Fly
Brian E. Fly, Clearwater Beach, FL US
Patent application number | Description | Published |
---|---|---|
20090322598 | INTEGRITY OF DIFFERENTIAL GPS CORRECTIONS IN NAVIGATION DEVICES USING MILITARY TYPE GPS RECEIVERS - A method and apparatus for calculating corrections to a navigation solution based on differential GPS data includes receiving GPS ephemeris from at least three GPS satellites. A PVT solution is resolved from the GPS ephemeris. The PVT solution includes a Circular Error Probable (CEP). Differential GPS data for calculating the corrections to the PVT solution is received. A corrected PVT solution is then based upon the differential GPS data. The corrected PVT solution is compared to an area defined by the CEP. Where the corrected PVT solution is not within the area, the corrected PVT solution is rejected in favor of the PVT solution for determining an accurate navigational solution. | 12-31-2009 |
Brian E. Fly, Clearwater, FL US
Patent application number | Description | Published |
---|---|---|
20090255335 | METHOD AND SYSTEM FOR FORMING AN ELECTRONIC ASSEMBLY HAVING INERTIAL SENSORS MOUNTED THERETO - Systems and methods for forming an electronic assembly are provided. A first inertial sensor having a first sense axis is attached to a bracket. A second inertial sensor having a second sense axis is attached to the bracket such that the second sense axis is substantially orthogonal to the first sense axis. The bracket is attached to a circuit board having at least one microelectronic device mounted thereto. | 10-15-2009 |
20120239331 | CRANE JIB ATTITUDE AND HEADING REFERENCE SYSTEM AND METHOD - Methods and apparatus are provided for determining the attitude and heading angle of a crane jib. Crane jib angular velocity, crane jib roll angle, crane jib pitch angle, crane jib specific force, and magnetic field in the local operating environment of the crane jib are all sensed and supplied to a processor. All of these measurements are processed, in a processor, to estimate the attitude and heading angle of the crane jib. | 09-20-2012 |
20120271582 | CRANE JIB ATTITUDE AND HEADING REFERENCE SYSTEM CALIBRATION AND INITIALIZATION - Methods and apparatus are provided for calibrating and initializing/aligning an attitude and heading reference system of a crane jib. Magnetometer measurements are generated using a magnetometer that is attached to the crane jib, while crane jib maneuvers are performed including crane jib slewing. The magnetometer measurements are supplied to a processor that is configured to generate magnetometer calibration parameters using the magnetometer measurements and to initialize and align a plurality of filters. | 10-25-2012 |
Charles B. Fly, League City, TX US
Patent application number | Description | Published |
---|---|---|
20090126436 | TUBULAR EXPANSION DEVICE AND METHOD OF FABRICATION - The invention comprises a device for expanding tubular members to a controlled diameter and its method of fabrication. The device includes an expandable bladder held in a convoluted form. After the device is inserted into a cylindrical tube to be evenly expanded, the bladder is expanded by hydraulic pressure to a controlled maximum diameter. It is then deflated so the device can then be moved to another location and reused. The bladder is formed from a flexible impervious material having integral reinforcing fibers. It is initially formed in a fully expanded configuration over a convoluted mandrel and a removable cylindrical shell. When the shell is removed vacuum or external pressure draws the bladder against the mandrel. The bladder is overmolded with a resilient cover to hold it in reduced form until pressurized. The bladder cover prevents the bladder from kinking during the expansion. | 05-21-2009 |
David C. Fly, Maumelle, AR US
Patent application number | Description | Published |
---|---|---|
20100039513 | IMAGE-BASED INVENTORY CONTROL SYSTEM WITH AUTOMATIC CALIBRATION AND IMAGE CORRECTION - Systems for monitoring an inventory condition of objects based on captured images are described. An exemplary system includes at least one storage drawer, each storage drawer including a plurality of storage locations for storing objects, wherein each drawer is associated with an identifier with known color attributes; and an image sensing device configured to capture an image of one of the storage drawers along with the associated identifier. A data storage device of the system stores, for each storage drawer, information of the known color attributes of the associated identifier. A data processor of the system is configured to access information of the known color attributes of the identifier associated with the drawer corresponding to the captured image; determine color attributes of the identifier in the captured image; determine a correction factor based on the color attributes of the identifier in the captured image and the known color attributes of the identifier; and apply the correction factor to subsequent images captured by the image sensing device. | 02-18-2010 |
20100045423 | IMAGE-BASED INVENTORY CONTROL SYSTEM AND METHOD - Systems and methods for determining an inventory condition of objects based on captured images are described. An exemplary inventory control system or method utilizes a highly efficient and economical approach to apply suitable imaging parameters for capturing images of a storage drawer being accessed by a user, or for manipulating the captured images of the drawer. An inventory condition of the drawer is determined based on the captured images or manipulated images. | 02-25-2010 |
20130328661 | MONITORING REMOVAL AND REPLACEMENT OF TOOLS WITHIN AN INVENTORY CONTROL SYSTEM - An inventory control system is described that includes a tool storage device including a drawer or a tray providing a pallet, wherein the pallet includes storage locations for objects; a sensing device configured to form an image of the storage locations; and a data processor configured to determine presence or absence of the pallet and presence or absence of objects within the storage locations of the pallet using the information from the image. | 12-12-2013 |
20130332323 | ENABLING COMMUNICATION BETWEEN AN INVENTORY CONTROL SYSTEM AND A REMOTE SYSTEM OVER A NETWORK - The instant application describes an inventory control system including an object storage device including a drawer or a tray for housing objects; a sensing device configured to acquire an image including information about the objects stored in the object storage device; an interface circuitry in communication with the sensing device and configured to generate object data based on the image acquired by the sensing device; and a processor configured to provide an integrated network access and transmit the object data across a network using a Web Service as defined by World Wide Web Consortium (W | 12-12-2013 |
20130346261 | AUDITING AND FORENSICS FOR AUTOMATED TOOL CONTROL SYSTEMS - An inventory control system is provided for monitoring the removal and replacement of objects stored in the system. The system includes a storage container including a plurality of storage locations for storing objects; a sensing device configured to detect the presence or absence of objects in the storage locations; a display device; and a data processor. The data processor is configured to receive work order data identifying a particular work order; receive information associated with the work order based on the work order data; and display the information associated with the work order on the display device. | 12-26-2013 |
20140025543 | TOOL TRAINING FOR AUTOMATED TOOL CONTROL SYSTEMS - An inventory control system and method determines an inventory condition of objects stored in the system. Embodiments include a storage container including a plurality of storage locations for storing objects; an image sensing device to capture image data of the container, including image data of the plurality of storage locations and a target area that includes an individual object storage location having less than the plurality of storage locations; a data storage device for storing the image data of the container; and a data processor. The processor receives initial image data representing an initial image of the plurality of storage locations, and image data representing an image of the target area captured subsequent to the initial image; modifies the initial image data based on the image data of the target area to generate adjusted image data; and stores the adjusted image data in the data storage device. | 01-23-2014 |
20140350716 | BATTERY MONITORING IN A NETWORKED INVENTORY CONTROL SYSTEM - An inventory control device, such as an electronic toolbox, monitors the identity of battery packs that are mounted in the device and used to provide electrical power to the device. The device retrieves a unique identifier for each battery pack, and monitors the operation of each battery pack. The monitored data can be logged into memory for future use, communicated to a user of the inventory control device, and/or used to predict the future performance or replacement date for a battery pack. The monitored data can also be communicated across a communication network to an inventory control server that monitors the operation and performance of battery packs throughout an electronic tools control system including multiple toolboxes. The server can further track the operation and locations of battery packs through all of the toolboxes. | 11-27-2014 |
20140358740 | IMAGE-BASED INVENTORY CONTROL SYSTEM WITH AUTOMATIC CALIBRATION AND IMAGE CORRECTION - Systems for monitoring an inventory condition of objects based on captured images are described. An exemplary system includes at least one storage drawer, each storage drawer including a plurality of storage locations for storing objects; and an image sensing device configured to capture an image of one of the storage locations. A radio-frequency identification (RFID) sensor sub-system senses attributes of objects located in the inventory control system. A data storage system stores, for each storage location, reference data including identification of the object associated with each storage location. A data processor determines the inventory condition of each storage location of the captured image based on the image data of the captured image in conjunction with the sensing data of attributes of objects located in the inventory control system. | 12-04-2014 |
Gerald W. Fly, Genesco, NY US
Patent application number | Description | Published |
---|---|---|
20090126436 | TUBULAR EXPANSION DEVICE AND METHOD OF FABRICATION - The invention comprises a device for expanding tubular members to a controlled diameter and its method of fabrication. The device includes an expandable bladder held in a convoluted form. After the device is inserted into a cylindrical tube to be evenly expanded, the bladder is expanded by hydraulic pressure to a controlled maximum diameter. It is then deflated so the device can then be moved to another location and reused. The bladder is formed from a flexible impervious material having integral reinforcing fibers. It is initially formed in a fully expanded configuration over a convoluted mandrel and a removable cylindrical shell. When the shell is removed vacuum or external pressure draws the bladder against the mandrel. The bladder is overmolded with a resilient cover to hold it in reduced form until pressurized. The bladder cover prevents the bladder from kinking during the expansion. | 05-21-2009 |
Robert Fly, Orinda, CA US
Patent application number | Description | Published |
---|---|---|
20110282908 | Security Monitoring - Disclosed are systems, apparatus, methods, and computer readable media for analyzing computing site information. In one embodiment, an analysis tool for analyzing a first site record stored on a storage medium may be selected. The first site record comprising information may relate to a computing site. The computing site may comprise a unit of computing functionality accessible via a network. When it is determined that first confidentiality level for the computing site exceeds a trust level for the analysis tool, the first site record may be modified to create a second site record, the second site record having a second confidentiality level, the second confidentiality level not exceeding the trust level. | 11-17-2011 |
20110283356 | Security Monitoring - Disclosed are systems, apparatus, methods, and computer readable media for determining a combined trust level for a website. In one embodiment, a user account associated with the creation or maintenance of the website may be analyzed. The analysis of the user account may be capable of identifying the presence or absence of a first risk factor affecting a likelihood that the user account is engaged in a malicious activity. A source code file capable of being used to create a message for sending to a remote computing device may be analyzed. The analysis of the source code file may be capable of identifying the presence or absence of a second risk factor affecting a likelihood that the source code file is facilitating a malicious activity. Based on the analysis, a combined trust level for the website may be determined. | 11-17-2011 |
20130111585 | SYSTEM, METHOD AND COMPUTER PROGRAM PRODUCT FOR RENDERING DATA OF AN ON-DEMAND DATABASE SERVICE SAFE | 05-02-2013 |
20140259164 | SECURITY MONITORING - Disclosed are systems, apparatus, methods, and computer readable media for determining a confidentiality for a site record. In one embodiment, a site record for analysis is identified at a computing device. The computing device may identify a source for the site record and determine, based on the source, a source-based confidentiality for the site record. The computing device may identify, based on the site record, a designated confidentiality for the site record, and determine that the designated confidentiality is different from the source-based confidentiality. Responsive to the determination that the designated confidentiality is different from the source-based confidentiality, the computing device may store the source-based confidentiality for the site record on a storage medium. | 09-11-2014 |
Robert Fly, Moraga, CA US
Patent application number | Description | Published |
---|---|---|
20110307452 | PERFORMING CODE ANALYSIS IN A MULTI-TENANT DATABASE SYSTEM - A system and method for performing code analysis in a database system. In one embodiment, a method includes receiving a request to scan code for a software application. The method further includes fetching metadata associated with a user, fetching the code for the software application, and scanning the code. | 12-15-2011 |
20120042383 | ADAPTING A SECURITY TOOL FOR PERFORMING SECURITY ANALYSIS ON A SOFTWARE APPLICATION - A system and method for adapting a security tool for performing security analysis on a software application. In one embodiment, a method includes maintaining a registry of security tools; receiving code for a software application; and comparing component criteria for each security tool against each component of the software application, wherein the component criteria for each respective security tool indicate which components the respective security tool is designed to analyze for security vulnerabilities. The method also includes generating a tool-specific package for each component of the software application, wherein the tool-specific package comprises one or more security tools that are designed to analyze the respective component for security vulnerabilities. | 02-16-2012 |
20120042384 | PERFORMING SECURITY ANALYSIS ON A SOFTWARE APPLICATION - A system and method for performing security analysis on a software application. In one embodiment, a method includes receiving application architecture information for a software application; and determining an application type based on the application architecture information. The method also includes performing one or more security tests on the software application based on the application type and the application architecture information; and approving the software application to be available in an online marketplace if the software application passes the one or more security tests. | 02-16-2012 |
Robert C. Fly, Moraga, CA US
Patent application number | Description | Published |
---|---|---|
20130247217 | ON-DEMAND SERVICE SECURITY SYSTEM AND METHOD FOR MANAGING A RISK OF ACCESS AS A CONDITION OF PERMITTING ACCESS TO THE ON-DEMAND SERVICE - In accordance with embodiments, there are provided mechanisms and methods for managing a risk of access to an on-demand service as a condition of permitting access to the on-demand service. These mechanisms and methods for providing such management can enable embodiments to help prohibit an unauthorized user from accessing an account of an authorized user when the authorized user inadvertently loses login information. The ability of embodiments to provide such management may lead to an improved security feature for accessing on-demand services. | 09-19-2013 |
20140237234 | ENHANCED SYSTEM SECURITY - Methods and systems for maintaining the confidentiality of data provided by an organization for storage on a third party database system are provided. The data can be encrypted on an internal network of the organization and sent to the third party database system for storage. The third party database system can associate metadata with the encrypted data and can store the encrypted data. Accordingly, when a request for the encrypted data is received from a computing device communicating with an internal network of the organization, the encrypted data and associated metadata can be sent to the computing device. A key that is stored on an internal network of the organization can be called through an applet, which utilizes information within the metadata to locate the key on the internal network of the organization. | 08-21-2014 |
20140331299 | Managing Access to an On-Demand Service - In accordance with embodiments, there are provided mechanisms and methods for managing a risk of access to an on-demand service as a condition of permitting access to the on-demand service. These mechanisms and methods for providing such management can enable embodiments to help prohibit an unauthorized user from accessing an account of an authorized user when the authorized user inadvertently loses login information. The ability of embodiments to provide such management may lead to an improved security feature for accessing on-demand services. | 11-06-2014 |
Robert Charles Fly, Moraga, CA US
Patent application number | Description | Published |
---|---|---|
20130198236 | SYSTEM, METHOD AND COMPUTER PROGRAM PRODUCT FOR ENABLING ACCESS TO A RESOURCE OF A MULTI-TENANT ON-DEMAND DATABASE SERVICE UTILIZING A TOKEN - In accordance with embodiments, there are provided mechanisms and methods for enabling access to a resource of a multi-tenant on-demand database service utilizing a token. These mechanisms and methods for enabling access to a resource of a multi-tenant on-demand database service utilizing a token can be utilized to prevent identification of a user attempting to access the resource, and thus unwanted use of the user's identity. | 08-01-2013 |
20140330870 | SYSTEM, METHOD AND COMPUTER PROGRAM PRODUCT FOR ENABLING ACCESS TO A RESOURCE OF A MULTI-TENANT ON-DEMAND DATABASE SERVICE UTILIZING A TOKEN - In accordance with embodiments, there are provided mechanisms and methods for enabling access to a resource of a multi-tenant on-demand database service utilizing a token. These mechanisms and methods for enabling access to a resource of a multi-tenant on-demand database service utilizing a token can be utilized to prevent identification of a user attempting to access the resource, and thus unwanted use of the user's identity. | 11-06-2014 |