Patent application number | Description | Published |
20090238191 | TOPOLOGY ARRANGEMENT FOR ACHIEVING RELIABLE COMMUNICATION IN WIRELESS AUTOMOTIVE NETWORKS - A wireless network arrangement includes an enclosure having a hindrance to wireless communication. The hindrance includes a fixed barrier and/or a space for accommodating a moveable barrier. At least three wireless electronic nodes are wirelessly and communicatively coupled to each other. A broadcast range of the nodes is greater than a largest dimension of the enclosure. The hindrance is disposed between a first one of the nodes and a second one of the nodes. The at least three nodes are positioned within the enclosure such that a wireless signal communication path wirelessly and communicatively couples the first one of the nodes to the second one of the nodes. The communication path is non-intersecting with the hindrance. The communication path passes through at least a third one of the nodes. The communication path is formed exclusively of a plurality of joined linear segments. Opposite ends of each linear segment are disposed at corresponding ones of the nodes. | 09-24-2009 |
20100087986 | METHOD AND APPARATUS FOR CUSTOMIZING A WIRELESS NETWORK ARCHITECTURE - A wireless network arrangement for a vehicle includes an electronic controller disposed within the vehicle. A plurality of wireless electronic components are disposed within the vehicle and are wirelessly communicatively coupled to the electronic controller. The components are networked together wirelessly such that members of any subgroup of the components can wirelessly communicate with each other. | 04-08-2010 |
20100259611 | System, method, and device for controlled user tracking - In a system and method for controlled user tracking, a mobile device is provided for transmitting an identification signal, and a reader unit, which is statically located at a location, is provided for receiving the identification signal and transmitting to a surveillance control unit, in response to receipt of the identification signal, either the received identification signal or another signal that identifies the mobile device, for logging by the surveillance control unit of a presence of the mobile device at the location, where the mobile device and/or the reader unit is configured to transmit at least one surveillance control message for control of surveillance at the location. | 10-14-2010 |
20100315981 | SYSTEM, METHOD AND APPARATUS EMPLOYING TONE AND/OR TONE PATTERNS TO INDICATE THE MESSAGE TYPE IN WIRELESS SENSOR NETWORKS - A system and method for operating a wireless network provides for sending a wakeup tone, periodically waking up from a sleep mode to listen for the wakeup tone, upon receiving the wakeup tone, listening for at least one second tone, the at least one second tone being one of (i) a tone in a frequency different from the wakeup tone and (ii) a pattern of tones including at least one frequency different from the wakeup tone, and upon receiving the at least one second tone, performing an action based on the at least one second tone. | 12-16-2010 |
20110143790 | TOPOLOGY ARRANGEMENT FOR ACHIEVING RELIABLE COMMUNICATION IN WIRELESS AUTOMOTIVE NETWORKS - A wireless network arrangement includes a space having a hindrance to wireless communication. The hindrance includes a fixed barrier and/or a three-dimensional area for accommodating a moveable barrier. At least three wireless electronic nodes are wirelessly and communicatively coupled to each other. A broadcast range of the nodes is greater than a largest dimension of the enclosure. The hindrance is disposed between a first one of the nodes and a second one of the nodes. The at least three nodes are positioned within the enclosure such that a wireless signal communication path wirelessly and communicatively couples the first one of the nodes to the second one of the nodes. The communication path is non-intersecting with the hindrance. The communication path passes through at least a third one of the nodes. The communication path is formed exclusively of a plurality of joined linear segments. Opposite ends of each linear segment are disposed at corresponding ones of the nodes. | 06-16-2011 |
Patent application number | Description | Published |
20080254218 | Metal Precursor Solutions For Chemical Vapor Deposition - Metal source containing precursor liquid solutions for chemical vapor deposition processes, including atomic layer deposition, for fabricating conformal metal-containing films on substrates are described. More specifically, the metal source precursor liquid solutions are comprised of (i) at least one metal complex selected from β-diketonates, β-ketoiminates, β-diiminates, alkyl metal, metal carbonyl, alkyl metal carbonyl, aryl metal, aryl metal carbonyl, cyclopentadienyl metal, cyclopentadienyl metal isonitrile, cyclopentadienyl metal nitrile, cyclopentadienyl metal carbonyl, metal alkoxide, metal ether alkoxide, and metal amides wherein the ligand can be monodentate, bidentate and multidentate coordinating to the metal atom and the metal is selected from group 2 to 14 elements, and (ii) a solvent selected from organic amides including linear amides and cyclic amides for such metal source containing precursors. | 10-16-2008 |
20080312464 | Oxopentafluorosulfanyl-Substituted Alicyclic Compounds - A compound comprising at least one alicyclic or heteroalicyclic ring structure, the ring structure comprising a ring of about four to about eight atoms, wherein at least two adjacent atoms of the ring are carbon atoms and at least one of said carbon atoms is covalently bonded to an —OSF | 12-18-2008 |
20100041243 | Precursors for Depositing Silicon-containing Films and Methods for Making and Using Same - Aminosilane precursors for depositing silicon-containing films, and methods for depositing silicon-containing films from these aminosilane precursors, are described herein. In one embodiment, there is provided an aminosilane precursor for depositing silicon-containing film comprising the following formula (I): | 02-18-2010 |
20110150794 | Polymeric Compositions for Personal Care Products - A polymeric composition is disclosed for use in personal care products. The composition is, at room temperature, a solid solution of a long-chain alcohol having ten to fifty carbon atoms and a polyalkyl[meth]acrylate polymer having some alkyl side chains pendant the ester group having ten to thirty carbon atoms and other alkyl side chains pendant the ester group having one to eight carbon atoms. The polymer can be formed by a transesterification reaction of a polyalkyl[meth]acrylate and the long chain alcohol in the presence of a catalyst. | 06-23-2011 |
20130040060 | Liquid Methylenedianiline Compositions - A liquid methylenedianiline product is disclosed. The product is produced by reacting aniline and ethylaniline with formaldehyde with an amine to formaldehyde ratio greater than about 2:1. The resulting reaction product is a liquid mixture of methylenedianiline, monoethyl methylenedianiline, and diethyl methylenedianiline having a viscosity of less than about 1000 cps at 40° C. | 02-14-2013 |
20140243456 | Anhydride Accelerators for Epoxy Resin Systems - Carboxylic acid salts of tertiary amines for use as an accelerator for an anhydride based epoxy curing agents are disclosed. The disclosed carboxylic acid salts of certain tertiary amines are latent anhydride accelerators and enable epoxy resin curing when heated to an elevated temperature (e.g., an onset temperature of greater than about 50° C.). | 08-28-2014 |
20140303342 | One Component Epoxy Curing Agents Comprising Hydroxyalkylamino Cycloalkanes - Liquid epoxy curing agents that have improved latency over conventional liquid curing agents while retaining the physical properties of the cured material are disclosed. These liquid curing agents can be used for curing epoxy resins, or in combination with dicyandiamide (DICY) based curing agents in order to accelerate DICY curing. | 10-09-2014 |
20150025201 | AMINES AND POLYMERIC PHENOLS AND USAGE THEREOF AS CURING AGENTS IN ONE COMPONENT EPOXY RESIN COMPOSITIONS - The disclosure relates to solving problems associated with conventional latent epoxy curing agents by providing a new class of latent epoxy curing agents. In particular, the disclosure relates to epoxy curing agents with improved storage stability and low use level (e.g., less than about 10 wt % relative to the epoxy compound) by forming solid solutions of certain classes of amines in polyphenolic resins. | 01-22-2015 |
20150094400 | Epoxy Liquid Curing Agent Compositions - The present disclosure provides a liquid curing agent composition comprising at least 50% by weight of a polyamine and 0.2% to 10% by weight of dicyandiamide, the amine/epoxy composition and the product from the cured amine/epoxy composition. | 04-02-2015 |
20160122467 | Amidopolyamines with Enhanced Gel-Time for Elevated Temperature Applications - An epoxy curing agent is disclosed that can be obtained by reacting at least one carboxylic acid with at least one polyamine. The disclosed curing agent can be obtained by preparing an amidoamine with about 0.15 to about 0.30 molar excess of carboxylic acid. | 05-05-2016 |
Patent application number | Description | Published |
20090299863 | PERFORMING A CHECK TRANSACTION USING ADD-IN MODULES - A point-of-sale (POS) module and associated methods are described for performing a transaction involving a check. The POS module interacts with one or more add-in modules. Each add-in module is associated with a particular method for processing a payment using a check. Accordingly, the POS module can accommodate multiple different workflows by plugging in appropriate add-in modules. | 12-03-2009 |
20090319382 | EXTENSIBLE FRAMEWORK FOR SUPPORTING DIFFERENT MODES OF PAYMENTS - A method and system for providing an extensible framework for a POS application is provided. A POS application may be extended using a payment format add-in, a workflow add-in, a financial services provider add-in, or a combination of add-ins. A payment format add-in provides support for a payment format not included in the payment formats built into the POS application. A workflow add-in provides a configurable workflow that can be used to extend a built-in payment format or a payment format add-in. A financial services provider add-in provides support for interacting with a financial services provider for which the POS application does not provide built-in support. Each add-in can implement, for example, logic for processing a payment transaction, a portion of a payment transaction, and configuring steps for processing a payment transaction. | 12-24-2009 |
20110055033 | PAYMENT WORKFLOW EXTENSIBILITY FOR POINT-OF-SALE APPLICATIONS - Architecture that employs a software development kit and an add-in model to collect payment data and communicate with payment processors in a point-of-sale (POS) application to meet new requirements in new markets. Data gathered from an add-in and from the POS application can be combined and then communicated to the payment processor. The payment method can be determined and payment processing routed to different payment processors based on data and schema of data collected is also described. An add-in can also programmatically obtain information from the POS application information about a transaction and authorize a payment. A payment collecting/processing API is the interface between the POS application tender logic and payment collecting/processing logic and defines how a payment collecting/processing add-in interacts with the POS application. | 03-03-2011 |
20110161186 | EXTENSIBLE FRAMEWORK FOR SUPPORTING DIFFERENT MODES OF PAYMENTS - A method and system for providing an extensible framework for a POS application is provided. A POS application may be extended using a payment format add-in, a workflow add-in, a financial services provider add-in, or a combination of add-ins. A payment format add-in provides support for a payment format not included in the payment formats built into the POS application. A workflow add-in provides a configurable workflow that can be used to extend a built-in payment format or a payment format add-in. A financial services provider add-in provides support for interacting with a financial services provider for which the POS application does not provide built-in support. Each add-in can implement, for example, logic for processing a payment transaction, a portion of a payment transaction, and configuring steps for processing a payment transaction. | 06-30-2011 |
20130124348 | PLUG-IN BASED CHIP CARD PAYMENTS - A chip card payment processor interface component exposes a plurality of different interfaces for a plurality of different chip card payment processors. A chip card peripheral device interface component exposes a plurality of different chip card peripheral device interfaces for a plurality of different chip card peripheral devices. A payment services component can thus interact with the plurality of different chip card peripheral devices in conducting a transaction, and can also interact with a plurality of different chip card payment processors to authenticate and validate the transaction. | 05-16-2013 |
Patent application number | Description | Published |
20110197588 | Fuel Injector Nozzle - A fuel injector nozzle is disclosed. The nozzle includes a nozzle body for fluid communication of a liquid fuel to produce a liquid fuel jet and a fluid to produce a fluid jet. The nozzle body includes an adapter comprising a fuel conduit and a fluid conduit. The nozzle body also includes a nozzle tip disposed on the adapter comprising a plurality of fuel outlet conduits that are in fluid communication with the fuel conduits and a plurality of fluid outlet conduits that are in fluid communication with the fluid conduits. | 08-18-2011 |
20110197589 | Fuel Injector Nozzle - A fuel injector nozzle is disclosed. The nozzle includes a nozzle body having a fuel conduit that extends from a fuel inlet through a fuel outlet conduit to a fuel outlet and a fluid conduit that extends from a fluid inlet through a fluid outlet conduit to a fluid outlet. The fuel outlet conduit and fuel outlet configured to produce a liquid fuel jet from the fuel outlet upon introduction of a pressurized liquid fuel into the fuel conduit. The fluid outlet conduit and fluid outlet are configured to produce a liquid fluid jet from the fluid outlet upon introduction of a pressurized liquid fluid into the fluid conduit, wherein the liquid fuel jet and the liquid fluid jet are configured to impact one another and produce a flow stream of atomized fuel. | 08-18-2011 |
20110197594 | Method of Controlling a Combustor for a Gas Turbine - A method of controlling a combustor of a gas turbine is disclosed. The method includes operatively disposing a combustor can in a combustor of a gas turbine. The combustor can comprising a plurality of combustor fuel nozzles, each having a fuel injector and configured to selectively provide a liquid fuel, a liquid fluid or liquid fuel and liquid fluid to a fuel injector nozzle that is configured to provide, respectively, a plurality of liquid fuel jets, a plurality of liquid fluid jets or a combination thereof, that are in turn configured to provide an atomized liquid fuel stream, an atomized liquid fluid stream, or an atomized and emulsified liquid fuel-liquid fluid stream, respectively. The method also includes selectively providing an amount of fuel, fluid or a combination thereof to the fuel injector nozzle to produce an atomized fuel stream, atomized fluid stream, or an atomized and emulsified fuel-fluid stream, respectively. | 08-18-2011 |
Patent application number | Description | Published |
20160037903 | SYSTEMS, METHODS AND APPARATUS FOR TRACKING A TOOTHBRUSH - Systems, methods and apparatus are provided through which in some aspects the position of a toothbrush is tracked relative to a user's dentition, while brushing. In some aspects, a toothbrush system includes a handle, a brush head, an illumination system, a camera system operable to acquire a set of light field images, and a set of machine readable instructions operable to receive the set of light field images and determine a relative transformation of the camera system associated with each light field image. In another aspect, a method of tracking the position of a toothbrush as it brushes a dental structure includes illuminating the dental structure, capturing a set of light field images of the dental structure, computing a transformation relative to the dental structure associated with each light field image, and determining a set of positions of the toothbrush relative to the dental structure based on the transformation. | 02-11-2016 |
20160038033 | METHOD, SYSTEM AND APPARATUS FOR QUANTIFYING ORAL HEALTH WITH A TOOTHBRUSH - Systems, methods and apparatus are provided through which in one aspect, a toothbrush system for imaging a dental structure includes a handle, a brush head, a tracking system, an optical system operable to acquire a set of optical absorption samples associated with a set of optical properties and a time, and a set of machine readable instructions operable to receive the three dimensional position of the brush head, receive the optical absorption samples, associate each optical absorption sample with a point on the dental structure, and determine oral health measures associated with each point on the dental structure. In another aspect, a method for quantifying oral health includes acquiring a set of optical absorption samples wherein each sample is associated with a three dimensional point on a dental structure, and computing a set of oral health measures based on the set of optical absorption samples. | 02-11-2016 |
Patent application number | Description | Published |
20090300167 | NETWORKED IMAGE VISUALIZATION IMAGE QUALITY ENHANCEMENT METHOD AND SYSTEM - A method for managing medical image data transmission between computing devices is disclosed. In one embodiment, the method includes monitoring a plurality of parameters of a computer network that includes a server and a client. The plurality of parameters may include a client resource parameter, a server resource parameter, and a network operating parameter. The disclosed method may also include automatically determining a desired compression level at which to send medical image data to the client based at least in part on the client resource parameter, the server resource parameter, and the network operating parameter. Further, in one embodiment the method may include communicating the medical image data from the server to the client at the desired compression level in response to a client request for the image data. Various other methods, systems, and manufactures are also disclosed. | 12-03-2009 |
20110055360 | NETWORK DATA TRANSMISSION METHOD AND SYSTEM - A method for managing data transmission between computing devices is disclosed. In one embodiment, the method includes monitoring a plurality of parameters of a computer network that includes a server and a client. The plurality of parameters may include a client resource parameter, a server resource parameter, and a network operating parameter. The disclosed method may also include automatically determining a desired compression level at which to send data to the client based at least in part on the client resource parameter, the server resource parameter, and the network operating parameter. Further, in one embodiment the method may include communicating the data from the server to the client at the desired compression level in response to a client request for the data. Various other methods, systems, and manufactures are also disclosed. | 03-03-2011 |
Patent application number | Description | Published |
20140157404 | VIRTUALIZING A HARDWARE MONOTONIC COUNTER - Embodiments of an invention for virtualizing a hardware monotonic counter are disclosed. In one embodiment, an apparatus includes a hardware monotonic counter, virtualization logic, a first non-volatile storage location, and a second non-volatile storage location. The virtualization logic is to create a virtual monotonic counter from the hardware monotonic counter. The first non-volatile storage location is to store an indicator that the count of the hardware monotonic counter has changed. The second non-volatile storage location is to store an indicator that the count of the virtual monotonic counter has changed. | 06-05-2014 |
20140173756 | PLATFORM-HARDENED DIGITAL RIGHTS MANAGEMENT KEY PROVISIONING - Embodiments of an invention for platform-hardened digital rights management key provisioning are disclosed. In one embodiment, a processor includes an execution unit to execute one or more instructions to create a secure enclave in which to run an application to receive digital rights management information from a provisioning server in response to authentication of the application by a verification server. | 06-19-2014 |
20140282935 | TECHNIQUES FOR SECURING USE OF ONE-TIME PASSWORDS - Various embodiments are generally directed to the provision and use of a secure enclave defined within a storage of a computing device by a processor element thereof to store executable instructions of an OTP component implementing logic to generate and use one-time passwords (OTPs) to enable access to services provided by another computing device. An apparatus includes a storage; a first processor element; and first logic to receive a one-time password (OTP) routine, store the OTP routine within a first secure enclave defined by the first processor element within the storage, obtain a measure of the contents of the first secure enclave with the OTP routine stored therein, transmit the first measure to a computing device, and receive an OTP seed. Other embodiments are described and claimed. | 09-18-2014 |
20140359305 | APPLICATION INTEGRITY PROTECTION VIA SECURE INTERACTION AND PROCESSING - The present disclosure is directed to application integrity protection via secure interaction and processing. For example, interaction with a user interface in a device may result in input information being generated. Following encryption, the input information may be conveyed to an application executing in a secure processing environment. The encrypted input information may be received, decrypted and processed by the application. An example application may include a secure controller component, a secure model component and a secure view component. The secure controller component may, for example, provide change instructions to the secure model component based on the decrypted input information. The secure model component may then, if necessary, provide a change notification to the secure view component based on the change instructions. The secure view component may then generate output information, which may be encrypted prior to being provided to the user interface for decryption, processing and presentation. | 12-04-2014 |
20150113241 | ESTABLISHING PHYSICAL LOCALITY BETWEEN SECURE EXECUTION ENVIRONMENTS - Embodiments of an invention for establishing physical locality between secure execution environments are disclosed. In one embodiment, a processor includes a storage location and an execution core. The storage location is to store a locality nonce. The execution core is to execute a first instruction to create a secure execution environment. The execution core is also to execute, from within the secure execution environment, a second instruction to read the locality nonce from the storage location. | 04-23-2015 |
20150143118 | END-TO-END SECURE COMMUNICATION SYSTEM - The present disclosure is directed to an end-to-end secure communication system wherein, in addition to encrypting transmissions between clients, communication-related operations occurring within each client may also be secured. Each client may comprise a secure processing environment to process encrypted communication information received from other clients and locally-captured media information for transmission to other clients. The secure processing environment may include resources to decrypt received encrypted communication information and to process the communication information into media information for presentation by the client. The secure processing environment may also operate in reverse to provide locally recorded audio, image, video, etc. to other clients. Encryption protocols may be employed at various stages of information processing in the client to help ensure that information being transferred between the processing resources cannot be read, copied, altered, etc. In one example implementation, a server may manage interaction between clients, provision encryption keys, etc. | 05-21-2015 |
20150178481 | PLATFORM-HARDENED DIGITAL RIGHTS MANAGEMENT KEY PROVISIONING - Embodiments of an invention for platform-hardened digital rights management key provisioning are disclosed. In one embodiment, a processor includes an execution unit to execute one or more instructions to create a secure enclave in which to run an application to receive digital rights management information from a provisioning server in response to authentication of the application by a verification server. | 06-25-2015 |
20150222633 | TECHNOLOGIES FOR SUPPORTING MULTIPLE DIGITAL RIGHTS MANAGEMENT PROTOCOLS ON A CLIENT DEVICE - Technologies for supporting and implementing multiple digital rights management protocols on a client device are described. In some embodiments, the technologies include a client device having an architectural enclave which may function to identify one of a plurality of digital rights management protocols for protecting digital information to be received from a content provider or a sensor. The architectural enclave select a preexisting secure information processing environment (SIPE) to process said digital information, if a preexisting SIPE supporting the DRM protocol is present on the client. If a preexisting SIPE supporting the DRM protocol is not present on the client, the architectural enclave may general a new SIPE that supports the DRM protocol on the client. Transmission of the digital information may then be directed to the selected preexisting SIPE or the new SIPE, as appropriate. | 08-06-2015 |
20150264087 | Systems, Apparatuses, and Methods for Enforcing Security on a Platform - Embodiments of a system, apparatus, and method of platform security are describe. In some embodiments, a system comprises a manageability engine to detect if a software agent of the platform is removed and a software agent enclave, wherein the software agent enclave and manageability engine each include a specific session key to be used for communications between the software agent enclave and the manageability engine. | 09-17-2015 |
20150304736 | TECHNOLOGIES FOR HARDENING THE SECURITY OF DIGITAL INFORMATION ON CLIENT PLATFORMS - Technologies for hardening the security of digital information on a client device are described. In some embodiments, the client device includes a secure processing environment such as a secure enclave, which may be used to protect digital information on a client platform. The secure environment(s) may also protect assets which may be used to access the digital information. Using the secure processing environment(s), the described technologies may protect digital information as it is provided to, stored on, accessed on, and/or processed for display by a client device, even if the client device may be infested with malware or subject to attack by another entity. | 10-22-2015 |
20150381634 | TRUSTED TIME SERVICE FOR OFFLINE MODE - Systems and methods for providing trusted time service for the off-line mode of operation of a processing system. An example processing system comprises: a first processing device communicatively coupled to a real-time clock, the first processing device to modify an epoch value associated with the real-time clock responsive to detecting a reset of the real-time clock; and a second processing device to execute, in a first trusted execution environment, a first application to receive, from the first processing device, a first time value outputted by the real-time clock and a first epoch value associated with the real-time clock. | 12-31-2015 |
20160094338 | SECURING AUDIO COMMUNICATIONS - Systems and methods include establishing a cryptographically secure communication between an application module and an audio module. The application module is configured to execute on an information-handling machine, and the audio module is coupled to the information-handling machine. The establishment of the cryptographically secure communication may be at least partially facilitated by a mutually trusted module. | 03-31-2016 |
20160094558 | SECURING SENSOR DATA - Systems and methods include establishing a secure communication between an application module and a sensor module. The application module is executing on an information-handling machine, and the sensor module is coupled to the information-handling machine. The establishment of the secure communication is at least partially facilitated by a mutually trusted module. | 03-31-2016 |