Patent application number | Description | Published |
20080302717 | MULTI-LAYER FILTER INCLUDING RETAINERS - A multi-layer filter including a first media layer surrounded by a second media layer, a third media layer surrounding the second media layer, and at least one retainer disposed between the first and second media layers or between the second and third media layers. The first, second and third media layers surround the central axis of the filter. The filter has multiple media layers in a compact package, providing increased media surface area which allows greater contaminant holding capacity, lower pressure drop, and lower face velocity. | 12-11-2008 |
20100006483 | Replaceable filter elements including unique pressure relief and systems including same - According to one embodiment a replaceable filter element includes a substantially annular filter media extending from a first end to a second end and has an exterior, a substantially hollow interior, and a first permeability. A first end plate is coupled to the first end of the substantially annular filter media. The first end plate includes an aperture leading to the substantially hollow interior of the substantially annular filter media. The replaceable filter element includes a filter media piece positioned adjacent the second end of the substantially annular filter media and has a second permeability less than the first permeability. The replaceable filter element includes an outer wrap extending from the second end of the substantially annular filter media along a portion of the exterior of the substantially annular filter media. Further embodiments, forms, objects, features, advantages, aspects, and benefits shall become apparent from the following description and drawings. | 01-14-2010 |
Patent application number | Description | Published |
20100192199 | CREATING AND USING A SPECIFIC USER UNIQUE ID FOR SECURITY LOGIN AUTHENTICATION - A method of monitoring all network login activity, which includes a real-time analysis of intercepting all network login activity, analyzing network login activity, authenticating network login activity and closing (i.e., terminating) those network login connections that are not authenticated to proceed and access the network. | 07-29-2010 |
20100205650 | METHOD OF PERFORMING SOFTWARE UPDATES (INSTALLATIONS), ON NETWORKED 32/64-BIT MICROSOFT COMPUTERS IN AN AUTOMATED ENVIRONMENT WITHOUT INTRODUCING A POSSIBLE SECURITY THREAT - A method of monitoring all network communications, including a real-time analysis of intercepting all networked connections and closing those network connections, including all connections across the Internet, except for those specific connections that will function to update a networked computer with new software or updates to existing software. | 08-12-2010 |
20100211955 | CONTROLLING 32/64-BIT PARALLEL THREAD EXECUTION WITHIN A MICROSOFT OPERATING SYSTEM UTILITY PROGRAM - A method of programming operating system (O/S) utility C and C++ programs within the Microsoft professional development 32/64-bit parallel threads environment, includes providing a computer unit, which can be a 32/64-bit Microsoft PC O/S, or a 32/64-bit Microsoft Server O/S, a Microsoft development tool, which is the Microsoft Visual Studio Development Environment for C and C++ for either the 32-bit O/S or the 64-bit O/S. | 08-19-2010 |
20100228870 | METHOD OF MONITORING NETWORK AND INTERNET CONNECTIONS IN A REAL-TIME ENVIRONMENT TO DETECT UNAUTHORIZED NETWORK CONNECTIONS AND UNAUTHORIZED NETWORK ACTIVITY WITHIN A 32/64-BIT MICROSOFT PC OR SERVER OPERATING SYSTEM - A method of monitoring all network communications, which includes a real-time analysis and intercepting of all connections, and determining whether those network connections, including all connections across the Internet, are authorized or unauthorized connections. If a connection is unauthorized, the connection may be terminated in a real-time environment and the logical communications port for authorized connections is re-established. | 09-09-2010 |
20100293151 | ANALYZING INTERNAL HARD DRIVES AND CONTINUOUSLY AUTHENTICATING PROGRAM FILES WITHIN MICROSOFT OPERATING SYSTEM - A method of performing an analysis on internal hard drive(s), which includes an analysis of the file management system, individual files that exist on the hard drive, developing a Unique ID for each program (i.e., executable) file and continuously analyzing (i.e., scanning) the hard drive(s) to detect physical changes in the previously analyzed program files. The method may be implemented on a computer unit, which can be a 32/64-bit Microsoft PC O/S, or a 32/64-bit Microsoft Server O/S. | 11-18-2010 |
20100293596 | METHOD OF AUTOMATICALLY DEFINING AND MONITORING INTERNAL NETWORK CONNECTIONS - A method of defining network connection policies, deploying the network connection policies and monitoring all network connections, including an automated real-time analysis and intercepting all connections, and determining whether those network connections are private access connections, or public access connections. If the public access connections are unauthorized, terminating the public access connections in communications port for authorized connections. | 11-18-2010 |
20130305254 | CONTROLLING 32/64-BIT PARALLEL THREAD EXECUTION WITHIN A MICROSOFT OPERATING SYSTEM UTILITY PROGRAM - A method of programming operating system (O/S) utility C and C++ programs within the Microsoft professional development 32/64-bit parallel threads environment, includes providing a computer unit, which can be a 32/64-bit Microsoft PC O/S, or a 32/64-bit Microsoft Server O/S, a Microsoft development tool, which is the Microsoft Visual Studio Development Environment for C and C++ for either the 32-bit O/S or the 64-bit O/S. | 11-14-2013 |
20140173273 | CREATING AND USING A SPECIFIC USER UNIQUE ID FOR SECURITY LOGIN AUTHENTICATION - A method of monitoring all network login activity, which includes a real-time analysis of intercepting all network login activity, analyzing network login activity, authenticating network login activity and closing (i.e., terminating) those network login connections that are not authenticated to proceed and access the network. | 06-19-2014 |
Patent application number | Description | Published |
20100066345 | Battery Charger Short Circuit Monitor - Various apparatuses and methods for supplying an electrical current are disclosed herein. For example, some embodiments provide an apparatus including a current regulation switch connected in a current path between a power input and a current output. A current regulator is connected to the current regulation switch. The current regulator includes a current set terminal, and the current through the current regulation switch is proportional to the current through current set terminal. An impedance monitor is connected to the current set terminal. | 03-18-2010 |
20110163608 | Reducing Corruption of Communication in a Wireless Power Transmission System - An embodiment of the invention provides a method for reducing data corruption in a wireless power transmission system. Power is transmitted from a primary coil to a secondary coil by induction. The voltage induced on the secondary coil by induction is rectified. The change in current supplied to a load configured to be coupled to the wireless power transmission system is limited. | 07-07-2011 |
20120242311 | Systems and Methods of Dynamic Current Limit - Systems and methods of dynamic current limit are disclosed herein. A current is sensed a wireless charging circuit, for example. When the current sense reaches a reference current level while a communication is active, the current limit is enabled for the next packet. The current limit signal may be cleared for the next packet. | 09-27-2012 |
20150016003 | METHODS AND APPARATUS TO CLAMP OVERVOLTAGES FOR ALTERNATING CURRENT SYSTEMS - Methods and apparatus to clamp overvoltages for inductive power transfer systems are described herein. An example overvoltage protection circuit is described, including a first terminal configured to receive an alternating current signal for conversion to a second signal, a capacitor, a first switch configured to selectively electrically couple the capacitor to the first terminal based on an overvoltage detection signal to reduce an overvoltage on the second signal, and an overvoltage detector. The example overvoltage detector is configured to determine a signal level of the second signal and, in response to determining that the signal level of the second signal is greater than a threshold, to output the overvoltage detection signal to cause the switch to electrically couple the capacitor between the first terminal and a second terminal. | 01-15-2015 |