Garay
Csaba Zoltán Garay, Adliswil CH
Patent application number | Description | Published |
---|---|---|
20140232564 | ASSESSING TRAFFIC STATUS WITH SENSORS - A computer-implemented method for assessing traffic status with sensors is provided. The method includes receiving sensor readings from a plurality of mobile sensors for detecting a traffic parameter and obtaining traffic information associated with the received sensor readings. The method also includes identifying a change in traffic based on the obtained traffic information and the received sensor reading, and determining whether a traffic incident has occurred based on the identified change. Systems and machine-readable media are also provided. | 08-21-2014 |
Ernesto Garay, Gresham, OR US
Patent application number | Description | Published |
---|---|---|
20150198715 | DROP DETECTION - A system for drop detection of fluid drops ejected by a printing device includes a drop detector comprising a radiation source and radiation sensor for illuminating a region in which drops are ejected by a print bar and detecting radiation from the radiation source that is reflected by backscattering from the drops to the radiation sensor; and a controller for controlling the drop detector and the print bar, wherein the controller uses a signal output by the drop detector to determine whether nozzles of the print bar are operating properly. | 07-16-2015 |
Gerardo Rodriguez Garay, Chihuahua MX
Patent application number | Description | Published |
---|---|---|
20090044571 | Knitted Glove with Controlled Stitch Stretch Capability and enhanced cuff - A knitted glove made by creating each of the at least fifteen sections using a separate knitting course on a flat knitting machine providing varying stitch dimensions with one or two yarns in one or more sections. Custom stretch characteristics can be provided using one or two yarns providing a tight glove that provides flexibility and ease of movement. The varying stitch dimension is achieved by 1) varying the depth of penetration of the knitting needle into fabric being knitted by a computer program, 2) adjusting the tension of yarn between a pinch roll and knitting head by a mechanism controlled by a computer and/or 3) casting off or picking up additional stitches in a course. The glove includes four finger components, a thumb component, two palm components, and a wrist component. A padded cuff section can be added to the wrist component for comfort. | 02-19-2009 |
20130213094 | ZONAL CUT RESISTANT GLOVE - Embodiments of the invention include knitted gloves having a cut-resistant yarn in at least one knitted zone of a glove and further including one or more yarns knitted into other knitted zones of the glove in which at least one zone has vertically knitted courses. | 08-22-2013 |
Gerardo Rodriguez Garay, Juarez MX
Patent application number | Description | Published |
---|---|---|
20090211305 | Knitted Glove - A knitted glove made by creating each of the sections of the glove using a separate knitting course on a flat knitting machine providing variable stitch dimensions. Each of these sections provides its own designed stretch characteristics so that the glove fits tightly, yet provides flexibility and ease of movement. The variable stitch dimension is achieved by 1) varying the depth of penetration of a knitting needle into a fabric being knitted by a computer program, 2) adjusting the tension of yarn between a pinch roller and a knitting head by a mechanism controlled by a computer, and 3) casting off or picking up additional stitches in a course. The glove includes a plurality of finger components made from at least ten separately knitted sections, two palm components, each of which is made from at least two separately knitted sections, and a wrist component made from at least one knitted section. | 08-27-2009 |
Gregory Terrence Garay, West Chester, OH US
Patent application number | Description | Published |
---|---|---|
20080253898 | DAMPER CONFIGURED TURBINE BLADE - A turbine rotor blade includes a hollow airfoil joined to a platform and dovetail. A main flow channel extends longitudinally in span through the blade and is bound chordally by opposite partitions transversely bridging opposite sidewalls of the airfoil. A damper rib and transversely opposite damper pad are arranged together in a plurality of pairs spaced longitudinally apart in the airfoil and chordally positioned intermediate to the partitions to provide unobstructed forward and aft portions of the flow channel for channeling a coolant therethrough. The damper ribs and pads are configured to receive a wire damper through the channel to locally dampen vibration while minimizing obstruction of the coolant flow therethrough. | 10-16-2008 |
Juan Garay, Guttenburg, NJ US
Patent application number | Description | Published |
---|---|---|
20110153503 | Device and Method for Identity Theft Resistant Transcations - An authorization device includes an input module, a key generator, and an output module. The input module receives a request to authorize a transaction between a mobile device and a merchant terminal. The key generator generates a key used for authorizing the transaction. The key relates only to the transaction. The output module transmits an authorization for the transaction that is based on a processing of the key. | 06-23-2011 |
Juan Garay, Guttenberg, NJ US
Patent application number | Description | Published |
---|---|---|
20120297476 | Verifying Transactions Using Out-of-Band Devices - The present disclosure relates to verifying transactions using user devices. A client device used to complete a transaction with a server computer. The client device communicates with a user device such as a smart phone, laptop computer, or other computing device. The user device communicates with the client device and a verification server via the out-of-band communication channel. The verification server receives two or more copies of session data associated with the transaction occurring between the client device and the server computer. One copy of the session data is received from the server computer and another copy of the session data is provided by the user device. The two copies of the session data are compared by the verification server or by the user device, and mismatches are reported as suspected malicious software attacks. | 11-22-2012 |
Juan A. Garay, Guttenberg, NJ US
Patent application number | Description | Published |
---|---|---|
20100058070 | Message authentication code pre-computation with applications to secure memory - A method comprising the steps of creating a random permutation of data from a data input by executing at least one of a Pseudo-Random Permutation (PRP) and a Pseudo-Random Function (PRF), creating a first data block by combining the random permutation of data with a received second data block and executing an ε-differentially uniform function on the result of the combination, XORing the result of the ε-DU function evaluation with a secret key, and reducing the first data block to a first message authentication code. | 03-04-2010 |
20110016307 | Authorization, authentication and accounting protocols in multicast content distribution networks - An end user computer is assigned a multicast content distribution group by a network service intelligence platform. The network service intelligence platform authenticates a token sent by the user and signed by a third part content controller, and provides the user with credentials for joining the group. The credentials include an authorization key as well as identifications of the user and the requested content. The credentials are encrypted and authenticated by the third party content controller. The user includes the encrypted and authenticated credentials in a join request sent to a network resource, such as an edge router. After verifying the credentials, the network resource adds the end user computer to the multicast group. | 01-20-2011 |
20110185174 | System and Method for Providing a One-Time Key for Identification - A server includes a key generator and an authenticator. The key generator is configured to receive a request for a first key from a worker device, to create the first key that is associated with a worker, and to transmit the first key to the worker device. The authenticator is in communication with the key generator, the authenticator is configured to receive a second key and identification details from a customer device, to transmit the identification details to the worker device, to receive acknowledgment of the identification details from the worker device, and to authenticate the second key and the identification details with the customer device. | 07-28-2011 |
20130097682 | Authentication Techniques Utilizing a Computing Device - A pre-registration procedure is utilized to create a user profile for a user of a multi-factor authentication (“MFA”) service. A client application installation procedure is utilized to install a client application on a computing device that is to be utilized as an authentication factor for the MFA service. A computing device enrollment procedure is utilized to enroll the computing device on which the client application was installed for the MFA service. A voice enrollment procedure is utilized to create a voice print for the user of the computing device that is to be utilized as an authentication factor for the MFA service. An authentication procedure is utilized to provide multi-factor authenticated access to a service, such as an online service that provides access to sensitive account information. | 04-18-2013 |
20130254557 | MESSAGE AUTHENTICATION CODE PRE-COMPUTATION WITH APPLICATIONS TO SECURE MEMORY - A method comprising the steps of creating a random permutation of data from a data input by executing at least one of a Pseudo-Random Permutation (PRP) and a Pseudo-Random Function (PRF), creating a first data block by combining the random permutation of data with a received second data block and executing an ε-differentially uniform function on the result of the combination, XORing the result of the ε-DU function evaluation with a secret key, and reducing the first data block to a first message authentication code. | 09-26-2013 |
20140259121 | System And Method For Providing A One-Time Key For Identification - A server includes a key generator and an authenticator. The key generator is configured to receive a request for a first key from a worker device, to create the first key that is associated with a worker, and to transmit the first key to the worker device. The authenticator is in communication with the key generator, the authenticator is configured to receive a second key and identification details from a customer device, to transmit the identification details to the worker device, to receive acknowledgment of the identification details from the worker device, and to authenticate the second key and the identification details with the customer device. | 09-11-2014 |
20150016602 | METHOD AND APPARATUS FOR PROVIDING SECURE IMAGE ENCRYPTION AND DECRYPTION - Methods, non-transitory computer readable media and apparatuses for decrypting an image are disclosed. For example, a method captures a portion of an encrypted image and decrypts the portion of the image using a decryption key. The portion of the image contains partial information for an adjacent portion of the image. The method then displays the portion of the image that is decrypted and also displays the adjacent portion of the image using the partial information for the adjacent portion of the image. Another method includes capturing a first portion of an image that is encrypted using a first key and a second key, decrypting the first portion of the image using a first key and displaying the first portion of the image that is decrypted. | 01-15-2015 |
20150154598 | Secure Interaction with Input Devices - Methods of obtaining input on a physical input device are provided. A virtual input device is superimposed over the physical input device. The virtual input device has a different layout than the physical input device, such that a first input on the physical input device is mapped to a different input on the virtual input device. In another aspect, methods of securing a transaction according include displaying a first input screen to a user, encrypting a scrambling key using a public key, the scrambling key defining a second input screen that has a different layout from the first input screen, transmitting the encrypted scrambling key to a user device, receiving an input from the user device, and mapping the input to the second input screen. | 06-04-2015 |
Juan A. Garay, Gutenberg, NJ US
Patent application number | Description | Published |
---|---|---|
20120011007 | Mobile Payment Using DTMF Signaling - Systems and methods are disclosed for mobile payment using dual-tone multi-frequency (DTMF) signals. A mobile device equipped with at least a speaker and an input is used to connect to a server on the mobile network. Upon authentication of a user of the mobile device, the server generates the payment key, translates the key to DTMF signals, and plays the DTMF signals over the speaker of the mobile device. The user holds the mobile device speaker close to a microphone of a DTMF scanner at a POS terminal. The DTMF scanner includes logic that extracts the payment key from the DTMF signals, and the POS terminal uses the payment key to bill the user. The POS terminal transmits the bill with the payment key to the server on the network. The server ensures that the key is active, and debits an account for the user based on the amount presented in the bill. The key is de-activated after a specified time period or one use, whichever occurs first. | 01-12-2012 |
Julio Cesar Garay, Tampa, FL US
Patent application number | Description | Published |
---|---|---|
20130071348 | NANOPARTICLES WITH COVALENTLY BOUND SURFACTANT FOR DRUG DELIVERY - The present invention concerns nanoparticles, compositions comprising the nanoparticles, methods for their production, and methods of using the nanoparticles for the delivery of biologically active agents (e.g., antibiotics or other drugs) to human or non-human subjects. In one embodiment, the nanoparticle is a “surfactant-free” nanoparticle in which the surfactant moiety is covalently attached to the backbone of the polymer. | 03-21-2013 |
Leon E. Garay, Juarez MX
Patent application number | Description | Published |
---|---|---|
20090191021 | Free spin fastener and connection system - A fastener and a fastener system using the fastener are disclosed. The fastener has an elongated shank having a thread formed at one end and a annular recess formed adjacent the threaded portion to define a leading and trailing abutment surface. The thread guides the fastener into engagement with one or more components having thread engagement features and the annular recess permits the free spinning of the fastener without further tightening after the thread engagement features have advanced past the thread. The fastening system includes the fastener and a component to be fastened having a passageway for accepting the fastener formed by at least two flanges engageable in the thread and engageable in the annular recess of the fastener. | 07-30-2009 |
20150125200 | HOUSING WITH SELF-MOUNTING FEATURE - A housing with a self-mounting feature is provided. The housing includes a base that is configured to define a hook that cooperates with a back side of a panel and a first edge of an opening of the panel to secure the housing to a front side of the panel. The housing further includes a retainer that is operable to an un-engaged position and an engaged position. The retainer is configured to define a blocker portion that cooperates with a second edge of the opening to keep the hook adjacent to the first edge when the retainer is in the engaged position. | 05-07-2015 |
Mauricio Garay, Las Heras Mendoza AR
Patent application number | Description | Published |
---|---|---|
20090037029 | METHOD FOR OPERATING A FIRING PLANT - A method for operating a firing plant with at least one combustion chamber and with at least one burner for producing hot gas, especially a gas turbine, preferably of a power generating plant, includes an operating characteristic for operating the combustion chamber close to the lean extinction limit defined in the form of a burner group staging ratio (BGV | 02-05-2009 |
20130019605 | METHOD FOR OPERATING A FIRING PLANT - A method for operating a firing plant with at least one combustion chamber and at least one burner, especially a gas turbine, includes an operating characteristic for operating the combustion chamber close to the lean extinction limit defined as a burner group staging ratio (BGV | 01-24-2013 |
Michelle Garay, Pittstown, NJ US
Patent application number | Description | Published |
---|---|---|
20110081304 | EXTRACTS OF PHYLLANTHUS NIRURI - A method of making a low molecular weight fraction of | 04-07-2011 |
20110081432 | EXTRACTS OF PHYLLANTHUS NIRURI - A method of making a low molecular weight fraction of | 04-07-2011 |
20140364418 | COMPOSITIONS COMPRISING AN AROMATIC ALCOHOL AND A TRPV-1 ANTAGONIST, AND USES THEREOF - A topical composition providing reduced irritation that contains aromatic alcohols such as phenoxyethanol and a TRPV-1 antagonist is described. The composition is substantially free of parabens. The composition may be used for example for cleansing the skin. | 12-11-2014 |
Serge Garay, Osserain FR
Patent application number | Description | Published |
---|---|---|
20120012202 | Irregularly Shaped Flapper Closure and Sealing Surfaces - A flapper valve for a surface controlled, sub-surface safety valve has a seat and a curved flapper. The seat has a seating rim, and the curved flapper has a sealing rim and can pivot relative to the seat. The flapper's sealing rim corresponds in shape to the seating rim. Both rims have lobes disposed outside a circular perimeter. Also, the undulating edges of the rims have corresponding outcroppings and incroppings. When a flow tube moves towards or away from the flapper, the flapper's lobes protect the flapper's sealing rim as the flapper's inside surface engages the moving flow tube. Moreover, the rims can have a groove and a ridge that engage one another when the rims close. | 01-19-2012 |
20120193101 | SUBSURFACE SAFETY VALVE INCLUDING SAFE ADDITIVE INJECTION - A safety valve for an effluent-production installation, the safety valve comprising a longitudinal shell in which there extends a production tube defining an inside volume for effluent flow, the tube being movable in translation inside the shell in an axial direction between an advanced position in which effluent flow is authorized from the bottom of the installation towards the surface, and a retracted position in which effluent flow is prevented, the valve being characterized in that it further includes a connection duct between a feed line for feeding at least one additive from the surface and an injection line for injecting the additive downhole, a safety plug being provided in the connection duct in order to close or open the duct depending on whether the production tube is in its retracted position or its advanced position. | 08-02-2012 |
Sergio Rivas Garay, Cagnes S/mer FR
Patent application number | Description | Published |
---|---|---|
20130166328 | Internal Yield Adjustment Retrieval From Revenue Accounting - Disclosed is a computer-implemented method and system to perform a travel-related Availability Computation. The method includes, at an Inventory System, initiating an Availability Computation by retrieving information relevant to a received availability computation inquiry; determining that portion of a travel solution that corresponds to a reference carrier and a context to be prorated; making a call to a Proration Service and providing the Proration Service with applicable context information; receiving from the Proration Service proration information comprised of a calculated adjusted Yield or a calculated adjustment factor to be applied to the Yield, the Proration Service using proration data that is maintained by a Revenue Accounting System to make the calculation; and completing the Availability Computation using the adjusted Yield or the adjustment factor to be applied to the Yield. | 06-27-2013 |
Stephane Garay, Venerque FR
Patent application number | Description | Published |
---|---|---|
20100312835 | METHOD FOR COMMUNICATING DATA BETWEEN LOCALLY NETWORKED HETEROGENEOUS PROCESSING SYSTEMS AND COMMUNICATION SYSTEM USING SAID METHOD - A method for communicating data in an aircraft between at least a first data processing system and a second data processing system locally networked, each processing system being capable of executing at least one application, wherein the data to be exchanged are organized in messages, the aforementioned messages as well as the processing systems and the applications being defined in files stored in a backup unit connected to the network and accessible by the data processing systems. | 12-09-2010 |