Patent application number | Description | Published |
20080264661 | Dual-character shock isolation structure and methodology - Dual-character shock-isolation structure, and associated methodology, for minimizing the transmission of shock through a connective interface existing between a pair of interconnected structures, such as between the handle of an impact-delivering tool and a user's hand and arm. The proposed structure includes kinetic-energy-to-heat cushioning structure, and twin-layer, facially releasably, interengaged shear-lock structure operatively joined to, and positioned in shock-transmission series with, the cushioning structure. | 10-30-2008 |
20100108234 | Dual-character shock isolation methodology - A shock-mitigating method which is practiceable in a connective interface existing between a pair of interconnected structures, wherein the fundamental practice steps include (a) on one side of that interface, engaging any shock-transmission event with a cushioning material which is characterized by kinetic-energy-to-heat conversion behavior, and (b), on the other side of the interface, engaging such an event with a material which is in shock communication with the cushioning material, and which is characterized by shear-lock behavior. | 05-06-2010 |
20100186172 | Anatomical, pressure-evenizing mattress overlay - A method and structure for furnishing pressure-evenized, dynamic-reaction anatomical support. The method includes (a) supporting the anatomy with a 100% open cell viscoelastic foam, and (b) thereafter, and within the foam, reacting to both static and dynamic, anatomically-produced foam indentations to expand and contract cell-openness size, whereby deeper/sharper indentations result in greater-size cell-openness. Such reacting includes laterally stretching and flowing regions of the foam adjacent such an indentation The overlay structure features (1) a dynamic-response core expanse formed of a 100% open-cell, compressible and flowable, polyurethane, viscoelastic foam possessing a compressed, relaxed-state volume and (2) an elastomeric, moisture-resistant coating, load-transmissively, interfacially bonded to the entirety of the outside surface of the core expanse to function as a dynamically-responsive unit with the expanse. The coating possesses a relaxed-state prestressed tension condition which is responsible for the expanse's compressed condition. | 07-29-2010 |
20100191163 | Dynamic-response, anatomical bandaging system and methodology - A dynamic-response anatomical bandaging system and methodology utilizing a limb-wrappable, layered, dynamic-response, bandaging expanse which includes a dynamic-response, pressure-applying layer displaying a compressive-load versus compression-deflection behavior which is characterized by a curve having a substantially linear region in which a major change in compression deflection relates to an anatomically insignificant change in compressive load. The system and methodology also feature, relative to use of the bandaging expanse, freely attachable and detachable, dynamic-response (a) splinting structure, and (b) expanse-edge-overlap wrap-closure tensioning structure. | 07-29-2010 |
20100192306 | Anatomical, pressure-evenizing mattress overlay and associated methodology - A method and structure for furnishing pressure-evenized, dynamic-reaction anatomical support. The method includes (a) supporting the anatomy with a 100% open cell viscoelastic foam, and (b) within the foam, reacting to both static and dynamic, anatomically-produced foam indentations to expand and contract cell-openness size, whereby deeper/sharper indentations result in greater-size cell-openness. Such reacting includes laterally stretching and flowing regions of the foam adjacent such an indentation The overlay structure features (1) a dynamic-response core expanse formed of a 100% open-cell, compressible and flowable, polyurethane, viscoelastic foam possessing a compressed, relaxed-state volume, and (2) an elastomeric, moisture- and gas-flow-managing coating, load-transmissively, bonded to the entirety of the core expanse's outside surface to function as a dynamically-responsive unit with the expanse. The coating possesses a relaxed-state, prestressed tension condition which is responsible for the expanse's compressed condition. | 08-05-2010 |
20110072589 | ANATOMICAL, PRESSURE-EVENIZING MATTRESS OVERLAY WITH PRESTRESSED CORE, AND BAFFLED, LATERAL-EDGE CORE RESPIRATION - An anatomical pressure-evenizing mattress overlay including a dynamic-response core having spaced, upper and lower, surfaces and an intermediate, perimetral edge. The core is formed including a 100% open-cell, compressible and flowable, viscoelastic foam expanse, and possesses a relaxed-state volume which resides in about an 8-10% nominally compressed condition. Load-transmissively bonded to the entire outside of the core, so as to function as a dynamically-responsive unit with it, and possessing a relaxed-state, internal, prestressed, tension condition, is an elastomeric, moisture- and gas-flow-managing coating, including fluid-flow-controlling, baffled, respiration window structure which exposes a portion of the core's edge to accommodate respiration of and for the interior of the core. | 03-31-2011 |
20130237890 | MIGRAINE HEADACHE MITIGATION - Apparatuses for reducing migraine headache pain comprising head-contacting expanses of compressible material having pressure-versus-deflection characteristics possessing plateau conditions defined by ranges of compressive material deflections associated throughout with substantially constant material compression produced by an applied, material-compressing pressure which is slightly less than that pressure which, when applied to the anatomy, occludes anatomical, venous-return blood flow, and shells substantially surrounding, and contacting, the compressible-material expanses, appropriately sized, and operable, with the apparatuses in place on a wearers' heads, to place the compressible material in the expanse in its characteristic “plateau” condition of compression, wherein such compression, at every location, is a non-adjustable value dependent entirely upon the fit-spacing at that location between a wearer's head and the inside of the shell. This disclosure additionally or alternatively discusses methods of reducing migraine headache pain by fitting apparatuses to wearers' heads for appropriate time expanses and other methods of reducing migraine pain. | 09-12-2013 |
Patent application number | Description | Published |
20080227471 | METHOD FOR TRACKING CREDIT CARD FRAUD - A system and method for automatically comparing obtained wireless device location information from a wireless network and comparing that location with another independent source geographic location is provided. Location information is derived from two or more sources in a multiplicity of ways and a comparison is made within a Location Comparison Engine. The Location Comparison Engine makes use of databases that assist in resolving obtained raw positioning information and converting that positioning information into one or more formats for adequate location comparison. Results of the location comparison are deduced to determine if the wireless device is in some proximity to some other activity source location. Other location information used for comparison may be obtained from a multiplicity of sources, such as another network based on some activity of the wireless device user, another wireless device via a wireless network, or any system capable of providing location information to the Location Comparison Engine. | 09-18-2008 |
20090204457 | System and method for authenticating a user of multiple computer applications, networks or devices using a wireless device - An automated system and method for authenticating entities or individuals engaging in automated or electronic transactions or activities such as financial transactions, accessing computer applications, computer software, data networks or other automated or electronic devices requiring identity verification is provided. A unique Personal Identity Value is computed and stored in an Identity Register for the entity or individual and may be used for a variety of applications including recognizing incidents of identity theft. This Personal Identity Value is based on one or more computer logic resources that incorporate the relationship among a variety of identification information elements and parameters associated with the entity or individual, such as the entity's or individual's wireless device location, the entity's or individual's home location, other associated locations, automated activities engaged in and applications accessed. | 08-13-2009 |
20090204815 | System and method for wireless device based user authentication - An automated system and method for authenticating entities or individuals attempting to access a computer application, network, system or device using a wireless device is provided. The system employs one or more short-range wireless interfaces (e.g. BLUETOOTH or Wi-Fi) or long-range wireless interfaces (e.g. cellular or WiMAX) to detect the presence or location of the wireless device and it's proximity to the secure system to be accessed. The wireless device incorporates a unique identifier and secure authentication key information associated with the user of the wireless device. An authentication result is generated and may be used for a variety of applications. The application may process the result and determine the degree of access for which the entity or individual is allowed. | 08-13-2009 |
20110154447 | SYSTEMS AND METHODS FOR AUTHENTICATING A USER OF A COMPUTER APPLICATION, NETWORK, OR DEVICE USING A WIRELESS DEVICE - A method and system for authenticating a user includes providing an invocation element capable of being activated by a single user action, receiving an indication that the invocation element has been activated, obtaining a location of a wireless device associated with the user, determining whether the wireless device is associated with an authorized user, approving the user to use the application based on a predetermined location criterion, and producing an indication that the user has been authenticated. | 06-23-2011 |
20120144498 | System And Method For Mobile Identity Protection of a User of Multiple Computer Applications, Networks or Devices - An automated system and method for authenticating entities or individuals engaging in automated or electronic transactions or activities such as financial transactions, accessing computer applications, computer software, data networks or other automated or electronic devices requiring identity verification is provided. A unique Personal Identity Value is computed and stored in an Identity Register for the entity or individual and may be used for a variety of applications including recognizing incidents of identity theft. This Personal Identity Value is based on one or more computer logic resources that incorporate the relationship among a variety of identification information elements and parameters associated with the entity or individual, such as the entity's or individual's wireless device location, the entity's or individual's home location, other associated locations, automated activities engaged in and applications accessed. | 06-07-2012 |
20130132568 | SYSTEM AND METHOD FOR AUTOMATED ANALYSIS COMPARING A WIRELESS DEVICE LOCATION WITH ANOTHER GEOGRAPHIC LOCATION - A system and method for automatically comparing obtained wireless device location information from a wireless network and comparing that location with another independent source geographic location is provided. Location information is derived from two or more sources in a multiplicity of ways and a comparison is made within a Location Comparison Engine. The Location Comparison Engine makes use of databases that assist in resolving obtained raw positioning information and converting that positioning information into one or more formats for adequate location comparison. Results of the location comparison are deduced to determine if the wireless device is in some proximity to some other activity source location. Other location information used for comparison may be obtained from a multiplicity of sources, such as another network based on some activity of the wireless device user, another wireless device via a wireless network, or any system capable of providing location information to the Location Comparison Engine. | 05-23-2013 |
20130197998 | AUTHENTICATING ENTITIES ENGAGING IN AUTOMATED OR ELECTRONIC TRANSACTIONS OR ACTIVITIES - An automated system and method for authenticating entities or individuals engaging in automated or electronic transactions or activities such as financial transactions, accessing computer applications, computer software, data networks or other automated or electronic devices requiring identity and/or reliability verification is provided. | 08-01-2013 |
20140040155 | SYSTEM AND METHOD FOR MOBILE IDENTITY PROTECTION OF A USER OF MULTIPLE COMPUTER APPLICATIONS, NETWORKS OR DEVICES USING A WIRELESS DEVICE - An automated system and method for authenticating entities or individuals engaging in automated or electronic transactions or activities such as financial transactions, accessing computer applications, computer software, data networks or other automated or electronic devices requiring identity verification is provided. A unique Personal Identity Value is computed and stored in an Identity Register for the entity or individual and may be used for a variety of applications including recognizing incidents of identity theft. This Personal Identity Value is based on one or more computer logic resources that incorporate the relationship among a variety of identification information elements and parameters associated with the entity or individual, such as the entity's or individual's wireless device location, the entity's or individual's home location, other associated locations, automated activities engaged in and applications accessed. | 02-06-2014 |
20140187205 | SYSTEM AND METHOD FOR AUTOMATED ANALYSIS COMPARING A WIRELESS DEVICE LOCATION WITH ANOTHER GEOGRAPHIC LOCATION - A system and method for automatically comparing obtained wireless device location information from a wireless network and comparing that location with another independent source geographic location is provided. Location information is derived from two or more sources in a multiplicity of ways and a comparison is made within a Location Comparison Engine. The Location Comparison Engine makes use of databases that assist in resolving obtained raw positioning information and converting that positioning information into one or more formats for adequate location comparison. Results of the location comparison are deduced to determine if the wireless device is in some proximity to some other activity source location, Other location information used for comparison may be obtained from a multiplicity of sources, such as another network based on some activity of the wireless device user, another wireless device via a wireless network, or any system capable of providing location information to the Location Comparison Engine. | 07-03-2014 |
20140351899 | SYSTEMS AND METHODS FOR AUTHENTICATING A USER OF A COMPUTER APPLICATION, NETWORK, OR DEVICE USING A WIRELESS DEVICE - A method and system for authenticating a user includes providing an invocation element capable of being activated by a single user action, receiving an indication that the invocation element has been activated, obtaining a location of a wireless device associated with the user, determining whether the wireless device is associated with an authorized user, approving the user to use the application based on a predetermined location criterion, and producing an indication that the user has been authenticated. | 11-27-2014 |
20150178715 | AUTHENTICATING ENTITIES ENGAGING IN AUTOMATED OR ELECTRONIC TRANSACTIONS OR ACTIVITIES - An automated system and method for authenticating entities or individuals engaging in automated or electronic transactions or activities such as financial transactions, accessing computer applications, computer software, data networks or other automated or electronic devices requiring identity and/or reliability verification is provided. | 06-25-2015 |
Patent application number | Description | Published |
20100211470 | SYSTEM AND METHOD FOR CONTROLLING FINANCIAL TRANSACTIONS OVER A WIRELESS NETWORK - A system and method for controlling financial transactions is disclosed. A customer, using a wireless device, identifies a point of sale and the amount of a transaction at that point of sale is first communicated to a central service and then transmitted to the wireless device for display at the wireless device. The customer can either accept the transaction amount to complete the transaction or reject the amount to cancel the transaction. The customer may have to enter a password or personal identification number to verify the authorization to use the wireless financial system. The customer is billed for the transaction via credit, debit, ATM or other methods, such as the wireless carrier or an internet provider. | 08-19-2010 |
20120330767 | SYSTEM AND METHOD FOR CONTROLLING FINANCIAL TRANSACTIONS OVER A WIRELESS NETWORK - A system and method for controlling financial transactions is disclosed. A customer, using a wireless device, identifies a point of sale and the amount of a transaction at that point of sale is first communicated to a central service and then transmitted to the wireless device for display at the wireless device. The customer can either accept the transaction amount to complete the transaction or reject the amount to cancel the transaction. The customer may have to enter a password or personal identification number to verify the authorization to use the wireless financial system. The customer is billed for the transaction via credit, debit, ATM or other methods, such as the wireless carrier or an internet provider. | 12-27-2012 |
20140379500 | SYSTEM AND METHOD FOR CONTROLLING FINANCIAL TRANSACTIONS OVER A WIRELESS NETWORK - A system and method for controlling financial transactions is disclosed. A customer, using a wireless device, identifies a point of sale and the amount of a transaction at that point of sale is first communicated to a central service and then transmitted to the wireless device for display at the wireless device. The customer can either accept the transaction amount to complete the transaction or reject the amount to cancel the transaction. The customer may have to enter a password or personal identification number to verify the authorization to use the wireless financial system. The customer is billed for the transaction via credit, debit, ATM or other methods, such as the wireless carrier or an internet provider. | 12-25-2014 |
20140379502 | SYSTEM AND METHOD FOR CONTROLLING FINANCIAL TRANSACTIONS OVER A WIRELESS NETWORK - A system and method for controlling financial transactions is disclosed. A customer, using a wireless device, identifies a point of sale and the amount of a transaction at that point of sale is first communicated to a central service and then transmitted to the wireless device for display at the wireless device. The customer can either accept the transaction amount to complete the transaction or reject the amount to cancel the transaction. The customer may have to enter a password or personal identification number to verify the authorization to use the wireless financial system. The customer is billed for the transaction via credit, debit, ATM or other methods, such as the wireless carrier or an internet provider. | 12-25-2014 |
20140379786 | SYSTEM AND METHOD FOR CONTROLLING FINANCIAL TRANSACTIONS OVER A WIRELESS NETWORK - A system and method for controlling financial transactions is disclosed. A customer, using a wireless device, identifies a point of sale and the amount of a transaction at that point of sale is first communicated to a central service and then transmitted to the wireless device for display at the wireless device. The customer can either accept the transaction amount to complete the transaction or reject the amount to cancel the transaction. The customer may have to enter a password or personal identification number to verify the authorization to use the wireless financial system. The customer is billed for the transaction via credit, debit, ATM or other methods, such as the wireless carrier or an internet provider. | 12-25-2014 |