Patent application number | Description | Published |
20100287620 | COMPUTER SYSTEM LOCK-DOWN - Systems and methods for allowing authorized code to execute on a computer system are provided. According to one embodiment, a method is provided for locking down a computer system. A customized, local whitelist database is stored with a memory of the computer system. The whitelist database forms a part of an authentication system operable within the computer system and contains therein cryptographic hash values of code modules expressly approved for execution by the computer system. A kernel mode driver of the authentication system intercepts a request to create a process associated with a code module. The authentication system determines whether to authorize the request by causing a cryptographic hash value of the code module to be authenticated against the whitelist database. The authentication system allows the code module to be loaded and executed within the computer system if the cryptographic hash value matches one of the cryptographic hash values. | 11-11-2010 |
20110029772 | CLOUD-BASED APPLICATION WHITELISTING - Systems and methods for allowing authorized code to execute on a computer system are provided. According to one embodiment, an in-memory cache is maintained having entries containing execution authorization information regarding recently used modules. After authenticating a module, its execution authorization information is added to the cache. Activity relating to a module is intercepted. A hash value of the module is generated. The module is authenticated with reference to a multi-level whitelist including a global whitelist, a local whitelist and the cache. The authentication includes first consulting the cache and if the module is not found, then looking up its hash value in the local whitelist and if it is not found, then looking it up in the global whitelist. Finally, the module is allowed to be loaded and executed if its hash value matches a hash value of an approved code modules within the global whitelist. | 02-03-2011 |
20110167050 | SECURE SYSTEM FOR ALLOWING THE EXECUTION OF AUTHORIZED COMPUTER PROGRAM CODE - Systems and methods for allowing authorized code to execute on a computer system are provided. According to one embodiment, file or operating system activity relating to a code module is intercepted. A cryptographic hash value of the code module is authenticated with reference to a multi-level whitelist, which includes a remote global whitelist and a local whitelist. The remote global whitelist is maintained by a trusted service provider and contains cryptographic hash values of approved code modules known not to contain malicious code. The local whitelist is accessible by computer systems within the LAN and contains cryptographic hash values of a subset of the approved code modules. The cryptographic hash value is checked against the local whitelist. If no match is found, it is checked against the global whitelist. The code module is allowed to be loaded and executed if the cryptographic hash value corresponds to an approved code module. | 07-07-2011 |
20110167259 | SOFTWARE LICENSE ENFORCEMENT - Systems and methods for performing software license enforcement are provided. According to one embodiment, file or operating system activity relating to a code module are intercepted by a kernel mode driver of a computer system. The kernel mode driver causes a cryptographic hash value of the code module to be authenticated with reference to a local whitelist containing cryptographic hash values of approved code modules known not to contain malicious code. The local whitelist also contains licensing control information. If the cryptographic hash value matches a cryptographic hash value of an approved code module, then (i) authority to execute the code module is further validated if the licensing control information so indicates by performing a license check regarding the code module; and (ii) the code module is allowed to be loaded and executed within the computer system if the authority is affirmed by the license check. | 07-07-2011 |
20110167260 | COMPUTER SYSTEM LOCK-DOWN - Systems and methods for allowing authorized code to execute on a computer system are provided. According to one embodiment, a method is provided for locking down a computer system. A customized, local whitelist database is stored with a memory of the computer system. The whitelist database forms a part of an authentication system operable within the computer system and contains therein cryptographic hash values of code modules expressly approved for execution by the computer system. A kernel mode driver of the authentication system intercepts file system or operating system activity relating to a code module. The authentication system determines whether to authorize the request by causing a cryptographic hash value of the code module to be authenticated against the whitelist database. The authentication system allows the code module to be loaded and executed within the computer system if the cryptographic hash value matches one of the cryptographic hash values. | 07-07-2011 |
20110167261 | SELECTIVE AUTHORIZATION OF THE LOADING OF DEPENDENT CODE MODULES BY RUNNING PROCESSES - Systems and methods for selective authorization of dependent code modules are provided. According to one embodiment, file system or operating system activity relating to a first code module is initiated by a running process associated with a second code module. The file system or operating system activity is intercepted by a kernel mode driver of a computer system. The kernel mode driver selectively authorizes loading of the first code module by the running process based at least in part on one or more attributes of the second code module. | 07-07-2011 |
20120072725 | CLOUD-BASED APPLICATION WHITELISTING - Systems and methods for allowing authorized code to execute on a computer system are provided. According to one embodiment, an in-memory cache is maintained having entries containing execution authorization information regarding recently used modules. After verifying a module, its execution authorization information is added to the cache. Activity relating to a module is intercepted. A hash value of the module is generated. The module is verified with reference to a multi-level whitelist including a global whitelist, a local whitelist and the cache. The verification includes first consulting the cache and if the module is not found, then looking up its hash value in the local whitelist and if it is not found, then looking it up in the global whitelist. Finally, the module is allowed to be executed if the code module is approved by the multi-level whitelist database architecture. | 03-22-2012 |
20120078863 | APPLICATION CONTROL CONSTRAINT ENFORCEMENT - Systems and methods for performing application control constraint enforcement are provided. According to one embodiment, file system or operating system activity of a computer system is intercepted relating to a code module. A cryptographic hash value of the code module is checked against a local whitelist database containing cryptographic hash values of approved code modules, which are known not to contain viruses or malicious code. The local whitelist database also contains execution constraint information. When the cryptographic hash value matches one of the cryptographic hash values of approved code modules, authority of the computer system or an end user of the computer system to execute the code module is further validated if the execution constraint information so indicates by performing a constraint check regarding the code module. If the authority is affirmed by the constraint check, then allowing the code module to be executed. | 03-29-2012 |
20120191972 | SELECTIVE AUTHORIZATION OF THE LOADING OF DEPENDENT CODE MODULES BY RUNNING PROCESSES - Systems and methods for selective authorization of dependent code modules are provided. According to one embodiment, a kernel mode driver of a computer system intercepts file system or operating system activity, by a running process, relating to a dependent code module. Loading of the dependent code module is selectively authorized by authenticating a cryptographic hash value of the dependent code module with reference to a multi-level whitelist. The multi-level whitelist includes a global whitelist database remote from the computer system, maintained by a trusted service provider and which contains cryptographic hash values of approved code modules known not to contain viruses or malicious code; and a local whitelist database that includes cryptographic hash values of a subset of the approved code modules. The running process is allowed to load the dependent code module when the cryptographic hash value matches one of the cryptographic hash values of the approved code modules. | 07-26-2012 |
20130297946 | SELECTIVE AUTHORIZATION OF THE LOADING OF DEPENDENT CODE MODULES BY RUNNING PROCESSES - Systems and methods for selective authorization of dependent code modules are provided. According to one embodiment, responsive to a monitored file system or operating system event initiated by an active process, a real-time authentication process is performed or bypassed on a code module to which the monitored event relates with reference to a multi-level whitelist. The multi-level whitelist includes a global whitelist database remote from the computer system, maintained by a trusted service provider and which contains cryptographic hash values of approved code modules; and a local whitelist database that includes cryptographic hash values of a subset of the approved code modules. The active process is allowed to load the code module when the authentication process is bypassed or when the cryptographic hash value of the code module matches one of the cryptographic hash values of approved code modules within the multi-level whitelist. | 11-07-2013 |
20140075187 | SELECTIVE AUTHORIZATION OF THE LOADING OF DEPENDENT CODE MODULES BY RUNNING PROCESSES - Systems and methods for selective authorization of dependent code modules are provided. According to one embodiment, responsive to a monitored file system or operating system event initiated by an active process, a real-time authentication process is performed or bypassed on a code module to which the monitored event relates with reference to a whitelist that includes cryptographic hash values of approved code modules, which are known not to contain viruses or malicious code. The active process is allowed to load the code module when the authentication process is bypassed or when the cryptographic hash value of the code module matches one of the cryptographic hash values of approved code modules within the whitelist. | 03-13-2014 |
20140082355 | SECURE SYSTEM FOR ALLOWING THE EXECUTION OF AUTHORIZED COMPUTER PROGRAM CODE - Systems and methods for selective authorization of code modules are provided. According to one embodiment, a whitelist containing cryptographic hash values of code modules that are approved for loading into memory of a computer system and execution on the computer system is maintained by a kernel mode driver of the computer system. At least a subset of the cryptographic hash values has been included within the whitelist based upon results of application of one or more behavior analysis techniques to a corresponding subset of code modules. The kernel mode driver monitors a set of events occurring within one or more of a file system accessible by the computer system and an operating system that manages resources of the computer system. The kernel mode driver causes a cryptographic hash value of a code module relating to an observed event of the set of events to be authenticated with reference to the whitelist. When the cryptographic hash value matches one of the cryptographic hash values of approved code modules within the whitelist, the code module is allowed to be loaded and executed within the computer system. | 03-20-2014 |
20140115323 | SECURE SYSTEM FOR ALLOWING THE EXECUTION OF AUTHORIZED COMPUTER PROGRAM CODE - Systems and methods for selective authorization of code modules are provided. According to one embodiment, a trusted service provider maintain a cloud-based whitelist containing cryptographic hash values including those of code modules that are approved for execution on computer systems of subscribers of the service provider. A code module information query, including a cryptographic hash value of a code module, is received from a computer system of a subscriber by the service provider. If the cryptographic hash value matches one the cryptographic hash values contained within the cloud-based whitelist and the code module is an approved code module, then the service provider responds with an indication that the code module is authorized for execution; otherwise, it (i) responds with an indication that the code module is an unknown code module; and (ii) causes one or more behavior analysis techniques to be performed on the code module. | 04-24-2014 |
20140181511 | SECURE SYSTEM FOR ALLOWING THE EXECUTION OF AUTHORIZED COMPUTER PROGRAM CODE - Systems and methods for selective authorization of code modules are provided. According to one embodiment, file system or operating system activity relating to a code module is intercepted by a kernel mode driver of a computer system. The code module is selectively authorized by authenticating a cryptographic hash value of the code module with reference to a multi-level whitelist. The multi-level whitelist includes (i) a global whitelist database remote from the computer system that is maintained by a trusted service provider and that contains cryptographic hash values of approved code modules, which are known not to contain viruses or malicious code and (ii) a local whitelist database containing cryptographic hash values of at least a subset of the approved code modules. The activity relating to the code module is allowed when the cryptographic hash value matches one of the cryptographic hash values of approved code modules within the multi-level whitelist. | 06-26-2014 |
20150026463 | SECURE SYSTEM FOR ALLOWING THE EXECUTION OF AUTHORIZED COMPUTER PROGRAM CODE - Systems and methods for selective authorization of code modules are provided. According to one embodiment, file system or operating system activity relating to a code module is intercepted by a kernel mode driver of a computer system. The code module is selectively authorized by the kernel mode driver by authenticating a content authenticator of the code module with reference to a multi-level whitelist. The multi-level whitelist includes (i) a global whitelist database remote from the computer system that contains content authenticators of approved code modules that are known not to contain viruses or malicious code and (ii) a local whitelist database containing content authenticators of at least a subset of the approved code modules. The activity relating to the code module is allowed when the content authenticator matches one of the content authenticators of approved code modules within the multi-level whitelist. | 01-22-2015 |
Patent application number | Description | Published |
20110090541 | FINGERPRINT SCANNING SYSTEMS AND METHODS - Embodiments relate to methods and systems for gathering, archiving, transmitting, and processing forensic and latent fingerprints. An integrated forensic fingerprint scanning system is provided that includes a number of features for use with forensic-quality fingerprinting. One set of features of embodiments of the portable forensic fingerprint scanning system provides real-time feedback for accurate fingerprinting and training, including visual and/or audio feedback. Another set of features provides cadence-based functionality for improving fingerprinting results. Another set of features provides cryptographic-based approaches to secure highly sensitive collected fingerprint information against loss, theft, or surreptitious modification or tampering. Yet another set of features provides latent fingerprint collections and processing. Still another set of features provides various databasing functions, including centralized storage, data sharing, secure networking, etc. And another set of features provides compatibility with a large variety of jurisdiction-specific inputs and/or outputs, including linguistic interactivity, alerts, print cards, etc. | 04-21-2011 |
20130287270 | ARTIFICIAL INTELLIGENCE METHODS FOR DIFFICULT FORENSIC FINGERPRINT COLLECTION - Techniques are disclosed herein for artificial intelligence machine learning to increase collection of digital livescan fingerprints. According to certain embodiments of the invention, processing parameters can be automatically machine-optimized for processing scan images of fingerprints (and other areas) to increase the amount of detected minutia. The processing parameters can alter and change over time to reflect historical successes and failures of particular optimizations. This allows a fingerprint collection device to learn over time and become more accurate (i.e., more successful at detecting minutia). Additionally, the techniques further include receiving input from a user regarding physical traits of a scanned subject, to further customize the processing parameter optimization. Various other features are provided herein. | 10-31-2013 |
20130287271 | FINGER ASPERITY RESISTIVE DISCHARGE WAFER-SCALE INTEGRATION FOR FORENSIC PALM PRINT COLLECTION - Techniques are disclosed herein for artificial intelligence machine learning to increase collection of digital livescan fingerprints. According to certain embodiments of the invention, processing parameters can be automatically machine-optimized for processing scan images of fingerprints (and other areas) to increase the amount of detected minutia. The processing parameters can alter and change over time to reflect historical successes and failures of particular optimizations. This allows a fingerprint collection device to learn over time and become more accurate (i.e., more successful at detecting minutia). Additionally, the techniques further include receiving input from a user regarding physical traits of a scanned subject, to further customize the processing parameter optimization. Various other features are provided herein. | 10-31-2013 |
20130301832 | FINGERPRINT SCANNING SYSTEMS AND METHODS - Embodiments relate to methods and systems for gathering, archiving, transmitting, and processing forensic and latent fingerprints. An integrated forensic fingerprint scanning system is provided that includes a number of features for use with forensic-quality fingerprinting. One set of features of embodiments of the portable forensic fingerprint scanning system provides real-time feedback for accurate fingerprinting and training, including visual and/or audio feedback. Another set of features provides cadence-based functionality for improving fingerprinting results. Another set of features provides cryptographic-based approaches to secure highly sensitive collected fingerprint information against loss, theft, or surreptitious modification or tampering. Yet another set of features provides latent fingerprint collections and processing. Still another set of features provides various databasing functions, including centralized storage, data sharing, secure networking, etc. And another set of features provides compatibility with a large variety of jurisdiction-specific inputs and/or outputs, including linguistic interactivity, alerts, print cards, etc. | 11-14-2013 |
Patent application number | Description | Published |
20090157071 | System and Method for Tissue Sealing - An electrosurgical system is disclosed. The electrosurgical system includes an electrosurgical generator adapted to supply electrosurgical energy to tissue. The electrosurgical generator includes impedance sensing circuitry which measures impedance of tissue, a processor configured to determine whether a tissue reaction has occurred as a function of a minimum impedance value and a predetermined rise in impedance, wherein tissue reaction corresponds to a boiling point of tissue fluid, and an electrosurgical instrument including at least one active electrode adapted to apply electrosurgical energy to tissue. A tissue cooling period is provided to enhance operative outcomes. | 06-18-2009 |
20090157072 | System and Method for Tissue Sealing - An electrosurgical system is disclosed. The electrosurgical system includes an electrosurgical generator adapted to supply electrosurgical energy to tissue. The electrosurgical generator includes impedance sensing circuitry which measures impedance of tissue, a processor configured to determine whether a tissue reaction has occurred as a function of a minimum impedance value and a predetermined rise in impedance, wherein tissue reaction corresponds to a boiling point of tissue fluid, and an electrosurgical instrument including at least one active electrode adapted to apply electrosurgical energy to tissue. A tissue cooling period is provided to enhance operative outcomes. | 06-18-2009 |
20110060335 | Apparatus for Tissue Fusion and Method of Use - An end effector for an electrosurgical forceps is provided. The end effector includes a first jaw member having proximal and distal ends and a second jaw member having proximal and distal ends. The distal end of the first jaw member includes a recess defined therein. The distal end of the second jaw member includes a first prong configured for receipt within the recess defined in the first jaw member. Wherein engagement of the first prong of the second jaw member within the recess of the first jaw member creates a gap between the first and second jaw members to enable tissue sealing. | 03-10-2011 |
20110118736 | Surgical Forceps Capable of Adjusting Sealing Pressure Based on Vessel Size - A surgical forceps includes a housing having one or more shafts attached thereto and an end effector assembly disposed at a distal end thereof. The end effector assembly includes first and second jaw members disposed in opposing relation relative to one another. At least one jaw member is moveable from an open position to a closed position for grasping tissue therebetween. The jaw members include at least one sensing component that determines an output of one or both of cross-sectional diameter and composition of tissue disposed between the jaw members. A processing component is configured to receive the output and determine a seal pressure for adequately sealing tissue disposed between the jaw members based upon the output. A regulating component regulates the movement of the jaw members between the first and second positions such that the determined seal pressure is applied to tissue disposed therebetween. | 05-19-2011 |
20110144635 | System and Method for Tissue Sealing - An electrosurgical system includes an energy source adapted to supply energy to tissue. The energy source includes a microprocessor configured to execute a tissue treatment algorithm configured to control the supply of electrosurgical energy to tissue and process a configuration file including at least one parameter of the tissue treatment algorithm. The at least one parameter is adjustable to effect a tissue seal result. The microprocessor generates a target impedance trajectory based on at least one parameter of the tissue treatment algorithm and is further configured to drive tissue impedance along the target impedance trajectory by adjusting the supply of energy to tissue to substantially match tissue impedance to a corresponding target impedance value. The system also includes an electrosurgical instrument including at least one active electrode adapted to apply electrosurgical energy to tissue. | 06-16-2011 |
20110190653 | Surgical Forceps Capable of Adjusting Seal Plate Width Based on Vessel Size - A surgical forceps includes a housing having a shaft attached thereto and an end effector assembly disposed at a distal end of the shaft. The end effector assembly includes first and second jaw members having opposed seal plates, each of the seal plates having a width. At least one of the jaw members is moveable from an open position to a closed position for grasping tissue therebetween. A sensing component is configured to determine an output relating to a diameter of tissue or a composition of tissue disposed between the opposed seal plates of the first and second jaw members. An expanding component is configured to expand the width of at least one of the opposed seal plates according to the determined output. | 08-04-2011 |
20110319886 | Surgical Forceps for Sealing and Dividing Tissue - A forceps includes an end effector assembly including a pair of jaw members disposed in opposing relation relative to one another. At least one jaw member is moveable relative to the other between a spaced apart position, a first approximated position, and a second approximated position. The jaw members are configured to apply a pre-determined pressure to tissue disposed therebetween in each of the first and second approximated positions. A sealing pressure is applied to tissue disposed between the jaw members when the jaw members are in the first approximated position. A cutting pressure is applied to tissue disposed between the jaw members when the jaw members are in the second approximated position. | 12-29-2011 |
20140107648 | SURGICAL FORCEPS CAPABLE OF ADJUSTING SEAL PLATE WIDTH BASED ON VESSEL SIZE - A surgical forceps includes a housing having a shaft attached thereto and an end effector assembly disposed at a distal end of the shaft. The end effector assembly includes first and second jaw members having opposed seal plates, each of the seal plates having a width. At least one of the jaw members is moveable from an open position to a closed position for grasping tissue therebetween. A sensing component is configured to determine an output relating to a diameter of tissue or a composition of tissue disposed between the opposed seal plates of the first and second jaw members. An expanding component is configured to expand the width of at least one of the opposed seal plates according to the determined output. | 04-17-2014 |
20140155893 | SURGICAL FORCEPS FOR SEALING AND DIVIDING TISSUE - A forceps includes an end effector assembly including a pair of jaw members disposed in opposing relation relative to one another. At least one jaw member is moveable relative to the other between a spaced apart position, a first approximated position, and a second approximated position. The jaw members are configured to apply a pre-determined pressure to tissue disposed therebetween in each of the first and second approximated positions. A sealing pressure is applied to tissue disposed between the jaw members when the jaw members are in the first approximated position. A cutting pressure is applied to tissue disposed between the jaw members when the jaw members are in the second approximated position. | 06-05-2014 |
Patent application number | Description | Published |
20120042247 | USER-SELECTED MEDIA CONTENT BLOCKING - Presented herein is a method of blocking user-selected media content, such as, for example, audio and/or video content. In the method, at least one media content stream is presented to a user, wherein the at least one media content stream includes multiple showings of an identifiable contiguous segment of media content. One example of such a segment may be a commercial or advertisement. While presenting a current showing of the segment of media content to the user, a command is received from a user to block the segment of media content from presentation to the user. In response to receiving the command, information identifying the segment of media content is generated. The at least one media content stream is analyzed using the information to detect subsequent showings of the segment of media content. Presentation of at least one of the subsequent showings of the segment of media content is prevented when detected in the at least one media content stream. | 02-16-2012 |
20120163774 | USER-SELECTED INTERSTITIAL MEDIA CONTENT RECORDING - Presented herein is a method of recording user-selected interstitial media content, such as a television commercial. In the method, a media content stream is presented to a user. The media content stream includes an interstitial segment within a media content segment, such as a television program. In a media content segment listing, such as an electronic program guide, the media content segment is listed, but the interstitial segment is not. While the media content stream is presented, the stream is buffered. During or after the interstitial segment is being presented to the user, a command is received from the user to record the interstitial segment. In response to the command, beginning and ending points of the buffered interstitial segment are identified. The buffered interstitial segment is stored as a persistent recording based on the starting and ending points, and the persistent recording is distinguished from the media content segment. | 06-28-2012 |
20130283173 | USER-SELECTED MEDIA CONTENT BLOCKING - Presented herein is a method of blocking user-selected media content, such as, for example, audio and/or video content. In the method, at least one media content stream is presented to a user, wherein the at least one media content stream includes multiple showings of an identifiable contiguous segment of media content. One example of such a segment may be a commercial or advertisement. While presenting a current showing of the segment of media content to the user, a command is received from a user to block the segment of media content from presentation to the user. In response to receiving the command, information identifying the segment of media content is generated. The at least one media content stream is analyzed using the information to detect subsequent showings of the segment of media content. Presentation of at least one of the subsequent showings of the segment of media content is prevented when detected in the at least one media content stream. | 10-24-2013 |
Patent application number | Description | Published |
20090321024 | RETRACTABLE SHADE WITH COLLAPSIBLE VANES - A retractable covering for architectural openings having collapsible vanes includes a head rail and support structure in the form of a sheet of material, monofilaments, tapes, ribbons, cords, or the like, supporting an upper edge of a plurality of vertically spaced, horizontally extending vanes with the lower edges of the vanes being connected to operating elements adapted to raise the lower edges of each vane toward the upper edges to define openings or gaps between the vanes through which vision and light can pass in an open condition of the covering. The support structure, vanes and operating elements are adapted to be wrapped around a roller in the head rail in a retracted position of the covering and unwrapped in an extended position. An inhibitor system is incorporated into the covering to permit automatic opening of the vanes when the support structure, vanes and operating elements reach an extended position. | 12-31-2009 |
20100059186 | RETRACTABLE SHADE WITH COLLAPSIBLE VANES - A retractable cover for architectural openings having collapsible vanes includes a support structure in the form of a sheet of material, monofilaments, tapes, ribbons, cords, or the like, supporting an upper edge of a plurality of vertically spaced, horizontally extending vanes with the lower edges of the vanes in most embodiments of the invention being connected to operating elements adapted to raise the lower edges of each vane toward the upper edges to define openings or gaps between the vanes through which vision and light can pass in an open condition of the covering. Variations of the covering do not require movement of a lower edge of a vane relative to an upper edge but simply movement of some vanes relative to other vanes. The vanes can be made of materials having different flexibilities and where more rigid materials are used, creased fold lines can be established for desired operability. | 03-11-2010 |
20120193040 | RETRACTABLE SHADE WITH COLLAPSIBLE VANES - A retractable cover for architectural openings having collapsible vanes includes a support structure in the form of a sheet of material, monofilaments, tapes, ribbons, cords, or the like, supporting an upper edge of a plurality of vertically spaced, horizontally extending vanes with the lower edges of the vanes in most embodiments of the invention being connected to operating elements adapted to raise the lower edges of each vane toward the upper edges to define openings or gaps between the vanes through which vision and light can pass in an open condition of the covering. Variations of the covering do not require movement of a lower edge of a vane relative to an upper edge but simply movement of some vanes relative to other vanes. The vanes can be made of materials having different flexibilities and where more rigid materials are used, creased fold lines can be established for desired operability. | 08-02-2012 |
20130139977 | APPARATUS AND METHOD FOR MAKING A WINDOW COVERING HAVING OPERABLE VANES - An apparatus and associated method for manufacturing a window covering for an architectural opening. The apparatus includes a support structure handling assembly, an operating element handling assembly, and a vane handling assembly. The handling assemblies process the respective materials to an assembly station to attach one portion of a vane to the operating elements, and another portion of the vane to the support structure, allowing movement of one portion of the vane relative to other portion of the vane. | 06-06-2013 |
20140096915 | RETRACTABLE SHADE WITH COLLAPSIBLE VANES - A retractable cover for architectural openings having collapsible vanes includes a support structure in the form of a sheet of material, monofilaments, tapes, ribbons, cords, or the like, supporting an upper edge of a plurality of vertically spaced, horizontally extending vanes with the lower edges of the vanes in most embodiments of the invention being connected to operating elements adapted to raise the lower edges of each vane toward the upper edges to define openings or gaps between the vanes through which vision and light can pass in an open condition of the covering. Variations of the covering do not require movement of a lower edge of a vane relative to an upper edge but simply movement of some vanes relative to other vanes. The vanes can be made of materials having different flexibilities and where more rigid materials are used, creased fold lines can be established for desired operability. | 04-10-2014 |