Wooten, US
Alvin Wooten, New Orleans, LA US
Patent application number | Description | Published |
---|---|---|
20090265871 | Floor cleaning system - A floor cleaning system including a mop with a mop head having a plurality of mopping strands with multiple wringing beads, an elongated adjustable handle with a hand grip and a mop stand assembly, and a bucket with a wringing cone, rollers and a heating element. Also included are bucket rollers, safety feet, heating element shield, drain plug, chemical solution dispenser, bucket hose connection and hose storage reel. | 10-29-2009 |
Andrew Wooten, Chandler, AZ US
Patent application number | Description | Published |
---|---|---|
20090133633 | IN OVO ACTIVATION OF AN EGG IN THE SHELL - The present invention relates to the field of avian reproduction. In particular, the present invention provides a method of activating an egg in a shell. The invention also provides a method of activating an egg in a shell, whereby a live chick is hatched. | 05-28-2009 |
Anthony Loron Wooten, Cave Creek, AZ US
Patent application number | Description | Published |
---|---|---|
20150324715 | LOGISTICS SETTLEMENT RISK SCORING SYSTEM - A method and system for measuring financial risk in logistics transactions is disclosed. Historical data from processing logistics transactions is reviewed with analysis tools to determine risk scores in key areas. The method may be updated for new components representing high risk in logistics and to refresh risk scores periodically. In embodiments, a module generates risk score results for a given client profile, which may include actual or estimated inputs for both activity levels and a control configuration. Control configuration inputs include not only the basic controls in place for risk mitigation, but also the data enhancements applied for every control as implemented by the client. The client data inputs originate from shippers, logistics service providers, financiers, auditors or other logistics ecosystem partners. The outputs include quantified risk score results in various formats, which may be accessed by computer, smart phone, tablet, mobile device, or via an Internet browser. | 11-12-2015 |
Ceshea M. Wooten, Plano, TX US
Patent application number | Description | Published |
---|---|---|
20110230540 | MANASSATIN COMPOUNDS AND METHODS OF MAKING AND USING THE SAME - Provided are manassantin compounds and methods of using the compounds. Provided are methods of treating a disease, the method comprising administering a compound according to Formula I. Further provided are pharmaceutical compositions comprising compounds according to Formula I. Also provided are methods of inhibiting HIF-1 in a cell, the methods comprising administering to the cell a compound according to Formula I. | 09-22-2011 |
Charles Randy Wooten, Venice, CA US
Patent application number | Description | Published |
---|---|---|
20110045736 | Effect Generating Device in Response to User Actions - The present invention discloses a novel device having a sensing system to detect physical variance of a user, a responsive instrument to receive a signal matching the detected physical variance and correspondingly generate effect to interact with the user, and an attaching mechanism as well as an energy source to power the device. The physical variance can be the user's motion and the sensing system may include an accelerometer to detect the user's directions and accelerations. | 02-24-2011 |
Christopher L. Wooten, Austin, TX US
Patent application number | Description | Published |
---|---|---|
20080258704 | METHOD AND APPARATUS FOR IDENTIFYING BROKEN PINS IN A TEST SOCKET - A method includes scanning a test socket after removal of a device under test to generate scan data. The scan data is compared to reference data. A presence of at least a portion of a pin in the test socket is identified based on the comparison. A test system includes a test socket, a scanner, and a control unit. The test socket is operable to receive devices under test. The scanner is operable to scan a test socket after removal of a device under test to generate scan data. The control unit is operable to compare the scan data to reference data and identify a presence of at least a portion of a pin in the test socket based on the comparison. | 10-23-2008 |
20110057666 | METHOD AND APPARATUS FOR IDENTIFYING BROKEN PINS IN A TEST SOCKET - A method includes scanning a test socket after removal of a device under test to generate scan data. The scan data is compared to reference data. A presence of at least a portion of a pin in the test socket is identified based on the comparison. A test system includes a test socket, a scanner, and a control unit. The test socket is operable to receive devices under test. The scanner is operable to scan a test socket after removal of a device under test to generate scan data. The control unit is operable to compare the scan data to reference data and identify a presence of at least a portion of a pin in the test socket based on the comparison. | 03-10-2011 |
Clarence Wooten, Palo Alto, CA US
Patent application number | Description | Published |
---|---|---|
20160048850 | COLLECTING, AGGREGATING, ANALYZING AND REPORTING TRACTION DATA ON INTERNET-CONNECTED APPLICATIONS - Described is a way to improve efficiency in relaying software application traction data from developers to interested parties. Traction data is collected from a plurality of software applications through analytics modules. The traction data is forwarded in real-time to a network server which in turn aggregates and publishes the data in an indexed live feed. Within the live feed are controls for both subscribers and applications owners. Subscribers are enabled to configure threshold alerts concerning predetermined traction criterion. Application owners are enabled to determine which subscribers have access to traction data concerning their software application. | 02-18-2016 |
Daniel Wooten, Berkeley, CA US
Patent application number | Description | Published |
---|---|---|
20140262789 | VERY HIGH FREQUENCY (VHF) DRIVEN ATMOSPHERIC PLASMA SOURCES AND POINT OF USE FERTIGATION OF IRRIGATION WATER UTILIZING PLASMA PRODUCTION OF NITROGEN BEARING SPECIES - A point of use irrigation water fertigation system utilizes plasma production of nitrogen-bearing species. Soluble nitrogen-bearing species are generated using an atmospheric air plasma treatment of an irrigation water supply. A plasma is generated by a tube having an air intake. A high frequency generator generates atmospheric plasma. The end of the tube is placed above the surface of the irrigation water supply and the plasma emanating from the tube generates nitrogen species in the water. The non-thermal plasma discharge efficiently produces highly reactive radicals and NO | 09-18-2014 |
David Wooten, Redmond, WA US
Patent application number | Description | Published |
---|---|---|
20100088523 | TRUSTED PLATFORM MODULE SECURITY - The described implementations relate to trusted platform module (TPM) security. One configuration that is implemented on a computing device includes a TPM configured to generate a key pair utilizing a factor stored on the TPM and an external cofactor that is not stored on the TPM. The computing device also includes a communication device configured to receive the external cofactor and convey the external cofactor to the TPM. | 04-08-2010 |
David Wooten, Rochester, IL US
Patent application number | Description | Published |
---|---|---|
20120017296 | SOYBEAN VARIETY A1024300 - The invention relates to the soybean variety designated A1024300. Provided by the invention are the seeds, plants and derivatives of the soybean variety A1024300. Also provided by the invention are tissue cultures of the soybean variety A1024300 and the plants regenerated therefrom. Still further provided by the invention are methods for producing soybean plants by crossing the soybean variety A1024300 with itself or another soybean variety and plants produced by such methods. | 01-19-2012 |
David R. Wooten, Greenville, SC US
Patent application number | Description | Published |
---|---|---|
20160112203 | Trust Service for a Client Device - Techniques for a trust service for a client device are described. In various implementations, a trust service is implemented remotely from a client device and provides various trust-related functions to the client device. According to various implementations, communication between a client device and a remote trust service is authenticated by a client identifier (ID) that is maintained by both the client device and the remote trust service. In at least some implementations, the client ID is stored on a location of the client device that is protected from access by (e.g., is inaccessible to) device components such as an operating system, applications, and so forth. Thus, the client ID may be utilized to generate signatures to authenticate communications between the client device and the remote trust service. | 04-21-2016 |
David R. Wooten, Rochester, IL US
Patent application number | Description | Published |
---|---|---|
20110010793 | Methods and Compositions for Increased Yield - The invention overcomes the deficiencies of the art by providing methods for breeding soybean plants containing genomic regions associated with the pubescence alleles, T and Td, associated with increased grain yield. In addition, the invention provides the locus for Td. Moreover, the invention includes germplasm and the use of germplasm containing genomic regions conferring increased yield for introgression into elite germplasm in a breeding program. Moreover, the invention provides methods of purifying soybean breeding lines for such traits as flower color and pubescence color at early stages, such as seed. The invention also provides derivatives, and plant parts of these plants and uses thereof. | 01-13-2011 |
David R. Wooten, Redmond, WA US
Patent application number | Description | Published |
---|---|---|
20090089568 | Securely Launching Encrypted Operating Systems - Tools and techniques for securely launching encrypted operating systems are described herein. The tools may provide computing systems that include operating systems (OSs) that define boot paths for the systems. This boot path may include first and second OS loader components. The first loader may include instructions for retrieving a list of disk sectors from a first store, and for retrieving these specified sectors from an encrypted second store. The first loader may also store the sectors in a third store that is accessible to both the first and the second loader components, and may invoke the second loader to try launching the OS using these sectors. In turn, the second loader may include instructions for retrieving these sectors from the third store, and for unsealing a key for decrypting these sectors. The second loader may then decrypt these sectors, and attempt to launch the OS from these sectors. | 04-02-2009 |
20090100516 | Secure Bait and Switch Resume - Procedures for resumption from a low activity condition are discussed. In implementations, a persistent state file, or a portion thereof, is secured via an encryption algorithm, with the decryption key secured via the operating system (OS) login user credentials. Once a user is authenticated via the OS login, the persistent state file may be decrypted and inserted in the OS boot path with resumption occurring through the persistent state file. | 04-16-2009 |
20090327705 | ATTESTED CONTENT PROTECTION - The present invention extends to methods, systems, and computer program products for protecting content. Embodiments of the invention permit a local machine increased participation in authorizing access to protected content. An operating system attests to a computing environment at a corresponding computer system. If the computing environment is one permitted to access protected content, the operating system is permitted to regulate further (e.g., application) access to protected content in accordance with a procreation policy. As such, authorization decisions are partially distributed, easing the resource burden on a content protection server. Accordingly, embodiments of the invention can facilitate more robust and efficient authorization decisions when access to protected content is requested. | 12-31-2009 |
20110209213 | AUTHORIZATION LOGIC IN MEMORY CONSTRAINED SECURITY DEVICE - Architecture that utilizes logical combinations (e.g., of Boolean logic) of authorizations as a logical authorization expression that is computed through a proofing process to a single proof value which equates to authorizing access to an intended entity. The authorizations are accumulated and processed incrementally according to an evaluation order defined in the authorization expression. The logical combinations can include Boolean operations that evaluate to a proof value associated with a sum of products expression (e.g., combinations of AND, OR, etc.). The incremental evaluations output corresponding hash values as statistically unique identifiers used in a secure hash algorithm that when evaluated in order allow execution of a specific command to access the entity. The architecture, employed in a trust module, uses minimal internal trust module state, and can be employed as part of a device system that handles trust processing to obtain authorization to access the intended entity. | 08-25-2011 |
20130054946 | DIGITAL SIGNING AUTHORITY DEPENDENT PLATFORM SECRET - In accordance with one or more aspects, a representation of a configuration of a firmware environment of a device is generated. A secret of the device is obtained, and a platform secret is generated based on both the firmware environment configuration representation and the secret of the device. One or more keys can be generated based on the platform secret. | 02-28-2013 |
20140137178 | ATTACK PROTECTION FOR TRUSTED PLATFORM MODULES - A trusted platform module stores information in a protected object having an associated policy. A program requesting access to the information is allowed to access the information if the policy is satisfied, and is denied access to the information if the policy is not satisfied. The trusted platform module uses one or more monotonic counters associated with the protected object to track attempts to access the information. If a threshold number of unsuccessful requests to access the information are received, then the trusted platform module locks the information to prevent the program from accessing the information for an indefinite amount of time. | 05-15-2014 |
20140258700 | DYNAMICALLY LOADED MEASURED ENVIRONMENT FOR SECURE CODE LAUNCH - A “Secure Code Launcher” establishes platform trustworthiness, i.e., a trusted computing base (TCB), and uses hardware or firmware based components to securely launch one or more software components. The Secure Code Launcher measures and loads software components by interfacing with security extension functionality integral to one or more hardware or firmware-based components in the computing device. For example, various embodiments of the Secure Code Launcher include firmware-based components that interface with security extension functionality integral to the computing device to measure and load boot managers, operating system (OS) loaders, or other OS components including OS kernels. Similarly, the Secure Code Launcher is capable of measuring and loading software components responsible for installing an instance of an OS. In addition, various embodiments of the Secure Code Launcher provide a hypervisor loader that measures and loads a hypervisor which in turn measures and loads operating system components including virtual machines. | 09-11-2014 |
20140373135 | AUTHORIZATION LOGIC IN MEMORY CONSTRAINED SECURITY DEVICE - Architecture that utilizes logical combinations (e.g., of Boolean logic) of authorizations as a logical authorization expression that is computed through a proofing process to a single proof value which equates to authorizing access to an intended entity. The authorizations are accumulated and processed incrementally according to an evaluation order defined in the authorization expression. The logical combinations can include Boolean operations that evaluate to a proof value associated with a sum of products expression (e.g., combinations of AND, OR, etc.). The incremental evaluations output corresponding hash values as statistically unique identifiers used in a secure hash algorithm that when evaluated in order allow execution of a specific command to access the entity. The architecture, employed in a trust module, uses minimal internal trust module state, and can be employed as part of a device system that handles trust processing to obtain authorization to access the intended entity. | 12-18-2014 |
David Rudolph Wooten, Redmond, WA US
Patent application number | Description | Published |
---|---|---|
20090125716 | COMPUTER INITIALIZATION FOR SECURE KERNEL - Dynamic Root of Trust for Measurement (DRTM) mechanisms can be initiated, not by CPU-manufacturer-specific instructions, but by the execution of code in System Management Mode (SMM) that can modify the values stored in specific Platform Configuration Registers (PCRs) of a Trusted Platform Module (TPM). The SMM code can be verified prior to execution and it can be trusted based on the secure mechanisms used to update such code. The SMM code can restore a known, trusted state of the computing device and can initiate the measuring of subsequently executed code. In such a manner the Trusted Computing Base (TCB) can be limited. | 05-14-2009 |
20100088525 | EXTERNAL ENCRYPTION AND RECOVERY MANAGEMENT WITH HARDWARE ENCRYPTED STORAGE DEVICES - Hardware encrypting storage devices can provide for hardware encryption of data being written to the storage media of such storage devices, and hardware decryption of data being read from that storage media. To utilize existing key management resources, which can be more flexible and accommodating, mechanisms for storing keys protected by the existing resources, but not the hardware encryption of the storage device, can be developed. Dedicated partitions that do not have corresponding encryption bands can be utilized to store keys in a non-hardware-encrypted manner. Likewise, partitions can be defined larger than their associated encryption bands, leaving room near the beginning and end for non-hardware encrypted storage. Or a separate bit can be used to individually specify which data should be hardware encrypted. Additionally automated processes can maintain synchronization between a partition table of the computing device and a band table of the hardware encrypting storage device. | 04-08-2010 |
20150113266 | Secure Crypto-Processor Certification - The subject disclosure is directed towards certifying cryptographic data for a crypto-processor outside of a controlled environment. The crypto-processor and a certifying entity maintain shared secret data for the purpose of verifying security of cryptographic key generation by the crypto-processor's firmware. In order to certify new cryptographic keys, the crypto-processor uses the shared secret data to verify the crypto-processor's firmware/hardware to the certifying entity. By protecting the shared secret data from exposure to compromised firmware, the shared secret data may be used to compute another secret conveying to the certifying entity whether the firmware can be trusted or not. | 04-23-2015 |
Donald W. Wooten, Arlington, TX US
Patent application number | Description | Published |
---|---|---|
20080217496 | Shelf bracket and method of making same - A blank for forming a corner shelf bracket having a ledge and a plurality of side members. The blank has a first side portion and a second side portion, which can be bent to create the side members. The blank also has a third side portion created within either the first side portion or the second side portion which can be bent outwardly relative to the first side portion and the second side portion to attach to perpendicular faces of a corner stud support. In addition, the blank has a ledge portion for supporting a load when the blank is converted into a corner shelf bracket and a lip portion which can be bent to form a retaining member. The blank also has a plurality of stiffener portions which can be bent to create added stability when the blank is converted into the corner shelf bracket and attached to the corner stud support. The side portions, lip portion, stiffener portions and the ledge portion of the blank are all connected to the blank by a plurality of stress lines to facilitate bending of the blank into the corner shelf bracket. Connected to each of the stiffener portions are connector portions which connect to the corner stud support for added strength when the blank is converted into a shelf bracket. The blank also contains one or more ribs in the side portions and in the ledge portion to provide strength to the corner shelf bracket. | 09-11-2008 |
20100230568 | Shelf Bracket and Method of Making Same - A blank formable into a shelf bracket having a ledge portion positioned in between first and second side portions. The first and second side portions have outer sides. A first bend line is positioned between the ledge portion and the first side member and a second bend line is positioned between the ledge portion and the second side member. The first bend line and second bend line form weakened areas such that the first side member and second side member are manually bendable relative to the ledge portion. A first stiffener portion borders the outer side of the first side portion. A second stiffener portion borders the outer side of the second side portion. A first stiffener bend line is positioned between the first side portion and the first stiffener portion and a second stiffener bend line is positioned between the second side portion and the second stiffener portion. | 09-16-2010 |
20100313351 | PLUMBING FIXTURE PROTECTOR - A toilet bowl protector for protecting a finish of a toilet bowl, the toilet bowl including a bowl portion and a siphon tube disposed at a bottom of the bowl portion, the toilet bowl protector comprising a bowl shaped portion and an extension portion extending from the bowl shaped portion. | 12-16-2010 |
Donald W. Wooten, Dallas, TX US
Patent application number | Description | Published |
---|---|---|
20110162249 | MOUNTING ASSEMBLY AND METHODS OF USING SAME - A method for securing an accessory to a firearm. The method includes providing a body with an undercarriage portion which is shaped to matingly receive at least a portion of the undercarriage of the firearm, a trigger guard portion shaped to engage at least a portion of the trigger guard firearm, and a firearm connector portion which is constructed of a resilient deformable material which forms a snap-fit with a portion of the firearm in order to secure the body to the firearm. The body also has an accessory connector portion shaped to secure an accessory to the body. | 07-07-2011 |
Eric Wooten, Boston, MA US
Patent application number | Description | Published |
---|---|---|
20130040838 | METHODS FOR IDENTIFYING THE PRESENCE OF A BICUSPID AORTIC VALVE - The present invention features a method for identifying a subject with a bicuspid aortic valve (BAV) by detecting one or more single nucleotide polymorphisms (SNPs) present in one or more BAV-associated chromosomal regions (e.g., chromosomal regions containing the AXIN1-PDIA2, ENG, BAT2/3, or ZNF385D gene(s)). | 02-14-2013 |
Hasani Wooten, St. Louis, MO US
Patent application number | Description | Published |
---|---|---|
20150043801 | System and Method for the Validation and Quality Assurance of Computerized Contours of Human Anatomy - A system and method for validating the accuracy of delineated contours in computerized imaging using statistical data for generating assessment criterion that define acceptable tolerances for delineated contours, with the statistical data being conditionally updated and/or refined between individual processes for validating delineated contours to thereby adjust the tolerances defined by the assessment criterion in the stored statistical data, such that the stored statistical data is more closely representative of a target population. The present invention may be used to facilitate, as one example, on-line adaptive radiation therapy. | 02-12-2015 |
Hubert Kendall Wooten, Raeford, NC US
Patent application number | Description | Published |
---|---|---|
20140026930 | OUTDOOR SHELTER SYSTEM USING WATER VESSELS FOR FRAMEWORK - A shelter system includes a substantially cylindrical flexible cover, and two water vessels such as canoes, kayaks or the like. The vessels are positioned along opposite walls inside the flexible cover, with the vessels and flexible covers secured so as to retain the flexible cover in a taut, oblong position. A user may use the habitat established therein as they would normally use a tent. The system may include features such as rain flaps, bug netting flaps, and flap securing means. | 01-30-2014 |
James Edward Wooten, Sterling Heights, MI US
Patent application number | Description | Published |
---|---|---|
20150259953 | SELF-DRAINING KEYED CYLINDER INTEGRATED INTO DOOR TRIM - A vehicle door includes an outer panel and an inner frame defining a cavity, wherein a portion of the outer panel defines a generally downward outer surface. A trim member is attached to the outer surface, wherein the trim member and the outer surface define a cylinder receptacle in communication with the cavity. A keyed cylinder is disposed within the cylinder receptacle, wherein a longitudinal axis of the keyed cylinder is substantially normal to the outer surface, and the keyed cylinder slopes downward toward an outward surface of the trim member. The vehicle door also includes an internal locking mechanism and a key aperture of the keyed cylinder, wherein the internal locking mechanism includes a drain channel that slopes toward the key aperture and the cylinder receptacle, and wherein the drain channel is positioned parallel with the longitudinal axis of the keyed cylinder. | 09-17-2015 |
Jennifer L. Wooten, Winston-Salem, NC US
Patent application number | Description | Published |
---|---|---|
20090076920 | Multimedia restaurant system, booth and associated methods - A restaurant system may include multiple booths in at least part of a restaurant and a central computer in communication with each booth. Each booth may include a table having a table display, seating stations arranged around the table, the table being large enough to accommodate dining at each seating station, a wall having a wall display therein, the wall display positioned to be viewable from all seating stations, the wall display configured to display a common image, the table display configured to control the wall display, a booth computer in communication with the table display, the wall display, and the central computer, and an access point configured to allow access to restaurant workers and entry/exit to the booth. | 03-19-2009 |
20100179864 | Multimedia, multiuser system and associated methods - A table system includes a touch screen having a touch detection surface and a display, and a computer. The touch screen serves as an input device for the computer and the computer is configured to supply a continuous video signal to the display. The touch detection surface is configured to receive an object thereon without interference with detection, to send a first input to the computer in response to a first touch the computer configured to perform a first action on the touch screen in response thereto and, when a second touch occurs at a different location on the touch screen while the first action is being performed on the touch screen, to send a second input to the computer in response to the second touch, the computer being configured to perform a second action in response thereto, so that first and second actions are performed simultaneously. | 07-15-2010 |
20130147750 | MULTIMEDIA, MULTIUSER SYSTEM AND ASSOCIATED METHODS - A table system includes a touch screen having a touch detection surface and a display, and a computer. The touch screen serves as an input device for the computer and the computer is configured to supply a continuous video signal to the display. The touch detection surface is configured to receive an object thereon without interference with detection, to send a first input to the computer in response to a first touch the computer configured to perform a first action on the touch screen in response thereto and, when a second touch occurs at a different location on the touch screen while the first action is being performed on the touch screen, to send a second input to the computer in response to the second touch, the computer being configured to perform a second action in response thereto, so that first and second actions are performed simultaneously. | 06-13-2013 |
20130342489 | MULTIMEDIA, MULTIUSER SYSTEM AND ASSOCIATED METHODS - A table system includes a touch screen having a touch detection surface and a display, and a computer. The touch screen serves as an input device for the computer and the computer is configured to supply a continuous video signal to the display. The touch detection surface is configured to receive an object thereon without interference with detection, to send a first input to the computer in response to a first touch the computer configured to perform a first action on the touch screen in response thereto and, when a second touch occurs at a different location on the touch screen while the first action is being performed on the touch screen, to send a second input to the computer in response to the second touch, the computer being configured to perform a second action in response thereto, so that first and second actions are performed simultaneously. | 12-26-2013 |
20130346864 | MULTIMEDIA, MULTIUSER SYSTEM AND ASSOCIATED METHODS - A table system includes a touch screen having a touch detection surface and a display, and a computer. The touch screen serves as an input device for the computer and the computer is configured to supply a continuous video signal to the display. The touch detection surface is configured to receive an object thereon without interference with detection, to send a first input to the computer in response to a first touch the computer configured to perform a first action on the touch screen in response thereto and, when a second touch occurs at a different location on the touch screen while the first action is being performed on the touch screen, to send a second input to the computer in response to the second touch, the computer being configured to perform a second action in response thereto, so that first and second actions are performed simultaneously. | 12-26-2013 |
John R. Wooten, Simi Valley, CA US
Patent application number | Description | Published |
---|---|---|
20130209262 | METHOD OF MANUFACTURING AN AIRFOIL - Disclosed is a method of manufacturing an airfoil. The method includes establishing an Argon (Ar)-free environment, providing a bed within the Argon free environment, providing a set of data instructions for manufacturing the airfoil, and providing a powdered Nickel (Ni)-based alloy on the bed. In one example, the powdered Nickel (Ni)-based alloy consists essentially of about 4.8 wt. % Iron (Fe), about 21 wt. % Chromium (Cr), about 8.6 wt. % Molybdenum (Mo), about 0.07 wt. % Titanium (Ti), about 0.40% Aluminum (Al), about 5.01 wt. % Niobium (Nb), about 0.03 wt. % Carbon (C), about 0.14 wt. % Silicon (Si), and a balance Nickel (Ni). The method further includes fusing the powdered Nickel (Ni)-based alloy with an electron beam with reference to the data instructions to form the airfoil. | 08-15-2013 |
Orlando Wooten, Calumet City, IL US
Patent application number | Description | Published |
---|---|---|
20130232769 | Wallgrip screw - A fastener for securing drywall to wood or metal substrate. The fastener includes a dual threaded head drywall fastener with hexagon driving collar. The longer threaded side of fastener is driven directly into wood or metal substrate, the driving collar acts as a stopper, leaving the shorter threaded fastener side protruding from the wood or metal substrate. The shorten; threaded fastener side comes in direct contact with the drywall, by piercing and penetrating the unfinished side of drywall into fastener. The shorten side of fastener does not come threw the drywall finished side, forming a gripping effect to the paper and gypsum without damaging the finished side of the drywall. | 09-12-2013 |
Randall E. Wooten, Woodruff, SC US
Patent application number | Description | Published |
---|---|---|
20090040046 | Double-end fiber optic security system for sensing intrusions - A security system is disclosed for detecting intrusions at a plurality of predetermined locations having moveable closure members. The system comprises a plurality of intrusion sensors disposed at the locations for detecting movement of the closure members. Primary and secondary optical fiber sensor lines are routed through the intrusion sensors, and primary and secondary scanning units pulse signals along the sensor lines and receive reflected signals back from the sensor lines. A processor processes the reflected signals to determine if a reflection and/or attenuation change has occurred in a reflected pulse signal signifying a prescribed level of unauthorized intrusion activity which matches a signature intrusion signal. In the event of a cut through in the sensor lines, the primary sensor line monitors the sensors downstream of the break, and the secondary sensor line is activated to monitor the sensors downstream of the break. | 02-12-2009 |
Russ Wooten, Oxford, GA US
Patent application number | Description | Published |
---|---|---|
20090044328 | In-Line Bubble Reducer - An in-line bubble reducer for inducing turbulent flow in a liquid fluid stream in which gaseous bubbles are entrained. The bubble reducer includes a chamber with an inlet and an outlet, an axial flow diverter for directing the fluid stream outwardly and towards a subsequent annular flow diverter. The annular flow diverter extends from an inner wall of the chamber and induces turbulent flow in the fluid stream to reduce the size of the gaseous bubbles entrained in the fluid stream. | 02-19-2009 |
Russell Dudley Wooten, Mebane, NC US
Patent application number | Description | Published |
---|---|---|
20120012484 | BLIND PACKAGING AND METHODS OF CUTTING WINDOW COVERINGS - A package for a size-in-store window covering comprises a box having a first portion that extends for the width of the window covering and a second portion that extends for less than the width of the window covering. The window covering extends beyond an end of a bottom wall a first distance and the head rail extends beyond an end of a first side wall a second distance. A method of cutting a window covering comprises providing a window covering in a box as described above and positioning the box with the exposed portion of the window covering facing down and the exposed portion of the head rail facing a clamp. Methods of packaging a window covering comprise reducing the total number of loops in the window covering, and positioning inserts between adjacent components. | 01-19-2012 |
Shawn Wooten, Anchorage, AK US
Patent application number | Description | Published |
---|---|---|
20150298192 | BENDING INSTRUMENT AND METHODS OF USING SAME - Bending instruments for selectively applying a bending force to a rod or rod-like element, such as for example and without limitation, a surgical rod. Exemplary bending instruments include a first handle, a second handle, and a gear assembly. Pivotal movement of the second handle relative to the first handle effects a corresponding movement of the gear assembly components to thereby effect bending of the rod or rod-like element. | 10-22-2015 |
Steven De Wayne Wooten, Arizona City, AZ US
Patent application number | Description | Published |
---|---|---|
20090050067 | AQUATIC FARMING SYSTEMS - A system related to inland farming of seafood products within an environmentally-controlled seafood-farming environment. The seafood-farming environment is preferably established within at least one substantially buried space. The associated apparatus preferably comprises at least one nutrient supplier to supply adequate nutrients to at least one aqueous medium supporting the farming of the seafood, and at least one waste remover to remove unwanted waste from the aqueous medium. Surface crops are grown above and around the seafood-farming environment to maximize production within the farming site. A kit and methods of implementation are also discussed. | 02-26-2009 |
Timothy Carl Wooten, Shepherdsville, KY US
Patent application number | Description | Published |
---|---|---|
20090170046 | Jar candle with a candle disposed in the lid - The present invention is an adaptation of the common container candle. The container lid is formed so as to allow it to lay flat when turned on its crown. The base of the container lid contains a recess into which a candle is either formed or inserted in such a manner that when the lid is resting on its crown, the exposed wick of the lid candle rises vertically from the candle matrix. When the lid is engaged with the container, the exposed wick projects towards the container candle. | 07-02-2009 |
Timothy R. Wooten, Austin, TX US
Patent application number | Description | Published |
---|---|---|
20090276952 | POWER GENERATING WATER JET - An electrical power generating water jet for a spa, pool, or the like, having a stationary housing as a stator and at least one water jet as a rotor for generating electrical power when a pressurized fluid imparts movement of the jet relative to the stationary housing so as to generate an electrical charge during rotation of the jet to power an electrical circuit, such as a light source or an acoustic device. The electrical circuit may be carried in a user replaceable module, so as to change a defective light source, or to vary the display pattern or colors of the light source. | 11-12-2009 |
Todd Wooten, Holly Springs, NC US
Patent application number | Description | Published |
---|---|---|
20080238267 | Encoder arrangement on a direct current motor - An encoder arrangement of a direct current motor, having an encoder housing, an encoder disk, a circuit board arranged perpendicular in reference to an motor shaft with an optic sensor encompassing the encoder disk in a U-shaped manner, and a connection plug aligned parallel to the motor shaft. The encoder arrangement allows a simple, economical, reliable, and precise assembly, requiring little construction space, and protecting the encoder arrangement from contaminations. The circuit board is provided with accepting slots for connectors, with contact surfaces of the circuit board being arranged partially around the accepting slots and an electric contact is made between the connectors and the contract surfaces. The encoder housing comprises an encoder housing ring and an encoder housing lid. The encoder housing ring is provided with a radial recess, which is arranged in the area of the connector plug. The optical sensor is arranged on the circuit board at the side of the connector plug, and is provided with an accepting slot for the encoder disk, which accepting slot being open towards the motor shaft on which the encoder disk is mounted. The accepting slots are open on the side of the direct current motor opposite the connection plug and towards the edge of the circuit board. | 10-02-2008 |