Patent application number | Description | Published |
20080207416 | Flexible pedal - Described is an exercise apparatus that includes reciprocating foot pedal structures where the pedal structures include various mechanisms for absorbing foot impact or forces on the foot. The pedal structures can also include a mechanism for generating a biasing force generally normal to the upper surface of the foot pedal effective to restore the pedal to its normal position after foot impact. The impact absorbing mechanisms can include resilient members, fluid filled bladders and hinge arrangements. | 08-28-2008 |
20080242516 | Elliptical mechanism - Described is an exercise apparatus for providing elliptical foot motion that utilizes a pair of rocking links suspended from an upper portion of the apparatus frame permitting at least limited arcuate motion of the lower portions of the links. Foot pedal assemblies are connected to rotating shafts or members located on the lower portion of the links such that the foot pedals will describe a generally elliptical path in response to user foot motion on the pedals. | 10-02-2008 |
20100022357 | Climber appliance - An exercise apparatus to simulate climbing is described that includes such features as arm handles that move in synchronism with the motion of foot pedals to provide a total body workout; side handrails; a mounting step; linear foot movement at a simulated climbing angle; a three point support structure using a vertical support column; pedal track covers; a mechanism to provide constant resistance to pedal motion; and pedal impact absorption. | 01-28-2010 |
20110065552 | Climber appliance - An exercise apparatus to simulate climbing is described that includes such features as arm handles that move in synchronism with the motion of foot pedals to provide a total body workout; side handrails; a mounting step; linear foot movement at a simulated climbing angle; a three point support structure using a vertical support column; pedal track covers; a mechanism to provide constant resistance to pedal motion; and pedal impact absorption. | 03-17-2011 |
20110312471 | Climber Appliance - An exercise apparatus to simulate climbing is described that includes such features as arm handles that move in synchronism with the motion of foot pedals to provide a total body workout; side handrails; a mounting step; linear foot movement at a simulated climbing angle; a three point support structure using a vertical support column; pedal track covers; a mechanism to provide constant resistance to pedal motion; and pedal impact absorption. | 12-22-2011 |
Patent application number | Description | Published |
20100037310 | DYNAMICALLY ADAPTIVE NETWORK FIREWALLS AND METHOD, SYSTEM AND COMPUTER PROGRAM PRODUCT IMPLEMENTING SAME - One embodiment creates a model of the traffic through a network firewall and uses that model to dynamically manipulate the network firewall. The firewall model defines nodes, connections between the nodes, and firewall rules applicable to the nodes, the connections between the nodes, or a combination thereof. Each of the nodes represents simultaneously a source and a destination for data packets. The firewall rules include dynamic chains of rules having defined places where firewall rules may be dynamically inserted into or deleted from the firewall while the firewall is operating on one or more machines connected to network segments where the nodes reside. | 02-11-2010 |
20100058458 | SYSTEM AND METHOD FOR PROVIDING A SECURE CONNECTION BETWEEN NETWORKED COMPUTERS - Embodiments disclosed herein provide a system, method, and computer program product for establishing a secure network connection between two computers, a client and a server. The client may send a connection request over a public network to the server. In response, the server may generate a set of credentials, select a controller to automatically run on the client, and send the controller and the set of credentials to the client. The controller automatically executes on the client and utilizes the set of credentials from the server to establish a secure network connection with the server without user intervention. The set of credentials is valid until the secure network connection between the client and the server is severed. | 03-04-2010 |
20100064356 | SYSTEM AND METHOD FOR DOUBLE-CAPTURE/DOUBLE-REDIRECT TO A DIFFERENT LOCATION - Embodiments disclosed herein provide a system, method, and computer program product for providing network access control for a shared network. One embodiment of a network access controller may intercept a request to access a network resource from a browser application running on a client device associated with an anonymous user and determine whether the network resource is in a set of network destinations in the shared network. If the network resource is in the set of network destinations, the network access controller may direct the browser application to the network resource. If the network resource is not in the set of network destinations, the network access controller may redirect the browser application to a pre-authentication capture destination in the shared network. From the pre-authentication capture destination the anonymous user is free to visit any of the set of network destinations in the shared network without authentication. | 03-11-2010 |
20100146493 | METHOD AND SYSTEM FOR PLATFORM-INDEPENDENT FILE SYSTEM INTERACTION - Embodiments disclosed can provide a simple, singular programmatic interface for application developers to access and manipulate ASCII and non-ASCII file specifications in a cross-platform development environment regardless of operating system encoding capabilities or of the nature of the original file specification encoding. An application development environment is configured on a computer system such that a magic class file string object is instantiated when a bit string of a first encoding is received. The bit string represents a file specification of a file containing application code written by an application developer. The magic class file string object automatically determines what target operating system is being called by a function call in the application code, automatically transcodes the bit string from the first encoding into a second encoding of the target operating system, and automatically makes a correct file system API call specific to the target operating system. | 06-10-2010 |
20110219444 | DYNAMICALLY ADAPTIVE NETWORK FIREWALLS AND METHOD, SYSTEM AND COMPUTER PROGRAM PRODUCT IMPLEMENTING SAME - A system, method, and computer program product for controlling data through a firewall which may be dynamically configurable. The method may comprise defining at least one node, wherein the at least one node is associated with two or more network interfaces; associating a set of firewall rules with the at least one node; receiving a packet at a first node of the at least one node; and accepting or denying the packet based on the set of firewall rules. The firewall rules include dynamic chains of rules having defined places where firewall rules may be dynamically inserted into or deleted from the firewall while the firewall is operating on one or more machines connected to network segments where the nodes reside. | 09-08-2011 |
20110258687 | System and Method for Providing a Secure Connection between Networked Computers - Embodiments disclosed herein provide a system, method, and computer program product for establishing a secure network connection between a client and a server. The client may send a connection request over a public network to the server. The server may prepare a response containing a controller and session-specific credentials. The controller may be selected to configure a tunneling protocol on the client. After being downloaded to the client, the controller configures the tunneling protocol and establishes a secure network connection with the server without user intervention. The session-specific credentials are valid until the secure network connection between the client and the server is severed. | 10-20-2011 |
20120096517 | SYSTEM AND METHOD FOR PROVIDING A SECURE CONNECTION BETWEEN NETWORKED COMPUTERS - Embodiments disclosed herein provide a system, method, and computer program product for obtaining secure connectivity between networked computing devices. The invention comprises utilizing a network protocol inherent to an operating system on a client device to automatically set up and establish a transient secure network connection endpoint on the client device. The act of utilizing can be a result of a server device responding to a connection request from the client device. The act of establishing the transient secure network connection endpoint on the client device creates a transient secure network connection between the server device and the transient secure network connection endpoint on the client device without manual intervention or configuration by a user at the client device. Secured access by the client device to one or more network devices is permitted until the transient secure network connection between the server device and the client device is severed. | 04-19-2012 |
20120117615 | System and Method for Providing Access Control - A control device may be configured to monitor a network connection. An application running on a client device may send a first network communication destined for a network communicatively connected to the control device. Depending upon whether the client device is authorized to access the network, different global rules may be applied. The first application or a second application running on the client device may send a second network communication. The control device may process the second network communication according to a plurality of stages. Specifically, the control device may extract information associated with the client device from the second network communication and associate user specific rules at a client discrimination stage. The control device may, at a user specific rule stage, access these rules and apply accordingly to the second network communication as governed by user specific provisioning rules. | 05-10-2012 |