Patent application number | Description | Published |
20140069874 | METHOD OF FILTERING A LIQUID WITH A FILTER ASSEMBLY HAVING A PRIMARY AND A SECONDARY FILTER - An oil filter assembly is disclosed for a machine, such as an internal combustion engine, that has an oil output port and an oil input port. A mounting plate may be fixed with an outer enclosure and may be adapted for securing to the machine. The mounting plate may be further adapted to conduct oil from the machine into a peripheral portion of the outer enclosure, and then returning oil from a central portion of the outer enclosure back to the machine. Oil may pass from the peripheral portion to the central portion through a primary filter having a first porosity. A pressure-actuated valve may be fixed fluidly between the peripheral portion and central portion of the outer enclosure. Oil may pass through the pressure-actuated valve only when an oil pressure differential between the peripheral portion and the central portion of the outer enclosure exceeds a predetermined threshold pressure. A secondary filter may have a second porosity greater than the first porosity, and may be fixed fluidly between the pressure-actuated valve and the central portion of the outer enclosure. | 03-13-2014 |
20140082910 | METHOD OF EXCHANGING A FILTER ASSEMBLY - A method for exchange of a filter assembly is described, wherein a contaminated filter assembly is exchanged for a refurbished filter assembly or a new filter assembly. | 03-27-2014 |
20140190527 | METHOD FOR FILTERING A LIQUID - An oil filter assembly is disclosed for a machine, such as an internal combustion engine, that has an oil output port and an oil input port. A mounting plate is fixed with an outer enclosure. The mounting plate is further adapted to conduct oil from the machine into a peripheral portion of the outer enclosure, and then returning oil from a central portion of the outer enclosure back to the machine. Oil may pass from the peripheral portion to the central portion through a primary filter having a first porosity. A pressure-actuated valve is fixed fluidly between the portions of the outer enclosure. | 07-10-2014 |
Patent application number | Description | Published |
20080208868 | SYSTEM AND METHOD OF CONTROLLING ACCESS TO THE INTERNET - Certain embodiments provide for systems and methods of monitoring data sent from a requested device to a requesting device and removing certain portions of the data such as malicious or otherwise objectionable content. Objectionable content may include, for example, potentially executable web content. In certain embodiments, the systems and methods remove uniform resource locator (URL) links from the intercepted data which point to web pages having malicious or otherwise objectionable content. | 08-28-2008 |
20110252478 | SYSTEM AND METHOD OF ANALYZING WEB CONTENT - A system and method are provided for identifying inappropriate content in websites on a network. Unrecognized uniform resource locators (URLs) or other web content are accessed by workstations and are identified as possibly having malicious content. The URLs or web content may be preprocessed within a gateway server module or some other software module to collect additional information related to the URLs. The URLs may be scanned for known attack signatures, and if any are found, they may be tagged as candidate URLs in need of further analysis by a classification module. | 10-13-2011 |
20140115699 | SYSTEM AND METHOD FOR ANALYZING WEB CONTENT - A system and computer based method are provided for identifying active content in websites on a network. One embodiment includes a computer based method of classifying web content. The method receives content of a web page, and determines a first property associated with the content, the first property including static content. The method executes active content associated with the webpage, and determines a second property associated with the content based at least in part on the executing, the second property including the active content. The method also evaluates a logical expression relating the first property and the second property, and associates the web page with a category based on a result of the evaluation. The evaluation of the logical expression at least in part evaluates whether a constant value matches at least a portion of the content of the web page. | 04-24-2014 |
20150180899 | SYSTEM AND METHOD OF ANALYZING WEB CONTENT - Computer-implemented methods and systems for categorizing a uniform resource locator (URL) based on web content associated with the URL are disclosed. In one aspect, a method includes identifying a first URL using a first URL collection method, assigning, using an electronic processor, a first categorization priority to the first URL based on the first URL being identified using the first URL collection method, categorizing, the first URL based on the first categorization priority, identifying a second URL using a second URL collection method, assigning, using an electronic processor, a second categorization priority different than the first categorization priority based on the second URL having been identified using the second URL collection method; and categorizing, using an electronic processor, the second URL based on the second categorization priority. | 06-25-2015 |
20150215326 | SYSTEM AND METHOD FOR ANALYZING WEB CONTENT - A system and computer based method are provided for identifying active content in websites on a network. In one aspects, a method for classifying web content includes determining a first property associated with static content of a web page, determining a second property associated with the content of the web page based at least in part on active content associated with the web page, evaluating a logical expression relating the first property and the second property, at least in part by evaluating whether a constant value matches at least a portion of the content of the web page, associating the web page with a category based on a result of the evaluation, and determining whether to allow network access to the web page based on the category. | 07-30-2015 |
Patent application number | Description | Published |
20080307489 | SYSTEM AND METHOD FOR ADDING CONTEXT TO PREVENT DATA LEAKAGE OVER A COMPUTER NETWORK - Systems and methods for adding context to prevent data leakage over a computer network are disclosed. Data is classified and contextual information of the data is determined. A transmission policy is determined in response to the classification and contextual information. The data is either transmitted or blocked in response to the classification and the contextual information | 12-11-2008 |
20090241196 | METHOD AND SYSTEM FOR PROTECTION AGAINST INFORMATION STEALING SOFTWARE - A system and method for identifying infection of unwanted software on an electronic device is disclosed. A software agent configured to generate a bait and is installed on the electronic device. The bait can simulate a situation in which the user performs a login session and submits personal information or it may just contain artificial sensitive information. Parameters may be inserted into the bait such as the identity of the electronic device that the bait is installed upon. The output of the electronic device is monitored and analyzed for attempts of transmitting the bait. The output is analyzed by correlating the output with the bait and can be done by comparing information about the bait with the traffic over a computer network in order to decide about the existence and the location of unwanted software. Furthermore, it is possible to store information about the bait in a database and then compare information about a user with the information in the database in order to determine if the electronic device that transmitted the bait contains unwanted software. | 09-24-2009 |
20100115615 | SYSTEM AND METHOD FOR DYNAMIC AND REAL-TIME CATEGORIZATION OF WEBPAGES - A system and method for categorizing content on a webpage is disclosed. The method comprises receiving a request for a webpage from a user's computer. Next, the system determines whether there is dynamic content on the webpage by analyzing the address, links, reputation, type, style and other indicators of being able to easily change the webpage. If the webpage contains content that can be changed, then the webpage is analyzed to determine a current categorization thereof. If the webpage does not have dynamic content then the categorization of the webpage will remain the same thereby freeing system resources by only analyzing dynamic webpages. | 05-06-2010 |
20150143476 | SYSTEM AND METHOD FOR ADDING CONTEXT TO PREVENT DATA LEAKAGE OVER A COMPUTER NETWORK - Systems and methods for adding context to prevent data leakage over a computer network are disclosed. Data is classified and contextual information of the data is determined. A transmission policy is determined in response to the classification and contextual information. The data is either transmitted or blocked in response to the classification and the contextual information | 05-21-2015 |
20150220732 | METHOD AND SYSTEM FOR PROTECTION AGAINST INFORMATION STEALING SOFTWARE - A system and method for identifying infection of unwanted software on an electronic device is disclosed. A software agent configured to generate a bait and is installed on the electronic device. The bait can simulate a situation in which the user performs a login session and submits personal information or it may just contain artificial sensitive information. Parameters may be inserted into the bait such as the identity of the electronic device that the bait is installed upon. The output of the electronic device is monitored and analyzed for attempts of transmitting the bait. The output is analyzed by correlating the output with the bait and can be done by comparing information about the bait with the traffic over a computer network in order to decide about the existence and the location of unwanted software. Furthermore, it is possible to store information about the bait in a database and then compare information about a user with the information in the database in order to determine if the electronic device that transmitted the bait contains unwanted software. | 08-06-2015 |
Patent application number | Description | Published |
20120277572 | Method to Diagnose and Measure Vascular Drainage Insufficiency in the Central Nervous System - Neurodegenerative diseases, such as multiple sclerosis, may be caused or aggravated by insufficient venous draining from the central nervous system. Functional MRI measures the surge of blood flow into localized regions of cerebral cortex in response to activation of those regions by performing visual, auditory or executive tasks. These fMRI measurements are based on blood-oxygen-level dependence. The resulting fMRI/BOLD data is converted to hemodynamic response data and analyzed to determine any abnormality in the hemodynamic response data. Vascular drainage insufficiency is identified in the presence of abnormal hemodynamic response data. Abnormal hemodynamic response data can be determined by a negative trough in a graph of the HDR data or by the duration, depth, or area of the negative trough. | 11-01-2012 |
20140121498 | Method To Diagnose and Measure Vascular Drainage Insufficiency in the Central Nervous System - Neurodegenerative diseases, such as multiple sclerosis, may be caused or aggravated by insufficient venous draining from the central nervous system. Functional MRI measures the surge of blood flow into localized regions of cerebral cortex in response to activation of those regions by performing visual, auditory or executive tasks. These fMRI measurements are based on blood-oxygen-level dependence. The resulting fMRI/BOLD data is converted to hemodynamic response data and analyzed to determine any abnormality in the hemodynamic response data. Vascular drainage insufficiency is identified in the presence of abnormal hemodynamic response data. Abnormal hemodynamic response data can be determined by a negative trough in a graph of the HDR data or by the duration, depth, or area of the negative trough. | 05-01-2014 |
20140275960 | FUNCTIONAL MAGNETIC RESONANCE IMAGING BIOMARKER OF NEURAL ABNORMALITY - Systems and methods for application of fMRI as a biomarker of neural abnormalities are presented. A subject's activations of brain regions that occur while performing cognitive tasks in an fMRI scanning apparatus are measured. The resulting measurements are compared to the activations of brain regions that occur during each cognitive task for a control group. The comparison to the performance and brain activations of normal subjects determine the presence of cortical compensatory mechanisms that indicate neural abnormalities in the subject. | 09-18-2014 |
Patent application number | Description | Published |
20110072739 | Isolation Bearing Restraint Devices - Bearing retention devices and methods for their use in isolation bearings such as seismic bearings. | 03-31-2011 |
20110222800 | Methods and Compositions for Isolating a Payload from Vibration - Improved isolation bearings, platforms, and tracks are disclosed for protecting a payload, for example delicate computer equipment such as a hard disk drive, from damage due to vibrations, such as seismic vibrations, as well as weaker vibrations due to HDD, motorized equipment, air conditioning, heating systems, and the like. The isolation platforms and bearings combine a plurality of shapes on their load bearing surfaces to increase stability of the payload even when subjected to vibrations of high velocity or intensity, and preferably have an elastomeric coating on all but a central portion of the load-bearing surfaces of the bearing plates. | 09-15-2011 |
20120266558 | Seismically Stable Flooring - Methods and systems for isolating objects from seismic vibration, isolation flooring systems, vibrational damping devices, and methods for their use are disclosed. The present invention has the advantage of having a minimum of moving parts, and being extraordinarily easy to install and inspect. In preferred embodiments, the invention is drawn to methods of isolating sensitive objects from the full extent of seismic vibrations. | 10-25-2012 |
20130119224 | Composite Isolation Bearings - Improved isolation bearings, platforms, and tracks are disclosed for protecting a payload, such as delicate equipment, from damage due to vibrations, such as seismic vibrations. The isolation platforms and bearings combine a plurality of shapes on their load bearing surfaces to increase stability of the payload even when subjected to vibrations of high velocity or intensity. | 05-16-2013 |
20140291475 | Seismic Isolation Systems - Improved isolation flooring systems, and methods for their use are disclose for protecting a payload, such as heavy or delicate equipment (such as laboratory or computer equipment), from damage due to vibrations, such as seismic vibrations. In preferred embodiments, the invention is drawn to methods of isolating heavy and/or sensitive objects from the full acceleration of seismic vibrations. | 10-02-2014 |
20150101269 | Modular Isolation Systems - A modular base isolation system suitable for constructing isolation floors and platforms using the same elements, and capable of scaling up or down to suit the payload mass. These systems are low profile and permit placement of such systems un paces having restricted headroom. Also kits and methods or making and using such modular isolation systems. | 04-16-2015 |
Patent application number | Description | Published |
20090118996 | System and method for determining a prediction of average speed for a segment of roadway - The present invention provides a system and method for determining the necessary departure time to allow for an on-time or desired arrival time at a particular location over a particular route based on the evaluation of historic, present, and predicted road conditions. | 05-07-2009 |
20100268456 | SYSTEM AND METHOD FOR DELIVERING DEPARTURE NOTIFICATIONS - The present invention provides a system and method for determining the necessary departure time to allow for an on-time or desired arrival time at a particular location over a particular route based on the evaluation of historic, present, and predicted road conditions. | 10-21-2010 |
20120150422 | SYSTEM AND METHOD FOR DELIVERING DEPARTURE NOTIFICATIONS - The present invention provides a system and method for determining the necessary departure time to allow for an on-time or desired arrival time at a particular location over a particular route based on the evaluation of historic, present, and predicted road conditions. | 06-14-2012 |
20130131976 | POSITION ACCURACY TESTING SYSTEM - Accuracy of a positioning device may be determined without requiring the device to be at any specific location, such as a test location. Instead of comparing the reported location and directional data to a known location and directional data, the present technology may use multiple discrete location and directional reports for comparison with the reported data at multiple locations. The multiple comparisons are used to assess the relative accuracy of the positional telematics system. The reported location may be a GPS location or from another positioning system. | 05-23-2013 |
20140129142 | SYSTEM AND METHOD FOR DELIVERING DEPARTURE NOTIFICATIONS - The present invention provides a system and method for determining the necessary departure time to allow for an on-time or desired arrival time at a particular location over a particular route based on the evaluation of historic, present, and predicted road conditions. | 05-08-2014 |
20150206355 | FLEET MANAGER BASED VEHICLE CONTROL - A fleet manager may communicate desired driving behavior, including maximum speed, desired route, areas to avoid, and other information to operators of vehicles in the fleet. The communication may be via an application on a mobile device, vehicle computer, or other device associated with each driver or vehicle. In operation, an administrator, such as, for example, a fleet manager, may communicate instructions to one or more vehicles, for example a vehicle of a fleet of vehicles. | 07-23-2015 |
20150206436 | IDENTIFICATION OF DRIVER ABNORMALITIES IN A TRAFFIC FLOW - Driving behavior may be analyzed based on other vehicles in proximity to a tracked or monitored vehicle. GPS data is collected from the monitored vehicle and other vehicles in physical or geographic proximity thereto. A determination is made as to whether the vehicle in the physical or geographical area is exhibiting aberrant behavior. The aberrant behavior may be determined in view of other vehicles in the geographical area. If aberrant behavior is detected, an alert may be generated and transmitted to an administrator. | 07-23-2015 |
20160047667 | SYSTEM AND METHOD FOR DELIVERING DEPARTURE NOTIFICATIONS - The present invention provides a system and method for determining the necessary departure time to allow for an on-time or desired arrival time at a particular location over a particular route based on the evaluation of historic, present, and predicted road conditions. | 02-18-2016 |
20160102981 | POSITION ACCURACY TESTING SYSTEM - Accuracy of a positioning device may be determined without requiring the device to be at any specific location, such as a test location. Instead of comparing the reported location and directional data to a known location and directional data, the present technology may use multiple discrete location and directional reports for comparison with the reported data at multiple locations. The multiple comparisons are used to assess the relative accuracy of the positional telematics system. The reported location may be a GPS location or from another positioning system. | 04-14-2016 |
Patent application number | Description | Published |
20160070777 | SYSTEM AND METHOD FOR CONTENT COLLECTION, CATALOGING, AND COLLABORATION - Mobile and Web applications for the collection of digital media (photos, video, audio, documents, etc.), cataloging (using metadata in the form of tags), and collaborating (using storage and collaboration software). The applications allow an individual to collect digital content by using the native capabilities on their mobile device, or by uploading content already captured (in storage) and associating it with Events and Sessions. Additionally, individuals may capture or upload digital media without associating it with either Events or Sessions at the time of capture or upload, to later make these associations. Events, Sessions, and digital media are automatically (by the application) tagged with date, time, user, and location, while also allowing other stored and/or newly created tags to be added at the time of capture or upload, or later, as desired. Other individuals may be given permission to view or modify Events and/or Sessions, and to view digital media by the owner or contributor of the Event or Session. While accessing a Session, other individuals may be invited to participate in a live collaboration and view all content, as well as participate/contribute via their computer or a mobile device, and participate in a one-to-many video conference. All content is stored in the cloud, and audited through the use of Activity logs which capture all adds/changes/deletes to the database. | 03-10-2016 |
Patent application number | Description | Published |
20130318614 | MOBILE APPLICATION SECURITY ASSESSMENT - The security of mobile applications may be assessed and used to enhance the security of mobile devices. In one example, a method may include determining security scores of one or more mobile applications, the security scores defining a level of security risk corresponding to the one or more mobile applications. The method may further include receiving a policy relating to mobile applications that are permitted to be used by the mobile device, the policy including a threshold security score value; and receiving the requested security scores. The method may further include restricting use of selected ones of the one or more mobile applications when a security score corresponding to the one or more mobile applications is below the threshold security score value. | 11-28-2013 |
20140380413 | MOBILE APPLICATION SECURITY ASSESSMENT - The security of mobile applications may be assessed and used to enhance the security of mobile devices. In one example, a method may include determining security scores of one or more mobile applications, the security scores defining a level of security risk corresponding to the one or more mobile applications. The method may further include receiving a policy relating to mobile applications that are permitted to be used by the mobile device, the policy including a threshold security score value; and receiving the requested security scores. The method may further include restricting use of selected ones of the one or more mobile applications when a security score corresponding to the one or more mobile applications is below the threshold security score value. | 12-25-2014 |
20150067798 | SELECTIVE COMPLEX DATA ENTRY FROM ONE TIME PASSWORDS FOR AUTHENTICATION - A one time password (OTP) associated with a client device, and a padding rule, of a plurality of possible padding rules, associated with the client device may be determined. A padded OTP that include the OTP and additional data may be formed based on the padding rule. The padding rule may be associated with at least one of a position of the OTP within the padded OTP, a characteristic of the additional data, or a characteristic of the padded OTP. The padded OTP may be provided to the client device. A selection of a portion of the padded OTP may be received from the client device, and the client device may be authenticated when the selected portion of the padded OTP corresponds to the OTP. If the selected portion of the padded OTP does not correspond to the OTP, other actions may be performed based on the selected portion. | 03-05-2015 |
20150189490 | ORCHESTRATING USER DEVICES TO FORM IMAGES AT VENUE EVENTS - A method, performed by one or more computer devices, may include generating a sequence script for a venue event, wherein the sequence script is configured to synchronize a plurality of user devices located at the venue during the venue event to form one or more images discernable when the devices are viewed collectively. The method may further include obtaining user registration information associated with the venue event, wherein the user registration information identifies user devices registered to participate in the generation of the one or more images; detecting a trigger event associated with the sequence script; and orchestrating the plurality of user devices to form the one or more images, in response to detecting the trigger event. | 07-02-2015 |
20150271742 | METHOD, APPARATUS, AND SYSTEM FOR NETWORK IDENTIFIER SUPRESSION - A method, apparatus, and system for detection of a network are described. A network list indicating a plurality of network identifiers associated with a mobile device is determined. Each network identifier identifies one or more access points for a respective wireless network. Locality information is determined based on one or more sensors of the mobile device. At least one of the plurality of network identifiers is selected based on the locality information. And a transmission of the selected network identifiers by the mobile device is initiated. | 09-24-2015 |
Patent application number | Description | Published |
20100042834 | SYSTEMS AND METHODS FOR PROVISIONING NETWORK DEVICES - A method performed by a network device may include generating and storing a first public key and a first private key in a first device, transmitting a serial number and the first public key from the first device to a second device, generating, by the second device, a second public key and a second private key, transmitting the second public key from the second device to the first device and transmitting the serial number, the first public key, the second public key and the second private key to a third device, establishing and authenticating a connection between the first device and the third device using the first public key and the second public key and transmitting encrypted configuration information with the two key pairs from the third device to the first device. | 02-18-2010 |
20120239775 | TRANSPARENT PROXY CACHING OF RESOURCES - A device receives, from a client device, a request for a resource available from an origin device, and determines whether the resource is cached in a cache server. When the resource is cached, the device provides a first command instructing the client device to request the resource from the cache server, receives, from the client device, a first new request for the resource, and enables, based on the first new request, the client device to receive the resource from the cache server. When the resource is not cached, the device creates a firewall filter, provides a second command instructing the client device to request the resource from the origin device, receives, via the firewall filter and from the client device, a second new request for the resource, and enables, based on the second new request, the client device to receive the resource from the origin device. | 09-20-2012 |
Patent application number | Description | Published |
20100220596 | System and method for optimizing the routing of multimedia content - A system for optimizing the routing of data to a subscriber's device. The novel system includes a first sub-system for obtaining records on when each of a plurality of routing methods was available to the device during a predetermined period of time and a second sub-system for recommending a time and routing method to deliver data to the device based on the records. In an illustrative embodiment, the first sub-system includes an applet stored in and executed by the device adapted to monitor what routing methods are available to the device and record what routing methods were available at what times in a data file. The second sub-system includes a neural network artificial intelligence engine adapted to analyze the recorded data to predict when routing methods will be available to the device and identify an optimum time and routing method that minimizes a cost for delivering the data. | 09-02-2010 |
20100223093 | System and method for intelligently monitoring subscriber's response to multimedia content - A system for monitoring a subscriber's behavior. The novel system includes a first sub-system for obtaining a subscriber's responses to multimedia content previously delivered to the subscriber's device and a second sub-system for modifying a profile on the subscriber based on these responses. In an illustrative embodiment, the profile includes data on the subscriber's personal preferences on a plurality of categories, and the second sub-system includes a neural network artificial intelligence engine adapted to automatically refine the personal preferences based on the responses to previous content. The first sub-system includes an applet stored in and executed by the subscriber's device that records the subscriber's responses and actions in a data file and transmits the data file to the second sub-system. The second sub-system receives the recorded responses and actions from the applet and updates the subscriber's profile accordingly. | 09-02-2010 |
20100223637 | System and method for optimizing the pricing of multimedia content delivery - A system for setting a price for delivering multimedia content to subscribers' devices. The novel system includes a first sub-system for obtaining data on subscribers' actions on their devices and a second sub-system for determining a price to charge a content provider to deliver multimedia content to the devices based on this data. In an illustrative embodiment, the first sub-system includes an applet stored in and executed by each device adapted to record the subscriber's actions on the device, including the subscriber's responses to content previously delivered to the device. The second sub-system includes a neural network artificial intelligence engine adapted to determine a responsiveness of each subscriber based on their responses to previously delivered content and adjust the price based on the responsiveness of the subscribers selected to receive new content. | 09-02-2010 |
20100223638 | System and method for optimizing the scheduling of multimedia content - A system for optimizing the scheduling of multimedia content for playback on a subscriber's device. The novel system includes a first sub-system for obtaining data on a subscriber's actions on the device and a second sub-system for recommending a playback time for new multimedia content based on the data. In an illustrative embodiment, the first sub-system includes an applet stored in and executed by the device adapted to record the subscriber's actions on the device, including the actual playback times of and the subscriber's responses to content previously delivered to the device. The second sub-system includes a neural network artificial intelligence engine adapted to analyze the subscriber's recorded actions to predict at what time the new content should be scheduled for playback on the device to maximize subscriber acceptance of the new content. | 09-02-2010 |
20100223641 | System and method for predicting the optimum delivery of multimedia content based on human behavior patterns - A system for optimizing the delivery of multimedia content to subscribers' devices. The novel system includes a first sub-system for obtaining data on subscribers' actions on their devices and a second sub-system for recommending a delivery solution for new content based on the obtained data. In an illustrative embodiment, the second sub-system includes a neural network artificial intelligence engine adapted to predict how subscribers will respond to new content based on their monitored responses to previous content, and identify subscribers predicted to have a positive response to the new content. Optionally, the second sub-system may also identify one or more subgroups of subscribers predicted not to have a positive response to the new content and recommend modifications to the content to improve the response of these subscribers. | 09-02-2010 |