Patent application number | Description | Published |
20120180071 | COMPUTER ARCHITECTURE AND PROCESS FOR APPLICATION PROCESSING ENGINE - An application processing engine computer system is configured to process an application for at least one of a product and service using a plurality of coordinated, configurable services. The application processing engine includes an application data management service, an application process flow management service, a decisioning service, an application processing host service, an application activity monitoring service, a queue management service and/or a system maintenance service. Various embodiments are described, including a computer implemented method for processing an application using an application processing engine component and/or module. | 07-12-2012 |
20140149283 | ACCOUNT OPENING COMPUTER SYSTEM ARCHITECTURE AND PROCESS FOR IMPLEMENTING SAME - The present invention provides, in alternative embodiments, a computer architecture and/or computer implemented methods for account opening. In some embodiments, an integrated, component-based technology platform, globally standardized, business configurable account opening processes are separate and decoupled from the user interface screens and are directly manageable by business functionality and/or personnel. In various embodiments, the invention provides pause and resume, save and retrieve, cross-channel, metrics, audit tracking, data logging, and/or straight-through processing capabilities for account opening. | 05-29-2014 |
Patent application number | Description | Published |
20090205527 | RING BOOSTER FOR FUZE - A fuze and a fuzing method comprising initiating detonation of a first booster comprising a circular shaped charge and thereby causing detonation of a second booster. | 08-20-2009 |
20100024676 | Structural metallic binders for reactive fragmentation weapons - A munition is described including a reactive fragment having an energetic material dispersed in a metallic binder material. A method is also described including forming a energetic material; combining the energetic material with a metallic binder material to form a mixture; and shaping the mixture to form a reactive fragment. The munition may be in the form of a warhead, and the reactive fragment may be contained within a casing of the warhead. | 02-04-2010 |
20100269723 | Metal binders for thermobaric weapons - A munition includes a penetrator casing; and a payload, the payload composed of an explosive material dispersed in a metallic binder material. Related methods are also described. A method is also provided that includes forming an energetic material, combining the energetic material with a metallic binder material to form a mixture, and shaping the mixture to form a composite structural munition component. | 10-28-2010 |
20110132222 | ENHANCED BLAST EXPLOSIVE - A thermobaric munition including a composite explosive material, the composite explosive material having a high-explosive composition, and a detonable energetic material dispersed within the high-explosive composition, the detonable energetic material in the form of a thin film, the thin film having at least one layer composed at least in part by a reducing metal and at least one layer composed at least in part by a metal oxide. A related method includes tailoring the blast characteristics of high explosive composition to match a predetermined time-pressure impulse, the method including disbursing a detonable energetic material having a preselected reaction rate within the high-explosive composition, the detonable energetic material in the form of a thin film, the thin film having at least one layer composed at least in part by a reducing metal and at least one layer composed at least in part by a metal oxide | 06-09-2011 |
20110168308 | ENHANCED BLAST EXPLOSIVE - A thermobaric munition including a composite explosive material, the composite explosive material having a high-explosive composition, and a detonable energetic material dispersed within the high-explosive composition, the detonable energetic material in the form of a thin film, the thin film having at least one layer composed at least in part by a reducing metal and at least one layer composed at least in part by a metal oxide. A related method includes tailoring the blast characteristics of high explosive composition to match a predetermined time-pressure impulse, the method including disbursing a detonable energetic material having a preselected reaction rate within the high-explosive composition, the detonable energetic material in the form of a thin film, the thin film having at least one layer composed at least in part by a reducing metal and at least one layer composed at least in part by a metal oxide | 07-14-2011 |
20120255457 | STRUCTURAL METALLIC BINDERS FOR REACTIVE FRAGMENTATION WEAPONS - A munition is described including a reactive fragment having an energetic material dispersed in a metallic binder material. A method is also described including forming a energetic material; combining the energetic material with a metallic binder material to form a mixture; and shaping the mixture to form a reactive fragment. The munition may be in the form of a warhead, and the reactive fragment may be contained within a casing of the warhead. | 10-11-2012 |
Patent application number | Description | Published |
20090282460 | System and Method for Transferring Information Through a Trusted Network - A networking method includes receiving a first data packet from a computing node at a middleware process of a first computing system, adding, by the middleware process, a Common Internet Protocol Security Option (CIPSO) label to the data packet to form a modified packet, and transmitting, by a separation kernel, the modified packet to a second computing system. The first computing system includes an embedded operating system, and the computing node is coupled to the first computing system. The second computing system includes a CIPSO compliant operating system. | 11-12-2009 |
20090319529 | Information Rights Management - In certain embodiments, a method for providing information rights management (IRM) includes receiving, from a user having an associated security access profile, a request to access an object. The object has a corresponding IRM wrapper stored with the object both when the object is stored in a document management system (DMS) database and external to the DMS database, the IRM wrapper including an IRM profile and one or more IRM permission sets. The object also has encrypted data. The method further includes determining whether the user is authorized to access the object based on a comparison of the security access profile of the user and the IRM profile of the IRM wrapper corresponding to the object and communicating to the user, in response to a determination that the user is authorized to access the object, a decryption key associated with object. | 12-24-2009 |
20090320115 | Secure Network Portal - According to one embodiment, a secure network portal includes a number of application servers coupled to one or more clients through a portal server. The application servers serve a number of secure services that may be consumed by clients. The portal server creates a login session with a graphical user interface in which the login session is associated with a particular authorization level. The portal server then displays a service access point for each of the plurality of secure services and restricts access to each of the secure services according to the authorization level of the login session. | 12-24-2009 |
20100146593 | Secure Document Management - A method for providing secure document management includes receiving a document from a user having an associated security access profile and generating a security label to be stored as an attribute of the document. The security label includes a clearance component selected from an authorized subset of clearance components that are determined based on the security access profile associated with the user, and also includes one or more secondary security components selected from an authorized subset of secondary security components that are determined based on the clearance component of the security label and the security access profile associated with the user. The method includes storing the document in a document repository storing a plurality of documents each having an associated security label, and determining whether a third-party user is authorized to access the document based on a comparison of a security access profile of the third-party user and the security label associated with the document. | 06-10-2010 |
20100287182 | Method and System for Adjudicating Text Against a Defined Policy - A computerized method of adjudicating text against a policy includes receiving one or more system policies, creating a system datastructure for each received system policy, receiving an input message comprising a text to be adjudicated, selecting a system policy from the one or more received system policies based on the input message, and processing the text to be adjudicated and the system datastructure corresponding to the selected system policy to determine if a prohibited word is present in the text to be adjudicated. The one or more system policies include one or more prohibited words and a first hit value corresponding to each prohibited word. The system datastructure includes a plurality of linked lists corresponding the letters of the alphabet and a head linked list operable to store one or more found prohibited words. | 11-11-2010 |
20100306534 | ENABLING MULTI-LEVEL SECURITY IN A SINGLE-LEVEL SECURITY COMPUTING SYSTEM - According to an embodiment, a system may comprise a mass storage device that is operable to be coupled to one or more processors. The mass storage device may comprise a base operating system that is operable to be executed by the one or more processors. The base operating system may be operable to implement a single security level. The mass storage device may also comprise a virtual operating system that is operable to be executed by the one or more processors. The virtual operating system may be executed using a virtualization tool that is executed by the base operating system. The virtual operating system may be operable to process information according to a plurality of security levels and communicate the information to one or more computing systems. The information may be communicated according to the plurality of security levels of the information. | 12-02-2010 |
20100333193 | System and Method for Protecting Data with Multiple Independent Levels of Security - A data security system includes a single central processing unit (CPU), a plurality of different security zones corresponding to different levels of security classification, a plurality of operating systems, a communications interface, a global zone, and a memory coupled to the plurality of security zones and the global zone. The CPU includes a plurality of processing cores and each security zone is associated with a different one of the processing cores. The global zone is communicatively coupled to the communications interface and the plurality of security zones, and is associated with a different one of the processing cores than the plurality of security zones. The global zone directs communications between the communications interface and the plurality of security zones. Each processing core executes a separate one of the plurality of operating systems, thereby providing separate processing capability on the single CPU for each of the different levels of security classification. | 12-30-2010 |