Richard V.
Richard V. Beblo, Englewood, OH US
Patent application number | Description | Published |
---|---|---|
20150101325 | RECONFIGURABLE SKIN SYSTEM BASED ON SPATIALLY TARGETED ACTIVATION OF SHAPE MEMORY POLYMERS - Reconfigurable skin systems may include a multi-cellular structure, in which individual cells are filled with a shape memory polymer having conductive chains of conductive particles embedded or dispersed therein. The systems are configured such that application of a stimulus to selected cells causes the shape memory polymer to undergo a phase change in the selected cells and impart a textured surface to one side of the multi-cellular structure. | 04-16-2015 |
Richard V. De Caro, El Dorado Hills, CA US
Patent application number | Description | Published |
---|---|---|
20100061152 | METHOD AND SYSTEM TO ACCESS MEMORY - This document discusses among other things, a system comprising a host controller, an Input/Output buffer, and a memory device. The memory device is coupled to the host controller and is configured to receive a read command from the host controller. The non-volatile includes an interface control logic, which is in communication with a non-volatile memory. The interface control logic includes a latency programming circuit coupled to the non-volatile memory and the Input/Output buffer. The latency programming circuit stores at least one value corresponding to dummy byte delays to be provided at the non-volatile memory prior to transferring data from the non-volatile memory during a read operation. | 03-11-2010 |
20110170354 | Method and System to Access Memory - This document discusses among other things, a system comprising a host controller, an Input/Output buffer, and a memory device. The memory device is coupled to the host controller and is configured to receive a read command from the host controller. The non-volatile includes an interface control logic, which is in communication with a non-volatile memory. The interface control logic includes a latency programming circuit coupled to the non-volatile memory and the Input/Output buffer. The latency programming circuit stores at least one value corresponding to dummy byte delays to be provided at the non-volatile memory prior to transferring data from the non-volatile memory during a read operation. | 07-14-2011 |
20140032956 | ULTRA-DEEP POWER-DOWN MODE FOR MEMORY DEVICES - A memory device includes a voltage regulator, whose output provides a voltage supply for various other components of the memory device, including a command user interface. The memory device is placed into an ultra-deep power-down mode by providing to the memory device a software command, which causes the output of the voltage regulator to be disabled. To bring the memory device out of the ultra-deep power-down mode, a chip select signal is provided to the memory device, which includes a wake-up circuit that remains powered on even when the memory device is in the ultra-deep power-down mode. Receipt of the chip select signal while the memory device is in the ultra-deep power-down mode causes the output of the voltage regulator to be enabled, thereby providing power to the components that were completely powered down. | 01-30-2014 |
Richard V. Gebben, Webster, NY US
Patent application number | Description | Published |
---|---|---|
20120202044 | MICROPOROUS MEMBRANES, METHODS FOR MAKING SUCH MEMBRANES, AND THE USE OF SUCH MEMBRANES AS BATTERY SEPARATOR FILM - The invention relates to microporous membranes having one or more layers comprising polymer and inorganic molecules. The invention also relates to methods for producing these membranes, and the use of these membranes as battery separator film. | 08-09-2012 |
20130202904 | Sealable Polypropylene Films With Enhanced Stability - A multi-layered sealable film and method of storing and transporting a role of the film without buckling or starring, the film comprising a core layer comprising polypropylene sandwiched between at least a first and (optionally) second tie-layer on either side of the core; a sealable layer with two sides, one side adhered to the first tie-layer; wherein at least the first tie-layer comprising a blend of polypropylene and within the range of from 5 wt % to 40 wt % of a soft polymer additive, preferably a propylene-α-olefin elastomer having within the range of from 10 wt % to 30 wt % α-olefin derived units, wherein the blend is preferably partially or completely immiscible. A roll of the inventive films can be readily stored and transported without loss due to film defects. | 08-08-2013 |
20130344375 | MULTILAYER MICROPOROUS FILM, PROCESS FOR PRODUCTION OF THE FILM, AND USE OF THE FILM - The invention generally relates to polymer film, and more particularly relates to polymeric membranes, methods for producing such membranes, and the use of such membranes as battery separator film. In an embodiment, the invention relates to liquid-permeable multi-layer microporous membranes comprising microlayers. According to the invention, liquid-permeable multi-layer microporous membranes having excellent physical properties including permeability can be produced without causing delaminate. | 12-26-2013 |
Richard V. Goddand, Hanford, CA US
Patent application number | Description | Published |
---|---|---|
20100147539 | CELLULOSE-BASED AERIAL DELIVERY SYSTEM AND METHOD OF USE - The present invention is directed to an aerial delivery system that provides for the controlled delivery of items from an aircraft into a selected drop zone. In accordance with the present invention, the aerial delivery system includes a base and a sidewall arrangement adjacent the base. The sidewall arrangement generally acts as a sleeve defining an inner volume. Within the inner volume is a tray or cassette configured to be moveable within the inner volume. Adjacent the sidewall arrangement opposite the base is a top cover. The top cover is generally oversized relative to the shape defined by the sidewall arrangement. A plurality of straps connects the top cover, sidewall arrangement and, optionally, the material within the inner volume. The aerial delivery system is activated by an air stream that catches the oversized top cover, forcing the separation between the top cover and the other portions of the aerial delivery system. The separation of top cover places a load upon the straps that initiate the release of materials contained within the aerial delivery system. | 06-17-2010 |
Richard V. Johnson, Cedar Park, TX US
Patent application number | Description | Published |
---|---|---|
20120291654 | SELECTABLE LETHALITY, FOCUSED FRAGMENT MUNITION AND METHOD OF USE - A munition and method capable of producing real-time selectable effects ranging from unrestricted to low collateral damage. The munition is capable of a directionally focused fragment pattern and limited lethality/damage effects. | 11-22-2012 |
Richard V. Kisley, Charlotte, NC US
Patent application number | Description | Published |
---|---|---|
20120237023 | Secure Key Management - A system for implementing computer security is provided. The system includes a computer processor and an application configured to execute on the computer processor, the application implementing a method that includes creating a token and populating a payload section of the token with key material and selecting a wrapping method that specifies how the key material is securely bound to key control information. A structure of the key control information in the token is independent of the wrapping method. Implementing computer security also includes wrapping the key material and binding key control information to the key material in the token. The key control information includes information relating to usage and management of the key material. | 09-20-2012 |
20120275600 | SECURE KEY CREATION - A system for creating a secure key is provided that includes a computer processor and an application configured to execute on the computer processor, the application implementing a method that includes creating a token and populating a key control information section of the token with a value to indicate a minimum number of key parts used to form a key. Creating the secure key also includes populating a payload section of the token with a first key part, binding the key control information section to the payload section, adding a second key part to the first key part and iterating the value and binding the key control information section to the payload section after the second key part has been added. Creating the secure key further includes indicating the key is complete, wherein the key comprises a combination of the first and second key parts. | 11-01-2012 |
20120281836 | SECURE KEY MANAGEMENT - A system for implementing secure key management is provided. The system includes a computer processor and an application configured to execute on the computer processor, the application implementing a method. The method includes populating a section of information associated with a key, the section being populated with information relating to how the key was created. The method also includes populating the section with information relating to how the key was acquired by a secure module; and binding the section to the key, wherein the key is encrypted. | 11-08-2012 |
20120281837 | SECURE KEY MANAGEMENT - A system for secure key management is provided. The system includes a computer processor and an application configured to execute on the computer processor, the application implementing a method. The method includes populating a section of information associated with a key, the section of information being populated with information relating to a level of protection of the key accumulated over time. Secure key management further includes securely binding the section of information to the key, wherein the key is encrypted. | 11-08-2012 |
20120281838 | KEY MANAGEMENT POLICIES FOR CRYPTOGRAPHIC KEYS - A computer program product for secure key management is provided. The computer program product includes a tangible storage medium readable by a processing circuit and storing instructions for execution by the processing circuit for creating a token and populating the token with key material, and binding key control information to the key material. The key control information includes information relating to management of the key material populating one or more key management fields that define attributes that limit distribution of the key material. | 11-08-2012 |
20120281839 | KEY USAGE POLICIES FOR CRYPTOGRAPHIC KEYS - A computer program product for secure key management is provided. The computer program product includes a tangible storage medium readable by a processing circuit and storing instructions for execution by the processing circuit for creating a token and populating the token with key material, and binding key control information to the key material. The key control information includes information relating to usage of the key material populating one or more key usage fields that define attributes that limit actions that may be performed with the key material. | 11-08-2012 |
20120307998 | BUILDING OPTIONAL BLOCKS - A computer program product is provided and includes a tangible storage medium readable by a processing circuit and on which instructions are stored for execution by the processing circuit for verifying conditions for iterative building of optional blocks in a standardized key block, parsing optional block data to validate the optional block data and to determine a length of the optional block data and a number of optional blocks contained in the optional block data, validating an optional block identification to be added, determining a storage location, inserting the optional block into the storage location, updating a value of the optional block data and returning the updated value of the optional block data. | 12-06-2012 |
20120307999 | PROTECTING A CONTROL VECTOR IN AN OPTIONAL BLOCK OF A STANDARD KEY BLOCK - A computer program product is provided and includes a tangible storage medium readable by a processing circuit and on which instructions are stored for execution by the processing circuit for validating parameters passed to a parameter database, computing a length required for control vector CV data, preparing an optional block in accordance with a result of the computation, converting the CV to a format for a standardized key block while copying the converted CV into the optional block and updating optional block data in the standardized key block. | 12-06-2012 |
20120308000 | Combining Key Control Information in Common Cryptographic Architecture Services - A system includes a processor configured to perform a method, the method comprising receiving a first key token, second key token and a request to combine the first key token with the second key token, identifying a key type of the first key token and a key type of the second key token, determining whether the key type of the first key token may be combined with the key type of the second key token, combining the first key token with the second key token to create a third key token responsive to determining that the key type of the first key token may be combined with the key type of the second key token, and outputting the third key token. | 12-06-2012 |
20120308001 | SECURE KEY CREATION - Key creation includes sending a first public key part from a first system to a second system, receiving a second public key part sent by the second system to the first system and establishing a first secret material in the first system using the first and second public key parts, wherein the first secret material is identical to a second secret material established on the second system using the first and second key parts. Key creation also includes binding key control information to the first secret material in the first system, wherein the key control information includes information relating to key type and key management and deriving a first key material from the combination of the key control information and the first secret material, wherein the first key material is identical to a second key material derived by the second system. | 12-06-2012 |
20120310908 | METHOD OF PARSING OPTIONAL BLOCK DATA - A computer program product is provided and includes a tangible storage medium readable by a processing circuit and on which instructions are stored for execution by the processing circuit for initially verifying a presence of parameters passed to a parameter database and that a selected group of the parameters are greater than or equal to zero, parsing optional block data to validate the optional block data, determine a length thereof and a number of optional blocks contained therein and proceeding with one of a secondary info-parsing and a secondary data-parsing operation with respect to the optional block data in accordance with content of the parameters passed to the parameter database | 12-06-2012 |
20120311324 | METHOD OF MAPPING KEY INFORMATION - A computer program product is provided and includes a tangible storage medium readable by a processing circuit and on which instructions are stored for execution by the processing circuit for performing a method. The method includes checking whether information to be translated between a key token and a key block is valid and, in an event a result of the checking is affirmative, preparing an output by translating the information between the key token and the key block such that the key token and the key block each include key control information cryptographically bound to key material via a wrapping method of the key token and the key block, respectively. The key control information of the key block is related to the key control information of the key token following the translation and disambiguation information for guiding the translation specified prior to or during the translation. | 12-06-2012 |
20130034228 | SECURE KEY CREATION - Creating a secure key includes creating a token and populating a key control information section of the token with a value to indicate a minimum number of key parts used to form a key. Creating the secure key also includes populating a payload section of the token with a first key part, binding the key control information section to the payload section, adding a second key part to the first key part and iterating the value and binding the key control information section to the payload section after the second key part has been added. Creating the secure key further includes indicating the key is complete, wherein the key comprises a combination of the first and second key parts. | 02-07-2013 |
20130039494 | SECURE KEY MANAGEMENT - According to one embodiment, a method for implementing secure key management is provided. The method includes populating a section of information associated with a key, the section being populated with information relating to how the key was created. The method also includes populating the section with information relating to how the key was acquired by a secure module; and binding the section to the key, wherein the key is encrypted. | 02-14-2013 |
20130039495 | SECURE KEY MANAGEMENT - According to one embodiment, a method for implementing computer security is provided. The method includes creating a token and populating a payload section of the token with key material and selecting a wrapping method that specifies how the key material is securely bound to key control information, wherein a structure of the key control information in the token is independent of the wrapping method. The method also includes wrapping the key material and binding key control information to the key material in the token, wherein the key control information includes information relating to usage and management of the key material. | 02-14-2013 |
20130044875 | COMBINING KEY CONTROL INFORMATION IN COMMON CRYPTOGRAPHIC ARCHITECTURE SERVICES - A method for creating a key token includes receiving a first key token, second key token and a request to combine the first key token with the second key token, identifying a key type of the first key token and a key type of the second key token, determining whether the key type of the first key token may be combined with the key type of the second key token, combining the first key token with the second key token to create a third key token responsive to determining that the key type of the first key token may be combined with the key type of the second key token, and outputting the third key token. | 02-21-2013 |
20130044879 | SECURE KEY MANAGEMENT - Secure key management includes populating a section of information associated with a key, the section of information being populated with information relating to a level of protection of the key accumulated over time. Secure key management further includes securely binding the section of information to the key, wherein the key is encrypted. | 02-21-2013 |
20130044880 | KEY MANAGEMENT POLICIES FOR CRYPTOGRAPHIC KEYS - A computer program product for secure key management is provided. The computer program product includes a tangible storage medium readable by a processing circuit and storing instructions for execution by the processing circuit for performing a method. The method includes creating a token and populating the token with key material, and binding key control information to the key material. The key control information includes information relating to management of the key material populating one or more key management fields that define attributes that limit distribution of the key material. | 02-21-2013 |
20130054624 | METHOD OF PARSING OPTIONAL BLOCK DATA - A computer program product is provided and includes a tangible storage medium readable by a processing circuit and on which instructions are stored for execution by the processing circuit for performing a method. The method includes initially verifying a presence of parameters passed to a parameter database and that a selected group of the parameters are greater than or equal to zero, parsing optional block data to validate the optional block data, determine a length thereof and a number of optional blocks contained therein and proceeding with one of a secondary info-parsing and a secondary data-parsing operation with respect to the optional block data in accordance with content of the parameters passed to the parameter database. | 02-28-2013 |
20130058486 | METHOD OF PROTECTING A CONTROL VECTOR IN AN OPTIONAL BLOCK OF A STANDARD KEY BLOCK - A computer program product is provided and includes a tangible storage medium readable by a processing circuit and on which instructions are stored for execution by the processing circuit for performing a method. The method includes validating parameters passed to a parameter database, computing a length required for control vector CV data, preparing an optional block in accordance with a result of the computation, converting the CV to a format for a standardized key block while copying the converted CV into the optional block and updating optional block data in the standardized key block. | 03-07-2013 |
20130058487 | METHOD OF BUILDING OPTIONAL BLOCKS - A computer program product is provided and includes a tangible storage medium readable by a processing circuit and on which instructions are stored for execution by the processing circuit for performing a method. The method includes verifying conditions for iterative building of optional blocks in a standardized key block, parsing optional block data to validate the optional block data and to determine a length of the optional block data and a number of optional blocks contained in the optional block data, validating an optional block identification to be added, determining a storage location, inserting the optional block into the storage location, updating a value of the optional block data and returning the updated value of the optional block data. | 03-07-2013 |
20130103954 | KEY USAGE POLICIES FOR CRYPTOGRAPHIC KEYS - A computer program product for secure key management is provided. The computer program product includes a tangible storage medium readable by a processing circuit and storing instructions for execution by the processing circuit for performing a method. The method includes creating a token and populating the token with key material, and binding key control information to the key material. The key control information includes information relating to usage of the key material populating one or more key usage fields that define attributes that limit actions that may be performed with the key material. | 04-25-2013 |
Richard V. Mazzolla, Hardwick, NJ US
Patent application number | Description | Published |
---|---|---|
20120035641 | Surgical Obturator - An obturator has an elongated shaft with a first shaft portion and a second shaft portion within an obturator housing. The distal end of the first shaft portion creates a first shield and the distal end of the second shaft portion creates a second shield. A blade having a piercing tip and cutting edges is interposed between the first shield and the second shield. In use, once the piercing tip passes the body wall, the first shield moves to cover the piercing tip and protect internal organs from accidental injury while the cutting edges continue to cut the body wall. Once the second shield passes through the body wall, the second shield moves to cover the cutting edges. | 02-09-2012 |
Richard V. Miller, Denton, TX US
Patent application number | Description | Published |
---|---|---|
20140115870 | Bushed and In-Line Threaded Multi-Purpose Hole and Plug - A locator bushing is used in combination with a receiving member, such as a fixture plate. The locator bushing is a single integral item having a driver portion and a threaded portion to locate and position devices in relation to the receiving member. The driver portion includes a first locating surface and a drive element. The first locating surface locates the locator bushing in the receiving member. The drive element is configured to receive a rotational force to rotate the driver portion. The threaded portion releasably engages the receiving member and is used to position the locator assembly within the receiving member. The driver portion includes a second locating surface to selectively locate and position an insert device relative to both the locator assembly and the receiving member. | 05-01-2014 |
Richard V. Penalosa, Jr., Neptune, NJ US
Patent application number | Description | Published |
---|---|---|
20130303986 | Vascular Access Catheter Anchor and Access Valve - Provided is a venous catheter having an anchoring system and access valve for attachment to intravenous lumen tubing. The anchor includes a sloping base plate that is attached to the skin of a user for providing stability and immobility to the tubing. The sloping base plate elevates the tubing away from the skin in order to prevent catheter-related bloodstream infections. The plate can include an extension and cover for securing the tubing into position, and a shelf that allows the plate to extend beyond the extension to prevent skin contact with the tubing. The access valve is a T-shaped adapter for connecting the tubing to a dialysis machine tubing, and includes a flushing branch that eliminates the need to disconnect the tubing from the dialysis machine when flushing the dialysis vascular access. The access valve can be attached below the extension, snapped into the extension, or molded into the extension. | 11-14-2013 |
Richard V. Rifredi, Los Gatos, CA US
Patent application number | Description | Published |
---|---|---|
20100170043 | APPARATUS FOR MONITORING VITAL SIGNS - A sleep monitoring system includes a fluid bladder. A pump is in fluid communication with the fluid bladder, and the pump is operable to increase a fluid pressure within the fluid bladder. A sensor is packaged with the pump, and the sensor is in fluid communication with the fluid bladder and is operative to determine a pressure within the fluid bladder. A controller is configured to determine the at least one vital sign based on the pressure within the fluid bladder. | 07-08-2010 |
20100174198 | APPARATUS FOR MONITORING VITAL SIGNS HAVING FLUID BLADDER BENEATH PADDING - A sleeping monitoring system includes a first padding layer. A fluid bladder is beneath the first padding layer. A sensor is in fluid communication with the fluid bladder. The sensor is configured to output a vital sign signal. | 07-08-2010 |
20100174199 | APPARATUS FOR MONITORING VITAL SIGNS OF AN EMERGENCY VICTIM - A portable apparatus for monitoring on site near an emergency field at least one vital sign of a patient reclined thereon includes a fluid bladder transformable between a stowable arrangement and a deployed arrangement. The fluid bladder in the deployed arrangement has a comfortable top surface of sufficient size to fully support at least a torso of the patient in a reclined position, and the fluid bladder has a ruggedized puncture resistant bottom layer. A sensor is configured to detect a pressure within the fluid bladder. A controller is configured to determine the at least one vital sign based on the pressure within the fluid bladder. A triage condition indicator is configured to indicate a care urgency level based on the at least one vital sign. | 07-08-2010 |
20110144455 | SYSTEMS AND METHODS FOR MONITORING A SUBJECT AT REST - Disclosed herein are methods and devices for monitoring a subject at rest. One such device comprises a sensing unit having a fluid-filled bladder configured to be placed under a substrate on which the subject lays and a sensor in fluid communication with the bladder. The sensor is configured to sense pressure variations within the bladder generated by a heart beat, respiration and body weight of the subject and to generate signals indicative of the pressure variations. A processor is configured to receive the signals and to determine and generate output indicative of the subject's heart beat and respiration and presence on the substrate. An external device is configured to display one or more of the output. | 06-16-2011 |
Richard V. Rosetto, Chillcothe, IL US
Patent application number | Description | Published |
---|---|---|
20100162384 | Method and system to detect breaks in a border of a computer network - A method for detecting breaks in a border of a network is disclosed. The method may include monitoring network regulation and shaping traffic passing through the border. The method may also include providing, by a first confederate server on a first side of the border, a first connection request to a second confederate server on a second side of the border. Further, the method may include providing, by the second confederate server on the second side of the border, a second connection request to the first confederate server on the first side of the border. The method may also include executing a network diagnostic command if one or more of the first or second connection request is granted. Further, the method may also include copying any outputs of the network diagnostic command to a file. | 06-24-2010 |
Richard V. Smerbeck, Pittsford, NY US
Patent application number | Description | Published |
---|---|---|
20100234336 | Ophthalmic Compositions - An aqueous ophthalmic composition comprises a carboxy-containing polyanionic polymer that has a viscosity in the range from about 300 cp to about 1500 cp outside the eye and a total concentration of cations of less than about 50 mM, wherein the viscosity of the composition does not increase when the composition comes into contact with surface ocular fluid. | 09-16-2010 |
20120028947 | Ophthalmic Compositions - An aqueous ophthalmic composition comprising loteprednol etabonate, and polyacryclic acid. The composition has a viscosity in the range from about 300 cp to about 1500 cp, and a total concentration of cations of less than about 50 mM. The ophthalmic composition is used to treat patients suffering from allergic conjunctivitis, and includes instructing a person suffering from ocular itching resulting from allergic conjunctivitis to administer once or twice daily in the form of one or more eye drops the aqueous ophthalmic composition described. | 02-02-2012 |
Richard V. Vivilecchia, Rockaway, NJ US
Patent application number | Description | Published |
---|---|---|
20090143469 | SALTS OF NATEGLINIDE - The present invention relates to salts of organic acid, in particular salt of nateglinide, combined preparations comprising one or more salts of nateglinide and, optionally, one or more additional ingredients and the use thereof in pharmaceutical compositions for preventing or treating diabetes, cardiovascular disease, or conditions associated therewith. | 06-04-2009 |
Richard V. Wherry, Medford, MA US
Patent application number | Description | Published |
---|---|---|
20150161373 | SECURE CONNECTION BETWEEN A DATA REPOSITORY AND AN INTELLIGENCE APPLICATION - Embodiments of the invention are directed to systems, methods and computer program products for establishing a secure connection between a data repository and an intelligence application. In one embodiment, a method includes receiving, from a user device and using a processing device, a request from the intelligence application, the request communicated from the intelligence application through a data virtualization application and for obtaining access to the data repository; responding, using the processing device, to the request comprising preparing and sending an authentication request through the data virtualization application to the intelligence application; receiving authentication credentials from the intelligence application through the data virtualization application, the authentication credentials associated with one or more users of a plurality of users authorized to access the data repository; determining that the authentication credentials are valid; and providing device, access to the data repository in response to validating the authentication credentials. | 06-11-2015 |
Richard V. Wretberg, Herriman, UT US
Patent application number | Description | Published |
---|---|---|
20090043270 | EFFUSION DRAINAGE KITS AND METHODS FOR PACKAGING THE SAME - A kit for treating effusion, such as pleural effusion, comprises at least one tray including a plurality of indentations configured to receive one or more components used to insert a chest tube into a patient's pleural cavity, at least one dressing kit including supplies for applying a dressing to the patient's skin surrounding an inserted chest tube, and at least one drainage kit including one or more components for receiving fluid drained from the patient's pleural cavity. | 02-12-2009 |