Patent application number | Description | Published |
20120066045 | System and Method for Dynamically Identifying, Prioritizing and Offering Reward Categories - A method for identifying and offering rewards is provided. A user's transaction history or category history, such as, for example, spending history, transaction history, merchant history, purchases history, services history, product history, channel history, frequency of spending history, SKU history, redemption history, reward earnings history, earning levels, reward categories, or currency type, currency history, customer responses to questions, and/or other data or information that enables identification of relevant rewards is determined. Next, at least one reward category based on the user's transaction history or reward category history is dynamically prioritized, and at least one top reward category based on the dynamic prioritizing of the at least one reward category is determined. Finally, the user is dynamically rewarded discounts, rebates, coupons, or other reward incentives based on the least one top reward category. | 03-15-2012 |
Patent application number | Description | Published |
20090211187 | Portable Panel Construction And Method For Making The Same - Disclosed herein is a portable panel having numerous favorable characteristics. The panel comprises a core having a length, a width, a first side and a second side. A first fiber layer is attached to the first side while a second fiber layer is attached to the second side. A first polyurethane layer is impregnated in the first fiber layer while a second polyurethane layer is impregnated into the second fiber layer. A first skin is attached to the first polyurethane layer while a second skin is attached to the second polyurethane layer. The panel can be used in the manufacture of tables, flooring, risers, stages, bleachers, and the like. | 08-27-2009 |
20090211499 | Portable Panel Construction And Method For Making The Same - Disclosed herein is a portable panel having numerous favorable characteristics. The panel comprises a core having a length, a width, a first side and a second side. A first fiber layer is attached to the first side while a second fiber layer is attached to the second side. A first polyurethane layer is impregnated in the first fiber layer while a second polyurethane layer is impregnated into the second fiber layer. A first skin is attached to the first polyurethane layer while a second skin is attached to the second polyurethane layer. The panel can be used in the manufacture of tables, flooring, risers, stages, bleachers, and the like. | 08-27-2009 |
20090249723 | Portable Panel Construction and Method for Making the Same - Disclosed herein is a portable panel having numerous favorable characteristics. The panel comprises a core having a length, a width, a first side and a second side. A first fiber layer is attached to the first side while a second fiber layer is attached to the second side. A first polyurethane layer is impregnated in the first fiber layer while a second polyurethane layer is impregnated into the second fiber layer. A first skin is attached to the first polyurethane layer while a second skin is attached to the second polyurethane layer. The panel can be used in the manufacture of tables, flooring, risers, stages, bleachers, and the like. | 10-08-2009 |
20110000405 | Portable Table Construction and Method for Making the same. - Disclosed herein is a portable table having numerous favorable characteristics. The table comprises a tabletop, a column connection, and a column. The tabletop includes a core, a thickness, a perimeter section, and a bottom surface. The column connection is positioned within the thickness of the core and within the tabletop, and includes a flange and a cylindrical sleeve having a first fastener. The column includes an insertion end that includes a second fastener shaped to removably engage the first fastener and secure the column to the column connection. The insertion end is shaped to removably fit within the cylindrical sleeve of the column connection. | 01-06-2011 |
Patent application number | Description | Published |
20080245648 | ELECTRICAL SWITCHING APPARATUS AND TRIP ACTUATOR ASSEMBLY THEREFOR - A trip actuator assembly is provided for a circuit breaker including a housing having a mounting surface, separable contacts enclosed by the housing, and an operating mechanism structured to open and close the separable contacts. The trip actuator assembly includes a trip actuator cooperable with the operating mechanism, and a planar member having first and second ends, first and second edges, and an aperture. The trip actuator is at least partially disposed within the aperture and is further disposed between the planar member and the mounting surface of the housing. The first edge of the planar member is removably coupled to the mounting surface, thereby removably coupling the trip actuator to the housing. The circuit breaker may include an accessory tray which is insertable on and is removable from the mounting surface. When inserted, the accessory tray abuts the body of the trip actuator enclosure further securing the trip actuator. | 10-09-2008 |
20090173604 | ELECTRICAL SWITCHING APPARATUS AND TOOL THEREFOR - A tool is provided to manipulate an electrical switching apparatus, such as a circuit breaker, with respect to a housing structure. The circuit breaker has a mechanical interface. The tool includes an actuating mechanism having a plurality of segments and joints, which movably connect the segments. One segment is engageable with the mechanical interface of the circuit breaker. Another segment comprises a handle portion structured to be gripped by a user. The actuating mechanism is movable between a first position in which the segments are substantially parallel with respect to one another, and a second position in which adjacent segments are substantially perpendicular to each other. When disposed in the first position, the tool is stowable in an opening of the circuit breaker. When disposed in the second position, the tool is operable to move the circuit breaker in a predetermined manner with respect to the housing structure. | 07-09-2009 |
20120067707 | ELECTRICAL SWITCHING APPARATUS AND LEVERING ASSEMBLY THEREFOR - A levering assembly is provided for an electrical switching apparatus, such as a circuit breaker, which is removably disposed in a cassette. The levering assembly includes a mounting member coupled to the housing of the circuit breaker. A drive assembly is coupled to the mounting member and cooperates with the cassette. A powered actuator, such as an electric motor, is disposed on the mounting member and actuates the drive assembly to move the circuit breaker with respect to the cassette. The powered actuator is disposed within the housing of the circuit breaker. The mounting member, drive assembly and powered actuator form a self-contained sub-assembly, which is substantially disposed behind the circuit breaker cover. The levering assembly is operable from a remote location to automatically move the circuit breaker with respect to the cassette, to provide enhanced safety among other benefits. | 03-22-2012 |
20140131317 | Arc Runner Assembly and Circuit Interrupter - An arc runner assembly for use in a circuit interrupter provides a pair of arc runners that are situated at opposite sides of a stationary contact of the circuit interrupter. If used in a DC application, the arc runner assembly is configured to communicate a positive DC arc along one of the arc runners in a first direction away from the stationary contact and is further configured to communicate a negative DC arc along the other arc runner in another direction away from the stationary contact. The arc runner assembly additionally includes a support that is electrically engaged with a conductor of the circuit interrupter on a surface opposite that on which the stationary contact is disposed. The improved arc runner assembly advantageously facilitates extinction of electrical arc and extinguishes both positive and negative DC arcs in a DC application. | 05-15-2014 |
20140202990 | ARC RUNNERS SUITABLE FOR DC MOLDED CASE CIRCUIT BREAKERS AND RELATED METHODS - Circuit breakers include an arc chamber and an arc chute comprising a plurality of arc plates in the arc chamber. The circuit breakers also include a line conductor assembly with at least one arc runner attached to a line conductor in the arc chamber. The arc runner can extend below but adjacent to a bottom arc plate to thereby guide a respective arc into the arc chute. | 07-24-2014 |
20150041290 | HIDDEN/SLIDING DOOR SYSTEM FOR FIELD-INSTALLED ACCESSORY ACCESS - An electrical switching apparatus housing assembly for an electrical switching apparatus assembly is provided. The electrical switching apparatus housing assembly including a body assembly and a movable door member. The body assembly includes a number of outer sidewalls. The outer sidewalls define an enclosed space. The outer sidewalls include a top sidewall. The top sidewall includes a limited opening to the enclosed space. The movable door member is movably coupled to the top sidewall. The door member is movable between an open, first position, wherein the door member is not disposed in the limited opening, and a closed, second position, wherein the door member is disposed in the limited opening. | 02-12-2015 |
Patent application number | Description | Published |
20110185055 | SYSTEM AND METHOD FOR CORRELATING NETWORK IDENTITIES AND ADDRESSES - The system and method for correlating network identities and addresses described herein may include a log correlation engine distributed on a network that identifies relationships between certain network identities and Internet Protocol (IP) and Ethernet addresses in the network. In particular, the log correlation engine may analyze various event logs that describe activity in a network to learn relationships between network identities and network addresses and generate alerts in response to discovering changes in the learned relationships. For example, the log correlation engine may identify authentication events described in the logs to map network identities to IP addresses, and may further analyze the logs to map the IP addresses to Ethernet addresses. Thus, the log correlation engine may discover new and changed relationships between the network identities, the IP addresses, and the Ethernet addresses. | 07-28-2011 |
20110231935 | SYSTEM AND METHOD FOR PASSIVELY IDENTIFYING ENCRYPTED AND INTERACTIVE NETWORK SESSIONS - The system and method for passively identifying encrypted and interactive network sessions described herein may distribute a passive vulnerability scanner in a network, wherein the passive vulnerability scanner may observe traffic travelling across the network and reconstruct a network session from the observed traffic. The passive vulnerability scanner may then analyze the reconstructed network session to determine whether the session was encrypted or interactive (e.g., based on randomization, packet timing characteristics, or other qualities measured for the session). Thus, the passive vulnerability scanner may monitor the network in real-time to detect any devices in the network that run encrypted or interactive services or otherwise participate in encrypted or interactive sessions, wherein detecting encrypted and interactive sessions in the network may be used to manage changes and potential vulnerabilities in the network. | 09-22-2011 |
20130227714 | SYSTEM AND METHOD FOR USING FILE HASHES TO TRACK DATA LEAKAGE AND DOCUMENT PROPAGATION IN A NETWORK - The system and method described herein may use file hashes to track data leakage and document propagation in a network. For example, file systems associated with known reference systems and various user devices may be compared to classify the user devices into various groups based on differences between the respective file systems, identify files unique to the various groups, and detect potential data leakage or document propagation if user devices classified in certain groups include any files that are unique to other groups. Additionally, various algorithms may track locations, movements, changes, and other events that relate to normal or typical activity in the network, which may be used to generate statistics that can be compared to subsequent activities that occur in the network to detect potentially anomalous activity that may represent potential data leakage or document propagation. | 08-29-2013 |
20130247148 | SYSTEM AND METHOD FOR CORRELATING NETWORK IDENTITIES AND ADDRESSES - The system and method for correlating network identities and addresses described herein may include a log correlation engine distributed on a network that identifies relationships between certain network identities and Internet Protocol (IP) and Ethernet addresses in the network. In particular, the log correlation engine may analyze various event logs that describe activity in a network to learn relationships between network identities and network addresses and generate alerts in response to discovering changes in the learned relationships. For example, the log correlation engine may identify authentication events described in the logs to map network identities to IP addresses, and may further analyze the logs to map the IP addresses to Ethernet addresses. Thus, the log correlation engine may discover new and changed relationships between the network identities, the IP addresses, and the Ethernet addresses. | 09-19-2013 |
20140007241 | SYSTEM AND METHOD FOR IDENTIFYING EXPLOITABLE WEAK POINTS IN A NETWORK | 01-02-2014 |
20140013434 | SYSTEM AND METHOD FOR STRATEGIC ANTI-MALWARE MONITORING - The system and method described herein may leverage active network scanning and passive network monitoring to provide strategic anti-malware monitoring in a network. In particular, the system and method described herein may remotely connect to managed hosts in a network to compute hashes or other signatures associated with processes running thereon and suspicious files hosted thereon, wherein the hashes may communicated to a cloud database that aggregates all known virus or malware signatures that various anti-virus vendors have catalogued to detect malware infections without requiring the hosts to have a local or resident anti-virus agent. Furthermore, running processes and file system activity may be monitored in the network to further detect malware infections. Additionally, the network scanning and network monitoring may be used to detect hosts that may potentially be participating in an active botnet or hosting botnet content and audit anti-virus strategies deployed in the network. | 01-09-2014 |
20140283083 | SYSTEM AND METHOD FOR CORRELATING LOG DATA TO DISCOVER NETWORK VULNERABILITIES AND ASSETS - The system and method described herein relates to a log correlation engine that may cross-reference or otherwise leverage existing vulnerability data in an extensible manner to support network vulnerability and asset discovery. In particular, the log correlation engine may receive various logs that contain events describing observed network activity and discover a network vulnerability in response to the logs containing at least one event that matches a regular expression in at least one correlation rule associated with the log correlation engine that indicates a vulnerability. The log correlation engine may then obtain information about the indicated vulnerability from at least one data source cross-referenced in the correlation rule and generate a report that the indicated vulnerability was discovered in the network, wherein the report may include the information about the indicated vulnerability obtained from the at least one data source cross-referenced in the correlation rule. | 09-18-2014 |
20150222655 | SYSTEM AND METHOD FOR IDENTIFYING EXPLOITABLE WEAK POINTS IN A NETWORK - The system and method described herein may leverage passive and active vulnerability discovery to identify network addresses and open ports associated with connections that one or more passive scanners observed in a network and current connections that one or more active scanners enumerated in the network. The observed and enumerated current connections may be used to model trust relationships and identify exploitable weak points in the network, wherein the exploitable weak points may include hosts that have exploitable services, exploitable client software, and/or exploitable trust relationships. Furthermore, an attack that uses the modeled trust relationships to target the exploitable weak points on a selected host in the network may be simulated to enumerate remote network addresses that could compromise the network and determine an exploitation path that the enumerated remote network addresses could use to compromise the network. | 08-06-2015 |
20150281259 | SYSTEM AND METHOD FOR STRATEGIC ANTI-MALWARE MONITORING - The system and method described herein may leverage active network scanning and passive network monitoring to provide strategic anti-malware monitoring in a network. In particular, the system and method described herein may remotely connect to managed hosts in a network to compute hashes or other signatures associated with processes running thereon and suspicious files hosted thereon, wherein the hashes may communicated to a cloud database that aggregates all known virus or malware signatures that various anti-virus vendors have catalogued to detect malware infections without requiring the hosts to have a local or resident anti-virus agent. Furthermore, running processes and file system activity may be monitored in the network to further detect malware infections. Additionally, the network scanning and network monitoring may be used to detect hosts that may potentially be participating in an active botnet or hosting botnet content and audit anti-virus strategies deployed in the network. | 10-01-2015 |