Patent application number | Description | Published |
20090185779 | PROTECTIVE COVER FOR FIELD-INSTALLABLE CONNECTOR - A cap for a field-installable optical connector having a front and rear orientation, a housing, an axially-actuated clamping mechanism in the housing, and a ferrule assembly forward of the clamping mechanism and forwardly biased in the housing, the ferrule assembly comprising a holder and a ferrule extending from the holder, the cap comprising a front end defining a cavity for receiving the ferrule and having an outer surface defining at least part of a front-end geometry, a back end defining an opening through which the ferrule is received and a perimeter around the opening, the perimeter configured to contact the holder when the cap is pushed rearward in the housing, the front and back ends being unitary such that any rearward force on the front end is transferred to the back end and through the perimeter to the holder and a retention portion for contacting the housing to secure the cap to the housing. | 07-23-2009 |
20100080515 | CONNECTOR FOR TIGHT-JACKETED OPTICAL FIBER CABLE - A field-installable optical connector for terminating an optical cable, said connector comprising: (a) a housing having a front and back orientation; (b) a rear body attached to the back of said connector housing; (c) a ferrule assembly disposed in said connector housing, said ferrule assembly comprising at least a ferrule adapted for receiving a fiber of said cable, and a clamping mechanism to the rear of said ferrule, said clamping mechanism comprising at least a platform defining a fiber-receiving channel for receiving said fiber, a first member adjacent to the fiber-receiving channel and having at least one cam surface, and a second member having a second cam surface, said first and second cam surfaces cooperating such that relative movement between said first and second members causes said first member to move toward said fiber-receiving channel; (d) an actuator operatively connected to said second member to cause said second member to move relative said first member upon axial movement of said actuator, said actuator having an exposed portion extending rearward from said rear body, said exposed portion adapted to be inserted within a jacket of said cable to secure said jacket to said exposed portion, wherein said actuator and said ferrule assembly move as one unit once said clamping mechanism is actuated by said actuator to secure said fiber therein; and (e) a resilient member disposed between said ferrule and said rear body to urge said ferrule assembly forward. | 04-01-2010 |
20100254663 | BEND LIMITING BOOT - A connector having a front and back orientation and comprising: (a) a cable having at least a jacket and an optical fiber; (b) a ferrule assembly comprising a rear portion for attachment to said jacket, and a ferrule defining a bore hole for containing said optical fiber; (c) a housing having a front portion configured for mating with a mating structure and a back portion configured for attachment to a boot; (d) a spring biasing said ferrule assembly forward in said housing; and (e) a boot secured to said back portion of said housing and extending rearward around said tight-jacketed cable, said boot having an internal channel large enough to allow axial movement of said ferrule assembly relative to said boot. | 10-07-2010 |
20110271525 | PROTECTIVE COVER FOR FIELD-INSTALLABLE CONNECTOR - A method of terminating a fiber in a connector having a front and rear orientation, a housing, a clamping mechanism in the housing, and a ferrule assembly forward of the clamping mechanism and comprising a holder and a ferrule extending from the holder, the method comprising covering the ferrule with a cap, inserting a fiber into the clamping mechanism from the rear of the connector, and while the cap is on the ferrule, actuating the clamping mechanism to secure the fiber to the connector by urging the cap rearward relative to the clamping mechanism. | 11-10-2011 |
Patent application number | Description | Published |
20080263013 | System and method for creating a list of shared information on a peer-to-peer network - Today information Peer-to-Peer networks sometimes share improper information. Embodiments of the invention solve this problem by creating a list of shared information for analysis. In particular, a method or corresponding apparatus of an example embodiment includes a network node to obtain one or more searches from a Peer-to-Peer network. Next, the network node compares the one or more searches to one or more criteria. After comparing, the network node updates the one or more criteria to include variations of the one or more searches. Further, the network node issues the one or more searches based on the updated criteria. Next, the network node determines resultant information associated with the one or more searches. After determining, the network node creates a list of the resultant information for analysis. Using the list, an operator or software logic can analyze the resultant information to identify patterns and, in turn, identify improper information sharing. | 10-23-2008 |
20080319861 | System and method for advertising on a peer-to-peer network - A system for advertising on a Peer-to-Peer network detects a search request of a node in a Peer-to-Peer network. After detecting a search request, the system prepares an unsolicited response (e.g., advertisement) to the search request of the node. Once the unsolicited response is prepared, the system sends the unsolicited response to the node. For example, a Peer-to-Peer network node issues a search request and a system prepares an advertisement (e.g., an unsolicited response). After preparing the advertisement, the system sends the advertisement to the Peer-to-Peer network node that issued the search request. The process of sending advertisements can be made to each node issuing a search request without discrimination. In one example, the system detects a search request of a node in a Peer-to-Peer network; prepares an advertisement in response to the search request of the node based on a predetermined search criteria; and sends the advertisement to the node for advertising on the Peer-to-Peer network. | 12-25-2008 |
20100042732 | METHOD FOR IMPROVING PEER TO PEER NETWORK COMMUNICATION - The present invention relates to a node for deployment on a peer to peer network. The node is programmed for monitoring the network to receive communication messages therefrom and to forward the communication messages, optionally changing the communications radius parameters to an optimal or near optimal value. The node can forward messages from one network to another or from one network to the same network. The invention also provides a method for monitoring communication messages for selected objects by nodes on a peer to peer network. The method includes interposing the node on the network. The node has at least one stored object corresponding to a communication message object stored the node; and monitors the network to detect communication messages matching at least one of the stored objects and decides whether or not to forward or change communication message radius parameters based on some defined programming or configuration. | 02-18-2010 |
20110029660 | METHOD FOR MONITORING AND PROVIDING INFORMATION OVER A PEER TO PEER NETWORK - A pseudonode for deployment on a peer to peer network. The pseudonode is programmed for monitoring the peer to peer network to receive search requests therefrom, optionally comparing each said received search with said list of data objects, and to respond to such requests. The response may include advertising; the advertising may be selected in response to the request. The invention also provides a method for monitoring search requests for selected objects by nodes on a peer to peer network. The method further includes interposing the pseudonodes on the network in which it is configured to provide at least one IP address and optionally at least one client ID. The pseudonode has at least one stored object corresponding to a request object stored at said pseudonode; and monitors the network to detect requests matching at least one of the stored objects and acquires a unique ID generated by any network node requesting the object matching that stored object on the pseudonode, and responding to substantially each node representing an acquired ID. | 02-03-2011 |
20110035488 | Method for Monitoring and Providing Information Over A Peer to Peer Network - The present invention relates to a pseudonode used for deployment on a peer to peer network which pseudonode comprises an IP address and client ID that is changeable upon the occurrence of a preselected event and includes a list containing at least one searchable data object. The pseudonode is programmed for monitoring the network to receive search requests therefrom and to compare each said received search with said list of data objects and to respond to such request. The invention also provides a method for monitoring search requests for selected objects by nodes on a peer to peer network. The method includes interposing the pseudonodes on the network in which it is configured to provide at least one IP address and optionally at least one client ID. The pseudonode has at least one stored object corresponding to a request object stored at said pseudonode; and monitors the network to detect requests matching at least one of the stored objects and acquires a unique ID generated by any network node requesting the object matching that stored object on the pseudonode and responding to substantially each node representing an acquired ID. | 02-10-2011 |
20110066695 | METHOD FOR OPTIMALLY UTIILIZING A PEER TO PEER NETWORK - In accordance with an embodiment of the invention, there is provided a method for splitting a load of monitoring a peer to peer network. The method has a first node in the peer to peer network receiving information reported by a second node in the peer to peer network, including information concerning which nodes are connected to the second node. The method further has the first node connecting to nodes different from the nodes that are connected to the second node using the received information. The method still further has the first node reporting information, including information concerning which nodes are connected to the first node, such that the second node also has access to the reported information, thereby splitting the load of monitoring the peer to peer network among the first and second nodes. | 03-17-2011 |
20110289151 | Method For Monitoring And Providing Information Over A Peer To Peer Network - The present invention relates to a pseudonode used for deployment on a peer to peer network which pseudonode comprises an IP address and client ID that is changeable upon the occurrence of a preselected event and includes a list containing at least one searchable data object. The pseudonode is programmed for monitoring the network to receive search requests therefrom and to compare each said received search with said list of data objects and to respond to such request. The invention also provides a method for monitoring search requests for selected objects by nodes on a peer to peer network. The method includes interposing the pseudonodes on the network in which it is configured to provide at least one IP address and optionally at least one client ID. The pseudonode has at least one stored object corresponding to a request object stored at said pseudonode; and monitors the network to detect requests matching at least one of the stored objects and acquires a unique ID generated by any network node requesting the object matching that stored object on the pseudonode and responding to substantially each node representing an acquired ID. | 11-24-2011 |
20110289209 | Method For Monitoring And Providing Information Over A Peer To Peer Network - The present invention relates to a pseudonode used for deployment on a peer to peer network which pseudonode comprises an IP address and client ID that is changeable upon the occurrence of a preselected event and includes a list containing at least one searchable data object. The pseudonode is programmed for monitoring the network to receive search requests therefrom and to compare each said received search with said list of data objects and to respond to such request. The invention also provides a method for monitoring search requests for selected objects by nodes on a peer to peer network. The method includes interposing the pseudonodes on the network in which it is configured to provide at least one IP address and optionally at least one client ID. The pseudonode has at least one stored object corresponding to a request object stored at said pseudonode; and monitors the network to detect requests matching at least one of the stored objects and acquires a unique ID generated by any network node requesting the object matching that stored object on the pseudonode and responding to substantially each node representing an acquired ID. | 11-24-2011 |
20110314100 | Method For Improving Peer To Peer Network Communication - The present invention relates to a node for deployment on a peer to peer network. The node is programmed for monitoring the network to receive communication messages therefrom and to forward the communication messages, optionally changing the communications radius parameters to an optimal or near optimal value. The node can forward messages from one network to another or from one network to the same network. The invention also provides a method for monitoring communication messages for selected objects by nodes on a peer to peer network. The method includes interposing the node on the network. The node has at least one stored object corresponding to a communication message object stored the node; and monitors the network to detect communication messages matching at least one of the stored objects and decides whether or not to forward or change communication message radius parameters based on some defined programming or configuration. | 12-22-2011 |
20120124886 | ANTIMICROBIAL CONTAINING FISH HOOK AND METHOD OF USING AND MANUFACTURING SAME - A fishing hook is plated with, coated with, or contains an antimicrobial substance to treat the impalement wound of a fish caused by the hook. Specifically the hook includes at least one shank; at least one bend that extends from the shank; at least one point defined by a free end of the bend, wherein the fish hook contains a substance whose purpose is to minimize infection and to treat the puncture wound of a fish that is caught. The substance optionally acts to sterilize the hook to reduce the entrance of microbes into the wound when the puncture occurs. The substance may also contain an anti-inflammatory or a pain reliever to reduce the suffering of the fish or of others accidentally injured by the hook. | 05-24-2012 |
20120179748 | SYSTEM AND METHOD FOR SEARCHING FOR SPECIFIC TYPES OF PEOPLE OR INFORMATION ON A PEER-TO-PEER NETWORK - The present invention provides a system and a method for searching for specific types of people or specific types of information on a Peer-to-Peer network, and in particular, using specific types of search terms as a means of profiling to find specific types of information or specific types of people on a Peer-to-Peer network. When a specific types of person or specific type of information is needed, a specific type of search term is issued on the Peer-to-Peer network. If that specific type of person or specific types of information is available a response will be received. | 07-12-2012 |
20120185536 | Method For Optimally Utilizing A Peer To Peer Network - In accordance with an embodiment of the invention, there is provided a method for splitting a load of monitoring a peer to peer network. The method has a first node in the peer to peer network receiving information reported by a second node in the peer to peer network, including information concerning which nodes are connected to the second node. The method further has the first node connecting to nodes different from the nodes that are connected to the second node using the received information. The method still further has the first node reporting information, including information concerning which nodes are connected to the first node, such that the second node also has access to the reported information, thereby splitting the load of monitoring the peer to peer network among the first and second nodes. | 07-19-2012 |
20120185601 | Method For Optimally Utilizing A Peer To Peer Network - In accordance with an embodiment of the invention, there is provided a method for splitting a load of monitoring a peer to peer network. The method has a first node in the peer to peer network receiving information reported by a second node in the peer to peer network, including information concerning which nodes are connected to the second node. The method further has the first node connecting to nodes different from the nodes that are connected to the second node using the received information. The method still further has the first node reporting information, including information concerning which nodes are connected to the first node, such that the second node also has access to the reported information, thereby splitting the load of monitoring the peer to peer network among the first and second nodes. | 07-19-2012 |
20120191849 | Method For Monitoring And Providing Information Over A Peer To Peer Network - The present invention relates to a pseudonode used for deployment on a peer to peer network which pseudonode comprises an IP address and client ID that is changeable upon the occurrence of a preselected event and includes a list containing at least one searchable data object. The pseudonode is programmed for monitoring the network to receive search requests therefrom and to compare each said received search with said list of data objects and to respond to such request. The pseudonode has at least one stored object corresponding to a request object stored at said pseudonode; and monitors the network to detect requests matching at least one of the stored objects and acquires a unique ID generated by any network node requesting the object matching that stored object on the pseudonode and responding to substantially each node representing an acquired ID. | 07-26-2012 |
20140195656 | METHOD FOR OPTIMALLY UTILIZING A PEER TO PEER NETWORK - In accordance with an embodiment of the invention, there is provided a method for splitting a load of monitoring a peer to peer network. The method has a first node in the peer to peer network receiving information reported by a second node in the peer to peer network, including information concerning which nodes are connected to the second node. The method further has the first node connecting to nodes different from the nodes that are connected to the second node using the received information. The method still further has the first node reporting information, including information concerning which nodes are connected to the first node, such that the second node also has access to the reported information, thereby splitting the load of monitoring the peer to peer network among the first and second nodes. | 07-10-2014 |
20140213161 | TUNGSTEN JEWELRY RESURFACING KIT FOR CONSUMER END USE AND TUNGSTEN RESURFACING COMPOUND USED THEREIN - A tungsten jewelry resurfacing kit for consumer end use comprises a buffing cloth; a container of tungsten resurfacing compound having less than 50 ml of resurfacing compound, wherein the resurfacing compound comprises a mixture of i) a diamond powder of at least 1000 grit size; and ii) a binder, such as a fat, which is a semi-solid at ambient temperatures. The kit may further include a plurality of swabs for removing the resurfacing compound from the container. The compound may be a mixture of about 25 to 75% by volume of a diamond powder of at least 1000 grit size; and about 25 to 75% by volume a binder, such as a fat, which is a semi-solid at ambient temperatures. | 07-31-2014 |