Patent application number | Description | Published |
20090078261 | FILTERING FACE-PIECE RESPIRATOR THAT HAS EXPANDABLE MASK BODY - A filtering face-piece respirator | 03-26-2009 |
20090078262 | FILTERING FACE-PIECE RESPIRATOR SUPPORT STRUCTURE THAT HAS LIVING HINGES - A filtering face-piece respirator | 03-26-2009 |
20090078265 | RESPIRATOR HAVING DYNAMIC SUPPORT STRUCTURE AND PLEATED FILTERING STRUCTURE - A filtering face-piece respirator | 03-26-2009 |
20090229766 | ADHESIVE REMOVAL DEVICE - An adhesive removal system useful for removing a stretch release adhesive from a component includes a first member that engages with a component and an adhesive removal member that moves the adhesive and component relative to each other in order to stretch the adhesive and release the adhesive from a bond surface of the component. In some embodiments, the adhesive removal member applies a substantially uniform pulling force across the adhesive. The adhesive removal member may be manually actuated by a user or with the aid of an automated device. In some embodiments, the adhesive removal system comprises a rotatable portion that moves the adhesive relative to the component. In other embodiments, the adhesive removal system includes features that enable the first member and a second member, which is mechanically coupled to at least a portion of the adhesive extending from the component, to move relative to each other. | 09-17-2009 |
20110043719 | OPTICALLY TRANSMISSIVE COMPOSITE FILM FRAME - Optical display backlight assemblies having a transmissive optical film affixed to a frame which at least partially surrounds a backlight, are disclosed. The transmissive optical film can provide an increased bending resistance to the frame. The increase in bending resistance of the frame also increases the bending resistance of a display which incorporates the backlight assemblies. The optical film can be in tension after being affixed to the frame, and the tension in the film also can result in a flatter film surface with less sag. The film can be placed in tension prior to being affixed to the frame, the frame can be elastically distorted prior to affixing the film to impart tension to the film, or the film can develop tension by shrinkage after being affixed to the frame. | 02-24-2011 |
20130327850 | NOZZLE TIPS AND SPRAY HEAD ASSEMBLIES FOR LIQUID SPRAY GUNS - Removable nozzle tips, spray head assemblies including the nozzle tips and liquid spray guns that include the nozzle tips are described herein. The removable nozzle tips provide and define both the liquid nozzle openings and the center air outlets for the center air of the liquid spray guns and the spray head assemblies. The nozzle tips are removably attached over a liquid nozzle port formed in the spray head assembly and/or on the spray gun platform or body using any suitable attachment mechanism. The removable nozzle tips can be removed from the liquid spray gun or the spray head assembly without disturbing the remainder of the spray gun or the spray head assembly. | 12-12-2013 |
Patent application number | Description | Published |
20080244231 | Method and apparatus for speculative prefetching in a multi-processor/multi-core message-passing machine - In some embodiments, the invention involves a novel combination of techniques for prefetching data and passing messages between and among cores in a multi-processor/multi-core platform. In an embodiment, a receiving core has a message queue and a message prefetcher. Incoming messages are simultaneously written to the message queue and the message prefetcher. The prefetcher speculatively fetches data referenced in the received message so that the data is available when the message is executed in the execution pipeline, or shortly thereafter. Other embodiments are described and claimed. | 10-02-2008 |
20090089578 | DIGEST GENERATION FROM INSTRUCTION OP-CODES - In general, in one aspect, a computer-implemented method includes determining a digest value based on hash operations on values of, at least, a set op-codes of multiple instructions of a program during execution of the program by a processor. | 04-02-2009 |
20090143144 | Add-in card based cheat detection platform for online applications - In general, in one aspect, an add-in card includes inaccessible memory to store an identity key, wherein the identity key is to enable a secure communication link. The add-in card also includes an isolated execution environment and a machine-accessible medium comprising content. The content when executed by the isolated execution environment causes the isolated execution environment to route secure communications between an on-line application and a remote service provider through the isolated execution environment to provide a secure communication link therebetween, detect on-line application code modifications, detect on-line application process flow modifications, and notify, via the secure communication link, the remote service provider when a modification is detected. | 06-04-2009 |
20090144825 | Chipset based cheat detection platform for online applications - In general, in one aspect, an interface chipset includes at least one interface to receive user commands from input devices, filters to monitor the received user commands and to copy the user commands associated with at least a subset of the input devices, and an isolated execution environment. The isolated execution environment is to provide a secure communication link between an on-line application and a remote service provider. The isolated execution environment is also to detect at least some subset of user command modifications, on-line application code modifications, and on-line application process flow modifications. The isolated execution environment is further to notify the remote service provider when a modification is detected via the secure communication link. | 06-04-2009 |
20090235050 | DYNAMIC SERVICE MANAGEMENT FOR MULTICORE PROCESSORS - A system, apparatus, method and article to perform dynamic service management for multicore processors are described. The apparatus may include, for example, a processing device having multiple types of processors to process packets. A service manager may dynamically assign executable files for multiple services to the multiple types of processors during execution of the executable files based on packets processed for each service. Other embodiments are described and claimed. | 09-17-2009 |
20090292924 | MECHANISM FOR DETECTING HUMAN PRESENCE USING AUTHENTICATED INPUT ACTIVITY - When a service request associated with an initiated online service transaction is received, an attestation identifying a human-input activity is requested. Upon receiving a signature attesting the human-input activity, the previously initiated service transaction is authenticated based at least in part on the signature. | 11-26-2009 |
20120036508 | FRAMEWORK FOR DOMAIN-SPECIFIC RUN-TIME ENVIRONMENT ACCELERATION USING VIRTUALIZATION TECHNOLOGY - In some embodiments, the invention involves a framework for using virtualization technology to efficiently support a domain-specific run-time environment. In at least one embodiment, a framework is utilized to take advantage of virtualization technology (VT) to partition performance critical and non-performance critical tasks of the same domain-specific application. An embodiment of the invention utilizes a general-purpose operating system to execute non-performance critical aspects of a domain, and uses a privileged VT-root mode to execute performance critical aspects of the domain. Another embodiment uses one or more guest VMs to execute the performance critical aspects of the domain-specific run-time environment. Other embodiments are described and claimed. | 02-09-2012 |
20140096180 | SYSTEM, DEVICES, AND METHODS FOR PROXIMITY-BASED PARENTAL CONTROLS - Systems, devices, and methods for proximity-based parental controls include a dominant computing device and a subordinate computing device configured to pair and establish a shared secret. Later, upon determining that the dominant computing device and the subordinate computing device are in proximity, the dominant computing device authenticates the subordinate computing device using the shared secret and authorizes access to an application on the subordinate computing device. The dominant computing device may configure an access control policy associated with the application. The access control policy may define allowed usage time, allowed usage time of day, allowed content, and/or other parameters. The subordinate computing device may enforce the access control policy. The application on the subordinate computing device may be a user interface shell, a game, a web browser, a particular web site, or other application. Other embodiments are described and claimed. | 04-03-2014 |
20140115662 | Mechanism for Detecting Human Presence Using Authenticated Input Activity Timestamps - When a service request associated with an initiated online service transaction is received, an attestation identifying a human-input activity is requested. Upon receiving a signature attesting the human-input activity, the previously initiated service transaction is authenticated based at least in part on the signature. | 04-24-2014 |
20140187152 | SECURE TRANSFER OF WHITEBOARD CONTENT - Technologies for securely transferring whiteboard content data from a smart whiteboard device to another smart whiteboard device are disclosed. The smart whiteboard device may securely transfer the whiteboard content data to a mobile device. In response to receiving the whiteboard content data from the smart whiteboard device, the mobile device may transfer the received whiteboard content data to the other smart whiteboard device. The other smart whiteboard device may display the transferred whiteboard content data and enable manipulation thereof. | 07-03-2014 |