Patent application number | Description | Published |
20090190331 | Lock light - A battery powered, waterproof high intensity LED enclosed in a waterproof housing that is adapted for adhesive or magnetic attachment to a surface in the proximity of a lock. A motion detector means activates the device to switch on the LED/s. A internal timing circuit ensures the hands free operation of the light as well as to ensure that the LED shuts off after a predetermined time. An angle adjusting means allows the housing to be adjusted so as to fixably alter the angle between the light beam and the housing base. A reflector means allows the beam to be concentrated and focused on the area of interest. | 07-30-2009 |
20100035710 | Lighted Projectile - A projectile illuminated by a chemiluminescent light source is capable of producing a stroboscopic effect when set in motion. The projectile body is a solid body preferably made of a soft, pliable material such as NERF®, in the shape of a sports ball, and the light propagates, unobstructed, through orifices in the body that allow for maximum light transmission. There need not be any ancillary components, only the light stick(s) and the soft, pliable body, however, an optional housing may be included to contain the light source. Orifices through which the light escapes the body may be modeled in the shape of team or corporate logos. | 02-11-2010 |
20100295484 | Lock Light - A battery powered high-intensity illumination device enclosed in a waterproof housing is adapted for removable attachment to a surface adjacent to a lock. Upon removing the device from the surface, one may easily transport it in the palm of one's hand or in a pocket, because of its compact, ergonomic size and shape. Activation of the device may be automatic, triggered by motion detection or a touch-sensitive switch. An internal shutoff timing circuit ensures hands free operation and energy efficiency. Angular adjustment allows the housing to be rotated so as to fixably alter the angle of the light beam with respect to the illumination target. A reflector allows the light source to be shielded from view and for light output to be focused on an area of interest. The size, shape, and appearance of the lock light are appealing and unique features of the device. | 11-25-2010 |
20120071282 | Lighted Projectile - A projectile illuminated by a chemiluminescent light source is capable of producing a stroboscopic effect when set in motion. The projectile body is a solid body preferably made of a soft, pliable material such as NERF®, in the shape of a sports ball, and the light propagates, unobstructed, through orifices in the body that allow for maximum light transmission. There need not be any ancillary components, only the light stick(s) and the soft, pliable body, however, an optional housing may be included to contain the light source. Orifices through which the light escapes the body may be modeled in the shape of team or corporate logos. | 03-22-2012 |
Patent application number | Description | Published |
20100287110 | ELECTRONIC EMPLOYEE SELECTION SYSTEMS AND METHODS - An automated employee selection system can use a variety of techniques to provide information for assisting in selection of employees. For example, pre-hire and post-hire information can be collected electronically and used to build an artificial-intelligence based model. The model can then be used to predict a desired job performance criterion (e.g., tenure, number of accidents, sales level, or the like) for new applicants. A wide variety of features can be supported, such as electronic reporting. Pre-hire information identified as ineffective can be removed from a collected pre-hire information. For example, ineffective questions can be identified and removed from a job application. New items can be added and their effectiveness tested. As a result, a system can exhibit adaptive learning and maintain or increase effectiveness even under changing conditions. | 11-11-2010 |
20100287111 | ELECTRONIC EMPLOYEE SELECTION SYSTEMS AND METHODS - An automated employee selection system can use a variety of techniques to provide information for assisting in selection of employees. For example, pre-hire and post-hire information can be collected electronically and used to build an artificial-intelligence based model. The model can then be used to predict a desired job performance criterion (e.g., tenure, number of accidents, sales level, or the like) for new applicants. A wide variety of features can be supported, such as electronic reporting. Pre-hire information identified as ineffective can be removed from a collected pre-hire information. For example, ineffective questions can be identified and removed from a job application. New items can be added and their effectiveness tested. As a result, a system can exhibit adaptive learning and maintain or increase effectiveness even under changing conditions. | 11-11-2010 |
20110145161 | ELECTRONIC EMPLOYEE SELECTION SYSTEMS AND METHODS - An automated employee selection system can use a variety of techniques to provide information for assisting in selection of employees. For example, pre-hire and post-hire information can be collected electronically and used to build an artificial-intelligence based model. The model can then be used to predict a desired job performance criterion (e.g., tenure, number of accidents, sales level, or the like) for new applicants. A wide variety of features can be supported, such as electronic reporting. Pre-hire information identified as ineffective can be removed from a collected pre-hire information. For example, ineffective questions can be identified and removed from a job application. New items can be added and their effectiveness tested. As a result, a system can exhibit adaptive learning and maintain or increase effectiveness even under changing conditions. | 06-16-2011 |
20120078804 | ELECTRONIC EMPLOYEE SELECTION SYSTEMS AND METHODS - An automated employee selection system can use a variety of techniques to provide information for assisting in selection of employees. For example, pre-hire and post-hire information can be collected electronically and used to build an artificial-intelligence based model. The model can then be used to predict a desired job performance criterion (e.g., tenure, number of accidents, sales level, or the like) for new applicants. A wide variety of features can be supported, such as electronic reporting. Pre-hire information identified as ineffective can be removed from a collected pre-hire information. For example, ineffective questions can be identified and removed from a job application. New items can be added and their effectiveness tested. As a result, a system can exhibit adaptive learning and maintain or increase effectiveness even under changing conditions. | 03-29-2012 |
20120215710 | ELECTRONIC EMPLOYEE SELECTION SYSTEMS AND METHODS - An automated employee selection system can use a variety of techniques to provide information for assisting in selection of employees. For example, pre-hire and post-hire information can be collected electronically and used to build an artificial-intelligence based model. The model can then be used to predict a desired job performance criterion (e.g., tenure, number of accidents, sales level, or the like) for new applicants. A wide variety of features can be supported, such as electronic reporting. Pre-hire information identified as ineffective can be removed from a collected pre-hire information. For example, ineffective questions can be identified and removed from a job application. New items can be added and their effectiveness tested. As a result, a system can exhibit adaptive learning and maintain or increase effectiveness even under changing conditions. | 08-23-2012 |
Patent application number | Description | Published |
20100111646 | Method and apparatus for handling pipe - An apparatus and method for handling pipe includes an elongate frame structure for mounting on a ground surface, in which a carriage unit is mounted on the frame structure and is operable for selective and reciprocal shifting along the frame structure. A boom member mounted on the carriage unit is operable for selected pivotal movement relative to the carriage unit, and a plane generally parallel to the boom member's longitudinal axis, about a generally horizontal pivot axis oriented transverse to the direction of shifting of the carriage unit along the frame structure. An elongate pipe carrier mounted on the boom member as dimensioned for receiving pipe so that the pipe's longitudinal axis is substantially parallel to the longitudinal axis of the boom member and the pipe member, wherein the pipe carrier is operable for selective pivotal movement about its longitudinal axis. | 05-06-2010 |
20130153309 | CENTERING DEVICE FOR LOAD TRANSPORTING APPARATUS - Embodiments of the present invention are directed to a load transporting apparatus that automatically centers a support foot of the apparatus about a roller assembly during a recovery phase of an incremental walking movement. In particular, the load transporting apparatus includes guide devices positioned adjacent to a roller assembly that deflect a biasing device during non-linear load transporting movements, where the biasing device acts to automatically return the support foot to a centered position relative to the roller assembly after a non-linear movement has been completed and the support foot is raised above a ground surface. | 06-20-2013 |
20130156538 | ROTATION DEVICE FOR LOAD TRANSPORTING APPARATUS - Embodiments of the present invention are directed to a load transporting apparatus that is capable of being steered while transporting a load across a base surface. In particular, the load transporting apparatus includes a roller track configured to support movement of a roller assembly, and a support foot that is connected to the roller track with a pin connector. During load transport, the support foot can be maintained in a substantially similar position relative to a frame structure supporting the load even when the transport movement is not in a parallel direction to the orientation of the support foot. | 06-20-2013 |
20130156539 | ALIGNMENT RESTORATION DEVICE FOR LOAD TRANSPORTING APPARATUS - Embodiments of the present invention are directed to a load transporting apparatus that automatically aligns a support foot of the apparatus with a load-bearing frame connected to the load transporting apparatus during a recovery phase of an incremental walking movement. In particular, the load transporting apparatus includes a linking device attached to a support foot of the apparatus and a biasing device connected to the linking device that is deflected during non-linear load transporting movements, where the biasing device acts to automatically return the support foot to an aligned position relative to the load-bearing frame after a non-linear movement has been completed and the support foot is raised above a ground surface. | 06-20-2013 |
20130277124 | CENTERING DEVICE FOR LOAD TRANSPORTING APPARATUS - Embodiments of the present invention are directed to a load transporting apparatus that automatically centers a support foot of the apparatus about a roller assembly during a recovery phase of an incremental walking movement. In particular, the load transporting apparatus includes guide devices positioned adjacent to a roller assembly that deflect a biasing device during non-linear load transporting movements, where the biasing device acts to automatically return the support foot to a centered position relative to the roller assembly after a non-linear movement has been completed and the support foot is raised above a ground surface. | 10-24-2013 |
20140014417 | ALIGNMENT RESTORATION DEVICE FOR LOAD TRANSPORTING APPARATUS - Embodiments of the present invention are directed to a load transporting apparatus that automatically aligns a support foot of the apparatus with a load-bearing frame connected to the load transporting apparatus during a recovery phase of an incremental walking movement. In particular, the load transporting apparatus includes a linking device attached to a support foot of the apparatus and a biasing device connected to the linking device that is deflected during non-linear load transporting movements, where the biasing device acts to automatically return the support foot to an aligned position relative to the load-bearing frame after a non-linear movement has been completed and the support foot is raised above a ground surface. | 01-16-2014 |
20140158342 | RIG WITH DRAWWORKS AND HOISTING DEVICE - A rig includes a base structure in contact with an operating surface and configured to support the rig on the operating surface. A transportation system is operatively coupled to the base structure and is configured to position the rig over an extraction point. A raised platform is connected to the base structure by a plurality of support beams. A hoisting device is connected to the raised platform. A drawworks is supported on the base structure and is operatively connected to the hoisting device. | 06-12-2014 |
20140161581 | ROTATION DEVICE FOR LOAD TRANSPORTING APPARATUS - Embodiments of the present invention are directed to a load transporting apparatus that is capable of being steered while transporting a load across a base surface. In particular, the load transporting apparatus includes a roller track configured to support movement of a roller assembly, and a support foot that is connected to the roller track with a pin connector. During load transport, the support foot can be maintained in a substantially similar position relative to a frame structure supporting the load even when the transport movement is not in a parallel direction to the orientation of the support foot. | 06-12-2014 |
Patent application number | Description | Published |
20080244571 | VIRTUAL INTERRUPT PROCESSING IN A LAYERED VIRTUALIZATION ARCHITECTURE - Embodiments of apparatuses, methods, and systems for processing virtual interrupts in a layered virtualization architecture are disclosed. In one embodiment, an apparatus includes virtual machine entry logic, recognition logic, and evaluation logic. The virtual machine entry logic is to transfer control of the apparatus from a host to a guest. The recognition logic is to recognize a virtual interrupt request. The evaluation logic is to determine whether to transfer control from the guest to an intervening monitor in response to the virtual interrupt request. | 10-02-2008 |
20090007103 | INJECTING VIRTUALIZATION EVENTS IN A LAYERED VIRTUALIZATION ARCHITECTURE - Embodiments of apparatuses, methods, and systems for injecting virtualization events in a layered virtualization architecture are disclosed. In one embodiment, an apparatus includes virtual machine entry logic, recognition logic, and evaluation logic. The virtual machine entry logic is to initiate a transfer of control of the apparatus from a host to a guest running on a virtual machine. The recognition logic is to recognize a request from the host to inject a virtualization event into the virtual machine. The evaluation logic is to identify an intervening monitor to handle the virtualization event. | 01-01-2009 |
20100325354 | MECHANISM TO HANDLE EVENTS IN A MACHINE WITH ISOLATED EXECUTION - A platform and method for secure handling of events in an isolated environment. A processor executing in isolated execution “IsoX” mode may leak data when an event occurs as a result of the event being handled in a traditional manner based on the exception vector. By defining a class of events to be handled in IsoX mode, and switching between a normal memory map and an IsoX memory map dynamically in response to receipt of an event of the class, data security may be maintained in the face of such events. | 12-23-2010 |
20100325445 | MECHANISM TO HANDLE EVENTS IN A MACHINE WITH ISOLATED EXECUTION - A platform and method for secure handling of events in an isolated environment. A processor executing in isolated execution “IsoX” mode may leak data when an event occurs as a result of the event being handled in a traditional manner based on the exception vector. By defining a class of events to be handled in IsoX mode, and switching between a normal memory map and an IsoX memory map dynamically in response to receipt of an event of the class, data security may be maintained in the face of such events. | 12-23-2010 |
20100332760 | MECHANISM TO HANDLE EVENTS IN A MACHINE WITH ISOLATED EXECUTION - A platform and method for secure handling of events in an isolated environment. A processor executing in isolated execution “IsoX” mode may leak data when an event occurs as a result of the event being handled in a traditional manner based on the exception vector. By defining a class of events to be handled in IsoX mode, and switching between a normal memory map and an IsoX memory map dynamically in response to receipt of an event of the class, data security may be maintained in the face of such events. | 12-30-2010 |
20110047547 | VIRTUALIZATION EVENT PROCESSING IN A LAYERED VIRTUALIZATION ARCHITECTURE - Embodiments of apparatuses and methods for processing virtualization events in a layered virtualization architecture are disclosed. In one embodiment, an apparatus includes a event logic and evaluation logic. The event logic is to recognize a virtualization event. The evaluation logic is to determine whether to transfer control from a child guest to a parent guest in response to the virtualization event. | 02-24-2011 |
20120317572 | VIRTUALIZATION EVENT PROCESSING IN A LAYERED VIRTUALIZATION ARCHITECTURE - Embodiments of apparatuses and methods for processing virtualization events in a layered virtualization architecture are disclosed. In one embodiment, an apparatus includes a event logic and evaluation logic. The event logic is to recognize a virtualization event. The evaluation logic is to determine whether to transfer control from a child guest to a parent guest in response to the virtualization event. | 12-13-2012 |
20130024861 | Virtualization Event Processing in a Layered Virtualization Architecuture - Embodiments of apparatuses and methods for processing virtualization events in a layered virtualization architecture are disclosed. In one embodiment, an apparatus includes a event logic and evaluation logic. The event logic is to recognize a virtualization event. The evaluation logic is to determine whether to transfer control from a child guest to a parent guest in response to the virtualization event. | 01-24-2013 |
20130191603 | Method And Apparatus For Accessing Physical Memory From A CPU Or Processing Element In A High Performance Manner - A method and apparatus is described herein for accessing a physical memory location referenced by a physical address with a processor. The processor fetches/receives instructions with references to virtual memory addresses and/or references to physical addresses. Translation logic translates the virtual memory addresses to physical addresses and provides the physical addresses to a common interface. Physical addressing logic decodes references to physical addresses and provides the physical addresses to a common interface based on a memory type stored by the physical addressing logic. | 07-25-2013 |
20130232488 | VIRTUALIZATION EVENT PROCESSING IN A LAYERED VIRTUALIZATION ARCHITECTURE - Embodiments of apparatuses and methods for processing virtualization events in a layered virtualization architecture are disclosed. In one embodiment, an apparatus includes a event logic and evaluation logic. The event logic is to recognize a virtualization event. The evaluation logic is to determine whether to transfer control from a child guest to a parent guest in response to the virtualization event. | 09-05-2013 |
20130247040 | VIRTUALIZATION EVENT PROCESSING IN A LAYERED VIRTUALIZATION ARCHITECTURE - Embodiments of apparatuses and methods for processing virtualization events in a layered virtualization architecture are disclosed. In one embodiment, an apparatus includes a event logic and evaluation logic. The event logic is to recognize a virtualization event. The evaluation logic is to determine whether to transfer control from a child guest to a parent guest in response to the virtualization event. | 09-19-2013 |
Patent application number | Description | Published |
20110145558 | Virtual Bus Device Using Management Engine - A management engine may be used to trap configuration cycles during the boot process and thereafter in response to operating system enumeration. As a result, a virtual bus device can be created. The bus device may be used to provision software to the platform even when the operating system is corrupted or non-functional. | 06-16-2011 |
20110154316 | Providing Software Distribution and Update Services Regardless of the State or Physical Location of an End Point Machine - In accordance with some embodiments, software may be downloaded to an end point, even when that said end point is not fully functional. An indication that software is available for distribution may be stored in a dedicated location within a non-volatile memory. That location may be checked for software to download, for example, on each boot up. The software may then be downloaded and verified. Thereafter, the location is marked to indicate that the software has already been downloaded. | 06-23-2011 |
20110246756 | PROTOCOL FOR AUTHENTICATING FUNCTIONALITY IN A PERIPHERAL DEVICE - A protocol provides authentication of peripheral devices by a computing device to which the peripheral device connects. Computing devices include a verifier with a public key that authenticates multiple associated private keys. Private keys are embedded on peripheral devices. When the verifier is able to authenticate a connected peripheral, particular functionality is enabled that may not be enabled for peripherals that do not authenticate. | 10-06-2011 |
20120047580 | METHOD AND APPARATUS FOR ENFORCING A MANDATORY SECURITY POLICY ON AN OPERATING SYSTEM (OS) INDEPENDENT ANTI-VIRUS (AV) SCANNER - An antivirus (AV) application specifies a fault handler code image, a fault handler manifest, a memory location of the AV application, and an AV application manifest. A loader verifies the fault handler code image and the fault handler manifest, creates a first security domain having a first security level, copies the fault handler code image to memory associated with the first security domain, and initiates execution of the fault handler. The loader requests the locking of memory pages in the guest OS that are reserved for the AV application. The fault handler locks the executable code image of the AV application loaded into guest OS memory by setting traps on selected code segments in guest OS memory. | 02-23-2012 |
20120167187 | METHOD, APPARATUS AND SYSTEM FOR CONTROLLING ACCESS TO COMPUTER PLATFORM RESOURCES - A manageability engine, and/or operations thereof, for controlling access to one or more resources of a computer device. In an embodiment, the manageability engine executes an authentication agent to perform authentication of a local user of a computer platform which includes the manageability engine. In another embodiment, the manageability engine includes a device driver to control an input/output device for the local user to exchange an authentication factor via a trusted path between the input/output device and the manageability engine. | 06-28-2012 |
20120303952 | Dynamic Platform Reconfiguration By Multi-Tenant Service Providers - A manageability engine or adjunct processor on a computer platform may receive a request for activation and use of features embedded within that platform from a service provider authorized by the manageability engine's manufacturer. The manageability engine may initiate a request for authority through the service provider to a permit server. The permit server may provide, through the service provider, proof of the service provider's authority, together with a certificate identifying the service provider. Then the manageability engine may enable activation of the features on the platform coupled to the manageability engine, but only by the one particular service provider who has been authorized. | 11-29-2012 |
20130276057 | AUTHENTICATED LAUNCH OF VIRTUAL MACHINES AND NESTED VIRTUAL MACHINE MANAGERS - An embodiment of the invention provides for an authenticated launch of VMs and nested VMMs. The embodiment may do so using an interface that invokes a VMM protected launch control mechanism for the VMs and nested VMMs. The interface may be architecturally generic. Other embodiments are described herein. | 10-17-2013 |
20130347058 | Providing Geographic Protection To A System - In one embodiment, a method includes determining a location of a system responsive to location information received from at least one of a location sensor and a wireless device of the system, associating the location with a key present in the system to generate an authenticated location of the system, and determining whether the authenticated location is within a geofence boundary indicated in a location portion of a launch control policy (LCP) that provides a geographic-specific policy. Other embodiments are described and claimed. | 12-26-2013 |
20130347087 | Authenticating A User Of A System Via An Authentication Image Mechanism - In an embodiment, the present invention includes a method for receiving a request for user authentication of a system, displaying an authentication image on a display of the system using a set of random coordinates, receiving a plurality of gesture input values from the user, and determining whether to authenticate the user based at least in part on the plurality of gesture input values. Other embodiments are described and claimed. | 12-26-2013 |
20130347089 | OUT-OF-BAND REMOTE AUTHENTICATION - In an embodiment a single user authentication event, performed between a trusted path hardware module and a service provider via an out of band communication, can enable a user to transparently access multiple service providers using strong credentials that are specific to each service provider. The authentication event may be based on multifactor authentication that is indicative of a user's actual physical presence. Thus, for example, a user would not need to enter a different retinal scan to gain access to each of the service providers. Other embodiments are described herein. | 12-26-2013 |
20130347099 | KEYBOARD AS BIOMETRIC AUTHENTICATION DEVICE - Various embodiments are generally directed to use of a keyboard as a biometric authentication device. In one embodiment, for example, an apparatus comprises a processor circuit executing a sequence of instructions causing the processor circuit to receive a signal indicative of a keypress of at least one key of a keyboard communicatively coupled to the apparatus, and indicative of at least one physical characteristic associated with the keypress; compare the at least one physical characteristic to at least one stored physical characteristic associated with at least one authorized user of the apparatus; and determine if the keypress is associated with at least one authorized user of the apparatus based on the comparison. Other embodiments are described and claimed herein. | 12-26-2013 |
20140025939 | METHODS AND APPARATUS FOR TRUSTED BOOT OPTIMIZATION - A data processing system may include a high integrity storage (HIS) device with a partition or cache that is protected from updates. The data processing system may perform a boot process in response to being reactivated. The boot process may include the operation of executing a boot object. During the boot process, before executing the boot object, the data processing system may retrieve a digest for the boot object from the protected cache of the HIS device. The digest may be a cryptographic hash value for the boot object. During the boot process, the retrieved digest may be extended into a platform configuration register in a trusted platform module of the data processing system. Other embodiments are described and claimed. | 01-23-2014 |
20140032907 | PROTOCOL FOR AUTHENTICATING FUNCTIONALITY IN A PERIPHERAL DEVICE - A protocol provides authentication of peripheral devices by a computing device to which the peripheral device connects. Computing devices include a verifier with a public key that authenticates multiple associated private keys. Private keys are embedded on peripheral devices. When the verifier is able to authenticate a connected peripheral, particular functionality is enabled that may not be enabled for peripherals that do not authenticate. | 01-30-2014 |
20140032933 | PROVIDING ACCESS TO ENCRYPTED DATA - Embodiments of methods, systems, and storage medium associated with providing access to encrypted data for authorized users are disclosed herein. In one instance, the method may include obtaining a derived value for an authenticated user based on user personalization data of the authenticated user, and generating a user-specific encryption key based on the derived value. The derived value may have entropy in excess of a predetermined level. The user-specific encryption key may enable the authenticated user to access the encrypted data stored at the storage device. Other embodiments may be described and/or claimed. | 01-30-2014 |
20140095867 | DEVICE, METHOD, AND SYSTEM FOR SECURE TRUST ANCHOR PROVISIONING AND PROTECTION USING TAMPER-RESISTANT HARDWARE - A method and device for securely provisioning trust anchors includes generating a database wrapper key as a function of computing device hardware. The database wrapper key encrypts a key database when it is not in use by a trusted execution environment and may be generated using a Physical Unclonable Function (PUF). A local computing device establishes a secure connection and security protocols with a remote computing device. In establishing the secure connection, the local computing device and remote computing device may exchange and/or authenticate cryptographic keys, including Enhanced Privacy Identification (EPID) keys, and establish a session key and device identifier(s). One or more trust anchors are then provisioned depending on whether unilateral, bilateral, or multilateral trust is established. The local computing device may act as a group or domain controller in establishing multilateral trust. Any of the devices may also require user presence to be verified. | 04-03-2014 |
20140096182 | SYSTEMS AND METHODS FOR DISTRIBUTED TRUST COMPUTING AND KEY MANAGEMENT - Devices, systems, and methods for conducting trusted computing tasks on a distributed computer system are described. In some embodiments, a client device initiates a trusted task for execution within a trusted execution environment of a remote service provider. The devices, systems, and methods may permit the client to evaluate the trusted execution capabilities of the service provider via a planning and attestation process, prior to sending data/code associated with the trusted task to the service provider for execution. Execution of the trusted task may be performed while enforcing security and/or compartmentalization context on the data/code. Systems and methods for managing and exchanging encryption keys are also described. Such systems and methods may be used to maintain the security of the data/code before during, and/or after the execution of the trusted task. | 04-03-2014 |
20140108805 | TECHNOLOGIES LABELING DIVERSE CONTENT - Technologies for labeling diverse content are described. In some embodiments, a content creation device generates a data structure that may include encrypted diverse content and metadata including at least one rights management (RM) label applying to the diverse content. The RM label may attribute all or a portion of the diverse content to one or more authors. The metadata may also be signed using an independently verifiable electronic signature. A consumption device receiving such a data structure may verify the authenticity of the electronic signature and, if verification succeeds, decrypt the encrypted diverse content in the data structure. Because the metadata is encapsulated with the diverse content in the data structure, it may accompany the diverse content upon its transfer or incorporation into other diverse content. | 04-17-2014 |
20140281468 | Virtual Bus Device Using Management Engine - A management engine may be used to trap configuration cycles during the boot process and thereafter in response to operating system enumeration. As a result, a virtual bus device can be created. The bus device may be used to provision software to the platform even when the operating system is corrupted or non-functional. | 09-18-2014 |
20140282945 | TECHNOLOGIES FOR SECURE STORAGE AND USE OF BIOMETRIC AUTHENTICATION INFORMATION - Generally, this disclosure describes technologies for securely storing and using biometric authentication information, such as biometric reference templates. In some embodiments, the technologies include a client device that stores one or more biometric reference templates in a memory thereof. The client device may transfer such templates to an authentication device. The transfer may be conditioned on verification that the authentication device includes a suitable protected environment for the templates and will execute an acceptable temporary storage policy. The technologies may also include an authentication device that is configured to temporarily store biometric reference templates received from a client device in a protected environment thereof. Upon completion of biometric authentication or the occurrence of a termination event, the authentication devices may delete the biometric reference templates from the protected environment. | 09-18-2014 |
20140283099 | PRIVACY AWARE DHCP SERVICE - Generally, this disclosure describes a system including a privacy aware DHCP service and a user device. The user device includes a trusted execution environment including a client privacy agent configured to request a first Internet Protocol (IP) address from a DHCP service and to determine a device privacy score based, at least in part, on a DHCP policy; memory comprising secure storage configured to store the first IP address; and communication circuitry configured to establish at least one connection between the user device and at least one entity over a network using the first IP address. The client privacy agent is configured to monitor communication activity over the connection(s), to update the device privacy score based, at least in part, on the communication activity, and to close the connection(s) if the device privacy score is outside an acceptable privacy score range, the acceptable privacy range bounded by a privacy threshold. | 09-18-2014 |
20140366111 | CONTINUOUS AUTHENTICATION CONFIDENCE MODULE - Generally, this disclosure describes a continuous authentication confidence module. A system may include user device including processor circuitry configured to determine presence data; a confidence factor including at least one of a sensor configured to capture sensor input and a system monitoring module configured to monitor activity of the user device; memory configured to store a confidence score and an operating system; and a continuous authentication confidence module configured to determine the confidence score in response to an initial authentication of a specific user, update the confidence score based, at least in part, an expectation of user presence and/or selected presence data, and notify the operating system that the authentication is no longer valid if the updated confidence score is within a tolerance of a session close threshold; the initial authentication configured to open a session, the confidence score configured to indicate a current strength of authentication during the session. | 12-11-2014 |
20150082024 | TECHNOLOGIES FOR SYNCHRONIZING AND RESTORING REFERENCE TEMPLATES - Generally, this disclosure describes technologies for restoring and/or synchronizing templates such as biometric templates to/among one or more client devices. In some embodiments one or more client devices may register with a synchronization server and provide encrypted copies of their reference templates to the server. In a restoration operation, the synchronization server may provide an encrypted copy of a client's reference template(s) to the client, which may decrypt them in a protected environment. In a synchronization operation, the synchronization server may provide encrypted copy of a first client's template(s) to a plurality of second clients. The second clients may then decrypt the encrypted template(s) within a protected environment using an appropriate decryption key. | 03-19-2015 |
Patent application number | Description | Published |
20080244292 | Method and Apparatus to Re-create trust model after sleep state - A processing system features random access memory (RAM), a processor, and a trusted platform module (TPM). When the processing system enters a sleep mode during which the RAM is to stay powered, the processing system may measuring a VMM and one or more secure VMs in the processing system. However, the processing system may not measure or encrypt all of system memory. Upon resuming from sleep, the processing system may verify the measurements, to ensure that the VMM and secure VMs have not been tampered with. Other steps may include sealing encryption keys to the TPM, while preserving the blobs in memory. Other embodiments are described and claimed. | 10-02-2008 |
20090044187 | Methods And Apparatus For Creating An Isolated Partition For A Virtual Trusted Platform Module - A data processing system isolates a virtual trusted platform module (vTPM) manager in the processing system from other management software in the processing system. In one example process, the processing system launches a virtual machine monitor (VMM) that includes a memory-mapped input/output (MMIO) trap. The processing system also launches a vTPM manager in a first virtual machine (VM). In addition, the processing system launches a second VM to contain virtual machine management programs other than the vTPM manager and the MMIO trap. Other embodiments are described and claimed. | 02-12-2009 |
20090055641 | Method and apparatus for virtualization of a multi-context hardware trusted platform module (TPM) - In one embodiment, the present invention includes a method for receiving a request for a trusted platform module (TPM) operation from a virtual machine, determining whether the request is for a modification of a TPM version, and associating part of a multi-context hardware TPM with a virtual TPM (vTPM) to enable the modification. Other embodiments are described and claimed. | 02-26-2009 |
20090086979 | VIRTUAL TPM KEYS ROOTED IN A HARDWARE TPM - The present subject matter related to trusted computing, and more particularly, to virtual trusted platform module keys rooted in a hardware trusted platform module. Some embodiments include a trusted platform virtualization module operable to capture virtual machine trusted platform module calls and operates to generate, maintain, and utilize hardware trusted platform module keys on behalf of the one or more virtual machines. Some embodiments include virtual trusted platform module keys having a public portion on top of an private portion including an encrypted hardware trusted platform module key. | 04-02-2009 |
20090089582 | METHODS AND APPARATUS FOR PROVIDING UPGRADEABLE KEY BINDINGS FOR TRUSTED PLATFORM MODULES - A processing system with a trusted platform module (TPM) supports migration of digital keys. For instance, an application in the processing system may create a first configuration key as a child of a TPM storage root key (SRK) when the processing system has a first configuration. The application may also create an upgradable root user key associated with an upgrade authority as a child of the first configuration key. The application may also create a user key as a child of the upgradable root user key. When the processing system has a second configuration, the application may create a second configuration key as a child of the SRK. The application may request migration approval from the upgrade authority. In response to receiving the approval from the upgrade authority, the application may migrate the root user key to be a child of the second configuration key. Other embodiments are described and claimed. | 04-02-2009 |
20090165117 | Methods And Apparatus Supporting Access To Physical And Virtual Trusted Platform Modules - A data processing system features a hardware trusted platform module (TPM), and a virtual TPM (vTPM) manager. When executed, the vTPM manager detects a first request from a service virtual machine (VM) in the processing system, the first request to involve access to the hardware TPM (hTPM). In response, the vTPM manager automatically determines whether the first request should be allowed, based on filter rules identifying allowed or disallowed operations for the hTPM. The vTPM manager may also detect a second request to involve access to a software TPM (sTPM) in the processing system. In response, the vTPM manager may automatically determine whether the second request should be allowed, based on a second filter list identifying allowed or disallowed operations for the sTPM. Other embodiments are described and claimed. | 06-25-2009 |
20090169012 | VIRTUAL TPM KEY MIGRATION USING HARDWARE KEYS - The present subject matter is related to trusted computing, and more particularly to migration of virtual trusted platform module keys that are rooted in a hardware trusted platform module. Some embodiments include a trusted platform virtualization module that may perform one or more of inbound and outbound trusted platform module key migrations. Such migrations may be performed between a virtual trusted platform module and either a hardware or a virtual trusted platform module. | 07-02-2009 |
20090307493 | SYSTEM AND METHOD FOR COMBINING USER AND PLATFORM AUTHENTICATION IN NEGOTIATED CHANNEL SECURITY PROTOCOLS - A network security handshake exchange for combining user and platform authentication. The security handshake exchange performs operations on a pre-master secret to increase identity verification and security. The pre-master secret is augmented and authenticated with platform identity and user identity credentials of one endpoint. A second phase of exchanges may include exchange of a master secret that is the pre-master secret modified with platform identity and user identity of the other endpoint. | 12-10-2009 |
20110138166 | Extensible Pre-Boot Authentication - In one embodiment, the present invention includes a method for obtaining a pre-boot authentication (PBA) image from a non-volatile storage that is configured with full disk encryption (FDE), and storing the PBA image in a memory. Then a callback protocol can be performed between a loader executing on an engine of a chipset and an integrity checker of a third party that provided the PBA image to confirm integrity of the PBA image, the PBA image is executed if the integrity is confirmed, and otherwise it is deleted. Other embodiments are described and claimed. | 06-09-2011 |
20110145598 | Providing Integrity Verification And Attestation In A Hidden Execution Environment - In one embodiment, a processor includes a microcode storage including processor instructions to create and execute a hidden resource manager (HRM) to execute in a hidden environment that is not visible to system software. The processor may further include an extend register to store security information including a measurement of at least one kernel code module of the hidden environment and a status of a verification of the at least one kernel code module. Other embodiments are described and claimed. | 06-16-2011 |
20110154023 | Protected device management - A method, apparatus, system, and computer program product for management of storage devices protected by encryption, user authentication, and password protection and auditing schemes in virtualized and non-virtualized environments. | 06-23-2011 |
20110314472 | Method And Apparatus For Virtualization Of A Multi-Context Hardware Trusted Platform Module (TPM) - In one embodiment, the present invention includes a method for receiving a request for a trusted platform module (TPM) operation from a virtual machine, determining whether the request is for a modification of a TPM version, and associating part of a multi-context hardware TPM with a virtual TPM (vTPM) to enable the modification. Other embodiments are described and claimed. | 12-22-2011 |
20120017271 | DOMAIN-AUTHENTICATED CONTROL OF PLATFORM RESOURCES - A method, apparatus, system, and computer program product for domain-authenticated control of platform resources. Resources under the control of the platform are managed in accordance with access control rules that are centrally managed by a directory service. Security policies are uniformly applied by requiring authorization of the user's access to platform resources including hard drives, flash memory, sensors, network controllers and power state controllers. | 01-19-2012 |
20120030676 | Methods And Apparatus For Creating An Isolated Partition For A Virtual Trusted Platform Module - A data processing system isolates a virtual trusted platform module (vTPM) manager in the processing system from other management software in the processing system. In one example process, the processing system launches a virtual machine monitor (VMM) that includes a memory-mapped input/output (MMIO) trap. The processing system also launches a vTPM manager in a first virtual machine (VM). In addition, the processing system launches a second VM to contain virtual machine management programs other than the vTPM manager and the MMIO trap. Other embodiments are described and claimed. | 02-02-2012 |
20120030730 | PROVIDING A MULTI-PHASE LOCKSTEP INTEGRITY REPORTING MECHANISM - In one embodiment, a processor can enforce a blacklist and validate, according to a multi-phase lockstep integrity protocol, a device coupled to the processor. Such enforcement may prevent the device from accessing one or more resources of a system prior to the validation. The blacklist may include a list of devices that have not been validated according to the multi-phase lockstep integrity protocol. Other embodiments are described and claimed. | 02-02-2012 |
20130179693 | Providing Integrity Verification And Attestation In A Hidden Execution Environment - In one embodiment, a processor includes a microcode storage including processor instructions to create and execute a hidden resource manager (HRM) to execute in a hidden environment that is not visible to system software. The processor may further include an extend register to store security information including a measurement of at least one kernel code module of the hidden environment and a status of a verification of the at least one kernel code module. Other embodiments are described and claimed. | 07-11-2013 |
20130248717 | METHOD AND APPARATUS TO DETERMINE USER PRESENCE - According to some embodiments, a method and apparatus are provided to receive a first signal from a sensor, determine that a user is present based on the received first signal, receive a second signal from the sensor, and determine if the user is still present based on the received second signal. | 09-26-2013 |
20130283369 | Providing A Multi-Phase Lockstep Integrity Reporting Mechanism - In one embodiment, a processor can enforce a blacklist and validate, according to a multi-phase lockstep integrity protocol, a device coupled to the processor. Such enforcement may prevent the device from accessing one or more resources of a system prior to the validation. The blacklist may include a list of devices that have not been validated according to the multi-phase lockstep integrity protocol. Other embodiments are described and claimed. | 10-24-2013 |
20140013116 | APPARATUS AND METHOD FOR PERFORMING OVER-THE-AIR IDENTITY PROVISIONING - A method for controlling access to information includes sending a request from an identity requester to an identity provider through an over-the-air (OTA) link. Data received from the identity provider in response to the request includes information used to establish a first identity of a user for a first service. The first identity information is received during a Sigma session, and a second identity of the user is established for a second service based on the received first identity information. The user may be a user of a mobile communication terminal or other device, which is to receive the first and second services. | 01-09-2014 |
20140181535 | TAP-TO-WAKE AND TAP-TO-LOGIN NEAR FIELD COMMUNICATION (NFC) DEVICE - Described herein are techniques related to a tap-to-wake and tap-to-login system. This Abstract is submitted with the understanding that it will not be used to interpret or limit the scope and meaning of the claims. A tap-to-wake and tap-to-login system allows a user of a near field device to wake up a computing platform from a deep sleep state using a bump/tap without having to move a mouse or enter a keyboard stroke. | 06-26-2014 |
20140181925 | Privacy Enhanced Key Management For A Web Service Provider Using A Converged Security Engine - In an embodiment, a security engine of a processor includes an identity provider logic to generate a first key pair of a key pairing associating system user and a service provider that provides a web service and having a second system coupled to the system via a network, to perform a secure communication with the second system to enable the second system to verify that the identity provider logic is executing in a trusted execution environment, and responsive to the verification, to send a first key of the first key pair to the second system. This key may enable the second system to verify an assertion communicated by the identity provider logic that the user has been authenticated to the system according to a multi-factor authentication. Other embodiments are described and claimed. | 06-26-2014 |
20140181995 | PUBLICATION AND REMOVAL OF ATTRIBUTES IN A MULTI-USER COMPUTING SYSTEM - Embodiments of the present disclosure are directed toward publication and/or removal of attributes in a multi-user computing environment. In some embodiments, a consumer information manager (CIM) associated with a user of a multi-user computing system may receive a notification, from a dimension authority (DA), of a decrease in a population count of users of the computing system who have published an attribute within the computing system, and may determine whether the user has published the attribute. In response to receiving the notification of the decrease and determining that the user has published the attribute, the CIM may determine a likelihood that continued publication of the attribute will enable identification of the user, compare the likelihood to a threshold, and, when the likelihood exceeds the threshold, remove the attribute from publication. Other embodiments may be disclosed and/or claimed. | 06-26-2014 |
20140259125 | USER AUTHORIZATION AND PRESENCE DETECTION IN ISOLATION FROM INTERFERENCE FROM AND CONTROL BY HOST CENTRAL PROCESSING UNIT AND OPERATING SYSTEM - An embodiment may include circuitry to be included, at least in part, in a host. The host may include at least one host central processing unit (CPU) to execute, at least in part, at least one host operating system (OS). The circuitry may perform, at least in part, at least one operation in isolation both from interference from and control by the at least one host CPU and the at least one host OS. The at least one operation may include user authorization determination and user presence determination. The authorization determination may be in response, at least in part, to indication of physical presence of at least one user in proximity to the host. The user presence determination may determine, at least in part, whether, after the indication has been provided, the physical presence of the at least one user in the proximity to the host has ceased. | 09-11-2014 |
20140316886 | PROVISION OF ANONYMOUS CONTEXT INFORMATION AND GENERATION OF TARGETED CONTENT - Embodiments of the present disclosure are directed towards selective disclosure of user or computing environment attributes to facilitate generation and/or provision of targeted content. In various embodiments, a likelihood that disclosure of an attribute of a user or of a computing environment associated with the user will enable identification of the user may be determined based on an associated population count of users or computing environments sharing the same attribute. In various embodiments, the attribute may be selectively disclosed to a content provider configured to provide targeted content, or a recommendation may be selectively provided to the user as to whether the user should disclose the attribute to the content provider, based on the determination and a risk tolerance associated with the user. In various embodiments, a dimension authority may track and make available population counts of users or computing environments having various attributes. | 10-23-2014 |
20140359754 | Providing A Multi-Phase Lockstep Integrity Reporting Mechanism - In one embodiment, a processor can enforce a blacklist and validate, according to a multi-phase lockstep integrity protocol, a device coupled to the processor. Such enforcement may prevent the device from accessing one or more resources of a system prior to the validation. The blacklist may include a list of devices that have not been validated according to the multi-phase lockstep integrity protocol. Other embodiments are described and claimed. | 12-04-2014 |
20140366116 | PROTECTED DEVICE MANAGEMENT - A method, apparatus, system, and computer program product for management of storage devices protected by encryption, user authentication, and password protection and auditing schemes in virtualized and non-virtualized environments. | 12-11-2014 |
20150079933 | SECURELY MANAGED LOCATION-AND-TRACKING SERVICE ACCESS - Systems and techniques for securely managed location-and-tracking service (LTS) access are described herein. A trusted execution environment (TEE) may establish a connection to an LTS. The TEE may provide verification to the LTS that the connection origination from the TEE. The TEE may request an LTS location for the mobile device from the LTS using the connection. The TEE may provide the LTS location to applications of the mobile device. | 03-19-2015 |
Patent application number | Description | Published |
20080314871 | HIGH RESOLUTION PLASMA ETCH - A method for fabrication of microscopic structures that uses a beam process, such as beam-induced decomposition of a precursor, to deposit a mask in a precise pattern and then a selective, plasma beam is applied, comprising the steps of first creating a protective mask upon surface portions of a substrate using a beam process such as an electron beam, focused ion beam (FIB), or laser process, and secondly etching unmasked substrate portions using a selective plasma beam etch process. Optionally, a third step comprising the removal of the protective mask may be performed with a second, materially oppositely selective plasma beam process. | 12-25-2008 |
20090309018 | MULTI-SOURCE PLASMA FOCUSED ION BEAM SYSTEM - The present invention provides a plasma ion beam system that includes multiple gas sources and that can be used for performing multiple operations using different ion species to create or alter submicron features of a work piece. The system preferably uses an inductively coupled, magnetically enhanced ion beam source, suitable in conjunction with probe-forming optics sources to produce ion beams of a wide variety of ions without substantial kinetic energy oscillations induced by the source, thereby permitting formation of a high resolution beam. | 12-17-2009 |
20100294648 | Magnetically Enhanced, Inductively Coupled Plasma Source for a Focused Ion Beam System - The present invention provides an inductively coupled, magnetically enhanced ion beam source, suitable to be used in conjunction with probe-forming optics to produce an ion beam without kinetic energy oscillations induced by the source. | 11-25-2010 |
20110117748 | Localized Plasma Processing - A method of localized plasma processing improves processing speed and reduces work piece damage compared to charged particle beam deposition and etching. In one embodiment, a plasma jet exits a plasma generating chamber and activates a reactive gas. A jet of plasma and reactive gas impacts and processes the work piece. Because the plasma and the ions in the reactive gas can have low kinetic energy, there can be little or no surface damage. This is particularly useful for deposition processes. When it is desired to etch material, the reactive ions can be more energetic to enhance etching. | 05-19-2011 |
20110163068 | Multibeam System - A multibeam system in which a charged particle beam and one or more additional beams can be directed to the target within a single vacuum chamber. A first beam colunm preferably produces a beam for rapid processing, and a second beam column produces a beam for more precise processing. A third beam column can be used to produce a beam useful for forming an image of the sample while producing little or no change in the sample. | 07-07-2011 |
20120080407 | Multi-Source Plasma Focused Ion Beam System - The present invention provides a plasma ion beam system that includes multiple gas sources and that can be used for performing multiple operations using different ion species to create or alter submicron features of a work piece. The system preferably uses an inductively coupled, magnetically enhanced ion beam source, suitable in conjunction with probe-forming optics sources to produce ion beams of a wide variety of ions without substantial kinetic energy oscillations induced by the source, thereby permitting formation of a high resolution beam. | 04-05-2012 |
20120280136 | Plasma Source for Charged Particle Beam System - An inductively coupled plasma source for a focused charged particle beam system includes a dielectric liquid that insulates and cools the plasma chamber. A flow restrictor at an electrical potential that is a large fraction of the plasma potential reducing arcing because the voltage drop in the gas occurs primarily at relative high pressure. | 11-08-2012 |
20120319000 | MAGNETICALLY ENHANCED, INDUCTIVELY COUPLED PLASMA SOURCE FOR A FOCUSED ION BEAM SYSTEM - The present invention provides an inductively coupled, magnetically enhanced ion beam source, suitable to be used in conjunction with probe-forming optics to produce an ion beam without kinetic energy oscillations induced by the source. | 12-20-2012 |
20130192758 | High Resolution Plasma Etch - An apparatus for fabrication of microscopic structures that uses a beam process, such as beam-induced decomposition of a precursor, to deposit a mask in a precise pattern and then a selective, plasma beam is applied, comprising the steps of first creating a protective mask upon surface portions of a substrate using a beam process such as an electron beam, focused ion beam (FIB), or laser process, and secondly etching unmasked substrate portions using a selective plasma beam etch process. Optionally, a third step comprising the removal of the protective mask may be performed with a second, materially oppositely selective plasma beam process. | 08-01-2013 |
20130309421 | MULTI-SOURCE PLASMA FOCUSED ION BEAM SYSTEM - The present invention provides a plasma ion beam system that includes multiple gas sources and that can be used for performing multiple operations using different ion species to create or alter submicron features of a work piece. The system preferably uses an inductively coupled, magnetically enhanced ion beam source, suitable in conjunction with probe-forming optics sources to produce ion beams of a wide variety of ions without substantial kinetic energy oscillations induced by the source, thereby permitting formation of a high resolution beam. | 11-21-2013 |
20140312245 | MULTI-SOURCE PLASMA FOCUSED ION BEAM SYSTEM - The present invention provides a plasma ion beam system that includes multiple gas sources and that can be used for performing multiple operations using different ion species to create or alter submicron features of a work piece. The system preferably uses an inductively coupled, magnetically enhanced ion beam source, suitable in conjunction with probe-forming optics sources to produce ion beams of a wide variety of ions without substantial kinetic energy oscillations induced by the source, thereby permitting formation of a high resolution beam. | 10-23-2014 |
20150079796 | Charged-Particle-Beam Processing Using a Cluster Source - A cluster source is used to assist charged particle beam processing. For example, a protective layer is applied using a cluster source and a precursor gas. The large mass of the cluster and the low energy per atom or molecule in the cluster restricts damage to within a few nanometers of the surface. Fullerenes or clusters of fullerenes, bismuth, gold or Xe can be used with a precursor gas to deposit material onto a surface, or can be used with an etchant gas to etch the surface. Clusters can also be used to deposit material directly onto the surface to form a protective layer for charged particle beam processing or to provide energy to activate an etchant gas. | 03-19-2015 |
Patent application number | Description | Published |
20080303443 | POSITION LOCK TRIGGER - Position Lock Trigger apparatus employs oscilloscope circuitry and accompanying control software to provide to a user the capability to trigger an oscilloscope on a selected bit position in a received serial bit stream having a fixed pattern length, using either a synthesized, recovered, or external clock source. The selected trigger position can be moved forward and backward along the serial bit stream by one or more serial bit positions at a time in order to examine the entirety of the fixed pattern length serial bit stream, with or without regard to the actual bit sequences occurring in the serial stream. | 12-11-2008 |
20090109071 | SERIAL DATA ANALYSIS IMPROVEMENT - A method for improving performance and flexibility of serial data analysis in test instruments, is independent of data bit rate, encoding scheme or communication protocol embodied in the serial data. The serial data is input to a transmitter section, where it is demultiplexed into a plurality of multi-bit lanes, such as n bits for each of N lanes. The N lanes are then encoded into characters, the encoded N lanes having m bits per lane where m>n. Bit stuffing is used to adjust the data rate and/or to insert qualifiers. The stuffed, encoded N lanes are then multiplexed into N serial lanes, which are output from the transmitter section for input to a receiver section at a data rate that is optimal for the receiver section. In the receiver section the N lanes are deserialized, decoded and input to a word recognizer to generate a trigger event signal. | 04-30-2009 |
20090122852 | EYE VIOLATION AND EXCESS JITTER TRIGGER - An eye violation and excess jitter trigger for a digital signal uses a mask within a unit interval of the digital signal, such as a rectangular mask having corners defined by a high threshold, a low threshold, an early clock and a late clock, the early and late clocks being derived from a reference clock. The reference clock may be a recovered clock derived from the digital signal or from high and low threshold comparator outputs, or may be an external clock. For the excess jitter trigger, which is a special case of the eye violation trigger, the high and low thresholds are essentially equal. A status of the digital signal with respect to the mask is determined using the high and low thresholds and the early and late clocks, and a violation signal is output when the status indicates that a portion of the digital signal crossed into the mask. The violation signal may then be used to trigger data acquisition or for other purposes. | 05-14-2009 |
20100228508 | APPARATUS AND METHOD FOR PERFORMING BURST TRIGGERING IN A TEST AND MEASUREMENT INSTRUMENT - A test and measurement apparatus, system, and method for synchronizing an acquisition or triggering system to a specific burst of interest. The subject apparatus and method triggers on varying energy content of a signal qualified by time in the presence of high-frequency input signal bursts, by using an adjustable pulse width envelope detector, disposed in the signal path of the trigger circuitry, as a digital rectifier or to otherwise process and extract an envelope signal. An RF envelope probe having an analog envelope detector among other suitable components is disclosed. A method is implemented for isolating an interval of interest in a signal under test. An envelope detector circuit produces an envelope signal from the signal. Trigger circuitry receives the envelope signal from the envelope detector, and isolates the interval of interesting in the signal under test using the envelope signal. | 09-09-2010 |
20120194169 | dF/dT TRIGGER SYSTEM AND METHOD - A dF/dT trigger system and method includes instantaneously triggering on a frequency deviation of a data signal, which can be associated with an SSC signal. After receiving a signal at an input terminal of a test and measurement instrument, the signal is low-pass filtered and transmitted to trigger circuitry. When a frequency deviation rate in the filtered signal exceeds or crosses one or more thresholds, a trigger event is produced. Also disclosed is a test and measurement instrument including an input terminal to receive the signal, input circuitry to receive and process the signal, and dF/dT trigger circuitry configured to receive the signal and produce a trigger event when a frequency deviation in the signal exceeds or crosses one or more thresholds. | 08-02-2012 |
20130221980 | APPARATUS AND METHOD FOR PERFORMING BURST TRIGGERING IN A TEST AND MEASUREMENT INSTRUMENT - A test and measurement apparatus, system, and method for synchronizing an acquisition or triggering system to a specific burst of interest. The subject apparatus and method triggers on varying energy content of a signal qualified by time in the presence of high-frequency input signal bursts, by using an adjustable pulse width envelope detector, disposed in the signal path of the trigger circuitry, as a digital rectifier or to otherwise process and extract an envelope signal. An RF envelope probe having an analog envelope detector among other suitable components is disclosed. A method is implemented for isolating an interval of interest in a signal under test. An envelope detector circuit produces an envelope signal from the signal. Trigger circuitry receives the envelope signal from the envelope detector, and isolates the interval of interesting in the signal under test using the envelope signal. | 08-29-2013 |
20130231883 | APPARATUS AND METHOD FOR PERFORMING BURST TRIGGERING IN A TEST AND MEASUREMENT INSTRUMENT - A test and measurement apparatus, system, and method for synchronizing an acquisition or triggering system to a specific burst of interest. The subject apparatus and method triggers on varying energy content of a signal qualified by time in the presence of high-frequency input signal bursts, by using an adjustable pulse width envelope detector, disposed in the signal path of the trigger circuitry, as a digital rectifier or to otherwise process and extract an envelope signal. An RF envelope probe having an analog envelope detector among other suitable components is disclosed. A method is implemented for isolating an interval of interest in a signal under test. An envelope detector circuit produces an envelope signal from the signal. Trigger circuitry receives the envelope signal from the envelope detector, and isolates the interval of interesting in the signal under test using the envelope signal. | 09-05-2013 |
20140049328 | RING OSCILLATOR TIMER CIRCUIT - A ring oscillator timer circuit can include a plurality of electrical components arranged in a cascaded combination of delay stages connected in a closed loop chain. The timer circuit can begin oscillation a programmable number of gate delays after receiving a start signal. In some examples, the number of gate delays can be programmed to fractional values. In further examples, the ring oscillator timer circuit can include a counter having an input electrically coupled to an output of a reset component. | 02-20-2014 |
Patent application number | Description | Published |
20100111646 | Method and apparatus for handling pipe - An apparatus and method for handling pipe includes an elongate frame structure for mounting on a ground surface, in which a carriage unit is mounted on the frame structure and is operable for selective and reciprocal shifting along the frame structure. A boom member mounted on the carriage unit is operable for selected pivotal movement relative to the carriage unit, and a plane generally parallel to the boom member's longitudinal axis, about a generally horizontal pivot axis oriented transverse to the direction of shifting of the carriage unit along the frame structure. An elongate pipe carrier mounted on the boom member as dimensioned for receiving pipe so that the pipe's longitudinal axis is substantially parallel to the longitudinal axis of the boom member and the pipe member, wherein the pipe carrier is operable for selective pivotal movement about its longitudinal axis. | 05-06-2010 |
20130153309 | CENTERING DEVICE FOR LOAD TRANSPORTING APPARATUS - Embodiments of the present invention are directed to a load transporting apparatus that automatically centers a support foot of the apparatus about a roller assembly during a recovery phase of an incremental walking movement. In particular, the load transporting apparatus includes guide devices positioned adjacent to a roller assembly that deflect a biasing device during non-linear load transporting movements, where the biasing device acts to automatically return the support foot to a centered position relative to the roller assembly after a non-linear movement has been completed and the support foot is raised above a ground surface. | 06-20-2013 |
20130156538 | ROTATION DEVICE FOR LOAD TRANSPORTING APPARATUS - Embodiments of the present invention are directed to a load transporting apparatus that is capable of being steered while transporting a load across a base surface. In particular, the load transporting apparatus includes a roller track configured to support movement of a roller assembly, and a support foot that is connected to the roller track with a pin connector. During load transport, the support foot can be maintained in a substantially similar position relative to a frame structure supporting the load even when the transport movement is not in a parallel direction to the orientation of the support foot. | 06-20-2013 |
20130156539 | ALIGNMENT RESTORATION DEVICE FOR LOAD TRANSPORTING APPARATUS - Embodiments of the present invention are directed to a load transporting apparatus that automatically aligns a support foot of the apparatus with a load-bearing frame connected to the load transporting apparatus during a recovery phase of an incremental walking movement. In particular, the load transporting apparatus includes a linking device attached to a support foot of the apparatus and a biasing device connected to the linking device that is deflected during non-linear load transporting movements, where the biasing device acts to automatically return the support foot to an aligned position relative to the load-bearing frame after a non-linear movement has been completed and the support foot is raised above a ground surface. | 06-20-2013 |
20130277124 | CENTERING DEVICE FOR LOAD TRANSPORTING APPARATUS - Embodiments of the present invention are directed to a load transporting apparatus that automatically centers a support foot of the apparatus about a roller assembly during a recovery phase of an incremental walking movement. In particular, the load transporting apparatus includes guide devices positioned adjacent to a roller assembly that deflect a biasing device during non-linear load transporting movements, where the biasing device acts to automatically return the support foot to a centered position relative to the roller assembly after a non-linear movement has been completed and the support foot is raised above a ground surface. | 10-24-2013 |
20140014417 | ALIGNMENT RESTORATION DEVICE FOR LOAD TRANSPORTING APPARATUS - Embodiments of the present invention are directed to a load transporting apparatus that automatically aligns a support foot of the apparatus with a load-bearing frame connected to the load transporting apparatus during a recovery phase of an incremental walking movement. In particular, the load transporting apparatus includes a linking device attached to a support foot of the apparatus and a biasing device connected to the linking device that is deflected during non-linear load transporting movements, where the biasing device acts to automatically return the support foot to an aligned position relative to the load-bearing frame after a non-linear movement has been completed and the support foot is raised above a ground surface. | 01-16-2014 |
20140158342 | RIG WITH DRAWWORKS AND HOISTING DEVICE - A rig includes a base structure in contact with an operating surface and configured to support the rig on the operating surface. A transportation system is operatively coupled to the base structure and is configured to position the rig over an extraction point. A raised platform is connected to the base structure by a plurality of support beams. A hoisting device is connected to the raised platform. A drawworks is supported on the base structure and is operatively connected to the hoisting device. | 06-12-2014 |
20140161581 | ROTATION DEVICE FOR LOAD TRANSPORTING APPARATUS - Embodiments of the present invention are directed to a load transporting apparatus that is capable of being steered while transporting a load across a base surface. In particular, the load transporting apparatus includes a roller track configured to support movement of a roller assembly, and a support foot that is connected to the roller track with a pin connector. During load transport, the support foot can be maintained in a substantially similar position relative to a frame structure supporting the load even when the transport movement is not in a parallel direction to the orientation of the support foot. | 06-12-2014 |
20150053426 | MOUNTING STRUCTURE WITH STORABLE TRANSPORT SYSTEM - A mounting structure for a rig may include a base configured to support the mounting structure on an operating surface and a plurality of transport systems operatively connected to the base and configured to lift the mounting structure off of the operating surface. An elevated rig platform may be connected to the base by a plurality of support struts, wherein at least some of the support struts comprise a mounting connection that is configured to pivot to lower the elevated rig platform toward the base and place the mounting structure in a partially collapsed state. Additionally, a connecting member may be attached to one or more of the plurality of transport systems, wherein in response to the elevated rig platform being lowered to the partially collapsed state, the connecting member may be configured to displace at least a portion of the one or more transport systems. | 02-26-2015 |
Patent application number | Description | Published |
20090064538 | ARTICLE OF FOOTWEAR WITH IMPROVED STABILITY AND BALANCE - The stability and balance offered by an article of footwear is improved by including a rigid layer in an outsole assembly of the article of footwear. The rigid layer may include a material of at least a predefined rigidity. For example, an outsole may be fitted with a carbon fiber plate that maintains the shape and a flatness of the outsole assembly. The rigid layer may be attached to one or more other layers that may be configured for impact force attenuation and comfort. In one or more arrangements, the rigid layer may be sandwiched between two other layers. Alternatively, the rigid layer may be insertable into a layer of the outsole. A channel may cut into a layer of the outsole to distribute weight to an outside portion of the outsole. This distribution of weight to the outside portion of the outsole may improve stability and balance. | 03-12-2009 |
20090100705 | Article Of Footwear With A Sole Structure Having Fluid-Filled Support Elements - An article of footwear is disclosed that includes an upper and a sole structure secured to the upper. The sole structure incorporates a support element that includes a fluid-filled chamber. The chamber may be bonded to other portions of the sole to secure the chamber within the sole. A surface of the chamber may also be angled to form a corresponding bevel in a lower surface of the sole structure, potentially in a rear-lateral area of the sole structure. A plate may also extend under a portion of the chamber. | 04-23-2009 |
20090158622 | ARTICLE OF FOOTWEAR WITH ILLUMINATED CHAMBER - An article of footwear includes an upper and a sole assembly secured to the upper. The sole assembly has at least one fluid-filled chamber capable of transmitting light and a recess. A light source is positioned in the recess, and an outsole is secured to a lower surface of the sole assembly. | 06-25-2009 |
20110131833 | Article Of Footwear With A Sole Structure Having Fluid-Filled Support Elements - An article of footwear is disclosed that includes an upper and a sole structure secured to the upper. The sole structure incorporates a support element that includes a fluid-filled chamber. The chamber may be bonded to other portions of the sole to secure the chamber within the sole. A surface of the chamber may also be angled to form a corresponding bevel in a lower surface of the sole structure, potentially in a rear-lateral area of the sole structure. A plate may also extend under a portion of the chamber. | 06-09-2011 |
20110138654 | Article Of Footwear With A Sole Structure Having Fluid-Filled Support Elements - An article of footwear is disclosed that includes an upper and a sole structure secured to the upper. The sole structure incorporates a support element that includes a fluid-filled chamber. The chamber may be bonded to other portions of the sole to secure the chamber within the sole. A surface of the chamber may also be angled to form a corresponding bevel in a lower surface of the sole structure, potentially in a rear-lateral area of the sole structure. A plate may also extend under a portion of the chamber. | 06-16-2011 |
20120011743 | Article of Footwear with Improved Stability and Balance - The stability and balance offered by an article of footwear is improved by including a rigid layer in an outsole assembly of the article of footwear. The rigid layer may include a material of at least a predefined rigidity. For example, an outsole may be fitted with a carbon fiber plate that maintains the shape and a flatness of the outsole assembly. The rigid layer may be attached to one or more other layers that may be configured for impact force attenuation and comfort. In one or more arrangements, the rigid layer may be sandwiched between two other layers. Alternatively, the rigid layer may be insertable into a layer of the outsole. A channel may cut into a layer of the outsole to distribute weight to an outside portion of the outsole. This distribution of weight to the outside portion of the outsole may improve stability and balance. | 01-19-2012 |
20120159812 | ARTICLE OF FOOTWEAR WITH FOREFOOT PLATES - An article of footwear includes an upper and a sole assembly secured to the upper. The sole assembly has an upper plate and a lower plate in a forefoot portion of the sole assembly, and a plurality of lower plate arms curving downwardly from the upper plate. | 06-28-2012 |
20130199057 | ARTICLE OF FOOTWEAR WITH FOREFOOT PLATES - An article of footwear includes an upper and a sole assembly secured to the upper. The sole assembly has an upper plate and a lower plate in a forefoot portion of the sole assembly, and a plurality of lower plate arms curving downwardly from the upper plate. | 08-08-2013 |
Patent application number | Description | Published |
20100251578 | Traction Elements - Traction elements for an article of footwear can include stabilizer elements. An extendable traction element for an article of footwear can include an elongatable extender attached to another portion of a sole structure. An actuator can rest within the extender and cause elongation of the extender in response to a force from the foot of a wearer. | 10-07-2010 |
20120192458 | Customizable Stud for an Article of Footwear - Customizable studs for articles of footwear having variable ground interaction characteristics are disclosed. A customizable stud may generally include a fastening member formed of a fastening member cap and fastening member shaft, a plurality of rings, and a washer. The fastening member cap and the plurality of rings define the ground interaction characteristics of the stud. To vary the ground interaction characteristics, the contour, height, and material makeup of the stud may be altered by varying the shape, number, thickness, length, and material of the rings. The stud components may be sold as a kit with at least one fastening member and a plurality of rings with varying characteristics. The kit may also include at least one washer. | 08-02-2012 |
20130145656 | ARTICLE OF FOOTWEAR HAVING CHAMBER CAPABLE OF HOLDING VACUUM - An article of footwear includes an upper and a sole. The article of footwear also includes an outer surface defined on the upper or the sole. Moreover, the article of footwear includes a chamber wall operably coupled to one of the upper and the sole. The chamber wall defines at least a portion of a chamber operable to hold a vacuum for at least partially conforming the footwear to the foot of the wearer. Moreover, the footwear includes a valve including a passage that extends through the chamber wall to be in selective fluid communication with the chamber. The valve is operable to provide suction to draw the vacuum within the chamber. The valve is partially defined by an outer rim, and the outer rim is flush with the outer surface or recessed inward from the outer surface toward the chamber. | 06-13-2013 |
20130340295 | Sole Structure for Article of Footwear - A sole structure for an article of footwear includes an outer fabric layer and an inner chassis that is more rigid than the fabric layer. The fabric layer includes a plurality of fabric protrusions and the inner chassis includes a plurality of chassis protrusions that correspond to the fabric protrusions. Both the fabric protrusions and the chassis protrusions extend into cleat members of the sole structure. | 12-26-2013 |
20140202044 | Ultralightweight Adaptive Heel Member - A heel member includes a base portion, a medial portion and a lateral portion. The lateral portion is a wall-like portion including a plurality of windows. The medial portion comprises a plurality of projecting portions that extend upwardly from the base portion. The medial portion may be taller than the lateral portion. The medial portion may be more flexible than the lateral portion. | 07-24-2014 |
20140237858 | Article of Footwear With Reinforced Elastic Upper - An article of footwear is provided, which may include an upper and a sole structure. The upper may include an elastic skin material forming at least a portion of an external surface of the upper. In addition, the upper may include substantially inelastic reinforcing material selectively located adjacent portions of the elastic skin material, wherein the elastic skin material is more elastic than the substantially inelastic reinforcing material. | 08-28-2014 |
20140317962 | Footwear Upper Having Selectively Located Padding - An article of footwear is provided, which may include an upper and a sole structure. The upper may include an exposed outer layer forming at least a portion of an external surface of the upper. The upper may also include a polymer foam material selectively located on an inner side of the exposed outer layer and adjacent portions of the exposed outer layer, thereby forming padded portions of the upper. The padded portions of the upper may be located in areas of the article of footwear that correspond with predetermined bones of a foot of a wearer of the article of footwear. | 10-30-2014 |
20140366401 | Article of Footwear With Sole Member - An article of footwear has a sole member with an exposed central torsion bar or rod connecting the heel region of the sole member to the forefoot region of the sole member. The torsion bar or rod may be supported at either end by sockets of the sole member. The torsion bar or rod may also be supported at one or more intermediate points by a hollow component. This hollow component may itself be supported by ribs extending to the medial and lateral sides of the sole member, respectively. The torsion bar or rod, the sockets, the hollow component and the ribs form a suspension structure connecting the forefoot region of the sole member to the heel region of the sole member. | 12-18-2014 |
20140366402 | Sole Plate Assembly And Method of Making - An ultra-lightweight sole plate assembly can include a ground engaging outer shell, a structural component, and one or more cleat members. A method of making the outer shell includes thermoforming a foil material such as polyamide. Thermoforming the foil includes applying vacuum to the foil material. Excess foil material can be trimmed from the outer shell. The structural component can be made by injecting a molding material onto the outer shell. The cleat members can be co-molded with the shell during forming of the structural component. The resulting sole plate assembly has a reduced weight with the desired traction, strength and durability. | 12-18-2014 |