Patent application number | Description | Published |
20110213628 | SYSTEMS AND METHODS FOR PROVIDING A SAFETY SCORE ASSOCIATED WITH A USER LOCATION - Pursuant to some embodiments, insurance systems, methods and devices are provided which include a data storage device for storing, updating and providing access to loss risk score data. In some embodiments, a request for information associated with a user's location identified by user location data may be received over a communications network. A computer processing system may then be operated to generate a safety score associated with said use location data, the safety score being based on a plurality of loss risk factors associated with the user location data. At least one element of an insurance policy associated with the user may be modified in accordance with the safety score. A response, including the safety score, may then be transmitted to the user over the communications network. | 09-01-2011 |
20120123806 | SYSTEMS AND METHODS FOR PROVIDING A SAFETY SCORE ASSOCIATED WITH A USER LOCATION - Pursuant to some embodiments, insurance systems, methods and devices are provided which include a data storage device for storing, updating and providing access to loss risk score data. In some embodiments, a request for information associated with a user's location identified by user location data may be received over a communications network. A computer processing system may then be operated to generate a safety score associated with said use location data, the safety score being based on a plurality of loss risk factors associated with the user location data. A response, including the safety score, may then be transmitted to the user over the communications network. | 05-17-2012 |
20130138460 | SYSTEM AND METHOD FOR ADMINISTERING A TELEMATICS-ENABLED TEST DRIVE DEALER PROGRAM - Systems and methods are disclosed herein for pricing an insurance premium based on telematics data. The system includes a communications interface and a business logic processor in communications with the communications interface. The communications interface receives telematics data collected by a telematics acquisition device configured at a dealership for collecting telematics data of a vehicle sold by the dealership. The communications interface also receives vehicle data indicating the make and model of the vehicle sold and vehicle owner data related to the purchaser of the vehicle sold. The business logic processor determines an insurance quote for the purchaser based on the received telematics data, vehicle data, and vehicle owner data. The communications interface transmits the insurance quote for the purchaser of the vehicle. The business logic processor also manages a predetermined incentive that is provided to the purchaser in return for allowing the telematics data acquisition device to collect telematics data. | 05-30-2013 |
20140350970 | COMPUTER SYSTEM FOR DETERMINING GEOGRAPHIC-LOCATION ASSOCIATED CONDITIONS - Pursuant to some embodiments, computer systems for generating safety scores relating to vehicle travel routes are provided which include a data storage device for storing, updating and providing access to loss risk score data. In some embodiments, a request for information associated with a user's location identified by user location data may be received over a communications network. A computer processing system may then be operated to generate a safety score associated with said use location data, the safety score being based on a plurality of loss risk factors associated with the user location data. A response, including the safety score, may then be transmitted to the user over the communications network. | 11-27-2014 |
Patent application number | Description | Published |
20090018340 | Formation of Tetra-Substituted Enamides and Stereoselective Reduction Thereof - The present invention is directed to a practical process for the preparation of an enamide (II) by palladium catalyzed coupling of a primary amide (IV) with a compound of structural formula (III), as shown below: As well as to crystalline forms of a compound produced by this process, in particular, an anhydrous crystal form, Form B, and crystalline solvates falling into three patterns, Type 1, Type 2, and Type 3, and crystalline intermediate compounds produced in the process. Still further, the present invention relates to the stereoselective reduction of the tetrasubstituted enamide (II) to the corresponding amide (I). | 01-15-2009 |
20100041893 | FORMATION OF TETRA-SUBSTITUTED ENAMIDES AND STEREOSELECTIVE REDUCTION THEREOF - The present invention is directed to a practical process for the preparation of an enamide (II) by palladium catalyzed coupling of a primary amide (IV) with a compound of structural formula (III), as shown below: As well as to crystalline forms of a compound produced by this process, in particular, an anhydrous crystal form, Form B, and crystalline solvates falling into three patterns, Type 1, Type 2, and Type 3, and crystalline intermediate compounds produced in the process. Still further, the present invention relates to the stereoselective reduction of the tetrasubstituted enamide (II) to the corresponding amide (I). | 02-18-2010 |
Patent application number | Description | Published |
20130025422 | WATERJET CUTTING SYSTEM WITH STANDOFF DISTANCE CONTROL - A cutting head of a waterjet cutting system is provided having an environment control device and a measurement device. The environment control device is positioned to act on a surface of a workpiece at least during a measurement operation to establish a measurement area on the surface of the workpiece substantially unobstructed by fluid. The measurement device is positioned to selectively obtain information from within the measurement area indicative of a position of the cutting head relative to the workpiece. A control system is further provided and operable to position the cutting head relative to the workpiece at a standoff distance based at least in part on the information indicative of the position of the cutting head relative to the workpiece obtained by the measurement device. A method of operating a waterjet cutting system is also provided. | 01-31-2013 |
20150118942 | FLUID JET CUTTING SYSTEMS, COMPONENTS AND METHODS THAT FACILITATE IMPROVED WORK ENVIRONMENTS - Fluid jet systems, components and related methods are provided which are well adapted for processing workpieces under particularly work-friendly conditions. Embodiments include fluid jet systems and related methods that reduce, minimize or eliminate a gap between a workpiece being processed and jet receiving devices that receive and dissipate the energy of a fluid jet passing through the workpiece. Other embodiments include fluid jet systems and related methods involving fluid jet processing of workpieces in a submerged condition. Still further embodiments include fluid jet systems and related methods involving position and orientation adjustment of a fluid jet receptacle to coordinate the path of an incoming fluid jet with a central axis or other feature of the fluid jet receptacle. | 04-30-2015 |
20150283724 | FLUID JET CUTTING SYSTEMS, COMPONENTS AND METHODS THAT FACILITATE IMPROVED WORK ENVIRONMENTS - Fluid jet systems, components and related methods are provided which are well adapted for processing workpieces under particularly work-friendly conditions. Embodiments include fluid jet systems and related methods that reduce, minimize or eliminate a gap between a workpiece being processed and jet receiving devices that receive and dissipate the energy of a fluid jet passing through the workpiece. Other embodiments include fluid jet systems and related methods involving fluid jet processing of workpieces in a submerged condition. Still further embodiments include fluid jet systems and related methods involving position and orientation adjustment of a fluid jet receptacle to coordinate the path of an incoming fluid jet with a central axis or other feature of the fluid jet receptacle. | 10-08-2015 |
20150362914 | BEAM TOOL PATHING FOR 3D COMPOUND CONTOURS USING MACHINING PATH SURFACES TO MAINTAIN A SINGLE SOLID REPRESENTATION OF OBJECTS - Computer based methods, systems, and techniques for planning and generating machining paths for a tool that manufactures a three dimensional object having beveled or “compound” contours from a workpiece. A computer aided design (CAD)/computer aided manufacturing (CAM) system creates intermediate machining path surfaces that extend based on a CAD solid model representing the geometry of the object to be manufactured. The intermediate machining path surfaces extend to a shape that simulates a cutting beam (e.g., a waterjet, a laser beam, etc.) of the tool. For a flat workpiece, the machining path surfaces may extend from a top surface of the workpiece, which is a tool beam entrance surface, to a bottom surface of the workpiece, which is a tool beam exit surface. An operator is able to visualize the cuts to be made and the actual finished object geometry, without requiring the creation of multiple CAD solid models. | 12-17-2015 |
Patent application number | Description | Published |
20100107213 | Access Control State Determination Based on Security Policy and Secondary Access Control State - In accordance with one or more aspects, a current security policy for accessing a device or volume of a computing device is identified. A secondary access control state for the device or volume is also identified. An access state for the device is determined based on both the current security policy and the secondary access control state. | 04-29-2010 |
20100211792 | COMMUNICATION CHANNEL ACCESS BASED ON CHANNEL IDENTIFIER AND USE POLICY - A communication channel has an associated channel authenticator that includes a channel identifier, a use policy identifying how an owner of the communication channel indicates the communication channel is used, and a digital signature over the channel identifier and use policy. The identifier of the communication channel and the use policy can be verified by a computing device, and a check made as to whether a current security policy of the computing device is satisfied by the use policy. An access that the computing device is allowed to have to the communication channel is determined based at least in part on both whether the current security policy is satisfied by the use policy and whether the identifier of the communication channel and the use policy are verified. | 08-19-2010 |
20110019820 | COMMUNICATION CHANNEL CLAIM DEPENDENT SECURITY PRECAUTIONS - A set of security claims for a communication channel are obtained, the set of security claims including one or more security claims each identifying a security characteristic of the communication channel. The security claims are stored, as is a digital signature generated over the set of security claims by an entity. The security claims and digital signature are subsequently accessed when a computing device is to transfer data to and/or from the communication channel. The set of security claims is compared to a security policy of the computing device, and the entity that digitally signed the set of security claims is identified. One or more security precautions that the computing device is to use in transferring data to and/or from the communication channel are determined based at least in part on the comparing and the entity that has digitally signed the set of security claims. | 01-27-2011 |
20110252242 | MULTI-PHASE STORAGE VOLUME TRANSFORMATION - In accordance with one or more aspects, a storage volume is transformed into an encrypted storage volume or an unencrypted storage volume using a multi-phase process. One or more parts of the storage volume that have not yet been transformed are identified, and one or more parts of the storage volume that are allocated for use are identified. In a first phase of the multi-phase process, one or more parts of the storage volume that have not yet been transformed and that are allocated for use are transformed. In a second phase of the multi-phase process, after the first phase is finished, one or more parts of the storage volume that have not yet been transformed and are not allocated for use are transformed. | 10-13-2011 |
20130007463 | COMMUNICATION CHANNEL ACCESS BASED ON CHANNEL IDENTIFIER AND USE POLICY - A communication channel has an associated channel authenticator that includes a channel identifier, a use policy identifying how an owner of the communication channel indicates the communication channel is used, and a digital signature over the channel identifier and use policy. The identifier of the communication channel and the use policy can be verified by a computing device, and a check made as to whether a current security policy of the computing device is satisfied by the use policy. An access that the computing device is allowed to have to the communication channel is determined based at least in part on both whether the current security policy is satisfied by the use policy and whether the identifier of the communication channel and the use policy are verified. | 01-03-2013 |
20130054977 | ENCRYPTED CHUNK-BASED RAPID DATA ENCRYPTION POLICY COMPLIANCE - To comply with a policy for a computing device indicating that data written by the computing device to the storage volume after activation of the policy be encrypted, an encrypted chunks map is accessed. The encrypted chunks map identifies whether, for each chunk of sectors of a storage volume, the sectors in the chunk are unencrypted. In response to a request to write content to a sector, the encrypted chunks map is checked to determine whether a chunk that includes the sector is unencrypted. If the chunk that includes the sector is unencrypted, then the sectors in the chunk are encrypted, and the content is encrypted and written to the sector. If the chunk that includes the sector is encrypted or not in use, then the content is encrypted and written to the sector. | 02-28-2013 |
20130054979 | SECTOR MAP-BASED RAPID DATA ENCRYPTION POLICY COMPLIANCE - To comply with a policy for a computing device indicating that data written by the computing device to the storage volume after activation of the policy be encrypted, a sector map is accessed. The sector map identifies one or more sectors of a storage volume and also identifies, for each of the one or more sectors of the storage volume, a signature of the content of the sector. In response to a request to read the content of a sector, the content of the sector is returned without decrypting the content if the sector is one of the one or more sectors and the signature of the content of the sector matches the signature of the sector identified in the sector map. Otherwise, the content of the sector is decrypted and the decrypted content is returned. | 02-28-2013 |
20150033039 | SECTOR MAP-BASED RAPID DATA ENCRYPTION POLICY COMPLIANCE - To comply with a policy for a computing device indicating that data written by the computing device to the storage volume after activation of the policy be encrypted, a sector map is accessed. The sector map identifies one or more sectors of a storage volume and also identifies, for each of the one or more sectors of the storage volume, a signature of the content of the sector. In response to a request to read the content of a sector, the content of the sector is returned without decrypting the content if the sector is one of the one or more sectors and the signature of the content of the sector matches the signature of the sector identified in the sector map. Otherwise, the content of the sector is decrypted and the decrypted content is returned. | 01-29-2015 |
20150161155 | ACCESSING DATA IN A COMPRESSED CONTAINER THROUGH DYNAMIC REDIRECTION - Embodiments of the disclosure provide access to data in a compressed container through dynamic redirection, without storing decompressed data in persistent memory. The compressed container is stored in a first portion of memory. User data and reference files, with redirect pointers, for accessing corresponding files in the compressed container are stored in a second portion of memory. A command to access data is detected by a computing device. The redirect pointer in the reference file associated with the command redirects access to the corresponding compressed version of data stored in the compressed container. The corresponding accessed compressed version of data is decompressed on the fly and provided in response to the command without storing the decompressed data in persistent memory. Some embodiments provide integrity protection to validate the data coming from the compressed container. | 06-11-2015 |
20150270956 | Rapid Data Protection for Storage Devices - A computing device uses a data encryption and decryption system that includes a trusted runtime and an inline cryptographic processor. The trusted runtime provides a trusted execution environment, and the inline cryptographic processor provides decryption and encryption of data in-line with storage device read and write operations. When a portion (e.g., partition) of a storage device is defined, the trusted runtime generates an encryption key and provides the encryption key to the inline cryptographic processor, which uses the encryption key to encrypt data written to the portion and decrypt data read from the portion. Access to the portion can be subsequently protected by associating the key with authentication credentials of a user or other entity. The trusted runtime protects the encryption key based on an authentication key associated with the authentication credentials, allowing subsequent access to the encryption key only in response to the proper authentication credentials being provided. | 09-24-2015 |
20160072796 | Preserving Data Protection With Policy - Data files are encrypted based on a key associated with an entity that sets a data protection policy controlling access to the data files. The data protection policy identifies various restrictions on how the plaintext data of the encrypted data in the data files can be used. The data files have corresponding metadata identifying the entity that sets the data protection policy, and processes that are running instances of applications that are allowed to access the plaintext data are also associated with the identifier of the entity. These identifiers of the entity, as well as the data protection policy, are used by an operating system of a computing device to protect the data in accordance with the data protection policy, including having the protection be transferred to other devices with the protected data, or preventing the protected data from being transferred to other devices. | 03-10-2016 |