Patent application number | Description | Published |
20130091834 | DEAD-VOLUME MANAGEMENT IN COMPRESSED-GAS ENERGY STORAGE AND RECOVERY SYSTEMS - In various embodiments, coupling losses between a cylinder assembly and other components of a gas compression and/or expansion system are reduced or eliminated via valve-timing control. | 04-18-2013 |
20130091835 | DEAD-VOLUME MANAGEMENT IN COMPRESSED-GAS ENERGY STORAGE AND RECOVERY SYSTEMS - In various embodiments, coupling losses between a cylinder assembly and other components of a gas compression and/or expansion system are reduced or eliminated via valve-timing control. | 04-18-2013 |
20130091836 | DEAD-VOLUME MANAGEMENT IN COMPRESSED-GAS ENERGY STORAGE AND RECOVERY SYSTEMS - In various embodiments, coupling losses between a cylinder assembly and other components of a gas compression and/or expansion system are reduced or eliminated via valve-timing control. | 04-18-2013 |
20130139500 | DEAD-VOLUME MANAGEMENT IN COMPRESSED-GAS ENERGY STORAGE AND RECOVERY SYSTEMS - In various embodiments, coupling losses between a cylinder assembly and other components of a gas compression and/or expansion system are reduced or eliminated via valve-timing control. | 06-06-2013 |
20130152568 | VALVE ACTIVATION IN COMPRESSED-GAS ENERGY STORAGE AND RECOVERY SYSTEMS - In various embodiments, valve efficiency and reliability are enhanced via use of hydraulic or magnetic valve actuation, valves configured for increased actuation speed, and/or valves controlled to reduce collision forces during actuation. | 06-20-2013 |
20130152571 | VALVE ACTIVATION IN COMPRESSED-GAS ENERGY STORAGE AND RECOVERY SYSTEMS - In various embodiments, valve efficiency and reliability are enhanced via use of hydraulic or magnetic valve actuation, valves configured for increased actuation speed, and/or valves controlled to reduce collision forces during actuation. | 06-20-2013 |
20130152572 | VALVE ACTIVATION IN COMPRESSED-GAS ENERGY STORAGE AND RECOVERY SYSTEMS - In various embodiments, valve efficiency and reliability are enhanced via use of hydraulic or magnetic valve actuation, valves configured for increased actuation speed, and/or valves controlled to reduce collision forces during actuation. | 06-20-2013 |
20140130490 | DEAD-VOLUME MANAGEMENT IN COMPRESSED-GAS ENERGY STORAGE AND RECOVERY SYSTEMS - In various embodiments, coupling losses between a cylinder assembly and other components of a gas compression and/or expansion system are reduced or eliminated via valve-timing control. | 05-15-2014 |
Patent application number | Description | Published |
20100300159 | REMOTE-ACTIVATION LOCK SYSTEM AND METHOD - Remote-activation locks designed to permit unlocking and/or locking of the lock without physical manipulation of the lock are articulated to a product/good in a manner so as to deny one or more benefits associated with the product/good. | 12-02-2010 |
20120112912 | POINT OF SALE DEACTIVATION TABLET AND METHOD - A method and system for deactivating locks, locking the functionality of products and/or the product packing in which such products are sold, in particular remote-activation adhesive locks | 05-10-2012 |
20120263402 | FLUID BEARING ASSEMBLY - A fluid bearing assembly well-suited for use as high performance, web handling roller includes a stationary inner component that extends coaxially within a rotatable outer component. The inner component includes a single conical member from which extends a narrow stem. The delivery of fluid into a nominal gap between the inner and outer components creates a tapered bearing, with the outer component capable of frictionless rotation relative to the inner component. A thrust plate is axially mounted onto the stem and is retained thereon by a threaded nut. By delivering fluid into a nominal gap between the thrust plate and the outer component, a thrust bearing is created which counterbalances the net axial force produced from the tapered bearing. Furthermore, precise adjustment of the tapered bearing air gap can be achieved through rotation of the threaded nut, thereby enabling certain performance characteristics of the fluid bearing assembly to be modified. | 10-18-2012 |
20120273522 | DISPENSING SYSTEM AND SECURITY DEVICE FOR USE IN CONJUNCTION THEREWITH - A product dispensing system includes a partially-open container for retaining a supply of the product, a mechanism for dispensing a quantity of the product from the container, and a remotely-activated security device for selectively restricting the dispensing of product from the container. In one embodiment, the security device is in the form of a spherical enclosure that is mounted over the inlet port for a draw tube of the dispensing mechanism. In use, the security device includes an activation mixture, such as an expandable adhesive, that transitions the security device between a first state and a second state in response to an application of certain non-mechanical stimuli, such electromagnetic energy of a particular profile, the security device restricting the passage of the product through the draw tube when disposed in the first state and permitting the passage of the product through the draw tube when disposed in the second state. | 11-01-2012 |
20130200127 | WEB HANDLING SYSTEM AND VACUUM ROLLER FOR USE IN CONJUNCTION THEREWITH - A vacuum roller for a web handling system comprises a hollow, cylindrical, rotably driven drum and an end cap threadingly mounted onto the rear end of the drum. Together, the drum and the end cap define a plurality of individual, externally communicable vacuum paths. A spherical, metal movable element is internally disposed within each vacuum path and regulates the passage of air therethrough. A plurality of magnetic elements is fixedly mounted on a stationary annular holder. In use, each magnetic element selectively displaces each movable element when disposed in close proximity thereto to the extent necessary so as to permit the passage of air through its corresponding vacuum path. As such, the vacuum roller is provided with a predefined range of suction, or vacuum zone, about the outer surface of its rotating drum that directly corresponds to the angular arrangement of the plurality of stationary magnetic elements. | 08-08-2013 |
20140241598 | Method and Apparatus for Processing Biometric Images - A method and apparatus for applying gradient edge detection to detect features in a biometric, such as a fingerprint, based on data representing an image of at least a portion of the biometric. The image is modeled as a function of the features. Data representing an image of the biometric is acquired, and features of the biometric are modeled for at least two resolutions. The method and apparatus improves analysis of both high-resolution images of biometrics of friction ridge containing skin that include resolved pores and lower resolution images of biometrics without resolved pores. | 08-28-2014 |
20150062873 | LIGHTING FIXTURE - A high power, outdoor light fixture includes an enclosed, watertight housing shaped to define an interior cavity, a light source disposed within the interior cavity, an optical component for directing light produced by the light source out through a transparent region in the housing, a wirelessly accessible power source for supplying current to the light source, and an electrically insulating, thermally conductive, and transparent fluid, such as mineral oil, that substantially fills the interior cavity and submerges all components contained therein. The utilization of a liquid, rather than a gas, to fill the interior cavity eliminates internal pressure fluctuations within the fixture, thereby rendering the fixture safe and reliable for use in a wide range of environments. Additionally, any heat produced by the light source, or any additional interior components, is designed to be transferred to the thermally conductive housing via the liquid for efficient dissipation. | 03-05-2015 |
20150078736 | UNDERWATER IMAGING SYSTEM - An imaging system designed for use in a low visibility, underwater environment includes a short wavelength light source, such as an ultraviolet LED, for illuminating an object and a camera for capturing images of the object. The exterior of the object is applied with a light absorptive coating, such as a phosphorescent coating. In use, some the light emitted by the light source is reflected by particles suspended in the water, such as silt or algae, at the same relatively short wavelength as initially emitted. However, some of the light emitted by the light source is absorbed by the coated object and re-emitted at a relatively long wavelength based on a principle of fluorescence known as Stokes shift. Accordingly, a cutoff filter disposed in front of the camera enhances visibility of the object by filtering out the short wavelength light reflected by particles suspended in the immediate environment. | 03-19-2015 |
Patent application number | Description | Published |
20120023553 | Static Analysis For Verification Of Software Program Access To Secure Resources For Computer Systems - A method includes, using a static analysis, analyzing a software program to determine whether the software program accesses a secure resource for a computer system without verification that the secure resource can be accessed by the software program. The method also includes, in response to an access by the software program to the secure resource without verification that the secure resource can be accessed by the software program, outputting a result indicative of the analyzing. Computer program products and apparatus are also disclosed. An apparatus is disclosed that includes a user interface providing a security report to a user, the security report indicating a result of an analysis of whether or not a software program accesses a secure resource for a computer system without verification that the secure resource can be accessed by the software program. | 01-26-2012 |
20120102471 | GENERATING SPECIFICATIONS OF CLIENT-SERVER APPLICATIONS FOR STATIC ANALYSIS - Systems and methods are provided for creating a data structure associated with a software application that is based on at least one framework. According to the method, source code and at least one configuration file of the software application is analyzed by at least one framework-specific processor so as to determine entry point information indicating entry points in the source code, request attribute access information indicating where attributes attached to a request data structure are read and written, and forward information indicating forwards performed by the software application. A data structure for a static analysis engine is created based on this information. The data structure includes a list of synthetic methods that model framework-related behavior of the software application, and a list of entry points indicating the synthetic methods and/or application methods of the software application that can be invoked by the framework. | 04-26-2012 |
20120102474 | STATIC ANALYSIS OF CLIENT-SERVER APPLICATIONS USING FRAMEWORK INDEPENDENT SPECIFICATIONS - Systems and methods are provided for statically analyzing a software application that is based on at least one framework. According to the method, source code of the software application and a specification associated with the software application are analyzed. The specification includes a list of synthetic methods that model framework-related behavior of the software application, and a list of entry points indicating the synthetic methods and/or application methods of the software application that can be invoked by the framework. Based on the source code and the specification, intermediate representations for the source code and the synthetic methods are generated. Based on the intermediate representations and the specification, call graphs are generated to model which application methods of the software application invoke synthetic methods or other application methods of the software application. The software application is statically analyzed based on the call graphs and the intermediate representations so as to generate analysis results for the software application. | 04-26-2012 |
20120131668 | Policy-Driven Detection And Verification Of Methods Such As Sanitizers And Validators - A method includes performing a static analysis on a program having sources and sinks to track string flow from the sources to the sinks. The static analysis includes, for string variables in the program that begin at sources, computing grammar of all possible string values for each of the string variables and, for methods in the program operating on any of the string variables, computing grammar of string variables returned by the methods. The static analysis also includes, in response to one of the string variables reaching a sink that performs a security-sensitive operation, comparing current grammar of the one string variable with a policy corresponding to the security-sensitive operation, and performing a reporting operation based on the comparing. Apparatus and computer program products are also disclosed. | 05-24-2012 |
20120131670 | Global Variable Security Analysis - A method includes determining selected global variables in a program for which flow of the selected global variables through the program is to be tracked. The selected global variables are less than all the global variables in the program. The method includes using a static analysis performed on the program, tracking flow through the program for the selected global variables. In response to one or more of the selected global variables being used in security-sensitive operations in the flow, use is analyzed of each one of the selected global variables in a corresponding security-sensitive operation. In response to a determination the use may be a potential security violation, the potential security violation is reported. Apparatus and computer program products are also disclosed. | 05-24-2012 |
20120297372 | Static Analysis Of Validator Routines - A method includes accessing a validator routine having an input string and one or more return points, each return point returning a return value having two possible values; finding the return points in the validator routine; for each of the return points, performing a backwards traversal from a return point through a code section and determining constraints on the input string based at least on one or both of the two possible return values for the return point; using the determined constraints for the input string, determining whether all of the return values returned from the one or more return points meet validation constraints; and outputting one or more indications of whether all of the returned values returned from the return points meet the validation constraints for the one or both of the two possible return values. Apparatus and computer program products are also disclosed. | 11-22-2012 |
20120331547 | Static Analysis For Verification Of Software Program Access To Secure Resources For Computer Systems - Computer program products and apparatus are disclosed. Using a static analysis, a software program is analyzed to determine whether the software program accesses a secure resource for a computer system without verification that the secure resource can be accessed by the software program. In response to an access by the software program to the secure resource without verification that the secure resource can be accessed by the software program, a result is output indicative of the analyzing. An apparatus is disclosed that includes a user interface providing a security report to a user, the security report indicating a result of an analysis of whether or not a software program accesses a secure resource for a computer system without verification that the secure resource can be accessed by the software program. | 12-27-2012 |
20130031622 | STATIC ANALYSIS FOR VERIFICATION OF SOFTWARE PROGRAM ACCESS TO SECURE RESOURCES FOR COMPUTER SYSTEMS - Computer program products and apparatus are disclosed. Using a static analysis, a software program is analyzed to determine whether the software program accesses a secure resource for a computer system without verification that the secure resource can be accessed by the software program. In response to an access by the software program to the secure resource without verification that the secure resource can be accessed by the software program, a result is output indicative of the analyzing. An apparatus is disclosed that includes a user interface providing a security report to a user, the security report indicating a result of an analysis of whether or not a software program accesses a secure resource for a computer system without verification that the secure resource can be accessed by the software program. | 01-31-2013 |
20140053140 | STATIC ANALYSIS OF VALIDATOR ROUTINES - A method includes accessing a validator routine having an input string and one or more return points, each return point returning a return value having two possible values; finding the return points in the validator routine; for each of the return points, performing a backwards traversal from a return point through a code section and determining constraints on the input string based at least on one or both of the two possible return values for the return point; using the determined constraints for the input string, determining whether all of the return values returned from the one or more return points meet validation constraints; and outputting one or more indications of whether all of the returned values returned from the return points meet the validation constraints for the one or both of the two possible return values. Apparatus and computer program products are also disclosed. | 02-20-2014 |
20140143880 | Global Variable Security Analysis - A method includes determining selected global variables in a program for which flow of the selected global variables through the program is to be tracked. The selected global variables are less than all the global variables in the program. The method includes using a static analysis performed on the program, tracking flow through the program for the selected global variables. In response to one or more of the selected global variables being used in security-sensitive operations in the flow, use is analyzed of each one of the selected global variables in a corresponding security-sensitive operation. In response to a determination the use may be a potential security violation, the potential security violation is reported. Apparatus and computer program products are also disclosed. | 05-22-2014 |