ["7. The combination as claimed in any one of the claim 1 to 6, for use in the treatment of cognitive disorders in a patient, preferably wherein the cognitive disorder is selected from Alzheimer's disease, schizophrenia, Parkinson's disease, Lewy body dementia, vascular dementia, frontotemporal dementia, Down syndrome and Tourette's syndrome."] | false | [
"5",
"20",
"40",
"50",
"60",
"70",
"80",
"90",
"100",
"110",
"120",
"100",
"47",
"26"
] | |
EP_3500379_B1 (5).png | EP3500379B1 | PROCESSES FOR RECOVERING SAND AND ACTIVE CLAY FROM FOUNDRY WASTE | [
"FIG9"
] | [
"FIG9 depicts visual results of an evaluation of rinser/shaker tests on a Plant A sand stream using a pre-slurry"
] | [
"FIG9 depicts visual results of an evaluation of rinser/shaker tests on a Plant A sand stream using a pre-slurry. The feed to the rinser/shaker table was a slurry of the sand that was 30% solids. As in the no pre-slurry case, as the sand moves through each rinse, the clay and carbon are removed from the surface of ... | 23 | 89 | null | B | [
{
"element_identifier": "50",
"terms": [
"about"
]
},
{
"element_identifier": "10",
"terms": [
"stream"
]
},
{
"element_identifier": "2",
"terms": [
"stream"
]
},
{
"element_identifier": "1",
"terms": [
"stream",
"Set"
]
},
... | ['1. A method of reclaiming clean sand and active clay from foundry waste comprising: providing dust and sand from a molding process in a foundry, wherein the dust and sand comprise clay including active clay and dead clay; rinsing a slurry comprising the dust and sand to remove clay from the sand and dust, wherein the rinsing comprises rinsing the slurry at least one time, wherein the clay is separated as a first clay slurry; removing additional clay from the rinsed slurry by shaking the rinsed slurry on a shaker table, wherein the additional clay is separated as a second clay slurry, wherein a clean sand slurry is removed from an end of the shaker table; allowing the dead clay to separate as solids from the first and second clay slurry to form an active clay slurry; recycling the active clay slurry to a muller in a foundry; and recycling clean sand from the clean sand slurry to the foundry.'] | false | [
"38"
] | |
EP_3500379_B1 (6).png | EP3500379B1 | PROCESSES FOR RECOVERING SAND AND ACTIVE CLAY FROM FOUNDRY WASTE | [
"FIG10"
] | [
"FIG10 depicts visual results of an evaluation of rinser/shaker tests on a Plant A dust stream with no pre-slurry"
] | [
"FIG10 depicts visual results of an evaluation of rinser/shaker tests on a Plant A dust stream with no pre-slurry. The feed to the rinser/shake table was dry dust feed. Raw dust was used as input to the rinser/shaker and samples were taken and tested after the first, second, third, fourth, and fifth rinse. The raw ... | 23 | 129 | null | B | [
{
"element_identifier": "50",
"terms": [
"about"
]
},
{
"element_identifier": "10",
"terms": [
"stream"
]
},
{
"element_identifier": "2",
"terms": [
"stream"
]
},
{
"element_identifier": "1",
"terms": [
"stream",
"Set"
]
},
... | ['1. A method of reclaiming clean sand and active clay from foundry waste comprising: providing dust and sand from a molding process in a foundry, wherein the dust and sand comprise clay including active clay and dead clay; rinsing a slurry comprising the dust and sand to remove clay from the sand and dust, wherein the rinsing comprises rinsing the slurry at least one time, wherein the clay is separated as a first clay slurry; removing additional clay from the rinsed slurry by shaking the rinsed slurry on a shaker table, wherein the additional clay is separated as a second clay slurry, wherein a clean sand slurry is removed from an end of the shaker table; allowing the dead clay to separate as solids from the first and second clay slurry to form an active clay slurry; recycling the active clay slurry to a muller in a foundry; and recycling clean sand from the clean sand slurry to the foundry.'] | false | [
"39",
"10"
] | |
EP_3500383_B1 (5).png | EP3500383B1 | POWER SKIVING PRESSURE ANGLE CORRECTION WITHOUT TOOL GEOMETRY CHANGE | [
"FIG6"
] | [
"FIG6 shows the reference profile and one involute of a cutting blade before and after a corrective radial shift"
] | [
"FIG6 shows the reference profile 34 and the involute 30 generated by the reference profile 34, respectively by unrolling the virtual cord I*b from the base circle 39. The involute triangle I*b → R*b → (DOtool/2-ΔR) enables the determination of the pressure angle at point 32 with: α+Δα = arccos[Rb* / (DOtool/2-ΔR)]... | 19 | 66 | null | B | [
{
"element_identifier": "35",
"terms": [
"involute"
]
},
{
"element_identifier": "30",
"terms": [
"involute"
]
},
{
"element_identifier": "39",
"terms": [
"base circle"
]
},
{
"element_identifier": "37",
"terms": [
"involute reference l... | ['4. The method of claim 1 wherein changing said initial radial position of said cutting blades comprises shifting the position of each of said plurality of cutting blades in the lengthwise direction thereof.'] | false | [
"36",
"37",
"31",
"35",
"30",
"34",
"33",
"39",
"32",
"2",
"26",
"2",
"15"
] | |
EP_3500422_B1 (1).png | EP3500422B1 | A METHOD FOR MANUFACTURING CONTACT LENSES | [
"FIG2"
] | [
"FIG2 is a flow chart showing a method of manufacturing a contact lens in accordance with a first example method"
] | [
"FIG2 shows a flow chart of an example method of manufacturing a contact lens. In a first step a tubular mold having a diameter corresponding to the diameter of the finished contact lens is assembled 50. To produce the rod a predetermined quantity of liquid lens precursor composition is first poured 52a into the mo... | 20 | 238 | flowchart | B | [
{
"element_identifier": "103",
"terms": [
"mold"
]
},
{
"element_identifier": "2",
"terms": [
"electronic devices"
]
},
{
"element_identifier": "56",
"terms": [
"is removed"
]
},
{
"element_identifier": "104",
"terms": [
"device",
... | ['3. A method according to any previous claim, wherein manufacturing the rod (101) of lens material comprises curing a quantity of liquid lens precursor composition (105) containing an electronic component (104) in a mold (103).', '7. A method according to any previous claim, wherein the electronic component (104) forms part of a curved electronic device.', '8. A method according to claim 4, further comprising a final cure in which the curing process is completed for more than one of the lengths of the rod (101) simultaneously.'] | true | [
"50",
"103",
"105",
"56",
"104",
"104",
"58",
"09",
"62",
"2",
"10"
] | |
EP_3500422_B1.png | EP3500422B1 | A METHOD FOR MANUFACTURING CONTACT LENSES | [
"FIG1"
] | [
"FIG1 is a schematic view of a rod of contact lens material in accordance with a first example embodiment"
] | [
"With reference to the drawings, FIG1 shows a schematic view of a rod 1 of lens material in accordance with a first example embodiment. The rod has a circular cross section and incorporates four electronic devices 2. The electronic devices 2 are spaced equidistantly apart along the longitudinal axis of the rod 1. L... | 19 | 77 | schematic view | B | [
{
"element_identifier": "2",
"terms": [
"electronic devices"
]
},
{
"element_identifier": "1",
"terms": [
"rod"
]
}
] | ['1. A method of manufacturing a contact lens, the method comprising manufacturing a rod (101) of lens material, the rod (101) containing a plurality of electronic components (104) spaced apart along its length, separating the rod (101) into at least one lens blank containing at least one of said electronic components (104), and machining the front and/or back surface of the lens blank to produce a contact lens (110) containing the at least one electronic component (104), CHARACTERISED IN THAT : manufacturing the rod (101) of lens material comprises producing a first length of rod (101a) including a first one of a plurality of electronic components (104) and then producing a second length of the rod (101b), said second length including a second one of the plurality of electronic components (104).'] | false | [
"2",
"1"
] | |
EP_3500497_B1 (2).png | EP3500497B1 | OPEN-WALLED PACK | [
"FIG3"
] | [
"FIG3 is a side view of the pack of FIG1"
] | [
"FIG3 is a view of the pack 100 showing the second wall 108 and first opening 114. The first opening 114 is primarily in the side of the cuboid corresponding to the second wall 108. As shown, the first opening 114 extends from the top 102 of the pack 100 downward to an upper edge 302 of the second wall 108 in a dir... | 10 | 139 | side view | B | [
{
"element_identifier": "306",
"terms": [
"diagonal"
]
},
{
"element_identifier": "304",
"terms": [
"distance"
]
},
{
"element_identifier": "118",
"terms": [
"product",
"products"
]
},
{
"element_identifier": "102",
"terms": [
"to... | ['1. A pack (100) comprising: a unitary blank (400) folded into a rectangular cuboid, the rectangular cuboid defining: a bottom (104); a top (102) approximately parallel to and opposite of the bottom; and four walls (106,108,110,112) approximately perpendicular to and disposed between the top and the bottom, the four walls including a first wall (106), a second wall (108), a third wall (110), and a fourth wall (112), the first wall opposite of the third wall, and the second wall opposite of the fourth wall, wherein the second wall defines a first opening (114) into the interior of the cuboid and the fourth wall defines a second opening (116) into the interior of the cuboid, and characterised in that the first and second openings extend from the first wall to the third wall of the cuboid in a direction parallel to a bottom plane of the cuboid and from the top to an upper edge of the second and fourth walls respectively in a direction normal to the bottom plane of the cuboid and wherein the upper edge of the second and fourth walls is disposed at a height of 50 percent or greater of a distance from the bottom to the top of the cuboid.'] | false | [
"102",
"118",
"306",
"114",
"106",
"110",
"304",
"108",
"14"
] | |
EP_3500497_B1 (6).png | EP3500497B1 | OPEN-WALLED PACK | [
"FIG9"
] | [
"FIG9 is a top view of the pack of FIG1 with the first and second top flap folded over the top"
] | [
"Once the first top flap 432 is folded inward, the second top flap 434 can be folded inward over the first top flap 432. In particular, the second top flap 434 can be folded to an orientation that is perpendicular to the wall panels 406, 408, 410, 412 and covers at least a portion of the products in the pack 100, w... | 21 | 196 | view | B | [
{
"element_identifier": "420",
"terms": [
"wall fold lines"
]
},
{
"element_identifier": "440",
"terms": [
"tab"
]
},
{
"element_identifier": "416",
"terms": [
"top fold line",
"top fold lines"
]
},
{
"element_identifier": "452",
"terms... | ['1. A pack (100) comprising: a unitary blank (400) folded into a rectangular cuboid, the rectangular cuboid defining: a bottom (104); a top (102) approximately parallel to and opposite of the bottom; and four walls (106,108,110,112) approximately perpendicular to and disposed between the top and the bottom, the four walls including a first wall (106), a second wall (108), a third wall (110), and a fourth wall (112), the first wall opposite of the third wall, and the second wall opposite of the fourth wall, wherein the second wall defines a first opening (114) into the interior of the cuboid and the fourth wall defines a second opening (116) into the interior of the cuboid, and characterised in that the first and second openings extend from the first wall to the third wall of the cuboid in a direction parallel to a bottom plane of the cuboid and from the top to an upper edge of the second and fourth walls respectively in a direction normal to the bottom plane of the cuboid and wherein the upper edge of the second and fourth walls is disposed at a height of 50 percent or greater of a distance from the bottom to the top of the cuboid.', '2. The pack of claim 1, wherein the top (102) includes a first top flap (432) and a second top flap (434) disposed over at least a portion of the first top flap, the first top flap integral with a third wall (110) of the cuboid and the second top flap integral with a first wall (106) of the cuboid, wherein the second top flap includes an intermediate panel (436) parallel with the first top flap and defined by a fold with the third wall and by a mid-flap fold (446) with a distal panel (438) of the second top flap, the distal panel of the second top flap disposed over at least a portion of and parallel to the third wall and fastened thereto.', '3. The pack of claim 2, wherein the distal panel (438) of the second top flap (434) defines a tab (440), wherein the third wall (110) of the cuboid defines a slot (442), wherein the distal panel is fastened to the third wall by insertion of the tab into the slot.', '10. The pack of any of claims 2-9, comprising: a line of weakness (452) defined between the tab (440) and a remaining portion of the distal panel (438), the line of weakness configured to break to separate the tab from the remaining portion of the distal panel thereby unfastening the second top flap (434) from the third wall (110).'] | false | [
"112",
"102",
"416",
"436",
"438",
"452",
"440",
"106",
"420",
"408",
"422",
"108",
"10",
"104",
"20"
] | |
EP_3500682_B1 (4).png | EP3500682B1 | CLOSED LINEAR DNA PRODUCTION | [
"FIG10A",
" FIG10B"
] | [
"FIG10A shows the linear sequence of introduced stem loop used in Example 1 This also shows the primers used in Example 1 and the binding position in the loop is shown ",
"FIG10B is a photograph of an 0 8% agarose gel of TelN digest of amplified products produced from different priming strategies"
] | [
"Preferably, the central section of the motif or loop includes a sequence for a primer binding site. A primer binding site is a region of a nucleotide sequence where a primer binds or anneals to start replication. The primer specifically anneals to the primer binding site due to the complementary nature of their se... | 53 | 639 | null | C | [
{
"element_identifier": "15",
"terms": [
"priming site",
"ID NO",
"DNA concentrations determined at"
]
},
{
"element_identifier": "3",
"terms": [
"protelomerase recognition sequences",
"Version",
"Table"
]
},
{
"element_identifier": "2",
"t... | ['9. A method as claimed in any preceding claim wherein said template comprises one or more additional protelomerase recognition sequences.'] | true | [
"15",
"1",
"2",
"3",
"3",
"6",
"75"
] | |
EP_3500682_B1 (5).png | EP3500682B1 | CLOSED LINEAR DNA PRODUCTION | [
"FIG11"
] | [
"FIG11 depicts a plasmid map for the vectors used in Example 1 Various components are depicted"
] | [
"Production of stem loop closed linear DNA from a plasmid template. Table 1 below shows the conditions under which plasmid proTLx-K B5X4 eGFP 53SL (see FIG11) was amplified. RCA reactions were setup at room temperature and reagents added in the order indicated. Reactions were carried out in polypropylene tubes and ... | 16 | 147 | null | C | [
{
"element_identifier": "1",
"terms": [
"in Example"
]
},
{
"element_identifier": "2",
"terms": [
"protelomerase recognition sequences",
"Example",
"reaction was then diluted"
]
},
{
"element_identifier": "3",
"terms": [
"protelomerase recognitio... | ['1. A cell-free method of producing closed linear deoxyribose nucleic acid (DNA) molecules comprising: (a) contacting a template comprising linear, double stranded DNA molecule covalently closed at each end by a portion of a protelomerase recognition sequence and comprising at least one stem loop motif with a strand-displacing polymerase under conditions promoting amplification of said template in the presence of at least one primer which is capable of binding specifically to a primer binding site within said stem loop motif; (b) contacting the DNA produced in (a) with at least one protelomerase under conditions promoting production of closed linear DNA.', '9. A method as claimed in any preceding claim wherein said template comprises one or more additional protelomerase recognition sequences.', '11. A linear, double stranded DNA molecule covalently closed at each end by a portion of a protelomerase recognition sequence, wherein the sequence of said linear, double stranded DNA molecule includes at least one stem loop motif, preferably wherein said stem loop motif is as described in any one of claims 2 to'] | false | [
"3500",
"3500",
"3000",
"500",
"3680",
"500",
"3762",
"76",
"11"
] | |
EP_3500867_B1 (1).png | EP3500867B1 | BUILT-IN EYE SCAN FOR ADC-BASED RECEIVER | [
"FIG2"
] | [
"FIG2 is a block diagram depicting the receiver according to an example"
] | [
"The receiver 126 generally includes analog-to-digital converter (ADC) circuitry 104 and eye scan circuitry 106. An example structure of the receiver 126 is described further below with respect to FIG2. The receiver 126 receives an analog signal from the transmission medium 160. The ADC circuitry 104 generates a di... | 12 | 345 | block diagram | G | [
{
"element_identifier": "210",
"terms": [
"clock generator"
]
},
{
"element_identifier": "214",
"terms": [
"CTLE"
]
},
{
"element_identifier": "202",
"terms": [
"front end"
]
},
{
"element_identifier": "216",
"terms": [
"ADCs"
]
}... | ['1. A method of performing an eye-scan in a receiver (126), comprising: generating digital samples from an analog signal input to the receiver (126) based on a sampling clock, the sampling clock phase-shifted with respect to a reference clock based on a phase interpolator, PI, code; equalizing the digital samples based on first equalization parameters of a plurality of equalization parameters of the receiver (126); adapting the plurality of equalization parameters and performing clock recovery based on the digital samples to generate the PI code; performing a plurality of cycles of locking the plurality of equalization parameters, suspending phase detection in the clock recovery, offsetting the PI code by different amounts across the plurality of cycles, collecting an output of the receiver (126), resuming the phase detection in the clock recovery, and unlocking the equalization parameters to perform the eye scan.', '8. A receiver (126), comprising: a front end (202) configured to receive an analog signal; analog-to-digital converter, ADC, circuitry (104) configured to generate digital samples from the analog signal based on a sampling clock; a digital signal processor, DSP (204) configured to equalize the digital samples based on first equalization parameters of a plurality of equalization parameters; a clock recovery circuit (206) configured to perform clock recovery based on the digital samples to generate a phase interpolator, PI, code; a PI (208) configured to generate the sampling clock based on the PI code; an adaptation circuit (205) configured to adapt the plurality of equalization parameters; and an eye scan circuit (106) configured to control a plurality of cycles of locking the plurality of equalization parameters, suspending phase detection in the clock recovery of the clock recovery circuit (206), offsetting the PI code by different amounts across the plurality of cycles, collecting the digital samples, resuming the phase detection in the clock recovery of the clock recovery circuit (206), and unlocking the equalization parameters.'] | false | [
"126",
"106",
"210",
"208",
"206",
"202",
"212",
"104",
"216",
"204",
"218",
"220",
"214",
"205",
"13"
] | |
EP_3500867_B1 (2).png | EP3500867B1 | BUILT-IN EYE SCAN FOR ADC-BASED RECEIVER | [
"FIG3"
] | [
"FIG3 is a block diagram depicting clock recovery and eye scan circuitry according to an example"
] | [
"FIG3 is a block diagram depicting clock recovery and eye scan circuitry according to an example. The clock recovery circuit 206 includes a phase detector 302 and a digital loop filter 330. The eye scan circuitry 106 includes a control circuit 316, a multiplexer 304, and a multiplexer 326. An input of the phase det... | 16 | 130 | block diagram | G | [
{
"element_identifier": "327",
"terms": [
"phase path"
]
},
{
"element_identifier": "310",
"terms": [
"adder"
]
},
{
"element_identifier": "306",
"terms": [
"gain circuit",
"gain circuits"
]
},
{
"element_identifier": "304",
"terms": [
... | ['1. A method of performing an eye-scan in a receiver (126), comprising: generating digital samples from an analog signal input to the receiver (126) based on a sampling clock, the sampling clock phase-shifted with respect to a reference clock based on a phase interpolator, PI, code; equalizing the digital samples based on first equalization parameters of a plurality of equalization parameters of the receiver (126); adapting the plurality of equalization parameters and performing clock recovery based on the digital samples to generate the PI code; performing a plurality of cycles of locking the plurality of equalization parameters, suspending phase detection in the clock recovery, offsetting the PI code by different amounts across the plurality of cycles, collecting an output of the receiver (126), resuming the phase detection in the clock recovery, and unlocking the equalization parameters to perform the eye scan.', '2. The method of claim 1, wherein the step of performing the clock recovery comprises: performing the phase detection based on the digital samples to generate a phase error signal; filtering the phase error signal through a digital loop filter (330) to generate the PI code.', '3. The method of claim 2, wherein the step of suspending the phase detection comprises: disconnecting an output of a phase detector (302) configured to perform the phase detection from an input of the digital loop filter (330).'] | false | [
"327",
"306",
"330",
"304",
"324",
"208",
"326",
"302",
"318",
"310",
"312",
"308",
"320",
"322",
"14",
"328",
"316"
] | |
EP_3500867_B1 (3).png | EP3500867B1 | BUILT-IN EYE SCAN FOR ADC-BASED RECEIVER | [
"FIG4"
] | [
"FIG4 is a flow diagram depicting a method of performing an eye scan in a receiver according to an example"
] | [
"FIG4 is a flow diagram depicting a method 400 of performing an eye scan in a receiver according to an example. The method 400 can be performed by the SerDes 122 described above. The method 400 begins at step 402, where the control circuit 316 selects an initial offset for the PI code to be used during the eye scan... | 20 | 77 | flow diagram | G | [
{
"element_identifier": "420",
"terms": [
"step"
]
},
{
"element_identifier": "416",
"terms": [
"adaptation process. At step"
]
},
{
"element_identifier": "412",
"terms": [
"at step"
]
},
{
"element_identifier": "422",
"terms": [
"step"... | ['1. A method of performing an eye-scan in a receiver (126), comprising: generating digital samples from an analog signal input to the receiver (126) based on a sampling clock, the sampling clock phase-shifted with respect to a reference clock based on a phase interpolator, PI, code; equalizing the digital samples based on first equalization parameters of a plurality of equalization parameters of the receiver (126); adapting the plurality of equalization parameters and performing clock recovery based on the digital samples to generate the PI code; performing a plurality of cycles of locking the plurality of equalization parameters, suspending phase detection in the clock recovery, offsetting the PI code by different amounts across the plurality of cycles, collecting an output of the receiver (126), resuming the phase detection in the clock recovery, and unlocking the equalization parameters to perform the eye scan.', '2. The method of claim 1, wherein the step of performing the clock recovery comprises: performing the phase detection based on the digital samples to generate a phase error signal; filtering the phase error signal through a digital loop filter (330) to generate the PI code.'] | false | [
"400",
"402",
"404",
"406",
"408",
"410",
"412",
"414",
"416",
"418",
"420",
"422",
"4",
"15"
] | |
EP_3500867_B1 (4).png | EP3500867B1 | BUILT-IN EYE SCAN FOR ADC-BASED RECEIVER | [
"FIG5"
] | [
"FIG5 illustrates an example eye plot for a binary non-return-to-zero (NRZ) signal"
] | [
"FIG5 illustrates an example eye plot 500 for a binary NRZ signal. The eye plot 500 is formed from the various digital samples collected during the eye scan cycles described above. The eye plot 500 shows the data eye for a UI 502. During each eye scan cycle, the PI code is offset to scan across an axis 504 represen... | 20 | 128 | plot | G | [
{
"element_identifier": "504",
"terms": [
"axis"
]
},
{
"element_identifier": "500",
"terms": [
"eye plot"
]
},
{
"element_identifier": "502",
"terms": [
"UI"
]
}
] | ['7. The method of any of claims 1-6, wherein the plurality of cycles are performed until the PI code has been updated to cover at least one unit interval, UI, of the analog signal.'] | false | [
"500",
"502",
"5",
"504",
"16"
] | |
EP_3500867_B1.png | EP3500867B1 | BUILT-IN EYE SCAN FOR ADC-BASED RECEIVER | [
"FIG1"
] | [
"FIG1 is a block diagram depicting an example of a serial communication system"
] | [
"FIG1 is a block diagram depicting an example of a serial communication system 100. The serial communication system 100 comprises a transmitter 112 coupled to a receiver 126 over transmission medium 160. The transmitter 112 can be part of a serializer-deserializer (SerDes) 116. The receiver 126 can be part of a Ser... | 13 | 346 | block diagram | G | [
{
"element_identifier": "122",
"terms": [
"SerDes"
]
},
{
"element_identifier": "160",
"terms": [
"transmission medium"
]
},
{
"element_identifier": "128",
"terms": [
"circuitry"
]
},
{
"element_identifier": "116",
"terms": [
"SerDes"
... | ['1. A method of performing an eye-scan in a receiver (126), comprising: generating digital samples from an analog signal input to the receiver (126) based on a sampling clock, the sampling clock phase-shifted with respect to a reference clock based on a phase interpolator, PI, code; equalizing the digital samples based on first equalization parameters of a plurality of equalization parameters of the receiver (126); adapting the plurality of equalization parameters and performing clock recovery based on the digital samples to generate the PI code; performing a plurality of cycles of locking the plurality of equalization parameters, suspending phase detection in the clock recovery, offsetting the PI code by different amounts across the plurality of cycles, collecting an output of the receiver (126), resuming the phase detection in the clock recovery, and unlocking the equalization parameters to perform the eye scan.', '8. A receiver (126), comprising: a front end (202) configured to receive an analog signal; analog-to-digital converter, ADC, circuitry (104) configured to generate digital samples from the analog signal based on a sampling clock; a digital signal processor, DSP (204) configured to equalize the digital samples based on first equalization parameters of a plurality of equalization parameters; a clock recovery circuit (206) configured to perform clock recovery based on the digital samples to generate a phase interpolator, PI, code; a PI (208) configured to generate the sampling clock based on the PI code; an adaptation circuit (205) configured to adapt the plurality of equalization parameters; and an eye scan circuit (106) configured to control a plurality of cycles of locking the plurality of equalization parameters, suspending phase detection in the clock recovery of the clock recovery circuit (206), offsetting the PI code by different amounts across the plurality of cycles, collecting the digital samples, resuming the phase detection in the clock recovery of the clock recovery circuit (206), and unlocking the equalization parameters.'] | false | [
"100",
"116",
"112",
"122",
"126",
"104",
"106",
"128",
"160",
"110",
"120",
"12"
] | |
EP_3500908_B1 (4).png | EP3500908B1 | SUPPORTING AN AUGMENTED-REALITY SOFTWARE APPLICATION | [
"FIG8"
] | [
"FIG8 shows another embodiment of the processing means comprised in the computing device for supporting an AR software application"
] | [
"In FIG8 an alternative embodiment 800 of processing means 125 is illustrated. Similar to processing means 700, processing means 800 comprises one or more interfaces 801 (\"I/O\" in FIG8) for controlling and/or receiving information from other components comprised in computing device 120/500/600, such as camera 121... | 19 | 325 | embodiment | G | [
{
"element_identifier": "801",
"terms": [
"interfaces"
]
},
{
"element_identifier": "704",
"terms": [
"computer-executable instructions"
]
},
{
"element_identifier": "701",
"terms": [
"interfaces"
]
},
{
"element_identifier": "802",
"terms": ... | ['1. A computing device (120; 500; 600) for supporting an Augmented-Reality, AR, software application, the computing device comprising processing means (125) being operative to: for each one of at least two candidate physical locations (131, 132; 231, 232) for placing a current virtual object (104; 204), where the current virtual object appears to be placed when overlaid onto a video sequence capturing a physical scene (100; 200) in the surroundings of a user (110) of the AR software application: determine an expected physical location to which the user moves, or where the user remains, in response to displaying (123; 223) the physical scene and the overlaid current virtual object to the user, and evaluate a value of an attribute which is related to a performance of a wireless connection utilized by the AR software application, and which is spatially dependent in the surroundings of the user, at the expected physical location, and select the physical location for placing the current virtual object from the at least two candidate physical locations based on a superior performance of the wireless connection for the selected physical location.', '17. A computer program (704) comprising computer-executable instructions for causing a device to perform the method according to claim 16, when the computer-executable instructions are executed on a processing unit (702) comprised in the device.'] | true | [
"7",
"700",
"704",
"701",
"8",
"800",
"802",
"801",
"21"
] | |
EP_3500923_B1 (1).png | EP3500923B1 | COLLECTING ENTROPY FROM DIVERSE SOURCES | [
"FIG2"
] | [
"FIG2 illustrates foiling an eavesdropper in accordance with an embodiment"
] | [
"FIG2 illustrates foiling an eavesdropper in a typical use case. Entropy source 202 is compromised by a determined entity. For example, the manufacturer of a hardware-based entropy generator 202 may have conceded data to a government that shows that the entropy generator is slightly skewed. The government may be ab... | 10 | 70 | null | G | [
{
"element_identifier": "210",
"terms": [
"timers"
]
},
{
"element_identifier": "202",
"terms": [
"source",
"entropy generator"
]
},
{
"element_identifier": "242",
"terms": [
"PRNG"
]
},
{
"element_identifier": "262",
"terms": [
"... | ['1. A method for generating entropy in a computing device, the method comprising: setting a repeating first timer for a first frequency; setting a repeating second timer for a second frequency; collecting a predetermined number of first bits from a first entropy source at the first frequency, the predetermined number based on an amount of entropy per bit attributable to the first entropy source; presenting the first bits to a pseudo-random number generator; gathering a specified number of second bits from a second entropy source at the second frequency, the specified number based on an amount of entropy per bit attributable to the second entropy source; and presenting the second bits to the pseudo-random number generator, whereby the first and second bits can be used to seed the pseudo-random number generator.', '14. A method for seeding entropy in a pseudo-random number generator, the method comprising: setting asynchronous timers of different frequencies; collecting a predetermined number of first bits from a first entropy source according to a first timer of the asynchronous timers; calculating a Hamming distance between successive collected first bits; accepting the first bits into a first accumulation buffer based on the Hamming distance exceeding a minimum; summing Hamming distances between successive collections of first bits into an accumulated value of entropy attributed to contents of the first accumulation buffer; presenting contents of the first accumulation buffer to a pseudo-random number generator; gathering a specified number of second bits from a second entropy source according to a second timer of the asynchronous timers; accepting the second bits into a second accumulation buffer, the second accumulation buffer having a different size than a size of the first accumulation buffer; and presenting contents of the second accumulation buffer to the pseudo-random number generator.'] | false | [
"200",
"202",
"204",
"210",
"242",
"208",
"260",
"258",
"256",
"254",
"262",
"47"
] | |
EP_3500923_B1 (2).png | EP3500923B1 | COLLECTING ENTROPY FROM DIVERSE SOURCES | [
"FIG3"
] | [
"FIG3 is a sequence diagram in accordance with an embodiment"
] | [
"FIG3 is a sequence diagram for system 300 with time running from top to bottom. At a first time, source 302 supplies entropy 318a to entropy collector 306. That entropy is forwarded as seed 336a immediately to PRNG 342. At periodic time intervals following, at frequency 308, entropies 318b, 318c, 318d, 318e, 318f,... | 10 | 99 | sequence diagram | G | [
{
"element_identifier": "310",
"terms": [
"at frequency",
"frequencies",
"frequency"
]
},
{
"element_identifier": "338",
"terms": [
"seed"
]
},
{
"element_identifier": "334",
"terms": [
"accumulation buffer"
]
},
{
"element_identifier... | ['1. A method for generating entropy in a computing device, the method comprising: setting a repeating first timer for a first frequency; setting a repeating second timer for a second frequency; collecting a predetermined number of first bits from a first entropy source at the first frequency, the predetermined number based on an amount of entropy per bit attributable to the first entropy source; presenting the first bits to a pseudo-random number generator; gathering a specified number of second bits from a second entropy source at the second frequency, the specified number based on an amount of entropy per bit attributable to the second entropy source; and presenting the second bits to the pseudo-random number generator, whereby the first and second bits can be used to seed the pseudo-random number generator.', '8. The method of claim 1 further comprising: accepting the first bits into an accumulation buffer upon the collecting; and presenting the first bits from the accumulation buffer to the pseudo-random number generator upon the accumulation buffer becoming full, thereby providing a greater amount of sudden entropy than in a single collection of first bits.'] | false | [
"300",
"30",
"334",
"308",
"3189",
"34",
"310",
"334",
"348",
"334",
"334",
"338",
"334",
"48"
] | |
EP_3500923_B1 (3).png | EP3500923B1 | COLLECTING ENTROPY FROM DIVERSE SOURCES | [
"FIG4"
] | [
"FIG4 is a timing diagram with two entropy source sampling frequencies in accordance with an embodiment"
] | [
"FIG4 is a timing diagram with two entropy source sampling frequencies in accordance with an embodiment. A representation of first timer 408 is shown at the top of the figure. Every leading edge or downward edge represents a timer event. Nominally, first timer 408 fires at every vertical line. In the figure, the pu... | 16 | 92 | diagram | G | [
{
"element_identifier": "4",
"terms": [
"required"
]
},
{
"element_identifier": "414",
"terms": [
"random jitter"
]
},
{
"element_identifier": "410",
"terms": [
"second timer"
]
},
{
"element_identifier": "408",
"terms": [
"first timer"... | ['1. A method for generating entropy in a computing device, the method comprising: setting a repeating first timer for a first frequency; setting a repeating second timer for a second frequency; collecting a predetermined number of first bits from a first entropy source at the first frequency, the predetermined number based on an amount of entropy per bit attributable to the first entropy source; presenting the first bits to a pseudo-random number generator; gathering a specified number of second bits from a second entropy source at the second frequency, the specified number based on an amount of entropy per bit attributable to the second entropy source; and presenting the second bits to the pseudo-random number generator, whereby the first and second bits can be used to seed the pseudo-random number generator.'] | false | [
"414",
"408",
"49",
"410",
"4"
] | |
EP_3500923_B1 (4).png | EP3500923B1 | COLLECTING ENTROPY FROM DIVERSE SOURCES | [
"FIG5"
] | [
"FIG5 is a flowchart illustrating a process in accordance with an embodiment"
] | [
"FIG5 is a flowchart illustrating process 500 in accordance with an embodiment. The process can be implemented by computer by executing instructions in a processor or otherwise. In operation 501, a repeating time for a first frequency is set. In operation 502, a repeating second timer for a second frequency is set,... | 12 | 237 | flowchart | G | [
{
"element_identifier": "32",
"terms": [
"OpenSSL reads"
]
},
{
"element_identifier": "256",
"terms": [
"decryption key"
]
},
{
"element_identifier": "1",
"terms": [
"OpenSSL version"
]
},
{
"element_identifier": "0",
"terms": [
">"
... | ['1. A method for generating entropy in a computing device, the method comprising: setting a repeating first timer for a first frequency; setting a repeating second timer for a second frequency; collecting a predetermined number of first bits from a first entropy source at the first frequency, the predetermined number based on an amount of entropy per bit attributable to the first entropy source; presenting the first bits to a pseudo-random number generator; gathering a specified number of second bits from a second entropy source at the second frequency, the specified number based on an amount of entropy per bit attributable to the second entropy source; and presenting the second bits to the pseudo-random number generator, whereby the first and second bits can be used to seed the pseudo-random number generator.', '3. The method of claim 2 wherein the adjusting of the first frequency is based on an output from the pseudo-random number generator.', '14. A method for seeding entropy in a pseudo-random number generator, the method comprising: setting asynchronous timers of different frequencies; collecting a predetermined number of first bits from a first entropy source according to a first timer of the asynchronous timers; calculating a Hamming distance between successive collected first bits; accepting the first bits into a first accumulation buffer based on the Hamming distance exceeding a minimum; summing Hamming distances between successive collections of first bits into an accumulated value of entropy attributed to contents of the first accumulation buffer; presenting contents of the first accumulation buffer to a pseudo-random number generator; gathering a specified number of second bits from a second entropy source according to a second timer of the asynchronous timers; accepting the second bits into a second accumulation buffer, the second accumulation buffer having a different size than a size of the first accumulation buffer; and presenting contents of the second accumulation buffer to the pseudo-random number generator.'] | false | [
"500",
"501",
"502",
"503",
"505",
"504",
"506",
"507",
"50"
] | |
EP_3500923_B1 (5).png | EP3500923B1 | COLLECTING ENTROPY FROM DIVERSE SOURCES | [
"FIG6"
] | [
"FIG6 is a flowchart illustrating a process in accordance with an embodiment"
] | [
"FIG6 is a flowchart illustrating process 600 in accordance with an embodiment. The process can be implemented by computer by executing instructions in a processor or otherwise. In operation 601, asynchronous timers of different frequencies from one another that are not, in this case, harmonics of each other are se... | 12 | 249 | flowchart | G | [
{
"element_identifier": "32",
"terms": [
"OpenSSL reads"
]
},
{
"element_identifier": "256",
"terms": [
"decryption key"
]
},
{
"element_identifier": "1",
"terms": [
"OpenSSL version"
]
},
{
"element_identifier": "0",
"terms": [
">"
... | ['1. A method for generating entropy in a computing device, the method comprising: setting a repeating first timer for a first frequency; setting a repeating second timer for a second frequency; collecting a predetermined number of first bits from a first entropy source at the first frequency, the predetermined number based on an amount of entropy per bit attributable to the first entropy source; presenting the first bits to a pseudo-random number generator; gathering a specified number of second bits from a second entropy source at the second frequency, the specified number based on an amount of entropy per bit attributable to the second entropy source; and presenting the second bits to the pseudo-random number generator, whereby the first and second bits can be used to seed the pseudo-random number generator.', '3. The method of claim 2 wherein the adjusting of the first frequency is based on an output from the pseudo-random number generator.', '14. A method for seeding entropy in a pseudo-random number generator, the method comprising: setting asynchronous timers of different frequencies; collecting a predetermined number of first bits from a first entropy source according to a first timer of the asynchronous timers; calculating a Hamming distance between successive collected first bits; accepting the first bits into a first accumulation buffer based on the Hamming distance exceeding a minimum; summing Hamming distances between successive collections of first bits into an accumulated value of entropy attributed to contents of the first accumulation buffer; presenting contents of the first accumulation buffer to a pseudo-random number generator; gathering a specified number of second bits from a second entropy source according to a second timer of the asynchronous timers; accepting the second bits into a second accumulation buffer, the second accumulation buffer having a different size than a size of the first accumulation buffer; and presenting contents of the second accumulation buffer to the pseudo-random number generator.'] | false | [
"009",
"01",
"601",
"602",
"603",
"604",
"605",
"8",
"606",
"607",
"608",
"609",
"6",
"51"
] | |
EP_3500923_B1 (6).png | EP3500923B1 | COLLECTING ENTROPY FROM DIVERSE SOURCES | [
"FIG7"
] | [
"FIG7 illustrates an exemplary computer system, in which various embodiments of the present invention may be implemented "
] | [
"FIG7 illustrates an exemplary computer system 700, in which various embodiments of the present invention may be implemented. The system 700 may be used to implement any of the computer systems described above. As shown in the figure, computer system 700 includes a processing unit 704 that communicates with a numbe... | 18 | 109 | null | G | [
{
"element_identifier": "32",
"terms": [
"OpenSSL reads"
]
},
{
"element_identifier": "256",
"terms": [
"decryption key"
]
},
{
"element_identifier": "1",
"terms": [
"OpenSSL version"
]
},
{
"element_identifier": "0",
"terms": [
">"
... | ['1. A method for generating entropy in a computing device, the method comprising: setting a repeating first timer for a first frequency; setting a repeating second timer for a second frequency; collecting a predetermined number of first bits from a first entropy source at the first frequency, the predetermined number based on an amount of entropy per bit attributable to the first entropy source; presenting the first bits to a pseudo-random number generator; gathering a specified number of second bits from a second entropy source at the second frequency, the specified number based on an amount of entropy per bit attributable to the second entropy source; and presenting the second bits to the pseudo-random number generator, whereby the first and second bits can be used to seed the pseudo-random number generator.', '3. The method of claim 2 wherein the adjusting of the first frequency is based on an output from the pseudo-random number generator.', '14. A method for seeding entropy in a pseudo-random number generator, the method comprising: setting asynchronous timers of different frequencies; collecting a predetermined number of first bits from a first entropy source according to a first timer of the asynchronous timers; calculating a Hamming distance between successive collected first bits; accepting the first bits into a first accumulation buffer based on the Hamming distance exceeding a minimum; summing Hamming distances between successive collections of first bits into an accumulated value of entropy attributed to contents of the first accumulation buffer; presenting contents of the first accumulation buffer to a pseudo-random number generator; gathering a specified number of second bits from a second entropy source according to a second timer of the asynchronous timers; accepting the second bits into a second accumulation buffer, the second accumulation buffer having a different size than a size of the first accumulation buffer; and presenting contents of the second accumulation buffer to the pseudo-random number generator.'] | false | [
"704",
"734",
"700",
"732",
"706",
"708",
"702",
"724",
"52",
"720",
"722",
"710",
"712",
"714",
"716",
"718",
"726",
"728",
"730"
] | |
EP_3500923_B1.png | EP3500923B1 | COLLECTING ENTROPY FROM DIVERSE SOURCES | [
"FIG1"
] | [
"FIG1 illustrates an entropy module in accordance with an embodiment"
] | [
"FIG1 illustrates an entropy module in system 100. In entropy module 106, timers 108 and 110 are set up to periodically poll, or otherwise collect or gather, entropy (i.e., random bits or as otherwise known in the art) from first entropy source 102 or second entropy source 104, respectively. The frequencies of poll... | 10 | 94 | null | G | [
{
"element_identifier": "142",
"terms": [
"PRNG"
]
},
{
"element_identifier": "104",
"terms": [
"second entropy source"
]
},
{
"element_identifier": "118",
"terms": [
"entropy"
]
},
{
"element_identifier": "112",
"terms": [
"timer"
... | ['1. A method for generating entropy in a computing device, the method comprising: setting a repeating first timer for a first frequency; setting a repeating second timer for a second frequency; collecting a predetermined number of first bits from a first entropy source at the first frequency, the predetermined number based on an amount of entropy per bit attributable to the first entropy source; presenting the first bits to a pseudo-random number generator; gathering a specified number of second bits from a second entropy source at the second frequency, the specified number based on an amount of entropy per bit attributable to the second entropy source; and presenting the second bits to the pseudo-random number generator, whereby the first and second bits can be used to seed the pseudo-random number generator.', '3. The method of claim 2 wherein the adjusting of the first frequency is based on an output from the pseudo-random number generator.', '14. A method for seeding entropy in a pseudo-random number generator, the method comprising: setting asynchronous timers of different frequencies; collecting a predetermined number of first bits from a first entropy source according to a first timer of the asynchronous timers; calculating a Hamming distance between successive collected first bits; accepting the first bits into a first accumulation buffer based on the Hamming distance exceeding a minimum; summing Hamming distances between successive collections of first bits into an accumulated value of entropy attributed to contents of the first accumulation buffer; presenting contents of the first accumulation buffer to a pseudo-random number generator; gathering a specified number of second bits from a second entropy source according to a second timer of the asynchronous timers; accepting the second bits into a second accumulation buffer, the second accumulation buffer having a different size than a size of the first accumulation buffer; and presenting contents of the second accumulation buffer to the pseudo-random number generator.'] | false | [
"100",
"118",
"102",
"108",
"26",
"118",
"130",
"114",
"112",
"106",
"140",
"142",
"150",
"144",
"146",
"148",
"16",
"128",
"110",
"238",
"120",
"46",
"120",
"104",
"138",
"334",
"132"
] | |
EP_3500965_B1 (3).png | EP3500965B1 | SPEED CONTROL FOR A FULL STOP OF AN AUTONOMOUS DRIVING VEHICLE | [
"FIG6"
] | [
"FIG6 is a flow diagram illustrating a process of making a full stop of an autonomous vehicle according to a comparative example suitable for understanding the invention"
] | [
"FIG6 is a flow diagram illustrating a process of making a full stop of an autonomous vehicle according to a comparative example suitable for understanding the invention. Process 600 may be performed by processing logic which may include software, hardware, or a combination thereof. For example, process 600 may be ... | 27 | 198 | flow diagram | B | [
{
"element_identifier": "10",
"terms": [
"given stop location.DE",
"move"
]
},
{
"element_identifier": "2",
"terms": [
"second vehicle.EP"
]
},
{
"element_identifier": "100",
"terms": [
"network configuration"
]
},
{
"element_identifier": "... | ['3. The method of claim 2, wherein the first deceleration rate (A) is determined based on the following formula: A = k ∗ V 2 /2S, wherein k is a constant, V represents the current speed (V C ), and S represents the distance (S) between the first location and the second location, preferably, the constant k is approximately 1.', '14. A data processing system, comprising: a processor (1501); and a memory (1503) coupled to the processor (1501) to store instructions, which when executed by the processor (1501), cause the processor (1501) to perform operations of operating an autonomous vehicle (101), the operations including rece iving (601) a request to decelerate an autonomous vehicle from a first location and to stop at a second location, determining (602) a first zone (501) and a second zone (503) within a distance (S) from the first location to the second location, determining a third zone (502) between the first zone (501) and the second zone (503), decelerating (603) the autonomous vehicle (101) based on a first deceleration rate from a current speed (V C ) to a predetermined speed (Vi) during the first zone (501), maintaining the predetermined speed (Vi) of the autonomous vehicle (101) as a relatively constant speed within the third zone (502), and decelerating (604) the autonomous vehicle (101) based on a second deceleration rate from the predetermined speed (Vi) to a stop during the second zone (503), wherein the first deceleration rate and the second deceleration rate are different.'] | false | [
"009",
"601",
"602",
"3",
"603",
"604",
"20"
] | |
EP_3500968_B1 (1).png | EP3500968B1 | METHOD AND APPARATUS TO SECURE AND PROTECT DATA-CENTERS AND GENERALIZED UTILITY-BASED CLOUD COMPUTING ENVIRONMENTS FROM UNINVITED GUESTS IN THE FORM OF BOTH HARDWARE AND SOFTWARE | [
"FIG2"
] | [
"FIG2 is a block diagram illustrating a node that is executing a virtual agent, according to some embodiments"
] | [
"FIG2 is a block diagram illustrating a node that is executing a virtual agent, according to some embodiments. The node 130 includes hardware resources 140 such as computing hardware 210, storage hardware 220, and networking hardware 230. The node 130 executes a hypervisor 150 or VMM that allows a virtual agent 160... | 19 | 317 | block diagram | G | [
{
"element_identifier": "230",
"terms": [
"networking hardware"
]
},
{
"element_identifier": "160",
"terms": [
"virtual agent",
"virtual agents"
]
},
{
"element_identifier": "130",
"terms": [
"node",
"nodes"
]
},
{
"element_identifier... | ['1. A method implemented by a network device communicatively coupled to a datacenter to detect a presence of unauthorized software and hardware in the datacenter, the method comprising: initiating (310) deployment of a virtual agent on a node in the datacenter, wherein the virtual agent is to perform a security scan of the node and store results of the security scan in a memory allocated to the virtual agent at the node, and wherein the results of the security scan are to be encrypted by the virtual agent using a data encryption key; and initiating (320) migration of the virtual agent to a preconfigured location that has a data decryption key for decrypting the results of the security scan, wherein the results of the security scan are to be extracted from the virtual agent and decrypted at the preconfigured location using the data decryption key.', '6. The method of claim 1, wherein the virtual agent includes a hardware access key that provides the virtual agent with permission to access one or more hardware resources of the node.', '8. The method of claim 1, wherein the security scan includes a scan of any one of a Basic Input/Output System (BIOS), a Unified Extensible Firmware Interface (UEFI), a System Center Configuration Manager or Systems Management Server (SCCM/SMS), and hypervisor installed on the node.'] | false | [
"130",
"160",
"240",
"250",
"260",
"165",
"150",
"140",
"210",
"220",
"270",
"230",
"2",
"13"
] | |
EP_3500968_B1 (2).png | EP3500968B1 | METHOD AND APPARATUS TO SECURE AND PROTECT DATA-CENTERS AND GENERALIZED UTILITY-BASED CLOUD COMPUTING ENVIRONMENTS FROM UNINVITED GUESTS IN THE FORM OF BOTH HARDWARE AND SOFTWARE | [
"FIG3"
] | [
"FIG3 is a flow diagram of a process for detecting unauthorized software and hardware in a datacenter using a virtual agent, according to some embodiments"
] | [
"FIG3 is a flow diagram of a process for detecting unauthorized software and hardware in a datacenter using a virtual agent, according to some embodiments. In one embodiment, the process may be implemented by a network device 100 (e.g., cloud orchestration component 110 of network device 100) that is communicativel... | 26 | 135 | flow diagram | G | [
{
"element_identifier": "2",
"terms": [
"Layer"
]
},
{
"element_identifier": "120",
"terms": [
"datacenter"
]
},
{
"element_identifier": "130",
"terms": [
"node",
"nodes"
]
},
{
"element_identifier": "140",
"terms": [
"hardware re... | ['4. The method of claim 3, wherein the corrective action includes any one of migrating a tenant on the node to another node in the datacenter, installing a honeypot, decommissioning of the node, moving a tenant off the node, reinstalling an image on the node, and deploying another virtual agent in the datacenter.', '6. The method of claim 1, wherein the virtual agent includes a hardware access key that provides the virtual agent with permission to access one or more hardware resources of the node.', '8. The method of claim 1, wherein the security scan includes a scan of any one of a Basic Input/Output System (BIOS), a Unified Extensible Firmware Interface (UEFI), a System Center Configuration Manager or Systems Management Server (SCCM/SMS), and hypervisor installed on the node.', '12. A network device (100) configured to detect a presence of unauthorized software and hardware in a datacenter, the network device comprising: a set of one or more processors (410); and a non-transitory machine-readable storage medium (430) having stored therein a cloud orchestration component (110), which when executed by the set of one or more processors, causes the network device to initiate deployment of a virtual agent on a node in the datacenter, wherein the virtual agent is to perform a security scan of the node and store results of the security scan in a memory allocated to the virtual agent at the node, and wherein the results of the security scan are to be encrypted by the virtual agent using a data encryption key and initiate migration of the virtual agent to a preconfigured location that has a data decryption key for decrypting the results of the security scan, wherein the results of the security scan are to be extracted from the virtual agent and decrypted at the preconfigured location using the data decryption key.'] | false | [
"14"
] | |
EP_3500968_B1 (3).png | EP3500968B1 | METHOD AND APPARATUS TO SECURE AND PROTECT DATA-CENTERS AND GENERALIZED UTILITY-BASED CLOUD COMPUTING ENVIRONMENTS FROM UNINVITED GUESTS IN THE FORM OF BOTH HARDWARE AND SOFTWARE | [
"FIG4"
] | [
"FIG4 is block diagram of a network device that can implement the detection of the presence of unauthorized software and hardware in a datacenter using a virtual agent, according to some embodiments "
] | [
"FIG4 is block diagram of a network device that can implement the detection of the presence of unauthorized software and hardware in a datacenter using a virtual agent, according to some embodiments. The network device 100 includes a set of one or more processor(s) 410, which may be general purpose and/or a special... | 33 | 170 | block diagram | G | [
{
"element_identifier": "430",
"terms": [
"machine readable storage medium"
]
},
{
"element_identifier": "100",
"terms": [
"network device"
]
},
{
"element_identifier": "110",
"terms": [
"cloud orchestration component"
]
}
] | ['12. A network device (100) configured to detect a presence of unauthorized software and hardware in a datacenter, the network device comprising: a set of one or more processors (410); and a non-transitory machine-readable storage medium (430) having stored therein a cloud orchestration component (110), which when executed by the set of one or more processors, causes the network device to initiate deployment of a virtual agent on a node in the datacenter, wherein the virtual agent is to perform a security scan of the node and store results of the security scan in a memory allocated to the virtual agent at the node, and wherein the results of the security scan are to be encrypted by the virtual agent using a data encryption key and initiate migration of the virtual agent to a preconfigured location that has a data decryption key for decrypting the results of the security scan, wherein the results of the security scan are to be extracted from the virtual agent and decrypted at the preconfigured location using the data decryption key.'] | false | [
"100",
"410",
"420",
"430",
"110",
"4",
"15"
] | |
EP_3500968_B1.png | EP3500968B1 | METHOD AND APPARATUS TO SECURE AND PROTECT DATA-CENTERS AND GENERALIZED UTILITY-BASED CLOUD COMPUTING ENVIRONMENTS FROM UNINVITED GUESTS IN THE FORM OF BOTH HARDWARE AND SOFTWARE | [
"FIG1"
] | [
"FIG1 is a block diagram of a datacenter in which a virtual agent can be deployed, according to some embodiments"
] | [
"FIG1 is a block diagram of a datacenter in which a virtual agent can be deployed, according to some embodiments. As shown, the datacenter 120 includes nodes 130A-D. Each node 130 may be an electronic device or network device that includes hardware resources such as computing hardware (e.g., processors), storage ha... | 21 | 164 | block diagram | G | [
{
"element_identifier": "160",
"terms": [
"virtual agent",
"virtual agents"
]
},
{
"element_identifier": "120",
"terms": [
"datacenter"
]
},
{
"element_identifier": "100",
"terms": [
"network device"
]
},
{
"element_identifier": "115",
... | ['4. The method of claim 3, wherein the corrective action includes any one of migrating a tenant on the node to another node in the datacenter, installing a honeypot, decommissioning of the node, moving a tenant off the node, reinstalling an image on the node, and deploying another virtual agent in the datacenter.', '6. The method of claim 1, wherein the virtual agent includes a hardware access key that provides the virtual agent with permission to access one or more hardware resources of the node.', '8. The method of claim 1, wherein the security scan includes a scan of any one of a Basic Input/Output System (BIOS), a Unified Extensible Firmware Interface (UEFI), a System Center Configuration Manager or Systems Management Server (SCCM/SMS), and hypervisor installed on the node.', '12. A network device (100) configured to detect a presence of unauthorized software and hardware in a datacenter, the network device comprising: a set of one or more processors (410); and a non-transitory machine-readable storage medium (430) having stored therein a cloud orchestration component (110), which when executed by the set of one or more processors, causes the network device to initiate deployment of a virtual agent on a node in the datacenter, wherein the virtual agent is to perform a security scan of the node and store results of the security scan in a memory allocated to the virtual agent at the node, and wherein the results of the security scan are to be encrypted by the virtual agent using a data encryption key and initiate migration of the virtual agent to a preconfigured location that has a data decryption key for decrypting the results of the security scan, wherein the results of the security scan are to be extracted from the virtual agent and decrypted at the preconfigured location using the data decryption key.'] | false | [
"100",
"115",
"110",
"4",
"160",
"165",
"150",
"140",
"120",
"1",
"12"
] | |
EP_3500986_B1 (3).png | EP3500986B1 | METHOD AND SYSTEM FOR ESTIMATING THE MASS OF A STOCKPILE | [
"FIG5a"
] | [
"FIG5a is a table of data showing the force upon a layer influences the density, while FIG5b charts data from FIG5a"
] | [
"A representative sample of material was taken and placed in a cylindrical test cell having calibrated dimensions. Details are shown in the table of FIG5a. The volume of the cylindrical test cell was 3244cm3 and the surface area of the internal footprint was 181cm2. The mass of the wheat sample was 2707.05g. The in... | 22 | 323 | table | G | [
{
"element_identifier": "7",
"terms": [
"andFigure"
]
},
{
"element_identifier": "4",
"terms": [
"datum"
]
},
{
"element_identifier": "2",
"terms": [
"surface"
]
},
{
"element_identifier": "6",
"terms": [
"surface"
]
},
{
"e... | ['1. A method of estimating the mass of material in a stockpile, the method including: obtaining an upper surface profile of said stockpile; the method being characterised by : defining a plurality of layers in the stockpile based on the upper surface profile, wherein each layer is defined to extend parallel to the upper surface profile, and estimating the volume of each defined layer; obtaining density characteristics of the stockpile material; estimating the density of each defined layer according to the density characteristics of the stockpile material; and calculating, using the estimated volume and estimated density of each defined layer, the mass of the stockpile.'] | false | [
"0",
"13",
"3",
"742",
"7460",
"7575",
"7768",
"7793",
"7460",
"7420",
"15035",
"14840",
"22734",
"22260",
"59360",
"30502",
"29680",
"38296",
"37100",
"46126",
"44520",
"54003",
"51940",
"61906",
"59360",
"13",
"2",
"4",
"15",
"5",
"6",
"7830",
"7",
... | |
EP_3500986_B1 (5).png | EP3500986B1 | METHOD AND SYSTEM FOR ESTIMATING THE MASS OF A STOCKPILE | [
"FIG6a"
] | [
"FIG6a is a table of data showing the recorded mass of a number of stockpiles against estimated (and actual) mass values, while FIG6b charts data from FIG6a"
] | [
"FIG6a tabulates a real-world scenario in which the mass of material in a number of bunkers (column P) was to be audited for a client. The stock volume (column Q) and a density, referred to as the \"bulk density\" (column R) were provided by the client for each bunker and used to estimate the mass (column S) using ... | 30 | 75 | table | G | [
{
"element_identifier": "2",
"terms": [
"surface"
]
},
{
"element_identifier": "4",
"terms": [
"datum"
]
},
{
"element_identifier": "6",
"terms": [
"surface"
]
},
{
"element_identifier": "1m",
"terms": [
"each layer's depth was"
]
... | ['2. The method of claim 1, wherein each layer extends parallel to the upper surface profile and has a boundary, configured equidistant, in a vertical direction, from the upper surface profile.', '11. A system for estimating the mass of material in a stockpile, the system including: apparatus operable to obtaining an upper surface profile of said stockpile; the system being characterised by : a controller, configured to define a plurality of layers in the stockpile based on the upper surface profile, wherein each layer is defined to extend parallel to the upper surface profile, and estimate the volume of each defined layer; obtain density characteristics of the stockpile material; estimate the density of each defined layer, according to the density characteristics of the stockpile material; and calculate, using the estimated volume and density of each defined layer, the mass of the stockpile.', '12. A computer readable storage medium storing one or more programs, said programs having instructions, which when executed by an electronic device or system, perform a method according to any of claims 1 to'] | false | [
"7829",
"6669",
"18383",
"14317",
"37453",
"3436",
"26253",
"3476",
"14434",
"23218",
"6395",
"1595",
"7528",
"17627",
"14085",
"9187",
"11452745",
"7922",
"15"
] | |
EP_3501017_B1 (1).png | EP3501017B1 | MOTION SENSOR WITH ANTIMASK PROTECTION | [
"FIG2"
] | [
"FIG2 is a block diagram of a controller for the motion detector of FIG1 according to one embodiment"
] | [
"FIG2 is a block diagram of the microcontroller 125 of the motion detector 100 according to one embodiment. The microcontroller 125 includes a plurality of electrical and electronic components that provide power, operational control, and protection to the components and modules within the microcontroller 125. The m... | 18 | 117 | block diagram | G | [
{
"element_identifier": "6262661",
"terms": [
"A1. US"
]
},
{
"element_identifier": "100",
"terms": [
"motion detector"
]
},
{
"element_identifier": "105",
"terms": [
"transmission circuit"
]
},
{
"element_identifier": "110",
"terms": [
... | ['1. A motion detector (100) with antimasking capability, the motion detector (100) comprising: an antenna (131, 135); a dual-channel reception circuit (110, 115), the dual-channel reception circuit (110, 115) configured to receive a reflected radio frequency (RF) signal; and an electronic processor (205) electrically connected to the dual-channel reception circuit (110, 115) and configured to receive a first signal from a first channel (110) of the dual-channel reception circuit (110, 115) indicative of motion at a first range, receive a second signal from a second channel (115) of the dual-channel reception circuit (110, 115) indicative of motion at a second range, at least a portion of the second range being shorter than the first range, and generate a notification based on the first signal and the second signal, wherein the electronic processor (205) is configured to generate the notification by generating a trouble notification indicative of a masking attempt when the second signal indicates motion at the second range, and wherein the electronic processor (205) is configured to generate the trouble notification when the second signal is greater than a first threshold, characterized in that the electronic processor (205) is configured to adjust the first threshold to a lesser value when the first signal is indicative of motion at the first range.', '7. The motion detector (100) according to Claim 1, wherein the dual-channel reception circuit (110, 115) is controlled by a time gate circuit (120) such that the first channel (110) and the second channel (115) each receive control signals from the time gate circuit (120) simultaneously.'] | false | [
"125",
"305",
"310",
"11",
"315",
"2"
] | |
EP_3501017_B1 (2).png | EP3501017B1 | MOTION SENSOR WITH ANTIMASK PROTECTION | [
"FIG3"
] | [
"FIG3 is a timing diagram for controlling operation of the motion detector of FIG1 according to one embodiment"
] | [
"FIG3 illustrates one example of control signals for the transmission circuit 105, the first reception circuit 110, and the second reception circuit 115. The time gate circuit 120 is configured to generate multiple control signals including the transmission control signal 191 to control the shape generator 130, the... | 18 | 371 | diagram | G | [
{
"element_identifier": "6262661",
"terms": [
"A1. US"
]
},
{
"element_identifier": "100",
"terms": [
"motion detector"
]
},
{
"element_identifier": "105",
"terms": [
"transmission circuit"
]
},
{
"element_identifier": "110",
"terms": [
... | ['1. A motion detector (100) with antimasking capability, the motion detector (100) comprising: an antenna (131, 135); a dual-channel reception circuit (110, 115), the dual-channel reception circuit (110, 115) configured to receive a reflected radio frequency (RF) signal; and an electronic processor (205) electrically connected to the dual-channel reception circuit (110, 115) and configured to receive a first signal from a first channel (110) of the dual-channel reception circuit (110, 115) indicative of motion at a first range, receive a second signal from a second channel (115) of the dual-channel reception circuit (110, 115) indicative of motion at a second range, at least a portion of the second range being shorter than the first range, and generate a notification based on the first signal and the second signal, wherein the electronic processor (205) is configured to generate the notification by generating a trouble notification indicative of a masking attempt when the second signal indicates motion at the second range, and wherein the electronic processor (205) is configured to generate the trouble notification when the second signal is greater than a first threshold, characterized in that the electronic processor (205) is configured to adjust the first threshold to a lesser value when the first signal is indicative of motion at the first range.', '7. The motion detector (100) according to Claim 1, wherein the dual-channel reception circuit (110, 115) is controlled by a time gate circuit (120) such that the first channel (110) and the second channel (115) each receive control signals from the time gate circuit (120) simultaneously.'] | false | [
"191",
"192",
"193",
"12",
"194",
"195",
"1000",
"3"
] |
PatFig Dataset
Introduction
The PatFig Dataset is a curated collection of over 18,000 patent images from more than 7,000 European patent applications, spanning the year 2020. It aims to provide a comprehensive resource for research and applications in image captioning, abstract reasoning, patent analysis, and automated documentprocessing. The overarching goal of this dataset is to advance the research in visually situated language understanding towards more hollistic consumption of the visual and textual data.
Dataset Description
Overview
This dataset includes patent figures accompanied by short and long captions, reference numerals, corresponding terms, and a minimal set of claims, offering a detailed insight into the depicted inventions.
Structure
- Image Files: Technical drawings, block diagrams, flowcharts, plots, and grayscale photographs.
- Captions: Each figure is accompanied by a short and long caption describing its content and context.
- Reference Numerals and Terms: Key components in the figures are linked to their descriptions through reference numerals.
- Minimal Set of Claims: Claims sentences summarizing the interactions among elements within each figure.
- Metadata: Includes image names, publication numbers, titles, figure identifiers, and more. The detailed descriptions of the fields are available in the Dataset Documentation.
Categories
The dataset is categorized according to the International Patent Classification (IPC) system, ensuring a diverse representation of technological domains.
Usage
The PatFig Dataset is intended for use in patent image analysis, document image processing, visual question answering tasks, and image captioning in technical contexts. Users are encouraged to explore innovative applications in related fields.
Challenges and Considerations
Users should be aware of challenges such as interpreting compound figures. PatFig was built automatically using high-performance machine-learning and deep-learning methods. Therefore, the data might contain noise, which was mentioned in the corresponding paper.
License and Usage Guidelines
The dataset is released under a Creative Commons Attribution-NonCommercial 2.0 Generic (CC BY-NC 2.0) License. It is intended for non-commercial use, and users must adhere to the license terms.
Cite as
@inproceedings{aubakirova2023patfig,
title={PatFig: Generating Short and Long Captions for Patent Figures},
author={Aubakirova, Dana and Gerdes, Kim and Liu, Lufei},
booktitle={Proceedings of the IEEE/CVF International Conference on Computer Vision},
pages={2843--2849},
year={2023}
}
- Downloads last month
- 115