Boult
David Boult, Dhahran SA
Patent application number | Description | Published |
---|---|---|
20140039648 | SYSTEM FOR INSPECTION AND MAINTENANCE OF A PLANT OR OTHER FACILITY - The present invention is a computerized inspection and maintenance system for an industrial plant or other facility. The system comprises a plurality of software modules which are both interactive with inspectors, maintenance, and supervisory personnel and interact with one another | 02-06-2014 |
Kyle Boult, Winnipeg CA
Patent application number | Description | Published |
---|---|---|
20140110300 | Food Tray with Informational Insert - A food tray has upper and lower tray shaped members and an informational insert sandwiched between them for viewing of an informational display of the insert through a transparent or translucent window portion of at least one of the tray-shaped members. Two interlocking mechanisms are operable to reliably secure the tray members to one another when engaged together by sliding of the lower tray member into place along an underside of the upper tray member. The insert includes a rear wall portion disposed between upstanding rear walls of the tray members, and a height of the upper tray member is reduced at a front edge thereof to provide optimal viewing of the opposing rear wall portion of the insert. A seal positively positioned in a groove of the lower tray member provides a water tight seal between the tray members to protect the informational insert. | 04-24-2014 |
Steve Boult, Manchester GB
Patent application number | Description | Published |
---|---|---|
20090266154 | IN-BOREHOLE GAS MONITOR APPARATUS AND METHOD - A self-contained in-borehole gas monitor (IGM) apparatus ( | 10-29-2009 |
20130036811 | IN-BOREHOLE GAS MONITOR APPARATUS AND METHOD COMPRISING A VOC CONCENTRATION ANALYSER AND A VOC COLLECTOR - In-Borehole Gas Monitor Apparatus and Method An in-borehole gas monitor (IGM) apparatus comprising a VOC concentration analyser and a VOC collector. | 02-14-2013 |
Terrance Boult, Monoment, CO US
Patent application number | Description | Published |
---|---|---|
20110106734 | SYSTEM AND APPARTUS FOR FAILURE PREDICTION AND FUSION IN CLASSIFICATION AND RECOGNITION - The present invention relates to pattern recognition and classification, more particularly, to a system and method for meta-recognition which can to predict success/failure for a variety of different recognition and classification applications. In the present invention, we define a new approach based on statistical extreme value theory and show its theoretical basis for predicting success/failure based on recognition or similarity scores. By fitting the tails of similarity or distance scores to an extreme value distribution, we are able to build a predictor that significantly outperforms random chance. The proposed system is effective for a variety of different recognition applications, including, but not limited to, face recognition, fingerprint recognition, object categorization and recognition, and content-based image retrieval system. One embodiment includes adapting machine learning approach to address meta-recognition based fusion at multiple levels, and provide an empirical justification for the advantages of these fusion element. This invention provides a new score normalization that is suitable for multi-algorithm fusion for recognition and classification enhancement. | 05-05-2011 |
Terrance E. Boult, Bethlehem, PA US
Patent application number | Description | Published |
---|---|---|
20110211077 | Adaptive imaging using digital light processing | 09-01-2011 |
Terrance E. Boult, Monument, CO US
Patent application number | Description | Published |
---|---|---|
20080267403 | System and method for privacy enhancement via adaptive cryptographic embedding - The system and method enhances privacy and security by determining parts of a data stream that should not be publicly available and doing in-place encryption of that data while leaving the remaining data unencrypted for direct usage in security. The system is composed of a designator, that determines what parts of the data stream require protection, and a protector, that performs the in-place encryption. The resulting protected data stream can be played/displayed using the same standard technology as for the original data stream, with the encrypted portions appearing as random noise. The system also supports an extractor, which can, given access to the appropriate keys, invert the encryption and provide back the original data stream. | 10-30-2008 |
20090271634 | Bio-Cryptograhpy : Secure cryptographic protocols with bipartite biotokens - Techniques, systems and methods are described relating to combining biometric and cryptographic techniques to support securely embedding data within a token and subsequent biometrically-enabled recovery of said data. Various transformation approaches are described that provide a secure means for transforming a stored or live, secure biometric-based identity token, embedding data into such tokens and biometric-based matching to both verify the user's identity and recover the embedded data. Security enhancements to a range of existing protocols are described using the techniques. Systems using novel protocols based on these techniques are described | 10-29-2009 |
20110304465 | SYSTEM AND METHOD FOR DRIVER REACTION IMPAIRMENT VEHICLE EXCLUSION VIA SYSTEMATIC MEASUREMENT FOR ASSURANCE OF REACTION TIME - A system and method for measuring impairment in an operator and stopping an impaired operator from operating a vehicle. The method empirically measures an operator's cognitive and motor skills requisite for safely operating a motorized vehicle and verifies the person's identity. The invention includes three interlocking major subsystems. The first subsystem provides generalized impairment measurement unit. The second subsystem interfaces with the impairment measurement unit and a vehicle ignition system and ensures the vehicle does not start if the operator is impaired. The third system determines whether the person blowing into a drug and alcohol analyzer connected to the first system is that person by detecting a various biometric. If the operator is not impaired and their identity is verified the vehicle ignition is enabled. If the operator is indeed impaired beyond a level requisite to safely operate the vehicle the ignition is disabled. | 12-15-2011 |
20130262873 | METHOD AND SYSTEM FOR AUTHENTICATING REMOTE USERS - A user of a mobile device can be authenticated based on multiple factors including biometric data of the user. During an enrollment process of the user, an encryption key is sent to the mobile device via a message. The encryption key is recovered from the message and used to encrypt communications between the mobile device and a server. Biometric data is collected from the user and sent to the server for computing a biometric model (e.g., a voice model, etc.) of the user for later use in authentication. An encrypted biometric model is stored only in the mobile device and the encrypted biometric model is sent to the server for authentication of the user. For authentication, various information including an identification of the mobile device, responses to challenge questions, biometric data including the biometric model, etc. are used at the server. | 10-03-2013 |
20140307258 | OPTICAL ANALYTE MEASUREMENT - Ethanol is non-invasively tested using temperature-modulated spectroscopy (TMS). The TMS approach uses the active control of temperature to vary the spectral response of the IR-LED output, effectively sliding a spectral pulse across the ethanol sample, revealing the peaks and valleys of ethanol's spectral response. | 10-16-2014 |
Terrance E. Boult, Colorado Springs, CO US
Patent application number | Description | Published |
---|---|---|
20140380040 | SECURE BIOMETRIC CLOUD STORAGE SYSTEM - A secure and scalable data storage system that includes a server and a plurality of clients. The server maintains an access permission file that includes a file-group name, a plurality of client access blocks, a first and second public key, and a signature that is based on a first private key. The signature ensures that only clients who have a certain level of access can modify the contents of the access blocks. Each client access block includes at least one of a first access key, a second access key and a third access key. The access keys are encapsulated within biometric information of the client. The server grants one of a first level of access based on a successful verification of a signed request with the first public key and a second level of access based on a successful verification of the signed request with the second public key. | 12-25-2014 |
Terrance Edward Boult, Monument, CO US
Patent application number | Description | Published |
---|---|---|
20090022374 | Revocable biometrics with robust distance metrics - Techniques, systems and methods relating to cryptographically secure revocable biometric signatures and identification computed with robust distance metrics are described. Various biometric cryptographically secure revocable transformation approaches are described that support a robust pseudo-distance computation in encoded form, thereby supporting confidence in verification, and which can provide for verification without identification. | 01-22-2009 |
William Benjamin Boult, Cornwall GB
Patent application number | Description | Published |
---|---|---|
20150315985 | FLAPPER ASSEMBLY FOR A THROTTLE VALVE - A method of forming a flapper assembly ( | 11-05-2015 |
William Benjamin Boult, Bristol GB
Patent application number | Description | Published |
---|---|---|
20160123482 | FLAPPER EXHAUST DIVERTER VALVE - A flapper exhaust diverter valve ( | 05-05-2016 |