Bays
F. Barry Bays, Collierville, TN US
Patent application number | Description | Published |
---|---|---|
20150342756 | BONE HARVESTER AND BONE MARROW REMOVAL SYSTEM AND METHOD - A bone harvester and bone marrow removal system. The bone harvester can include a body defining a channel extending longitudinally therethrough from a distal to a proximal portion of the body. The distal portion can include a cutting tip. Bone marrow may be drawn through the channel. | 12-03-2015 |
Jean-Nicolas Bays, Chenens CH
Patent application number | Description | Published |
---|---|---|
20110273323 | ELECTRICALLY SELF-CONTAINED RADAR DEVICE - The invention relates to a radar device having a housing that includes: a microwave motion detection module ( | 11-10-2011 |
John T. Bays, West Richland, WA US
Patent application number | Description | Published |
---|---|---|
20130276555 | ENHANCED SURFACE SAMPLER AND PROCESS FOR COLLECTION AND RELEASE OF ANALYTES - An enhanced swipe sampler and method of making are described. The swipe sampler is made of a fabric containing selected glass, metal oxide, and/or oxide-coated glass or metal fibers. Fibers are modified with silane ligands that are directly attached to the surface of the fibers to functionalize the sampling surface of the fabric. The swipe sampler collects various target analytes including explosives and other threat agents on the surface of the sampler. | 10-24-2013 |
20140017805 | DEVICE AND METHOD FOR ENHANCED COLLECTION AND ASSAY OF CHEMICALS WITH HIGH SURFACE AREA CERAMIC - A method and device for enhanced capture of target analytes is disclosed. This invention relates to collection of chemicals for separations and analysis. More specifically, this invention relates to a solid phase microextraction (SPME) device having better capability for chemical collection and analysis. This includes better physical stability, capacity for chemical collection, flexible surface chemistry and high affinity for target analyte. | 01-16-2014 |
John T. Bays, Richland, WA US
Patent application number | Description | Published |
---|---|---|
20100147768 | RENEWABLE SORBENT MATERIAL AND METHOD OF USE - Sorbent materials include a support, a base material comprising a first compound covalently bound to the support, and an active material reversibly bound to the base material, wherein the active material comprises a second compound with at least one functional group selected for binding a target species. The active material with the bound target species can be removed by washing the sorbent material with a solvent in which the second compound is soluble. The sorbent material can be regenerated by reversibly binding one or more second compounds having a selected functional group to the washed base material. | 06-17-2010 |
Joseph Nathaniel Bays, Kingsport, TN US
Patent application number | Description | Published |
---|---|---|
20140187812 | SYSTEMS AND METHODS FOR PROCESSING VARIABLE ACETYL STREAMS - The invention provides systems and processes for concentrating acetic acid and acetic anhydride streams. The systems allow operation of equipment used for such concentrations in two or more modes of operation. At least one mode is intended to produce a concentrated or purified acetic acid stream. At least one other mode is intended to produce a concentrated or purified acetic anhydride stream. | 07-03-2014 |
Laurence E. Bays, Allentown, PA US
Patent application number | Description | Published |
---|---|---|
20130019041 | BIT SLICE ROUND ROBIN ARBITERAANM Bays; Laurence E.AACI AllentownAAST PAAACO USAAGP Bays; Laurence E. Allentown PA USAANM Banerjee; BalloriAACI BangaloreAACO INAAGP Banerjee; Ballori Bangalore INAANM Vomero; James F.AACI OrefieldAAST PAAACO USAAGP Vomero; James F. Orefield PA US - The present disclosure describes systems and methods for arbitrating between a plurality of devices competing for a system resource. Operations of the system and method may include, but are not limited to: initializing two or more previous grant request states; generating an access grant signal according to the two or more requests for access to the shared resource, two or more token states and the two or more previous grant request states; and generating an access grant signal according to the two or more requests for access to the shared resource, two or more token states and the two or more previous grant request states. | 01-17-2013 |
Lyle A. Bays, Ridgefield, WA US
Patent application number | Description | Published |
---|---|---|
20090017235 | Dual Mode Ink Jet Paper - In web/ink-jet operations in which ink jet data is over-printed on forms prepared by offset litho, undesirable interactions between the surface size and litho-fountain are controlled by use of a PCC basesheet having a size press coating of starch and alum, the alum amount being at least 0.75% by weight. | 01-15-2009 |
Mark Bays, Columbus, IN US
Patent application number | Description | Published |
---|---|---|
20110209461 | SYSTEM, METHOD, AND APPARATUS FOR DETERMINING AFTERTREATMENT FLUID QUALITY - A method includes determining a first NO | 09-01-2011 |
20140260202 | REDUCTANT MATERIAL DEPOSIT REDUCTION IN EXHAUST AFTERTREATMENT SYSTEMS - In one non-limiting embodiment, an apparatus for treating exhaust includes a reductant injector, an aftertreatment component including a NO | 09-18-2014 |
Mark N. Bays, Columbus, IN US
Patent application number | Description | Published |
---|---|---|
20100300408 | FUEL INJECTOR, CLAMPING ASSEMBLY AND METHOD OF MOUNTING A FUEL INJECTOR - A fuel injector, a method of mounting a fuel injector, a combination injector and clamping, and a clamp are all provided for ensuring the fuel injector is mounted in a proper rotative position in an injector mounting bore of any one of multiple internal combustion engine platforms requiring different injector mounting positions. The injector includes a first alignment feature having a first geometry corresponding to a first engagement feature of the first engine platform and adapted to be engaged by the first engagement feature to secure the injector to the first engine platform. The fuel injector further includes a second alignment feature having a second geometry different from, and incompatible with, the first geometry and corresponding to a second engagement feature of the second engine platform thereby ensuring the fuel injector is circumferentially oriented in a correct rotative position required by a given engine platform. | 12-02-2010 |
20120216760 | EJECTOR COOLANT PUMP FOR INTERNAL COMBUSTION ENGINE - An internal combustion engine includes a cooling fluid circuit and a pumping circuit. The pumping circuit drives an ejector pump located along the cooling fluid circuit, enabling a reduced parasitic load on the engine from pumping cooling fluid through the cooling fluid circuit. | 08-30-2012 |
Paul Leonard Bays, Muntelier CH
Patent application number | Description | Published |
---|---|---|
20110170702 | AUDIO HEADSET AND AUDIO PLAYER - The present invention provides an audio headset ( | 07-14-2011 |
Robert Bays, San Francisco, CA US
Patent application number | Description | Published |
---|---|---|
20140341218 | DISTRIBUTED METHODOLOGY FOR PEER-TO-PEER TRANSMISSION OF STATEFUL PACKET FLOWS - Techniques for enabling peer-to-peer transmission of stateful packet flows in a virtualized network environment are provided. In certain embodiments, a computer system receives a packet belonging to a stateful flow between a first virtual machine and a second virtual machine, accesses flow associating information (e.g., network address) from the packet, determines a second computer system comprising a state analysis owner for the stateful flow, using the flow associating information, and transmits the first packet to the second computer system. | 11-20-2014 |
Robert Bays, Villars-Sur-Glane CH
Patent application number | Description | Published |
---|---|---|
20110273323 | ELECTRICALLY SELF-CONTAINED RADAR DEVICE - The invention relates to a radar device having a housing that includes: a microwave motion detection module ( | 11-10-2011 |
Robert James Bays, San Francisco, CA US
Patent application number | Description | Published |
---|---|---|
20090016335 | Methods, Apparatuses and Systems Facilitating Determination of Network Path Metrics - Methods, apparatuses and systems relating to the control and application of policies for routing data over a computer network, such as the Internet. Some implementations of the invention facilitate the configuration, deployment and/or maintenance of network routing policies. Some implementations of the invention are particularly useful for controlling the routing of data among autonomous systems or organizations. Certain implementations allow for dynamic modification of routing policy based on such factors as current Internet performance load sharing, user-defined parameters, and time of day. In one embodiment, the present invention provides methods, apparatuses and systems implementing enhanced network path testing methodologies that enhance the efficiency of processes associated with testing of a network path, while reducing the perceived intrusiveness of test packets associated with such metrics tests. | 01-15-2009 |
Rodney L. Bays, Pierceton, IN US
Patent application number | Description | Published |
---|---|---|
20100234962 | CONSTRAINED PROSTHETIC KNEE WITH ROTATING BEARING - A constrained prosthetic knee having a modular hinge post and a rotating bearing. A cannulated hinge post is rotatably connected to the femoral component of the knee prosthesis so that a hinge post extension may be anteriorly positioned through the hinge post and into the tibial component of the knee prosthesis, after positioning of the femoral component in the femur and the tibial component in the tibia. The hinge post is preassembled to the femoral component so that such assembly is not required during the implantation procedure. A meniscal component forming the rotating bearing of the knee prosthesis is packaged together with the hinge post extension so that the appropriate hinge post extension is readily available. The meniscal component includes a mechanism for preventing lift off of the meniscal component from the tibial component, while allowing rotation of the meniscal component relative to the tibial component. | 09-16-2010 |
20120330430 | CONSTRAINED PROSTHETIC KNEE WITH ROTATING BEARING - A constrained prosthetic knee having a modular hinge post and a rotating bearing. A cannulated hinge post is rotatably connected to the femoral component of the knee prosthesis so that a hinge post extension may be anteriorly positioned through the hinge post and into the tibial component of the knee prosthesis, after positioning of the femoral component in the femur and the tibial component in the tibia. The hinge post is preassembled to the femoral component so that such assembly is not required during the implantation procedure. A meniscal component forming the rotating bearing of the knee prosthesis is packaged together with the hinge post extension so that the appropriate hinge post extension is readily available. The meniscal component includes a mechanism for preventing lift off of the meniscal component from the tibial component, while allowing rotation of the meniscal component relative to the tibial component. | 12-27-2012 |
Valerie Kathleen Bays, Redmond, WA US
Patent application number | Description | Published |
---|---|---|
20090025067 | GENERIC EXTENSIBLE PRE-OPERATING SYSTEM CRYPTOGRAPHIC INFRASTRUCTURE - A cryptographic device protocol provides a generic interface allowing pre-OS applications to employ any of a variety of cryptographic devices within the pre-OS environment. The generic interface can be used independent of the specific cryptographic devices and is independent of the cryptographic or hashing algorithms used by each device. Cryptographic functions may be performed in the pre-OS environment by pre-OS applications communicating with cryptographic device drivers using the cryptographic device protocol that is independent of the cryptographic devices. Each cryptographic device may be identified by a unique device identifier and may have a number of keys available to it, with each key being identified by a unique key identifier. | 01-22-2009 |
20090031408 | INTEGRITY PROTECTED SMART CARD TRANSACTION - Systems, methods, and technologies for configuring a conventional smart card and a client machine, and for performing a smart card authorization using the configured smart card and client. Further, the combination of methods provides for mutual authentication—authentication of the client to the user, and authentication of the user to the client. The authentication methods include presenting a specified token to the user sufficient to authenticate the client to the user and thus protect the user-provided PIN. Security is strengthened by using an integrity key based on approved client system configurations. Security is further strengthened by calculating a PIN′ value based on a user-specified PIN and a modifier and using the PIN′ value for unlocking the smart card. | 01-29-2009 |
20110176682 | INTEGRITY PROTECTED SMART CARD TRANSACTION - Systems, methods, and technologies for configuring a conventional smart card and a client machine, and for performing a smart card authorization using the configured smart card and client. Further, the combination of methods provides for mutual authentication—authentication of the client to the user, and authentication of the user to the client. The authentication methods include presenting a specified token to the user sufficient to authenticate the client to the user and thus protect the user-provided PIN. Security is strengthened by using an integrity key based on approved client system configurations. Security is further strengthened by calculating a PIN′ value based on a user-specified PIN and a modifier and using the PIN′ value for unlocking the smart card. | 07-21-2011 |
20110179282 | INTEGRITY PROTECTED SMART CARD TRANSACTION - Systems, methods, and technologies for configuring a conventional smart card and a client machine, and for performing a smart card authorization using the configured smart card and client. Further, the combination of methods provides for mutual authentication—authentication of the client to the user, and authentication of the user to the client. The authentication methods include presenting a specified token to the user sufficient to authenticate the client to the user and thus protect the user-provided PIN. Security is strengthened by using an integrity key based on approved client system configurations. Security is further strengthened by calculating a PIN′ value based on a user-specified PIN and a modifier and using the PIN′ value for unlocking the smart card. | 07-21-2011 |
20110179283 | INTEGRITY PROTECTED SMART CARD TRANSACTION - Systems, methods, and technologies for configuring a conventional smart card and a client machine, and for performing a smart card authorization using the configured smart card and client. Further, the combination of methods provides for mutual authentication—authentication of the client to the user, and authentication of the user to the client. The authentication methods include presenting a specified token to the user sufficient to authenticate the client to the user and thus protect the user-provided PIN. Security is strengthened by using an integrity key based on approved client system configurations. Security is further strengthened by calculating a PIN′ value based on a user-specified PIN and a modifier and using the PIN′ value for unlocking the smart card. | 07-21-2011 |
20120297200 | POLICY BOUND KEY CREATION AND RE-WRAP SERVICE - One or more techniques and/or systems are provided for provisioning encrypted key blobs and client certificates. That is, a trusted execution environment on a first machine may provide a key service provider with a cryptographic encryption key. The key service provider may encrypt a key blob using the cryptographic encryption key and/or wrap the encrypted key blob with one or more policies, such as a platform policy. The key service provider may provision the encrypted key blob to a client on the first machine. The client may submit the encrypted key blob to the trusted execution environment for validation so that the client may perform key actions, such as sign an email or encrypt data. Because the key blob may be specific to a particular trusted execution environment and/or machine, the key service provider may re-wrap the key blob if the client “roams” to a second machine. | 11-22-2012 |
20130290724 | INTEGRITY PROTECTED SMART CARD TRANSACTION - Systems, methods, and technologies for configuring a conventional smart card and client machine, and for performing a smart card authorization using the configured smart card and client. Further, the combination of methods provides for mutual authentication—authentication of the client to the user, and authentication of the user to the client. The authentication methods include presenting a specified token to the user sufficient to authenticate the client to the user and thus protect the user-provided PIN. Security is strengthened by using an integrity key based on approved client system configurations. Security is further strengthened by calculating a PIN′ value based on a user-specified PIN and a modifier and using the PIN′ value for unlocking the smart card. | 10-31-2013 |
20130297944 | INTEGRITY PROTECTED SMART CARD TRANSACTION - Systems, methods, and technologies for configuring a conventional smart card and client machine, and for performing a smart card authorization using the configured smart card and client. Further, the combination of methods provides for mutual authentication—authentication of the client to the user, and authentication of the user to the client. The authentication methods include presenting a specified token to the user sufficient to authenticate the client to the user and thus protect the user-provided PIN. Security is strengthened by using an integrity key based on approved client system configurations. Security is further strengthened by calculating a PIN′ value based on a user-specified PIN and a modifier and using the PIN′ value for unlocking the smart card. | 11-07-2013 |
20150149782 | INTEGRITY PROTECTED SMART CARD TRANSACTION - Systems, methods, and technologies for configuring a conventional smart card and client machine, and for performing a smart card authorization using the configured smart card and client. Further, the combination of methods provides for mutual authentication—authentication of the client to the user, and authentication of the user to the client. The authentication methods include presenting a specified token to the user sufficient to authenticate the client to the user and thus protect the user-provided PIN. Security is strengthened by using an integrity key based on approved client system configurations. Security is further strengthened by calculating a PIN′ value based on a user-specified PIN and a modifier and using the PIN′ value for unlocking the smart card. | 05-28-2015 |