Patent application number | Description | Published |
20130048379 | Controlled Full Flow Pressure Pulser for Measurement While Drilling (MWD) Device - An apparatus, method, and system described for generating pressure pulses in drilling fluid utilizing a flow throttling device which includes a controllable pulser operating sequentially within a downhole assembly within a drill string of a drill pipe. The system includes drilling fluid, fluid flow, and fluid drilling pump which when combined creates fluid flow into a bore pipe annulus within the downhole assembly creating a base line bore pipe pressure wherein bore pipe pressure is sensed via a sensor and information is sent to a Digital Signal Processor (DSP) that interprets the information. The DSP also receives information from an annulus pressure sensor that senses drilling fluid pressure as it returns to the pump. The DSP recognizes pressure variation input from the annulus pressure sensor and bore pipe pressure sensor and detects pressure variation providing signals as data information to the DSP, determining required action to adjust pulser operation. | 02-28-2013 |
20130051177 | Full Flow Pulser for Measurement While Drilling (MWD) Device - An apparatus, method, and system described for generating pressure pulses in a drilling fluid utilizing a flow throttling device longitudinally and axially positioned within the center of a main valve actuator assembly is described. The main valve actuator assembly includes a main valve pressure chamber, a magnetic cup encompassing a rotary magnetic coupling, and a pilot actuator assembly. Passage of drilling fluid through a series of orifices, valves, shields, and screens where the fluid eventually combines with a pilot exit fluid that flows toward a main exit flow such that as the fluid becomes a pilot fluid that ultimately combines with the main flow such that the combined fluid causes one or more flow throttling devices to generate large, rapid controllable pulses that produce transmission of well developed signals easily distinguished from other noise resulting from other vibrations due to nearby equipment that is within or exterior to the borehole such that the signals also provide predetermined height, width and shape. | 02-28-2013 |
Patent application number | Description | Published |
20120066372 | SELECTIVE REGISTRATION FOR REMOTE EVENT NOTIFICATIONS IN PROCESSING NODE CLUSTERS - An event notification system for distributed processing systems provides remote and local node event notification in systems that require local registration of an event consumer in order produce an event notifications. To provide notification of an event occurring on a remote node, either event consumers on all nodes in the cluster register locally to receive event notifications and specify that the event is a cluster event, in which case the nodes send notification of their locally-occurring events to all nodes, or remote registrations are accepted at nodes and if a local consumer for the event is not present, a listener thread registers as an event consumer. The listener thread sends the event notifications to the remote nodes registered as consumers for the event by observing communication between the event producer and the local consumer, or receiving the event notifications directly if there is no local consumer. | 03-15-2012 |
20120066694 | EVENT OVERFLOW HANDLING BY COALESCING AND UPDATING PREVIOUSLY-QUEUED EVENT NOTIFICATION - An event notification system for distributed processing systems provides reduction of queue space and event processing bandwidth associated with duplicate events such as a particular event that is duplicated and results in multiple event notifications propagated for multiple consumers. When a duplicate event notification is received at an input to an event notification queue, rather than queuing the duplicate event notification, a sequence number of the event notification already in the queue is updated to indicate to the event consumer, exactly how many duplicate events have been received. The timestamp of the updated event notification may also be set to the timestamp of the most recently received duplicate event notification. | 03-15-2012 |
20120117223 | CHANGING AN EVENT IDENTIFIER OF A TRANSIENT EVENT IN AN EVENT NOTIFICATION SYSTEM - An event notification system for distributed processing systems provides for replacement of event identifiers associated with transient objects, such as processes within the processing system. An event management interface receives a notification from an event producer that an identifier of an event produced by the event producer is no longer valid. The event management interface blocks event notification for the event and dissociates an event registration entry associated with the event from the event identifier. A new event identifier is received from the event producer by the event management interface, which associates the registration entry with the new event identifier. Event notification for the event is then resumed. | 05-10-2012 |
20120198477 | EVENT OVERFLOW HANDLING BY COALESCING AND UPDATING PREVIOUSLY-QUEUED EVENT NOTIFICATION - An event notification method for distributed processing systems provides reduction of queue space and event processing bandwidth associated with duplicate events such as a particular event that is duplicated and results in multiple event notifications propagated for multiple consumers. When a duplicate event notification is received at an input to an event notification queue, rather than queuing the duplicate event notification, a sequence number of the event notification already in the queue is updated to indicate to the event consumer, exactly how many duplicate events have been received. The timestamp of the updated event notification may also be set to the timestamp of the most recently received duplicate event notification. | 08-02-2012 |
20120198478 | SELECTIVE REGISTRATION FOR REMOTE EVENT NOTIFICATIONS IN PROCESSING NODE CLUSTERS - An event notification method for distributed processing systems provides remote and local node event notification in systems that require local registration of an event consumer in order produce an event notifications. To provide notification of an event occurring on a remote node, either event consumers on all nodes in the cluster register locally to receive event notifications and specify that the event is a cluster event, in which case the nodes send notification of their locally-occurring events to all nodes, or remote registrations are accepted at nodes and if a local consumer for the event is not present, a listener thread registers as an event consumer. The listener thread sends the event notifications to the remote nodes registered as consumers for the event by observing communication between the event producer and the local consumer, or receiving the event notifications directly if there is no local consumer. | 08-02-2012 |
Patent application number | Description | Published |
20110114323 | Heat Generation Process for Treating Oilfield Deposits - Generating heat within a combination solvent/acid system removes undesirable deposits from petroleum reservoir formations (especially the near well-bore region), oilfield equipment, and petroleum processing equipment. An exothermic reaction occurs between the solvent and the acid and the heat evolved helps remove organic solid deposits. The acids may include organic acid compounds, such as sulfonic acids, sulfuric acid and nitric acid. The solvents may include terpene- and terpene-derivative-containing solvents, including, but not necessarily limited to, limonene, pinene, dipentene, myrcene, turpentines and compounds having at least one double bond, such as methyl furan, dienes, styrene, vinyl acetate and the like. The exothermic reaction produces a great amount of heat, and together with using certain acids and solvents already known as effective to remove paraffin and asphaltene deposition, removing such deposits is improved. | 05-19-2011 |
Patent application number | Description | Published |
20130035863 | SYSTEM AND METHOD FOR FRACTIONATION OF A WELL USING A THREE DIMENSIONAL WELLBORE PROFILE WITH AN EXECUTIVE DASHBOARD - A system and computer assisted method to fractionate an oil or other well using a user moveable and rotatable three dimensional model of a lateral pay zone for a directionally drilled well, and other information relative to the lateral pay zone, enabling accurate identification of fractionation zones, accurate placement of well perforating guns, and accurate insertion of fractionation plugs to maximize production of the well, while additionally enabling the three dimensional model of the lateral pay zone to be viewable and updatable by on site uses at the location of the fractionation and by remote users as events occur, in some cases, in providing updates in less than 1 minute. | 02-07-2013 |
20130269411 | METHOD FOR CONTINUOUS GAS ANALYSIS - A method for gas analysis can include continuously diverting a portion of drilling fluid into a sample chamber from a drilling fluid stream, creating a bidirectional drilling fluid circulation to liberate gas from the drilling fluid, applying a suction to a gas capturing chamber, and allowing a sample of the liberated fluid to continuously flow through the gas capturing chamber, continuously be filtered, and continuously flow into a gas analyzer. The method can include maintaining the sample chamber in an open configuration or decompressing the gas capturing chamber by closing off one or more sample inlets and sample outlets and exhausting portions of the liberated fluid that do not flow to the gas analyzer. The method can include simultaneously providing analysis data to client devices. | 10-17-2013 |
20130270006 | DRILLING RIG WITH CONTINUOUS GAS ANALYSIS - A drilling rig having continuous gas analysis can include a substructure, base, mast, pipe handler, mud pump, drilling rig power source, drawworks, cabling, rotating head, blowout preventer, drill string, and drill bit. A rig server of the drilling rig can have a rig processor and rig data storage for implementing rig operations. Piping can be in fluid communication between the blowout preventer and a gas analyzer system for real-time measurement of a concentration of gases in a drilling fluid. The gas analyzer system can include a sample chamber, means for agitating and creating a vortex, gas capturing chamber for receiving liberated fluid, gas analyzer for providing real-time gas speciation of the liberated fluid, suction pump for pulling the liberated fluid, filtration means, exhaust port, and exhaust line for flowing non-analyzed fluid to a drilling fluid storage chamber, drilling fluid conduit, or both. | 10-17-2013 |
20130275047 | GAS TRAP WITH GAS ANALYZER SYSTEM FOR CONTINUOUS GAS ANALYSIS - A gas trap with a gas analyzer for continuous gas analysis can include a sample chamber, means for agitating and creating a vortex, gas capturing chamber for receiving liberated gas, gas analyzer for providing real-time gas speciation of the liberated gas. A suction pump can pull the liberated fluid, a filtration means can condition the liberated fluid, and an exhaust port can exhaust analyzed fluid. An exhaust line can flow non-analyzed fluid to a drilling fluid storage chamber, drilling fluid stream, or both. | 10-17-2013 |
20130275053 | COMPUTER IMPLEMENTED METHOD FOR ANALYZING A GAS SAMPLE USING AN INLINE GAS ANALYZER - A computer implemented, real-time, continuous, electromagnetic, spectroscopic, high sensitivity, digital method for analyzing a gas sample can include using an inline gas component analyzer to receive the gas sample. An electromagnetic beam generator can generate a beam to pass through a filter in a sample chamber and into the sample gas to form a sample wavelength. The sample wavelength can pass into an electromagnetic beam detector. A processor and data storage can be in communication with each component of the inline gas component analyzer for monitoring and controlling thereof. The processor can be in communication with client devices through a network for remote monitoring and controlling thereof. The inline gas component analyzer can be calibrated with a calibration gas sample. | 10-17-2013 |
20130346754 | CLOUD COMPUTING SYSTEM FOR REAL-TIME STREAMING OF WELL LOGGING DATA WITH SELF-ALIGNING SATELLITES - A cloud computing system for real-time streaming of drilling data from a drilling rig using satellites, wherein the system includes client devices for transmitting the drilling data. Radio boxes disposed around the drilling rig to form a local area network for connecting with the client devices. A router and switch connected to the local area network for receiving and transmitting the drilling data. A processor and data storage configured to receive the drilling data and form well logging data for transmission to the router and switch. A modem in communication with the router and switch used to send the drilling data to satellite dishes. A server positioned apart from the drilling rig used to receive drilling data and from well logs and executive dashboards. The server can stream the drilling data, well logs, and executive dashboard in real-time to remote client devices. | 12-26-2013 |
20140000964 | CLOUD COMPUTING METHOD FOR GEOSTEERING DIRECTIONAL DRILLING APPARATUS | 01-02-2014 |
20150039233 | METHOD FOR NEAR REAL TIME SURFACE LOGGING OF A HYDROCARBON OR GEOTHERMAL WELL USING A MASS SPECTROMETER - An automatic method for providing geological trends and real time mapping of a geological basin using a mass spectrometer. The method provides information from a mass spectrometer on fluid samples from a wellbore into a geochemical surface well log with graphical tracks in real time. The dataset includes geochemical, engineering, and geological. The viewable geochemical well log provides information on well fluids and rock, and displays data in graphical tracks on client devices. The mass spectrometer receives samples from a gas trap connected to the wellbore, performs analysis on the samples, and communicates in real time to a geochemical surface well log with a plurality of graphical tracks which is then further communicated to a client device via a network. | 02-05-2015 |
Patent application number | Description | Published |
20110219450 | System And Method For Malware Detection - According to one embodiment, a computer-implemented method for execution on one or more processors includes receiving a first file and determining a file type of the first file. The method also includes determining, according to a first policy, a plurality of malware detection schemes to apply to the first file based on the determined file type of the first file. In addition, the method includes scheduling the application of the determined plurality of malware detection schemes to the first file amongst a plurality of detection nodes according to a second policy. Further, the method includes determining, in response to determining the results of applying the plurality of malware detection schemes, that the first file is malware or determining that the first file is suspected malware according to a third policy. | 09-08-2011 |
20110219451 | System And Method For Host-Level Malware Detection - According to one embodiment, a computer-implemented method includes: accessing a set of configuration parameters, accessing a set of identifiers of files known not to be malware, and accessing a set of identifiers of files known to be malware. Further, the method includes: comparing a first file to the set of configuration parameters, determining that a first hash of the first file is not in the set of identifiers of files known not to be malware and that the first hash is not in the set of identifiers of files known to be malware, and sending the at least one file and information related to the at least one file to be analyzed for malware. The method includes deleting the set of configuration parameters, the set of identifiers of files known not to be malware, and the set of identifiers of files known to be malware after sending the first file. | 09-08-2011 |
20120216046 | System and Method for Decrypting Files - In accordance with particular embodiments, a computer-implemented method for execution by one or more processors includes intercepting a communication comprising a message. The method also includes identifying words from within the message. The method further includes storing in a dictionary words from within the message of the communication and one or more parameters of the communication for each of the words. The dictionary comprises a plurality of words from a plurality of intercepted text-based communications. The method also includes receiving an encrypted file that is configured to be decrypted using a password. The method additionally includes identifying words from the dictionary to be used to attempt to decrypt the encrypted file. The identified words are identified based on at least one parameter associated with the encrypted file and the one or more parameters stored in the dictionary. The method further includes attempting to decrypt the encrypted file using at least a portion of the identified words from the dictionary as the password for decrypting the encrypted attachment. | 08-23-2012 |
20120266245 | Multi-Nodal Malware Analysis - A computer-implemented method includes accessing, by an analysis console, information related to a first file received at a first host of a plurality of hosts. Each host is capable of running a corresponding set of malware detection processes. The information includes: an identifier of the first file; and data indicating a first result of the first host applying the set of malware detection processes to the first file. The identifier is generated by the first host and is usable by each of the hosts to determine whether a second file comprises content substantially equivalent to content of the first file. The analysis console generates a first output including: the identifier of the first file; and a second result indicating whether the first file comprises malware. The second result is usable by each of the hosts to determine whether the second file comprises malware. The first output is propagated to the hosts. | 10-18-2012 |
20120330801 | Distributed Malware Detection - According to one embodiment, a computer-implemented method includes accessing, using one or more processing units, a first file of a plurality of files requested to be analyzed for malware. Each of the plurality of files corresponds to a respective remote client of a plurality of remote clients. Further, the method includes: processing, using the one or more processing units, an analysis of the first file for malware; and generating an output comprising an indication of whether the first file comprises malware. The method also includes accessing, using the one or more processing units, an address for a first remote client of the plurality of remote clients. The first remote client is the respective remote client corresponding to the first file. In addition, the method includes: sending, using the one or more processing units, the output in a communication addressed to the first remote client corresponding to the first file. | 12-27-2012 |
20120330863 | System and Method for Sharing Malware Analysis Results - In certain embodiments, a computer-implemented method includes accessing information related to a first file determined to satisfy at least one of a plurality of suspected malware conditions. A first of a number of manager consoles may access the information, each manager console being communicatively coupled to a respective network of a number of networks. A request may be generated for a determination of whether the first file comprises malware. The determination may be conducted at a master manager console. Data may be accessed indicating a result, outputted by the master manager console, of the determination of whether the first file comprises malware. A sharing policy may be accessed and used to determine whether the result is sharable with a second one of the manager consoles. If the result is sharable, a message comprising the result may be generated to be sent to the second manager console. | 12-27-2012 |
20130081142 | System, Method, and Logic for Classifying Communications - In accordance with particular embodiments, a method includes intercepting a communication and extracting metadata associated with the communication. The extracted metadata comprises a plurality of different fields from communication metadata and file metadata. The method further includes determining a score, based on previous communications, for each field of the extracted metadata. The score is indicative of a likelihood that the communication is a malicious communication. The method additionally includes combining the scores to generate a combined score for the communication based on an algorithm developed from the previous communications. The method also includes generating, based on the combined score at a first time, a predicted classification as to whether the communication is a malicious communication. The method further includes receiving, at a second time subsequent to the first time, an indication of whether the communication is a malicious communication and updating the algorithm based on the indication. | 03-28-2013 |
20130145466 | System And Method For Detecting Malware In Documents - In one embodiment, a method includes identifying, using one or more processors, a plurality of characteristics of a Portable Document Format (PDF) file. The method also includes determining, using the one or more processors, for each of the plurality of characteristics, a score corresponding to the characteristic. In addition, the method includes comparing, using the one or more processors, the determined scores to a first threshold. Based at least on the comparison of the determined scores to the first threshold, the method includes determining, using the one or more processors, that the PDF file is potential malware. | 06-06-2013 |
20130145471 | Detecting Malware Using Stored Patterns - In one embodiment, a method includes identifying a plurality of portions of a file and comparing the plurality of portions of the file to a plurality of stored patterns. The plurality of stored patterns include portions of known malware. The method also includes determining, from the plurality of portions of the file and based on the comparing of the plurality of portions of the file to the plurality of stored patterns, a set of matching portions. The set of matching portions include one or more of the plurality of portions of the file. In addition, the method includes determining a score for each portion in the set of matching portions and providing information regarding the set of matching portions. The information includes the scores determined for each portion of the set of matching portions. | 06-06-2013 |
Patent application number | Description | Published |
20110273129 | Managing Renewable Power Generation - A power delivery rate from a renewable power source to a load is managed by determining, by processing circuitry, a change in a power generation rate, determining, by the processing circuitry, whether the change in the power generation rate exceeds a limit, and then, adjusting, by control circuitry, a power transfer rate to or from a power storage device, such that the adjusting is sufficient to prevent the power delivery rate from exceeding the limit. | 11-10-2011 |
20130278203 | Managing Renewable Power Generation - A power delivery rate from a renewable power source to a load is managed by determining, by processing circuitry, a change in a power generation rate, determining, by the processing circuitry, whether the change in the power generation rate exceeds a limit, and then, adjusting, by control circuitry, a power transfer rate to or from a power storage device, such that the adjusting is sufficient to prevent the power delivery rate from exceeding the limit. | 10-24-2013 |
20140183961 | Responding to Local Grid Events and Distributed Grid Events - A control system for an energy storage device is coupled to sensors on an electrical grid. The control system is configured to receive a measurement from each of the sensors. The control system determines, based on the received measurements, whether a grid event is a local event or a distributed event. The control system selects a response mode for controlling the energy storage device based on whether the grid event is determined to be a local event or a distributed event. | 07-03-2014 |
Patent application number | Description | Published |
20110296054 | Network Message Transmission - A method, computer program product, and apparatus for transmitting a message over a network are presented. A processor unit receives the message for transmission over the network and a portion of an address for a source from which the message is to be transmitted. The processor unit identifies an interface configured to transmit messages from the source onto the network using the portion of the address. The processor unit then transmits the message from the source onto the network using the interface. | 12-01-2011 |
20120036179 | Using Unique Local Unicast Addresses in a Global Domain Name Server - Mechanisms are provided for resolving a domain name. The mechanisms send a request, from a resolver executing on the data processing system, to a name server requesting a resolution of a domain name into an address. A response to the request is received that includes a local address. The local address has a scope that is local to a site and is not global in scope. A determination is made as to whether the local address corresponds to a domain associated with the resolver. Communications are then performed with a device corresponding to the domain name using the local address in response to a determination that the local address corresponds to a domain associated with the resolver. | 02-09-2012 |
20120036241 | Using Unique Local Unicast Addresses in a Global Domain Name Server by Providing a Centralized Registry - Mechanisms are provided for assigning addresses for use in communications between computing devices. With these mechanisms, a centralized domain name registrar server assigns a unique global identifier to a domain of a site such that the unique global identifier uniquely identifies the domain. The unique global identifier is received in a data processing system from the centralized domain name registrar server. The site is divided into a plurality of sub-domains and a unique sub-domain identifier is assigned to each sub-domain in the site such that the unique sub-domain identifier uniquely identifies a corresponding sub-domain in the site. The global identifier for the domain of the site and the sub-domain identifiers of the sub-domains in the plurality of sub-domains are provided by the data processing system to routers of the site for use in associating addresses with devices of the site. | 02-09-2012 |
20120110207 | EMBEDDING ZONE IDENTIFIERS IN IP ADDRESSES - Internet Protocol Version 6 (IPv6) was described in RFC 2460 in 1998 and was designed to succeed Internet Protocol Version 4. In 2005, RFC 4007 was published. RFC 4007 specifies the architectural characteristics and usage of IPv6 addresses with different zones. Some applications (“legacy applications”) were not designed to support the implementations described in RFC 4007. Therefore, the legacy applications may accept IPV6 addresses as input, but may not accept zone identifiers. Embodiments include conveying an IPv6 link-local unicast address with an embedded zone identifier to a legacy application. | 05-03-2012 |
20120198095 | Using Unique Local Unicast Addresses in a Global Domain Name Server by Providing a Centralized Registry - Mechanisms are provided for assigning addresses for use in communications between computing devices. With these mechanisms, a centralized domain name registrar server assigns a unique global identifier to a domain of a site such that the unique global identifier uniquely identifies the domain. The unique global identifier is received in a data processing system from the centralized domain name registrar server. The site is divided into a plurality of sub-domains and a unique sub-domain identifier is assigned to each sub-domain in the site such that the unique sub-domain identifier uniquely identifies a corresponding sub-domain in the site. The global identifier for the domain of the site and the sub-domain identifiers of the sub-domains in the plurality of sub-domains are provided by the data processing system to routers of the site for use in associating addresses with devices of the site. | 08-02-2012 |
20120323987 | SHARED NETWORK RESPONSE CACHE - A method is disclosed for reducing network traffic using a shared network response cache. The method intercepts a network request to prevent the network request from entering a data network. The network request is sent by a client and is intended for one or more recipients on the data network. The method checks a shared response cache for an entry matching the network request. The method sends a local response to the client in response to an entry in the shared response cache matching the network request. The local response satisfies the network request based on information from the matching entry in the shared response cache. | 12-20-2012 |
20120324035 | SHARED NETWORK RESPONSE CACHE - An apparatus and system are disclosed for reducing network traffic using a shared network response cache. A request filter module intercepts a network request to prevent the network request from entering a data network. The network request is sent by a client and is intended for one or more recipients on the data network. A cache check module checks a shared response cache for an entry matching the network request. A local response module sends a local response to the client in response to an entry in the shared response cache matching the network request. The local response satisfies the network request based on information from the matching entry in the shared response cache. | 12-20-2012 |
20130003600 | Configuration of Interfaces Communicatively Coupled to Link-Local Zones in a Network - Some example embodiments include a method for configuring of a node on a network. The method includes configuring an interface of the node on the network. The configuring includes performing duplicate address detection for an address to be assigned to the interface as part of the configuring. The duplicate address detection comprises transmitting, out from the interface onto the network, an address detection message having a destination address that is the same as the address to be assigned to the interface. The configuring also includes responsive to receiving the address detection message on a different interface of the node, determining that the interface and the different interface are on a same link of the network and assigning the interface to be in a same link-local zone as the different interface. | 01-03-2013 |