Lambert, CA
Alexandra Lambert, Quebec CA
Patent application number | Description | Published |
---|---|---|
20100061991 | Identification of therapeutic agents for HIV infection - A cell surface molecule designated DCIR (for dendritic cells ImmunoReceptor), a member of a recently described family of DC-expressing C-type lectin receptors, has been shown to participate to the capture of human immunodeficiency virus (HIV) and promote infection in trans and in cis of autologous CD4(+) T cells from human immature monocyte-derived DC. The contribution of DCIR to these processes was revealed using DCIR-specific siRNAs and a polyclonal antibody specific for the carbohydrate recognition domain of DCIR. Therapeutic agents for HIV infection are therefore provided herein. These therapeutic agents are useful for impairing the interaction between DCIR and HIV and as such may be useful for treatment or prevention of HIV infection. Also provided are assays for identifying additional therapeutics agents for treatment or prevention HIV infection. | 03-11-2010 |
20120039894 | IDENTIFICATION OF THERAPEUTIC AGENTS FOR HIV INFECTION - A cell surface molecule designated DCIR (for dendritic cells ImmunoReceptor), a member of a recently described family of DC-expressing C-type lectin receptors, has been shown to participate to the capture of human immunodeficiency virus (HIV) and promote infection in trans and in cis of autologous CD4(+) T cells from human immature monocyte-derived DC. The contribution of DCIR to these processes was revealed using DCIR-specific siRNAs and a polyclonal antibody specific for the carbohydrate recognition domain of DCIR. Therapeutic agents for HIV infection are therefore provided herein. These therapeutic agents are useful for impairing the interaction between DCIR and HIV and as such may be useful for treatment or prevention of HIV infection. Also provided are assays for identifying additional therapeutics agents for treatment or prevention HIV infection. | 02-16-2012 |
20130267461 | COMPOUNDS AND THERAPEUTIC APPLICATIONS RELATED TO INHIBITION OF DENDRITIC CELL IMMUNORECEPTOR (DCIR) ACTIVITY AND SIGNALING EVENTS - The invention is concerned with methods, compounds and pharmaceutical compositions for interfering dendritic cell immunoreceptor (DCIR) activity and signalling events. Described herein are compounds useful in targeting one or more of intracellular modulators and the uses thereof for the prevention or treatment of virus infections, and more particularly for reducing human immunodeficiency virus (HIV) binding, entry and/or replication in human cells. Exemplary compounds include peptides and antisense molecules. | 10-10-2013 |
20150157705 | THREE-DIMENSIONAL CAVITIES OF DENDRITIC CELL IMMUNORECEPTOR (DCIR), COMPOUNDS BINDING THERETO AND THERAPEUTIC APPLICATIONS RELATED TO INHIBITION OF HUMAN IMMUNODEFICIENCY VIRUS TYPE-1 (HIV-1) - The invention is concerned with compounds, pharmaceutical compositions, screening methods, and therapeutic methods for preventing or reducing a human immunodeficiency virus type-1 (HIV-1) infection and/or propagation associated with dendritic cell immunoreceptor (DCIR). Described herein are compounds which bind on at least one three-dimensional cavity of the DCIR, the cavity(ies) being involved in the interaction between HIV-1 and DCIR. Also described are screening methods for identifying active inhibitors and method of using such inhibitors for the prevention or treatment of virus infections, and more particularly for reducing human immunodeficiency virus type-1 (HIV-1) binding, entry and/or replication in human cells. | 06-11-2015 |
Chad D. Lambert, Belleville CA
Patent application number | Description | Published |
---|---|---|
20080239743 | Headlamp assembly with isolated optics chamber - A headlamp assembly which employs semiconductor light sources includes an optics chamber that is isolated from the surrounding environment to prevent the ingress of water, dirt, or other foreign materials into the optics chamber. At the same time, the headlamp assembly includes a plenum chamber, separated from the optics chamber, and airflow through the plenum chamber provides the necessary cooling for the semiconductor light sources. | 10-02-2008 |
20090237952 | Semiconductor-based lighting system and lighting system components for automotive use - A modular semiconductor light source assembly includes a semiconductor light source, such as a light emitting diode, which is mounted on a substrate which supplies electricity to the light source and which assists in removing waste heat therefrom. Substantially all of the light emitted by the LED is transferred to a lens by a light pipe, the cross section of the light pipe increasing from the light source to the lens and the lens having a general D-shape such that the light pattern formed by the lens is constrained in a first direction orthogonal to a second direction. The assembly can be combined with other similar assemblies or other light sources in a light fixture to produce a desired overall beam pattern such as a automobile headlamp low beam or high beam pattern. | 09-24-2009 |
20100046242 | High efficiency light pipe - H.E.L.P. - A headlamp assembly which includes an optic used for providing a turn signal which meets the government requirements for luminous intensity when the turn signal is located near or next to the headlamp assembly. The present invention is a headlamp assembly which includes a housing, at least one optic disposed within the housing, as well as at least one light source which is operable with the optic such that light is emitted from the optic which meets or exceeds present regulatory requirements. The present invention also includes an outer lens mounted on the housing such that light emitted from the optic passes through the outer lens. | 02-25-2010 |
20100195342 | Automotive Signal Light Employing Multi-focal Length Light Pipes - An automotive signal light is taught which employs multi-focal length light pipes to collect, collimate and direct, as needed, light emitted from one or more semiconductor light sources. Each multi-focal length light pipe includes at least one light transmission structure, each of which has a light receiving port to receive light miffed from a semiconductor light source spaced from the light receiving port by an air gap. The light transmission structure includes at least two superimposed parabolic reflecting surfaces, each having a common focal point at the light receiving port but having different focal lengths, and the superimposed parabolic reflectors operate to receive, collimate, spread and transmit the light from the semiconductor light source to a light emitting surface of the light pipe which is located adjacent to a lens of the signal light. The aesthetic arrangement of the light pipes is not particularly limited and a wide range of signal light functionalities can be provided. | 08-05-2010 |
20110096562 | Fog Lamp and the Like Employing Semiconductor Light Sources - A novel vehicular light fixture ( | 04-28-2011 |
20130223088 | AUTOMOTIVE SIGNAL LIGHT EMPLOYING MULTI-FOCAL LENGTH LIGHT PIPES - An automotive signal light is taught which employs multi-focal length light pipes to collect, collimate and direct, as needed, light emitted from one or more semiconductor light sources. Each multi-focal length light pipe includes at least one light transmission structure, each of which has a light receiving port to receive light emitted from a semiconductor light source spaced from the light receiving port by an air gap. The light transmission structure includes at least two superimposed parabolic reflecting surfaces, each having a common focal point at the light receiving port but having different focal lengths, and the superimposed parabolic reflectors operate to receive, collimate, spread and transmit the light from the semiconductor light source to a light emitting surface of the light pipe which is located adjacent to a lens of the signal light. The aesthetic arrangement of the light pipes is not particularly limited and a wide range of signal light functionalities can be provided. | 08-29-2013 |
20130250598 | FOG LAMP AND THE LIKE EMPLOYING SEMICONDUCTOR LIGHT SOURCES - A novel vehicular light fixture ( | 09-26-2013 |
Claude J. Lambert, Varennes CA
Patent application number | Description | Published |
---|---|---|
20160118186 | Hardened Inductive Device And Systems And Methods For Protecting The Inductive Device From Catastrophic Events - A hardened inductive device and systems and methods for protecting the inductive device from impact is provided. The inductive device is hardened with protective coating and/or an armor steel housing. The hardened inductive device is protected from impact by an object such as a bullet and leakage of dielectric fluid is prevented. Acoustic and vibration sensors are provided to detect the presence and impact, respectively, of an object in relation to the inductive device housing. The measurements of the acoustic and vibration sensors are compared to thresholds for sending alarms to the network control center and initiating shut-down and other sequences to protect the active part. The acoustic sensor results are utilized to determine the location of origin of the projectile. | 04-28-2016 |
David Lambert, Ardrossan CA
Patent application number | Description | Published |
---|---|---|
20130175461 | RADIATION SHIELDING BARRIERS - Articles of manufacture and a method of how to utilize the same in order to create a radiation shielding barrier wall assembly. A metal stud and a metal support bar and a metal restraining bar and a prefabricated radiation shielding lead panel whereby the assembly of these components in the manner as directed and in conjunction with commercially available preexisting metal stud components will result in all radiation shielding lead panels overlapping at all interior field joints, and will result in no punctures or damage in any way to the radiation shielding lead created by the attachment method, creating a radiation shielding leak-proof metal stud system. | 07-11-2013 |
Felix Lambert, Terrebonne CA
Patent application number | Description | Published |
---|---|---|
20100077441 | BUFFERING CONTENT ON A HANDHELD ELECTRONIC DEVICE - A handheld device receives a wireless RF transmission that includes multiple video streams and buffers all video streams or selected video streams based on an identification of video streams to buffer. The device might also buffer all or selected audio streams or other real-time data content that is received in the wireless RF transmission. The wireless RF transmission may include a set of video streams (and/or audio streams, and/or other real-timed data) for the handheld device to buffer. A head end that sends the RF transmission may determine which streams to buffer based on operator input, user preferences, and other factors. Alternatively, the handheld device may automatically determine which streams to buffer based on information such as user preferences and information in the RF transmission. Alternatively, a user may select which streams to buffer. | 03-25-2010 |
20120246689 | BUFFERING CONTENT ON A HANDHELD ELECTRONIC DEVICE - A handheld device receives a wireless RF transmission that includes multiple video streams and buffers all video streams or selected video streams based on an identification of video streams to buffer. The device might also buffer all or selected audio streams or other real-time data content that is received in the wireless RF transmission. The wireless RF transmission may include a set of video streams (and/or audio streams, and/or other real-timed data) for the handheld device to buffer. A head end that sends the RF transmission may determine which streams to buffer based on operator input, user preferences, and other factors. Alternatively, the handheld device may automatically determine which streams to buffer based on information such as user preferences and information in the RF transmission. Alternatively, a user may select which streams to buffer. | 09-27-2012 |
Fred Lambert, Sherwood Park CA
Patent application number | Description | Published |
---|---|---|
20130175461 | RADIATION SHIELDING BARRIERS - Articles of manufacture and a method of how to utilize the same in order to create a radiation shielding barrier wall assembly. A metal stud and a metal support bar and a metal restraining bar and a prefabricated radiation shielding lead panel whereby the assembly of these components in the manner as directed and in conjunction with commercially available preexisting metal stud components will result in all radiation shielding lead panels overlapping at all interior field joints, and will result in no punctures or damage in any way to the radiation shielding lead created by the attachment method, creating a radiation shielding leak-proof metal stud system. | 07-11-2013 |
Geoffrey Lambert, Edmonton CA
Patent application number | Description | Published |
---|---|---|
20100230917 | TRANSPORTABLE DISPLAY CART - A transportable display cart includes a chassis with ground engaging wheels and an upper body removably supported by the chassis. The upper body has a first side portion and a second side portion hingedly connected in a clamshell arrangement such that the first and second side portions pivot between a closed position and an open position. Each of the first side portion and second side portion have a flat side panel such that in the open position, the first and second side portions form a flat surface. There is a transport connector on the chassis for supporting the upper body in the closed position for transport or storage. There is a display connector on the chassis for supporting the upper body in the open position or in a position intermediate the closed position and the open position. | 09-16-2010 |
Ghislain Lambert, Beloeil CA
Patent application number | Description | Published |
---|---|---|
20090286652 | System and Method for Starting a Combustion Engine of a Hybrid Vehicle - A system and method for starting an ICE of a hybrid vehicle, the hybrid vehicle having a generator with a rotor rotating at an angular speed and a clutch provided between the ICE and the rotor. The method includes steps of disengaging the clutch so that the rotor and the ICE can operate independently; increasing the angular speed; upon the angular speed reaching a predetermined speed, engaging the clutch; allowing the ICE to crank; and starting the ICE. | 11-19-2009 |
Guillaume Lambert, Otterburn Park CA
Patent application number | Description | Published |
---|---|---|
20150324643 | REMOTE VISUAL INSPECTION SYSTEM AND METHOD - A method and a system for remote visual inspection of a target surface of a structure, the system comprising a multi-axis assembly; a combination of dynamic digital video cameras and optic supported by said multi-axis assembly; and a controller connected to the cameras and the multi-axis assembly; wherein the multi-axis assembly comprises a turret along a vertical axis, the turret being connected at a top part thereof to a first arm extending along a roll axis, the first arm being connected to a second arm along a pitch axis, the cameras and optic being carried by the second arm. | 11-12-2015 |
Jean-Francois Lambert, Orford CA
Patent application number | Description | Published |
---|---|---|
20130175106 | SNOWMOBILE HAVING A FRONT SUSPENSION ASSEMBLY WITH AT LEAST ONE PROTRUSION - A snowmobile has a front suspension and ski assembly having a right side and a left side. The right and left sides each have an upper arm, a lower arm and a spindle. A ski is connected to the lower portion of each spindle. At least one of the upper arms has a least one protrusion extending therefrom. | 07-11-2013 |
20160121970 | SNOWMOBILE SUSPENSION - A snowmobile rear suspension assembly has a first and second suspension arms, a pair of slide rails pivotally connected to lower ends of the suspension arms and at least one shock absorber, a pair of extension arms pivotally connected to a rear portion of the pair of slide rails about a lateral axis and being pivotable between raised | 05-05-2016 |
Jean-François Lambert, Montreal CA
Patent application number | Description | Published |
---|---|---|
20150056924 | POST-ACCIDENT NETWORK PROBE AND METHOD OF USING THE SAME - A post-accident network probe and a method of using such a probe are disclosed. The probe is configured to be deployed in a confined environment (e.g. an underground mine), typically after an accident has occurred, in order to establish a connection with the wireless network, or a portion thereof, located therein. The probe generally allows the rescuers to determine the position of potentially trapped miners and can allow the rescuers to have access to environment-related information collected by the network, to get vital signs information, and/or to communicate with the trapped miners. The probe can be deployed using different access methods such as bore holes (existing or new), ventilation shafts, preventive installations of probes, etc. Notably, since the probe establishes a connection with the network, the location of the probe does not have to be exactly where the miners are located as long as the miners are tracked by the network. | 02-26-2015 |
Kenneth Jason William Lambert, Kanata CA
Patent application number | Description | Published |
---|---|---|
20120214444 | System and Method for Identity Management for Mobile Devices - Systems and methods for managing a user identity on a mobile device are provided. The system comprises the mobile device comprising a user agent and a client application, the user agent and the client application in communication with each other. The system further comprises an identity provider in communication with the mobile device, and a client service in communication with the mobile device. The user agent is configured to communicate with the identity provider and retrieve the user identity for the client application, and the client application is configured to transmit the user identity to the client service. | 08-23-2012 |
20140108801 | System and Method for Identity Management for Mobile Devices - Systems and methods for managing a user identity on a mobile device are provided. The system comprises the mobile device comprising a user agent and a client application, the user agent and the client application in communication with each other. The system further comprises an identity provider in communication with the mobile device, and a client service in communication with the mobile device. The user agent is configured to communicate with the identity provider and retrieve the user identity for the client application, and the client application is configured to transmit the user identity to the client service. | 04-17-2014 |
Lawrence Arthur Lambert, Ladysmith CA
Patent application number | Description | Published |
---|---|---|
20160130161 | METHOD AND APPARATUS FOR SEPARATING SALTS FROM A LIQUID SOLUTION - An apparatus and method for removing a salt from a source solution is provided. The apparatus comprises a feed vessel, a collection vessel, and an ion transport channel in ionic communication with the feed vessel and the collection vessel. A plurality of electrodes is arranged along the ion transport channel. | 05-12-2016 |
Marc Lambert, Sainte-Catherine CA
Patent application number | Description | Published |
---|---|---|
20140252863 | ALTERNATING CURRENT (AC) SYNCHRONIZATION FOR LOAD RESTORATION - Among other things, one or more techniques and/or systems are provided for synchronizing one or more direct current (DC) to alternating current (AC) power sources (e.g., a DC power source coupled to an inverter) for restoration of power to a load. That is, responsive to a grid fault of a grid used to supply power to a load over a common bus, the common bus is isolated from the grid and the load. One or more DC to AC power sources are synchronized through synchronization circuits (e.g., voltage, phase, and/or frequency synchronization) until a total power supply provided by respective synchronized DC to AC power sources is greater than or equal to a target power used to supply the load. Once the target power is achieved, a load circuit breaker is closed so that respective synchronized DC to AC power sources provide power to the load over the common bus. | 09-11-2014 |
Marie-Josée Lambert, Sherbrooke CA
Patent application number | Description | Published |
---|---|---|
20150173426 | Swimming Garment and Corresponding Method of Use Thereof - A garment for enabling a user to selectively have access to a lower body portion, generally below a waist line of the user, is disclosed. The garment comprises an upper body portion and a lower body portion. The upper body portion is configured to be removably mountable about an upper body portion of the user. The upper body portion of the garment typically comprise a front side and a rear side. The lower body portion is configured for to be removably and selectively covering a lower body portion of the user. The lower body portion of the garment comprises a front side and a rear side and is generally depends from one of the front and rear side of the upper body portion such as to be selectively apposeable one the other of the front and rear side of the upper body portion. | 06-25-2015 |
Michel Lambert, Laval CA
Patent application number | Description | Published |
---|---|---|
20080239709 | Concealed Emergency Lighting Fixture with Full Rotation of Door - An emergency lighting fixture includes a door and light source disposed on the door. The door rotates 360 degrees in one direction. A slip clutch assembly permits manual rotation of the door when obstructed by a motor or to remain in the same position when obstructed during rotation by the motor. A capacitor stores energy to close the door. A pressure locking assembly includes a bearing ball biased into engagement with an alignment hole by a spring in response to the door being rotated near a predetermined position. A conductive clip maintains electrical contact with a conductive portion of a hinge as the door rotates. The conductive clip is connected to a power source, and the light source is connected to the conductive portion of the hinge, thereby providing power to the light source after the door has stopped in a pre-determined position or during rotation of the door. The fixture may be used in non-emergency lighting applications. | 10-02-2008 |
Michel Lambert, Saint-Eustache CA
Patent application number | Description | Published |
---|---|---|
20140292506 | EMERGENCY LIGHTING FIXTURE WITH REMOTE CONTROL - A processing unit in a dual-mode lighting fixture receives, via a light pipe of the lighting fixture, a test command signal from a remote control and initiates, based on the test command signal, testing for emergency condition lighting of the lighting fixture. The processing unit receives, via the light pipe, a control command signal from the remote control and controls, based on the control command signal, normal condition lighting of the lighting fixture. The processing unit also monitors feedback loops from a battery, a charger, or a set of LED lamps in the lighting fixture and presents, via the light pipe, a status color indication based on the monitored feedback. | 10-02-2014 |
Mitchell Lambert, Calgary CA
Patent application number | Description | Published |
---|---|---|
20150136427 | Tubewire Injection Buckling Mitigation - A tubewire buckling mitigation assembly for use with injection of tubewire into coiled tubing. The mitigation assembly includes a passageway having a small diameter passage, an intermediate diameter section and first and second tapered transition sections. | 05-21-2015 |
Patrick Lambert, Otterburn Park CA
Patent application number | Description | Published |
---|---|---|
20110226911 | PIPE SPACER - A pipe spacer is provided for spacing at least one pipe in a piping system. The spacer includes a handle with at least one pipe-engaging support member for maintaining an engaged pipe close to a surface in a piping system. | 09-22-2011 |
Paul Lambert, Chambly CA
Patent application number | Description | Published |
---|---|---|
20140353039 | CORE BARREL VALVE ASSEMBLY - A valve assembly for use in an inner tube member of a core barrel head assembly positionable within a drill string of a drilling apparatus. The valve assembly works using two separate surfaces A and B and a biasing element with a force F | 12-04-2014 |
20140353044 | CORE BARREL HEAD ASSEMBLY - A valve assembly for use in an inner tube member of a core barrel head assembly positionable within a drill string of a drilling apparatus. The piston member of the valve assembly is located between a fluid pressure communication port and a fluid flow port to hold the retracting case in an up position and the latches retracted. After an increased fluid pressure has pushed the piston member past the annular element or bushing, the piston member substantially restricts fluid flow through the bushing and allows the retracting case to move to a down position and extend the latches. If the latches are not extended due to an obstruction or misalignment, the retracting case will prevent the piston member from completely passing through the bushing, thus maintaining high fluid pressure due to the flow ports remaining closed, and indicating to the driller that the latches have not properly latched. | 12-04-2014 |
Paul Lambert, North Bay CA
Patent application number | Description | Published |
---|---|---|
20130146365 | QUICKLY RECONFIGURABLE CORE BARREL HEAD ASSEMBLY - A core barrel head assembly positionable within a drill string of a drilling apparatus. The core barrel head assembly includes an upper latch body having a latch assembly for engageably latching the drill string and a reduced diametric portion below the latch assembly for receiving a seal member. The reduced diametric portion has a lower coupling portion on a bottom portion thereof. The head assembly also includes a lower latch body including an upper coupling portion on a top portion thereof, and a coupler for removably coupling the upper latch body to the lower latch body. The seal member is installable on and removable from the reduced diametric portion upon uncoupling the upper latch body from the lower latch body. The head assembly is quickly reconfigurable between surface and pump in/underground configurations. Core barrel outer tube components also do not require reconfiguring between these two configurations. | 06-13-2013 |
20130214546 | FAIL SAFE LOCKING OVERSHOT DEVICE - A fail safe locking overshot device. The overshot device is connected to a hoisting line for retrieval of a spearhead. The device provides automatic engagement of a mechanical locking system through locking dogs for locking the lifting dogs after capture of a spearhead. Manual disengagement is required to unlock the lifting dogs and release the spearhead. | 08-22-2013 |
20150014065 | CORE BARREL VALVE ASSEMBLY - A valve assembly for use in an inner tube member of a core barrel head assembly positionable within a drill string of a drilling apparatus. The valve assembly works using two separate surfaces and a biasing element with a force. When hydrostatic pressure is present forces are created on these surfaces, these forces have a direct relationship with pressure, as an increase in pressure will increase the force and vice versa. The surface areas are designed such that the valve will maintain closed while under a predetermined fluid pressure, indicating to the driller that the inner tube has landed. When the driller relieves the fluid pressure and the pressure decreases, the force difference between the respective forces decreases until the valve opens for drilling through the force from the biasing element. | 01-15-2015 |
Reginald Lambert, Calgary CA
Patent application number | Description | Published |
---|---|---|
20110302975 | SULPHUR-CONTAINING FERTILIZERS AND PROCESS FOR THE PREPARATION THEREOF - According to the present invention, there is provided a process for the manufacture of sulphur-containing fertilizer compositions, said process comprising the steps of: a) providing a slurry of at least one phosphate-based fertilizer material selected from the group consisting of ammonium phosphates, ammonium phosphate based nitrogen-phosphorus-potassium (NPK) compounds, super phosphates and partially acidulated phosphate rocks; b} bringing said slurry into contact with at least one surfactant and elemental sulphur; and c) introducing the mixture obtained in step b) into a granulator unit in order to obtain granules of the fertilizer composition, wherein the elemental sulphur is present in an amount in the range of form 1 to 25 wt. %, based on the total weight of the fertilizer composition The present invention also provides a fertilizer composition. | 12-15-2011 |
Reginald Lambert, Alberta CA
Patent application number | Description | Published |
---|---|---|
20110302973 | SULPHUR-CONTAINING FERTILIZERS AND PROCESS FOR THE PREPARATION THEREOF - Process for the manufacture of sulphur-containing fertilizer compositions, comprising the steps of: a} providing a slurry of at least one phosphate-based fertilizer material selected from the group consisting of ammonium phosphates, ammonium phosphate based nitrogen-phosphorus-potassium (NPK) compounds, super phosphates and partially acidulated phosphate rocks; b) bringing said slurry into contact with at least one anionic surfactant and elemental sulphur; c) introducing the mixture obtained in step b} into a granulator unit in order to obtain granules of the fertilizer composition, wherein the at least one phosphate-based fertilizer material is present in an amount in the range of at least 50 wt. %, the elemental sulphur is present in an amount in the range of from 1 to 25 wt. % and the anionic surfactant is present in an amount in the range of from 0.001 to 3 wt. % based on the overall weight of the fertilizer composition. The present invention also provides a fertilizer composition. | 12-15-2011 |
Richard Lambert, Kleinberg CA
Patent application number | Description | Published |
---|---|---|
20100236075 | Scraping utensil and means for storing a utensil - A kitchenware utensil composed of fibreglass reinforced polyphenyl sulfide PPS is provided. In particular, a kitchenware scraper and an improved scraper blade, composed of PPS are described. The invention also provides a stand for storing the scraper in an upright position, and an abrasive apparatus for reshaping or sharpening the scraper. | 09-23-2010 |
Robert Lambert, Cambridge CA
Patent application number | Description | Published |
---|---|---|
20130016831 | Method and Apparatus For Computing A Shared Secret Key - A method of generating a key by a first correspondent. The key is computable by a second correspondent by a second correspondent. The method comprising the steps of: | 01-17-2013 |
Robert John Lambert, Cambridge CA
Patent application number | Description | Published |
---|---|---|
20100146028 | METHOD AND APPARATUS FOR MODULUS REDUCTION - A modulo reduction is performed on a value a represented as an ordered sequence of computer readable words. The lowest order words are eliminated by substituting an equivalent value represented by higher order words for each of the lower order words. The lowest order words are eliminated until the sequence has a word length corresponding to the modulus. Carries and borrows resulting from the substitution are propagated from lower order words to higher order words. Further reduction is performed to maintain the word length of the sequence to that of the modulus. The further reduction may be determined by examination of a carryover bit or may be performed a predetermined number of times without examination. | 06-10-2010 |
20100223478 | SYSTEM AND METHOD FOR PERFORMING EXPONENTIATION IN A CRYPTOGRAPHIC SYSTEM - There are disclosed systems and methods for computing an exponentiatied message. In one embodiment blinding is maintained during the application of a Chinese Remainder Theorem (CRT) algorithm and then removed subsequent to the completion of the CRT algorithm. In another embodiment, fault injection attacks, such as the gcd attack, can be inhibited by applying and retaining blinding during the application of the CRT algorithm to yield a blinded exponentiation value, and then subsequently removing the blinding in a manner that causes an error injected into the CRT computation to cascade into the exponent of the value used to unblind the blinded exponentiated value. | 09-02-2010 |
20110013768 | SYSTEM AND METHOD FOR REDUCING THE COMPUTATION AND STORAGE REQUIREMENTS FOR A MONTGOMERY-STYLE REDUCTION - A system and method are described that provide an alternative way in which to produce a Montgomery reduction from below by storing a new precomputed value used to substantially replace the μ and n values used in Montgomery reduction with a single value. By modifying the Montgomery reduction mechanism in this way, the number of multiplications and registers required to effect the Montgomery reduction can be reduced. To avoid having to store both μ and n, a modified reduction value or a logical shift or signed version of such a value can be used in place of μ and n for the bulk of the low-order reduction. | 01-20-2011 |
20110270906 | METHOD AND APPARATUS FOR PROVIDING FLEXIBLE BIT-LENGTH MODULI ON A BLOCK MONTGOMERY MACHINE - Techniques are disclosed for utilizing a block Montgomery machine designed only to operate at a fixed block length to perform operations using non-block length (flexible)moduli. In one embodiment, a new modulus n′ is obtained having a block length equal to the fixed block length of the Montgomery machine or a multiple thereof. At least one modular additive operation is performed with the new modulus n′, and at least one modular multiplicative operation is performed with the non-block length modulus n. In this way, the result of the at least one additive operation is sufficiently reduced when a carry stems from the additive operation. | 11-03-2011 |
20120011362 | System and Method for Performing Device Authentication Using Key Agreement - A system and method are provided which employs a key agreement scheme, wherein the agreed-upon-shared key is used in a protocol message in the authentication rather than being employed as a session key. | 01-12-2012 |
20120079593 | System and Method For Hindering a Cold Boot Attack - A method for hindering a cold boot attack on a user equipment (UE) is provided. The method includes, in response to detection of the cold boot attack, executing prioritized security procedures. A user equipment (UE) is also provided that includes a processor configured to execute prioritized security procedures responsive to detection of a cold boot attack. | 03-29-2012 |
20120155637 | SYSTEM AND METHOD FOR HARDWARE STRENGTHENED PASSWORDS - A cryptographic module and a computing device implemented method for securing data using a cryptographic module is provided. The cryptographic module may include an input component for receiving a password, an output component for outputting data to the computing device, a random number generator for generating a random number and a module processor operative to generate at least one cryptographic key using the generated random number, and to record an association between the received password linking the received password with the at least one cryptographic key in a data store accessible to the cryptographic module. | 06-21-2012 |
20120242459 | INTERROGATING AN AUTHENTICATION DEVICE - Methods, systems, and computer programs for interrogating an authentication device are disclosed. For example, a mobile device can include an interrogator module that interrogates an authentication module in a mobile device accessory, for example, upon installation of the mobile device accessory. In some implementations, challenge-response pairs and a challenge-response distribution are stored in a memory of an interrogator module. The challenge-response distribution defines selection probabilities for the challenge values. In some instances, the interrogator module receives an authentication request from an authentication module, and in response to the authentication request, the interrogator module selects an initial challenge value according to the challenge-response distribution. The interrogator module sends the authentication module an interrogation message that includes the initial challenge value. The interrogator module can modify the challenge-response distribution, for example, based on suspicious behavior. | 09-27-2012 |
20120257742 | Efficient Implementation of Hash Algorithm on a Processor - An efficient implementation of SHA-512, and similarly SHA-384, on an ARM processor. The implementation maximizes reuse of the register values between iterations so as to minimize the need to load these values from memory. This is achieved by categorizing the iterations into even and odd ones such that the sequence of computation in the even iteration is reversed in the odd iteration and the register values at the end of one iteration are consumed at the beginning of the following one. | 10-11-2012 |
20120284514 | MANAGING DATA FOR AUTHENTICATION DEVICES - Methods, systems, and computer programs for managing authentication data for an authentication device are disclosed. An authentication device may be included, for example, in a mobile device battery so that the battery can be authenticated by a mobile device. In some implementations, encrypted certificate data are stored on an authentication device. The encrypted certificate data are accessed, and unencrypted certificate data are generated by decrypting the encrypted certificate data. The unencrypted certificate data are stored on the authentication device. The unencrypted certificate data enable the authentication device to provide a valid reply message, for example, in response to receiving an interrogation message from an interrogation device. In some implementations, the reply message includes the unencrypted certificate data and a response value generated by the authentication device based on a secret value. | 11-08-2012 |
20120311007 | SQUARING BINARY FINITE FIELD ELEMENTS - Methods and systems for squaring a binary finite field element are described. In some aspects, a data processing apparatus includes registers and processor logic. A first register stores a sequence of binary values that define a binary finite field element input. The processor logic accesses input components from the first register according to intervals in the sequence. Each input component includes a binary value from each interval in the sequence. In some cases, the intervals are periodic and the binary finite field element corresponds to a sum of phase-shifted input components. The processor logic generates output components based on the input components. The processor logic generates a square of the binary finite field element in the second register based on the output components. The number of input components can be selected, for example, to balance costs of additional processing time against benefits associated with reduced processing hardware. | 12-06-2012 |
20130046972 | Using A Single Certificate Request to Generate Credentials with Multiple ECQV Certificates - A method and apparatus are disclosed for using a single credential request (e.g., registered public key or ECQV certificate) to obtain a plurality of credentials in a secure digital communication system having a plurality of trusted certificate authority CA entities and one or more subscriber entities A. In this way, entity A can be provisioned onto multiple PKI networks by leveraging a single registered public key or implicit certificate as a credential request to one or more CA entities to obtain additional credentials, where each additional credential can be used to derive additional public key-private key pairs for the entity A. | 02-21-2013 |
20130170644 | Mechanism for Managing Authentication Device Lifecycles - An authentication device is used to authenticate a component to a product using a secret key. The life cycle of the authentication device is controlled by selective deletion of the secret key. An attestation message is sent by the authentication device upon deletion of the secret key. Authentication devices from faulty components or over supply of the authentication devices ma}′ be rendered inoperable and audited. | 07-04-2013 |
20140003604 | AUTHENTICATION OF A MOBILE DEVICE BY A NETWORK AND KEY GENERATION | 01-02-2014 |
20140153714 | Challenge-Response Authentication Using a Masked Response Value - Challenge-response authentication protocols are disclosed herein, including systems and methods for a first device to authenticate a second device. In one embodiment, the following operations are performed by the first device: (a) sending to the second device: (i) a challenge value corresponding to an expected response value known by the first device, and (ii) a hiding value; (b) receiving from the second device a masked response value; (c) obtaining an expected masked response value from the expected response value and the hiding value; and (d) determining whether the expected masked response value matches the masked response value received from the second device. The operations from the perspective of the second device are also disclosed, which in some embodiments include computing the masked response value using the challenge value, the hiding value, and secret information known to the second device. | 06-05-2014 |
20140154975 | Verifying a Wireless Device - In some aspects of what is described here, a first wireless device detects proximity of a second wireless device (e.g., by a Near Field Communication (NFC) interface or another type of interface). Based on detecting proximity of the second wireless device, the first wireless device generates a recommendation request from information received from the second wireless device. The first wireless device sends the recommendation request to a trusted authority and receives a response. The response includes the trusted authority's recommendation whether to trust the second wireless device. The first wireless device can determine whether to trust the second wireless device based on the recommendation. | 06-05-2014 |
20140156998 | Challenge-Response Authentication Using a Masked Response Value - Challenge-response authentication protocols are disclosed herein, including systems and methods for a first device to authenticate a second device. In one embodiment, the following operations are performed by the first device: (a) sending to the second device: (i) a challenge value corresponding to an expected response value known by the first device, and (ii) a hiding value; (b) receiving from the second device a masked response value; (c) obtaining an expected masked response value from the expected response value and the hiding value; and (d) determining whether the expected masked response value matches the masked response value received from the second device. The operations from the perspective of the second device are also disclosed, which in some embodiments include computing the masked response value using the challenge value, the hiding value, and secret information known to the second device. | 06-05-2014 |
20140298033 | HYBRID SIGNATURE SCHEME - A signature scheme is provided in which a message is divided in to a first portion which is hidden and is recovered during verification, and a second portion which is visible and is required as input to the verification algorithm. A first signature component is generated by encrypting the first portion alone. An intermediate component is formed by combining the first component and the visible portion and cryptographically hashing them. A second signature component is then formed using the intermediate component and the signature comprises the first and second components with the visible portion. A verification of the signature combines a first component derived only from the hidden portion of the message with the visible portion and produces a hash of the combination. The computed hash is used together with publicly available information to generate a bit string corresponding to the hidden portion. | 10-02-2014 |
20140344579 | Accelerated Verification of Digital Signatures and Public Keys - Accelerated computation of combinations of group operations in a finite field is provided by arranging for at least one of the operands to have a relatively small bit length. In a elliptic curve group, verification that a value representative of a point R corresponds the sum of two other points uG and vG is obtained by deriving integers w,z of reduced bit length and that v=w/z. The verification equality R=uG+vQ may then be computed as −zR+(uz mod n)+wQ=O with z and w of reduced bit length This is beneficial in digital signature verification where increased verification can be attained. | 11-20-2014 |
20140369492 | METHOD TO CALCULATE SQUARE ROOTS FOR ELLIPTIC CURVE CRYPTOGRAPHY - A method is presented to compute square roots of finite field elements from the prime finite field of characteristic p over which points lie on a defined elliptic curve. Specifically, while performing point decompression of points that lie on a standardized elliptic curve over a prime finite field of characteristic 2 | 12-18-2014 |
20140380056 | SECURING METHOD FOR LAWFUL INTERCEPTION - A method is presented for secure communication, the method including generating a signature using a private key, a nonce, and at least one of an identifier and a key component; and transmitting the signature, the nonce, a security parameter, and the at least one of the identifier and the key component, wherein the security parameter associates a user identity with a public key, the public key being associated with the private key. | 12-25-2014 |
20150124961 | Public Key Encryption Algorithms for Hard Lock File Encryption - In some aspects, an encryption method comprises encrypting a first portion of a message using a first secret key. The first secret key is generated based on the public key of an entity. A one-way function is used to generate a second secret key from the first secret key, and the first secret key is subsequently discarded. A second portion of the message is encrypted using the second secret key. The encrypted first portion of the message and the encrypted second portion of the message are provided to the entity. | 05-07-2015 |
20150270975 | METHOD FOR VALIDATING MESSAGES - There is provided a method for secure communications. The method includes a computing device receiving a notification comprising a message, a counter value, a signature signed by a signer and based on the message and the counter value, and an indication of the signer. The device obtains a current counter value based on an identity of the signer, checks the signature and compares the counter value with the current counter value; and, if the counter comparison and the signature checking is successful, accepting the message. | 09-24-2015 |
20150271208 | MANAGEMENT AND DISTRIBUTION OF SECURITY POLICIES IN A COMMUNICATION SYSTEM - A system and method are provided for having a device in a communication system update an operational policy for the device by encoding a policy update in a virtual machine language used by a virtual machine on the device, having the policy update signed by a trusted entity, and sending a message comprising the signed policy update to the device to enable the device to implement the policy update using the virtual machine on the device. A system and method are also provided for updating an operational policy on a device in a communication system by receiving, at the device, a message comprising a signed policy update that has been signed by a trusted entity, the policy update being encoded in a virtual machine language used by a virtual machine on the device, verifying the signed policy update, and implementing the policy update using the virtual machine on the device when the policy update is verified. | 09-24-2015 |
Sebastien Lambert, Sainte-Sophie CA
Patent application number | Description | Published |
---|---|---|
20090188022 | HOCKEY HELMET WITH AN OUTER SHELL MADE OF TWO DIFFERENT MATERIALS - The present invention covers a hockey helmet for receiving a head of a player. The helmet comprises an outer shell made of first and second materials having respective first and second flexibilities. The outer shell comprises a front portion for at least partially facing the crown region of the head, a top portion for at least partially facing the top region of the head, a back portion for at least partially facing the back region of the head, an occipital portion for at least partially facing the occipital region of the head, and left and right portions for at least partially facing the left and right side regions of the head, the left and right portions comprising respective left and right projections that extend downwardly in front of the respective left and right ears and left and right sections located above and behind the respective left and right ears wherein one of the occipital portion, left and right projections and left and right sections is made of the second material and wherein the second flexibility is greater from the first flexibility. | 07-30-2009 |
Sebastien Lambert, Ste-Sophie CA
Patent application number | Description | Published |
---|---|---|
20100050323 | HOCKEY HELMET COMPRISING AN OCCIPITAL ADJUSTMENT MECHANISM - Hockey helmet for receiving a head of a wearer, the helmet comprising: (a) a front shell for facing the crown region of the head; (b) a rear shell for facing the left and right side regions, the back region and the occipital region of the head, the rear shell comprising outer and inner surfaces and left and light elongated slots positioned symmetrically about a longitudinal axis of the helmet; (e) a rear inner pad for facing the back and left and right side regions of the head, the rear inner pad being affixed to the inner surface of the rear shell; (d) an occipital inner pad located between the rear shell and the occipital region of the head; (e) a central member extending along the longitudinal axis of the helmet, the central member comprising an upper part that is hingely mounted with respect to the rear shell and a lower part that is mounted to the occipital inner pad; and (f) left and right wedging members located between the occipital inner pad and the inner surface of the rear shell, each of the left and right wedging members being movable from a first position to a second position wherein, in use, in the second position, the occipital inner pad applies pressure upon the occipital region of the head for urging the front shell towards the crown region of the head. The rear shell of the helmet has a curvature, the occipital inner pad has a rear surface that extends generally perpendicularly about the longitudinal axis of the helmet, each of the left and right wedging members has a front portion contacting the rear surface of the occipital inner pad and movement of each of the left and right wedging members away from the longitudinal axis follows the curvature of the rear shell such that the occipital inner pad moves towards the second position. | 03-04-2010 |
Tyler Lambert, Loring CA
Patent application number | Description | Published |
---|---|---|
20160044855 | SHOVEL AND STEP - A shovel having a blade fixed to a shaft. A step fixed to the blade and/or the shaft, the step having a step shoulder, the step being spaced longitudinally along the shovel at a selected distance from the blade shoulder. | 02-18-2016 |