Patent application number | Description | Published |
20130055795 | FRACTIONATION OF DE-ASPHALTED OIL OF VACUUM RESID USING PREPARATIVE HIGH PERFORMANCE LIQUID CHROMATOGRAPHIC SEPARATIONS - Two quantitative separation approaches to fractionate de-asphalted oils (DAOs) into seven classes of compounds (saturates, 1-4 | 03-07-2013 |
20140131257 | PREPARATORY HIGH PERFORMANCE LIQUID CHROMATOGRAPHIC (HPLC) SEPARATION TECHNIQUE FOR QUANTITATIVE FRACTIONATION OF HEAVY PETROLEUM STREAMS - A method and system for performing quantitative fractionation of a hydrocarbon sample is disclosed. The method includes introducing the hydrocarbon sample in a separation system having a first separation column and a second separation column. Separate fraction removal steps are performed for the elution of saturates, aromatic ring classes, sulfides, and polars fractions. The method allows to collect the separated fractions and obtain the material balance information of the hydrocarbon sample. The method further includes performing an analysis on the at least one aromatic ring class fraction to identify and quantify an olefins fraction in the hydrocarbon sample. | 05-15-2014 |
20140166542 | PREPARATORY HIGH PERFORMANCE LIQUID CHROMATOGRAPHIC (HPLC) SEPARATION SYSTEM AND TECHNIQUE FOR QUANTITATIVE FRACTIONATION OF TOTAL VACUUM RESID - A method and system for conducting chromatographic analysis of a total vacuum resid to provide quantification of eight classes of compounds (i.e., asphaltenes, saturates, 1-4+ ring aromatics, sulfides, and polars) contained within the total vacuum resid without prior de-asphalting are disclosed. The system is also capable of conducting chromatographic analysis of a vacuum gas oils and de-asphalted oils to provide quantification of seven classes of compounds (i.e., saturates, 1-4+ ring aromatics, sulfides, and polars). The system is also capable of conducting chromatographic analysis of a resid to identity the presence of and provide quantification of asphaltenes. | 06-19-2014 |
Patent application number | Description | Published |
20090174575 | MULTILANE VEHICLE INFORMATION CAPTURE SYSTEM - A system and method for accurate express tolling of highway vehicles. A multilane tolling system comprises a tolling (MVIC) unit that collects information from tolling subsystems arranged to take various vehicle measurements. Preferably, an intelligent vehicle identification subsystem sends vehicle information to the MVIC unit many times per second. Preferably, a vision tracking system (VTS) communicates with the MVIC unit and sends the latter information about the vehicle position using vision tracking sensors. Preferably, an RF subsystem conducts multiple reads of a transponder on a passing vehicle and forwards the read information to the MVIC unit. Preferably, a vehicle image capture unit (VICU) captures images of the passing vehicle when a camera in the VICU receives a trigger from the MVIC unit. Preferably, a driver alert module is used alert a driver passing through a tolling point as to account balance associated with a silent toll tag or pay by plate system. | 07-09-2009 |
20090174576 | MULTILANE VEHICLE INFORMATION CAPTURE SYSTEM - A system and method for accurate express tolling of highway vehicles. A multilane tolling system comprises a tolling (MVIC) unit that collects information from tolling subsystems arranged to take various vehicle measurements. Preferably, an intelligent vehicle identification subsystem sends vehicle information to the MVIC unit many times per second. Preferably, a vision tracking system (VTS) communicates with the MVIC unit and sends the latter information about the vehicle position using vision tracking sensors. Preferably, an RF subsystem conducts multiple reads of a transponder on a passing vehicle and forwards the read information to the MVIC unit. Preferably, a vehicle image capture unit (VICU) captures images of the passing vehicle when a camera in the VICU receives a trigger from the MVIC unit. Preferably, a driver alert module is used alert a driver passing through a tolling point as to account balance associated with a silent toll tag or pay by plate system. | 07-09-2009 |
20090174778 | MULTILANE VEHICLE INFORMATION CAPTURE SYSTEM - A system and method for accurate express tolling of highway vehicles. A multilane tolling system comprises a tolling (MVIC) unit that collects information from tolling subsystems arranged to take various vehicle measurements. Preferably, an intelligent vehicle identification subsystem sends vehicle information to the MVIC unit many times per second. Preferably, a vision tracking system (VTS) communicates with the MVIC unit and sends the latter information about the vehicle position using vision tracking sensors. Preferably, an RF subsystem conducts multiple reads of a transponder on a passing vehicle and forwards the read information to the MVIC unit. Preferably, a vehicle image capture unit (VICU) captures images of the passing vehicle when a camera in the VICU receives a trigger from the MVIC unit. Preferably, a driver alert module is used alert a driver passing through a tolling point as to account balance associated with a silent toll tag or pay by plate system. | 07-09-2009 |
Patent application number | Description | Published |
20100082316 | Virtualized Policy Tester - Embodiments of the present invention are directed to testing policy changes associated with a production network. A virtual network that represents at least a portion of the production network can be generated. A first transaction log based on a first execution of the virtual network using test traffic and a first set of policies that are implemented in the production network can be obtained. A second transaction log based on a second execution of the virtual network using the test traffic and a second set of policies to be implemented in the production network can be obtained. Based on a comparison of the first and second transaction logs, it can be determined whether the second set of policies has a desired effect in the virtual network. | 04-01-2010 |
20100169474 | Methods, Devices and Computer Program Products for Regulating Network Activity Using a Subscriber Scoring System - Network activity in a network is regulated. Network activity scores that correspond to network usage patterns for respective network users are calculated. A network user is assigned into one of multiple risk classes responsive to a respective one of the network activity scores. A subsequent action is selected responsive to which of the risk classes the network user is assigned. | 07-01-2010 |
20110004919 | Method for Processing Emails in a Private Email Network - A postal inspector gatekeeper function is implemented in an electronic email communication system to process email. Various methods of processing email in a private email network approve or reject specific emails for delivery after determining whether the email sender and/or the intended email recipient are included in directories such as a member directory, enterprise member client directory, and a non-member whitelist. | 01-06-2011 |
20110107413 | METHODS, SYSTEMS, AND COMPUTER PROGRAM PRODUCTS FOR PROVIDING A VIRTUAL PRIVATE GATEWAY BETWEEN USER DEVICES AND VARIOUS NETWORKS - A communication network is operated by receiving traffic from a user device at a gateway device associated with a gateway service provider, which manages gateways to both secure and insecure networks. The gateway uses security policies to determine if traffic is destined to the secure or insecure network and applies appropriate policies which cause the traffic to be routed, dropped, or analyzed. | 05-05-2011 |
20120245917 | Virtualized Policy Tester - Embodiments of the present invention are directed to testing policy changes associated with a production network. A virtual network that represents at least a portion of the production network can be generated. A first transaction log based on a first execution of the virtual network using test traffic and a first set of policies that are implemented in the production network can be obtained. A second transaction log based on a second execution of the virtual network using the test traffic and a second set of policies to be implemented in the production network can be obtained. Based on a comparison of the first and second transaction logs, it can be determined whether the second set of policies has a desired effect in the virtual network. | 09-27-2012 |
20120324585 | Methods, Devices and Computer Program Products for Regulating Network Activity Using a Subscriber Scoring System - Network activity in a network is regulated. Network activity scores that correspond to network usage patterns for respective network users are calculated. A network user is assigned into one of multiple risk classes responsive to a respective one of the network activity scores. A subsequent action is selected responsive to which of the risk classes the network user is assigned. | 12-20-2012 |
20130054962 | POLICY CONFIGURATION FOR MOBILE DEVICE APPLICATIONS - Methods, articles of manufacture, and apparatus to perform policy configuration for mobile device applications are disclosed. A disclosed example method includes determining whether a digital certificate associated with a application executable on a mobile device has been signed by a first trusted certificate authority, the first trusted certificate authority being included in a list of trusted certificate authorities hard-coded in the mobile device, and when the digital certificate is determined to have been signed by the first trusted certificate authority, configuring the application for execution on the mobile device based on an access privilege indicating a physical interface of the mobile device the application is permitted to access, and execution configuration information associated with the application. | 02-28-2013 |
20130055347 | HARDWARE INTERFACE ACCESS CONTROL FOR MOBILE APPLICATIONS - Methods, articles of manufacture, and apparatus for hardware interface access control for mobile applications are disclosed. A disclosed example method includes restricting an application from accessing a set of hardware interfaces of a mobile device, and providing a virtual interface to the application via which the application is to access a first hardware interface in the set of hardware interfaces, the virtual interface provided by a program in a kernel layer of an operating system of the mobile device to control at least one of access or a method of access to the first hardware interface in the set of hardware interfaces, the first hardware interface that is accessible via the virtual interface being unknown to the application. | 02-28-2013 |
20130117561 | SECURE DESKTOP APPLICATIONS FOR AN OPEN COMPUTING PLATFORM - Example secure desktop applications for an open computing platform are disclosed. An example secure desktop method for a computing platform disclosed herein comprises establishing a secure communication connection between a secure desktop provided by the computing platform and a trusted entity, the secure communication connection being accessible to a trusted application authenticated with the secure desktop, the secure communication connection being inaccessible to an untrusted application not authenticated with the secure desktop, and securing data that is stored by the secure desktop in local storage associated with the computing platform, the stored data being accessible to the trusted application and inaccessible to the untrusted application. | 05-09-2013 |
20130117804 | BROWSER-BASED SECURE DESKTOP APPLICATIONS FOR OPEN COMPUTING PLATFORMS - Example browser-based secure desktop applications for open computing platforms are disclosed. An example method disclosed herein to provide secure desktop functionality to a computing platform comprises providing, in response to a first request, a secure desktop application to the computing platform, the secure desktop application for execution by a browser on the computing platform, and establishing a secure communication connection between a service node and the secure desktop application, the secure communication connection to provide the secure desktop application with access to a trusted entity, the secure communication connection being accessible to a trusted application downloaded to the computing platform for execution by the browser in association with the secure desktop application, the secure communication connection being inaccessible to an untrusted application not executed in association with the secure desktop application. | 05-09-2013 |
20150317489 | SECURE DESKTOP APPLICATIONS FOR AN OPEN COMPUTING PLATFORM - Example secure desktop applications for an open computing platform are disclosed. An example secure desktop method for a computing platform disclosed herein comprises establishing a secure communication connection between a secure desktop provided by the computing platform and a trusted entity, the secure communication connection being accessible to a trusted application authenticated with the secure desktop, the secure communication connection being inaccessible to an untrusted application not authenticated with the secure desktop, and securing data that is stored by the secure desktop in local storage associated with the computing platform, the stored data being accessible to the trusted application and inaccessible to the untrusted application. | 11-05-2015 |
Patent application number | Description | Published |
20110138467 | Method and System for Content Distribution Network Security - A content delivery system includes an upload module, a content delivery module, and a monitoring module. The upload module is configured to receive content from a content provider, detect content containing malicious software or proprietary information, and provide information about the content to a monitoring module. The content delivery module is configured to detect content containing malicious software or unauthorized changes, detect operational changes to the content delivery module, provide information about the content and the operational changes to the monitoring module, receive a request for the content from a client system, and provide the content to the client system. The monitoring module is configured to monitor a network for potentially malicious traffic, receive information from the content delivery module and the upload module, correlate the information and the potentially malicious traffic to identify a security event, and trigger a response to the security event. | 06-09-2011 |
20110289134 | End-To-End Secure Cloud Computing - A method includes receiving, at a control node of a cloud computing network, a first enterprise policy specific to the first enterprise and a second enterprise policy specific to the second enterprise, and managing communications between at least one user device of the first enterprise and the at least one enterprise application hosted on behalf of the first enterprise based on the first enterprise policy. The method also includes managing communications between at least one user device of the second enterprise and the at least one enterprise application hosted on behalf of the second enterprise based on the second enterprise policy. | 11-24-2011 |
20120147824 | METHODS AND APPARATUS TO CONFIGURE VIRTUAL PRIVATE MOBILE NETWORKS - Methods and apparatus to configure virtual private mobile networks are disclosed. A disclosed example method includes receiving a request at a wireless network provider from a client, the request instructing the wireless network provider to create the virtual private mobile network for the client, identifying available network elements within a wireless network of the wireless network provider based on the request from the client, configuring a portion of a control plane and a portion of a data plane of the identified network elements for the virtual private mobile network, and enabling user equipment associated with the client to wirelessly communicatively couple to the virtual private mobile network. | 06-14-2012 |
20120159578 | METHODS AND APPARATUS TO CONTROL PRIVILEGES OF MOBILE DEVICE APPLICATIONS - Methods and apparatus to control privileges of mobile device applications are disclosed. A disclosed example method includes assigning a process identifier to an application on a mobile device, the process identifier generated by an operating system of the mobile device, determining via a digital certificate that the application is authorized to be executed on the mobile device and that the application is authorized to access a network interface of the mobile device, configuring a mandatory access control module of the mobile device to enforce access of the network interface by providing the process identifier to the mandatory access control module, and enabling the application to access the network interface. | 06-21-2012 |
20130205392 | METHOD AND SYSTEM FOR CONTENT DISTRIBUTION NETWORK SECURITY - A content delivery system includes an upload module, a content delivery module, and a monitoring module. The upload module is configured to receive content from a content provider, detect content containing malicious software or proprietary information, and provide information about the content to a monitoring module. The content delivery module is configured to detect content containing malicious software or unauthorized changes, detect operational changes to the content delivery module, provide information about the content and the operational changes to the monitoring module, receive a request for the content from a client system, and provide the content to the client system. The monitoring module is configured to monitor a network for potentially malicious traffic, receive information from the content delivery module and the upload module, correlate the information and the potentially malicious traffic to identify a security event, and trigger a response to the security event. | 08-08-2013 |
Patent application number | Description | Published |
20140162474 | CHIP SOCKET INCLUDING A CIRCULAR CONTACT PATTERN - An apparatus for coupling an integrated circuit to other electronics can include a housing having an exterior and an interior, the exterior having an exterior bottom surface, the interior defined by an interior bottom surface opposite the exterior bottom surface, and at least one sidewall extending away from the interior bottom surface to define an interior shape that is sized to receive the integrated circuit, with the integrated circuit disposed against the interior bottom surface and the at least one sidewall. The example can include a plurality of exterior contacts exposed along the exterior bottom surface in an exterior contact pattern that is generally circular in shape. | 06-12-2014 |
20140162475 | CONNECTOR ASSEMBLY AND METHOD - Connectors and methods to couple packages and dies are shown. Selected examples include plugs and receptacles having two or more terraces with contacts provided along the terraces. Examples of connectors and methods include configurations where the connector is usable with a package including a die coupled along a substrate. In selected examples a heat sink is coupled over the die, and a package includes a side access port between the heat sink and the substrate configured to receive the connector, such as one or more of a plug or receptacle through the side access port. | 06-12-2014 |
20140273555 | CONNECTOR ASSEMBLY WITH INTEGRATED PITCH TRANSLATION - This disclosure relates generally to a connector assembly. Optionally, first conductive members form a first row. Second conductive members include a first subset forming a second row and a second subset forming a third row, the second and third rows being parallel and offset with respect to one another. Individual ones of the first and second conductive members are arranged to be coupled at a first end to a corresponding contact. At least one of the first and second subsets has a vertical displacement to form a common row of the second conductive members at a second end of the second conductive members. Individual ones of the first conductive members are arranged to be coupled proximate a second end of the first conductive members to the second end of a corresponding one of the second conductive members. | 09-18-2014 |
20140273662 | CONNECTOR ASSEMBLY AND METHODS WITH INTEGRATED PITCH TRANSLATION - This disclosure relates generally to a connector assembly. In various examples, first conductive members are secured with respect to one another and form a first row and second conductive members are secured with respect to one another, a first subset of the second conductive members forming a second row and a second subset of the second conductive members forming a third row, the second and third rows being parallel and stacked with respect to one another and the second and third rows being orthogonal to the first row. Individual ones of the first and second conductive members are arranged to be coupled at a first end to a corresponding one of contacts. Ones of the first conductive members are arranged to be coupled to a corresponding individual one of the second conductive members proximate a second end of each of the first and second conductive members. | 09-18-2014 |
20150118870 | INTEGRATED CIRCUIT CONNECTORS - Embodiments related to integrated circuit (IC) connectors are described. In some embodiments, an IC assembly may include an IC package substrate, an intermediate member, and a male connector. The IC package substrate may have first signal contacts on a top or bottom surface, and the bottom surface may have second signal contacts for coupling with a socket on a circuit board. The intermediate member may have a first end coupled to the first signal contacts and a second end extending beyond the side surface. The male connector may be disposed at the second end of the intermediate member, and may have signal contacts coupled to the signal contacts of the intermediate member. The male connector may be mateable with a female connector when the female connector is brought into engagement in a direction parallel to the axis of the intermediate member. Other embodiments may be disclosed and/or claimed. | 04-30-2015 |
20150162719 | CHIP SOCKET INCLUDING A CIRCULAR CONTACT PATTERN - An apparatus for coupling an integrated circuit to other electronics can include a housing having an exterior and an interior, the exterior having an exterior bottom surface, the interior defined by an interior bottom surface opposite the exterior bottom surface, and at least one sidewall extending away from the interior bottom surface to define an interior shape that is sized to receive the integrated circuit, with the integrated circuit disposed against the interior bottom surface and the at least one sidewall. The example can include a plurality of exterior contacts exposed along the exterior bottom surface in an exterior contact pattern that is generally circular in shape. | 06-11-2015 |
20150249298 | CONNECTOR ASSEMBLY AND METHOD - Connectors and methods to couple packages and dies are shown. Selected examples include plugs and receptacles having two or more terraces with contacts provided along the terraces. Examples of connectors and methods include configurations where the connector is usable with a package including a die coupled along a substrate. In selected examples a heat sink is coupled over the die, and a package includes a side access port between the heat sink and the substrate configured to receive the connector, such as one or more of a plug or receptacle through the side access port. | 09-03-2015 |
20150280337 | ELECTRONIC ASSEMBLIES WITH SCALABLE CLIP-TYPE CONNECTORS - A clip-type connector for electrically coupling a substrate with a device or another substrate is disclosed. An electrical connector comprises a top plate and a bottom plate. An array of contacts are on at least one of the top plate and bottom plate. A hinge is located between the top plate and the bottom plate such that the hinge mechanically connects the top plate to the bottom plate. A spring applying a force against the top and bottom plates. | 10-01-2015 |
Patent application number | Description | Published |
20150179513 | DIAGONAL HARDMASKS FOR IMPROVED OVERLAY IN FABRICATING BACK END OF LINE (BEOL) INTERCONNECTS - Self-aligned via and plug patterning using diagonal hardmasks for improved overlay in fabricating back end of line (BEOL) interconnects is described. In an example, a method of fabricating an interconnect structure for an integrated circuit involves forming a first hardmask layer above an interlayer dielectric layer disposed above a substrate. The first hardmask layer includes a plurality of first hardmask lines having a first grating in a first direction and comprising one or more sacrificial materials interleaved with the first grating. The method also involves forming a second hardmask layer above the first hardmask layer. The second hardmask layer includes a plurality of second hardmask lines having a second grating in a second direction, diagonal to the first direction. The method also involves, using the second hardmask layer as a mask, etching the first hardmask layer to form a patterned first hardmask layer. The etching involves removing a portion of the one or more sacrificial materials. | 06-25-2015 |
20150179515 | METHOD OF FORMING HIGH DENSITY, HIGH SHORTING MARGIN, AND LOW CAPACITANCE INTERCONNECTS BY ALTERNATING RECESSED TRENCHES - Embodiments of the invention describe low capacitance interconnect structures for semiconductor devices and methods for manufacturing such devices. According to an embodiment of the invention, a low capacitance interconnect structure comprises an interlayer dielectric (ILD). First and second interconnect lines are disposed in the ILD in an alternating pattern. The top surfaces of the first interconnect lines may be recessed below the top surfaces of the second interconnect lines. Increases in the recess of the first interconnect lines decreases the line-to-line capacitance between neighboring interconnects. Further embodiments include utilizing different dielectric materials as etching caps above the first and second interconnect lines. The different materials may have a high selectivity over each other during an etching process. Accordingly, the alignment budget for contacts to individual interconnect lines is increased. | 06-25-2015 |
20150214094 | METHODS FOR FORMING INTERCONNECT LAYERS HAVING TIGHT PITCH INTERCONNECT STRUCTURES - Processes for forming interconnection layers having tight pitch interconnect structures within a dielectric layer, wherein trenches and vias used to formed interconnect structures have relatively low aspect ratios prior to metallization. The low aspect ratios may reduce or substantially eliminated the potential of voids forming within the metallization material when it is deposited. Embodiments herein may achieve such relatively low aspect ratios through processes that allows for the removal of structures, which are utilized to form the trenches and the vias, prior to metallization. | 07-30-2015 |
20150243599 | METHOD OF FORMING HIGH DENSITY, HIGH SHORTING MARGIN, AND LOW CAPACITANCE INTERCONNECTS BY ALTERNATING RECESSED TRENCHES - Embodiments of the invention describe low capacitance interconnect structures for semiconductor devices and methods for manufacturing such devices. According to an embodiment of the invention, a low capacitance interconnect structure comprises an interlayer dielectric (ILD). First and second interconnect lines are disposed in the ILD in an alternating pattern. The top surfaces of the first interconnect lines may be recessed below the top surfaces of the second interconnect lines. Increases in the recess of the first interconnect lines decreases the line-to-line capacitance between neighboring interconnects. Further embodiments include utilizing different dielectric materials as etching caps above the first and second interconnect lines. The different materials may have a high selectivity over each other during an etching process. Accordingly, the alignment budget for contacts to individual interconnect lines is increased. | 08-27-2015 |
Patent application number | Description | Published |
20110035312 | System and Method for Linking and Managing Linked Orders in an Electronic Trading Environment - A system and method for linking and managing linked orders are described. According to one method, a trader may first link two or more orders into a linked order, and then one or more parameters associated with one of the orders may be dynamically changed based on user inputs or information being received from an exchange. For example, a trader may link any two orders as an order cancel order, and each linked order may be associated with the same or different tradable objects, order quantities, and may be submitted to one or more exchanges. The order quantities may be then dynamically updated based on updates being received from the one or more exchanges and further based on a quantity ratio between the two orders. Further, the linked order may be submitted upon detecting a fill for another order. | 02-10-2011 |
20110040675 | System and Method for Linking and Managing Linked Orders in an Electronic Trading Environment - A system and method for linking and managing linked orders are described. According to one method, a trader may first link two or more orders into a linked order, and then one or more parameters associated with one of the orders may be dynamically changed based on user inputs or information being received from an exchange. For example, a trader may link any two orders as an order cancel order, and each linked order may be associated with the same or different tradable objects, order quantities, and may be submitted to one or more exchanges. The order quantities may be then dynamically updated based on updates being received from the one or more exchanges and further based on a quantity ratio between the two orders. Further, the linked order may be submitted upon detecting a fill for another order. | 02-17-2011 |
20110047067 | System and Method for Linking and Managing Linked Orders in an Electronic Trading Environment - A system and method for linking and managing linked orders are described. According to one method, a trader may first link two or more orders into a linked order, and then one or more parameters associated with one of the orders may be dynamically changed based on user inputs or information being received from an exchange. For example, a trader may link any two orders as an order cancel order, and each linked order may be associated with the same or different tradable objects, order quantities, and may be submitted to one or more exchanges. The order quantities may be then dynamically updated based on updates being received from the one or more exchanges and further based on a quantity ratio between the two orders. Further, the linked order may be submitted upon detecting a fill for another order. | 02-24-2011 |
20140156494 | SYSTEM AND METHOD FOR LINKING AND MANAGING LINKED ORDERS IN AN ELECTRONIC TRADING ENVIRONMENT - A system and method for linking and managing linked orders are described. According to one method, a trader may first link two or more orders into a linked order, and then one or more parameters associated with one of the orders may be dynamically changed based on user inputs or information being received from an exchange. For example, a trader may link any two orders as an order cancel order, and each linked order may be associated with the same or different tradable objects, order quantities, and may be submitted to one or more exchanges. The order quantities may be then dynamically updated based on updates being received from the one or more exchanges and further based on a quantity ratio between the two orders. Further, the linked order may be submitted upon detecting a fill for another order. | 06-05-2014 |
20140164212 | SYSTEM AND METHOD FOR LINKING AND MANAGING LINKED ORDERS IN AN ELECTRONIC TRADING ENVIRONMENT - A system and method for linking and managing linked orders are described. According to one method, a trader may first link two or more orders into a linked order, and then one or more parameters associated with one of the orders may be dynamically changed based on user inputs or information being received from an exchange. For example, a trader may link any two orders as an order cancel order, and each linked order may be associated with the same or different tradable objects, order quantities, and may be submitted to one or more exchanges. The order quantities may be then dynamically updated based on updates being received from the one or more exchanges and further based on a quantity ratio between the two orders. Further, the linked order may be submitted upon detecting a fill for another order. | 06-12-2014 |
Patent application number | Description | Published |
20100000397 | High Density Perforating Gun System Producing Reduced Debris - A perforating system has a perforating module comprising a unitary body of explosive. The explosive is contained within a non-explosive casing, or liner, having formed indentations and a cover thereover. The indentations, which will transform into explosively formed penetrators (EFP's) upon detonation, have a perimeter shape that allows for improved packing density, e.g., a hexagonal perimeter, which results in relatively little “dead space” wherein no perforating penetrators are generated. In operation, the module provides a relatively dense shot pattern and substantially reduced amount of post-detonation debris that could clog the perforations and/or require remedial clean-up or repeat perforation. | 01-07-2010 |
20140083283 | High Density Perforating Gun System Producing Reduced Debris - A perforating system has a perforating module comprising a unitary body of explosive. The explosive is contained within a non-explosive casing, or liner, having formed indentations and a cover thereover. The indentations, which will transform into explosively formed penetrators (EFP's) upon detonation, have a perimeter shape that allows for improved packing density, e.g., a hexagonal perimeter, which results in relatively little “dead space” wherein no perforating penetrators are generated. In operation, the module provides a relatively dense shot pattern and substantially reduced amount of post-detonation debris that could clog the perforations and/or require remedial clean-up or repeat perforation. | 03-27-2014 |
Patent application number | Description | Published |
20080230424 | System for communicating benefits of a product and/or product array - Systems for communicating benefits of a product and/or a product array to consumers comprise product(s) having a number of claimed benefits releasably contained in a package(s). At least a portion of the package is shaped like the integer representing the number of claimed benefits and the package has at least one label comprising indicia of the number of claimed benefits. | 09-25-2008 |
20110162151 | Detergent Dispensing and Pre-Treatment Cap - A detergent dispensing cap for pre-treating a stained fabric. The cap can have a pour volume sized and dimensioned to provide for a unit dose of the detergent composition. A portion of the cap can be provided with surface irregularities for scrubbing a stain. | 07-07-2011 |
20110179585 | Detergent Dispensing and Pre-Treatment Cap - A detergent dispensing cap for pre-treating a stained fabric. The cap can have a pour volume sized and dimensioned to provide for a unit dose of the detergent composition. A portion of the cap can be provided with surface irregularities for scrubbing a stain. | 07-28-2011 |
20110179586 | Detergent Dispensing and Pre-Treatment Cap - A detergent dispensing cap for pre-treating a stained fabric. The cap can have a pour volume sized and dimensioned to provide for a unit dose of the detergent composition. A portion of the cap can be provided with surface irregularities for scrubbing a stain. | 07-28-2011 |
20110179587 | Detergent Dispensing and Pre-Treatment Cap - A detergent dispensing cap for pre-treating a stained fabric. The cap can have a pour volume sized and dimensioned to provide for a unit dose of the detergent composition. A portion of the cap can be provided with surface irregularities for scrubbing a stain. | 07-28-2011 |
20110311296 | Detergent Dispensing and Pre-Treatment Cap - A detergent dispensing cap for pre-treating a stained fabric. The cap can have a pour volume sized and dimensioned to provide for a unit dose of the detergent composition. A portion of the cap can be provided with surface irregularities for scrubbing a stain. | 12-22-2011 |
20120324653 | PRODUCT FOR PRE-TREATMENT AND LAUNDERING OF STAINED FABRIC - A product for pre-treatment and laundering of fabric having a stained portion. The product comprising a pourable aqueous detergent composition and a dispensing cap. The cap can have a pour volume sized and dimensioned to provide for a unit dose of the detergent composition. A portion of the cap can be provided with surface irregularities for scrubbing a stain. | 12-27-2012 |
20120324655 | PRODUCT FOR PRE-TREATMENT AND LAUNDERING OF STAINED FABRIC - A product for pre-treatment and laundering of fabric having a stained portion. The product comprising a pourable aqueous detergent composition and a dispensing cap. The cap can have a pour volume sized and dimensioned to provide for a unit dose of the detergent composition. A portion of the cap can be provided with surface irregularities for scrubbing a stain. | 12-27-2012 |
20140059784 | DETERGENT DISPENSING AND PRE-TREATMENT CAP - A detergent dispensing cap for pre-treating a stained fabric. The cap can have a pour volume sized and dimensioned to provide for a unit dose of the detergent composition. A portion of the cap can be provided with surface irregularities for scrubbing a stain. | 03-06-2014 |
20150308037 | PRODUCT FOR PRE-TREATMENT AND LAUNDERING OF STAINED FABRIC - A product for pre-treatment and laundering of fabric having a stained portion. The product comprising a pourable aqueous detergent composition and a dispensing cap. The cap can have a pour volume sized and dimensioned to provide for a unit dose of the detergent composition. A portion of the cap can be provided with surface irregularities for scrubbing a stain. | 10-29-2015 |
Patent application number | Description | Published |
20110113100 | SYSTEM FOR SHARING FAVORITES AND ENABLING IN-NETWORK LOCAL SEARCH BASED ON NETWORK RANKINGS - A system for sharing user's favorite locations within their social network, based on the locations added on their mobile device is presented. Additionally, a system and method for optimizing local search based on users' favorite locations and aggregate statistics of users for determining network ranking is presented. Users can perform an “in-network” search to determine recommended locations within their social network, and also share preferences for planning meeting locations. | 05-12-2011 |
20110159884 | REAL-TIME LOCATION AND PRESENCE USING A PUSH-LOCATION CLIENT AND SERVER - A system for providing real-time always-on location is presented for maintaining the current location of a mobile device, while saving the battery by managing the GPS in a power-saving mode while the device is considered to be stationary. The system also provides a real-time location in an indoor environment where a GPS signal may not be available. Additionally, methods for driving detection are also presented. | 06-30-2011 |
20110183645 | RICH PRESENCE STATUS BASED ON LOCATION, ACTIVITY, AVAILABILITY AND TRANSIT STATUS OF A USER - A method and system for determining and sharing rich presence status of a user is presented. Multiple types of presence status options are associated with user's status based on location, activity, availability, transit status, and user's text updates, which the user can selectively share on their mobile device with different groups of users, and make one or more aspects of their presence status broadly available to everyone. Also a system to determine status based on auto-updates and manual updates is presented. | 07-28-2011 |
20120009900 | LOCATION BASED PRESENCE AND PRIVACY MANAGEMENT - A method and system for providing location based presence status and enhancing location privacy management in a mobile, instant messaging or social networking environment. A user specifies or saves their favorite locations (e.g. home, work, school, or particular business or point of interest locations), and specifies or selects names and/or categories to be shared for each user-specified location. In addition, the system provides multiple sharing levels for sharing multiple types of location contextual information. When user's current location corresponds to user-specified locations, location based presence status is provided to specified contacts according to the sharing level settings, and provides user the option to share location contextual information without sharing location coordinates of the user. When user is driving, location based presence status is updated accordingly, and when user is at other business or POI locations, corresponding location contextual information is shared based on user's settings for each sharing level. | 01-12-2012 |
20120245995 | METHOD AND SYSTEM FOR ENABLING LOCATION BASED ADVERTISEMENTS WITH PAY FOR PERFORMANCE - A system for offering mobile location based advertisements based on a pay for performance method is presented. The system serves and tracks advertisements and business locations searched and viewed by a user, and can determine if the user visited the business location and performed a transaction at the location in a specified timeframe of the advertisement. The advertising costs are determined based on cost per action models such as a cost per visit (CPV) or a cost per transaction (CPT). Additionally, a system to verify user visits, advertisement codes and transactions in a local business environment is presented, which can also be used for sending an electronic receipt of the transaction to the user's mobile device. | 09-27-2012 |
20130281168 | REAL-TIME LOCATION AND PRESENCE USING A PUSH-LOCATION CLIENT AND SERVER - A system for providing real-time always-on location is presented for maintaining the current location of a mobile device, while saving the battery by managing the GPS in a power-saving mode while the device is considered to be stationary. The system also provides a real-time location in an indoor environment where a GPS signal may not be available. Additionally, methods for driving detection are also presented. | 10-24-2013 |
20140047053 | RICH PRESENCE STATUS BASED ON LOCATION, ACTIVITY, AVAILABILITY AND TRANSIT STATUS OF A USER - A method and system for determining and sharing rich presence status of a user is presented. Multiple types of presence status options are associated with user's status based on location, activity, availability, transit status, and user's text updates, which the user can selectively share on their mobile device with different groups of users, and make one or more aspects of their presence status broadly available to everyone. Also a system to determine status based on auto-updates and manual updates is presented. | 02-13-2014 |
20150163749 | REAL-TIME LOCATION AND PRESENCE USING A PUSH-LOCATION CLIENT AND SERVER - A system for providing real-time always-on location is presented for maintaining the current location of a mobile device, while saving the battery by managing the GPS in a power-saving mode while the device is considered to be stationary. The system also provides a real-time location in an indoor environment where a GPS signal may not be available. Additionally, methods for driving detection are also presented. | 06-11-2015 |
Patent application number | Description | Published |
20150356144 | Cognitive Media Content - A method, system and computer-usable medium for providing composite cognitive insights comprising receiving streams of data from a plurality of data sources; processing the streams of data from the plurality of data sources, the processing the streams of data from the plurality of data sources performing data enriching and generating a sub-graph for incorporation into a cognitive graph; processing the cognitive graph, the processing the cognitive graph providing a plurality of individual cognitive insights; generating a composite cognitive insight, the composite cognitive insight being composed of the plurality of individual cognitive insights; and, providing the composite cognitive insight to a user via a set of cognitive media content. | 12-10-2015 |
20150356442 | Cognitive Media Content - A method, system and computer-usable medium for providing composite cognitive insights comprising receiving streams of data from a plurality of data sources; processing the streams of data from the plurality of data sources, the processing the streams of data from the plurality of data sources performing data enriching and generating a sub-graph for incorporation into a cognitive graph; processing the cognitive graph, the processing the cognitive graph providing a plurality of individual cognitive insights; generating a composite cognitive insight, the composite cognitive insight being composed of the plurality of individual cognitive insights; and, providing the composite cognitive insight to a user via a set of cognitive media content. | 12-10-2015 |
20150356443 | Cognitive Media Commerce - A method, system and computer-usable medium for providing composite cognitive insights comprising receiving streams of data from a plurality of data sources; processing the streams of data from the plurality of data sources, the processing the streams of data from the plurality of data sources performing data enriching and generating a sub-graph for incorporation into a cognitive graph; processing the cognitive graph, the processing the cognitive graph providing a plurality of individual cognitive insights; generating a composite cognitive insight, the composite cognitive insight being composed of the plurality of individual cognitive insights; and, providing the composite cognitive insight to a user via a set of cognitive media content, the set of cognitive media content comprising a commercial offer content element. | 12-10-2015 |
20150356592 | Cognitive Media Advertising - A method, system and computer-usable medium for providing composite cognitive insights comprising receiving streams of data from a plurality of data sources; processing the streams of data from the plurality of data sources, the processing the streams of data from the plurality of data sources performing data enriching and generating a sub-graph for incorporation into a cognitive graph; processing the cognitive graph, the processing the cognitive graph providing a plurality of individual cognitive insights; generating a composite cognitive insight, the composite cognitive insight being composed of the plurality of individual cognitive insights; and, providing the composite cognitive insight to a user via a set of cognitive media content, the set of cognitive media content comprising a cognitive advertising content element. | 12-10-2015 |
20150356593 | Cognitive Media Advertising - A method, system and computer-usable medium for providing composite cognitive insights comprising receiving streams of data from a plurality of data sources; processing the streams of data from the plurality of data sources, the processing the streams of data from the plurality of data sources performing data enriching and generating a sub-graph for incorporation into a cognitive graph; processing the cognitive graph, the processing the cognitive graph providing a plurality of individual cognitive insights; generating a composite cognitive insight, the composite cognitive insight being composed of the plurality of individual cognitive insights; and, providing the composite cognitive insight to a user via a set of cognitive media content, the set of cognitive media content comprising a cognitive advertising content element. | 12-10-2015 |
20150356626 | Cognitive Media Commerce - A method, system and computer-usable medium for providing composite cognitive insights comprising receiving streams of data from a plurality of data sources; processing the streams of data from the plurality of data sources, the processing the streams of data from the plurality of data sources performing data enriching and generating a sub-graph for incorporation into a cognitive graph; processing the cognitive graph, the processing the cognitive graph providing a plurality of individual cognitive insights; generating a composite cognitive insight, the composite cognitive insight being composed of the plurality of individual cognitive insights; and, providing the composite cognitive insight to a user via a set of cognitive media content, the set of cognitive media content comprising a commercial offer content element. | 12-10-2015 |
Patent application number | Description | Published |
20140310509 | HOST RECOVERY USING A SECURE STORE - Approaches are described for enabling a host computing device to store credentials and other security information useful for recovering the state of the host computing device in a secure store, such as a trusted platform module (TPM) on the host computing device. When recovering the host computing device in the event of a failure (e.g., power outage, network failure, etc.), the host computing device can obtain the necessary credentials from the secure store and use those credentials to boot various services, restore the state of the host and perform various other functions. In addition, the secure store (e.g., TPM) may provide boot firmware measurement and remote attestation of the host computing devices to other devices on a network, such as when the recovering host needs to communicate with the other devices on the network. | 10-16-2014 |
20140310510 | REMOTE ATTESTATION OF HOST DEVICES - Approaches are described for enabling a host computing device to store credentials and other security information useful for recovering the state of the host computing device in a secure store, such as a trusted platform module (TPM) on the host computing device. When recovering the host computing device in the event of a failure (e.g., power outage, network failure, etc.), the host computing device can obtain the necessary credentials from the secure store and use those credentials to boot various services, restore the state of the host and perform various other functions. In addition, the secure store (e.g., TPM) may provide boot firmware measurement and remote attestation of the host computing devices to other devices on a network, such as when the recovering host needs to communicate with the other devices on the network. | 10-16-2014 |
Patent application number | Description | Published |
20080250269 | System and Method for Improving Rebuild Speed Using Data in Disk Block - A fast rebuild mechanism by which a RAID controller is made aware of what blocks are actually in use so that only those blocks are rebuilt after a disk drive failure. The fast rebuild mechanism uses data stored in the disk metadata to indicate whether a virtual disk supports a fast rebuild and on every block to indicate whether the block has valid user data. The fast rebuild mechanism also includes functionality for an IO controller (such as storage controller) to detect whether a block has stored data to indicate that the block has valid data when the block is accessed. | 10-09-2008 |
20090037655 | System and Method for Data Storage and Backup - Systems and methods for data storage and backup are disclosed. A system for data storage and backup may include a storage array comprising one or more storage resources and an agent running on a host device, the agent communicatively coupled to the storage array. The agent may be operable to automatically allocate one or more storage resources for the storage of data associated with a backup job of the hose device and communicate the data associated with the backup job to the allocated storage resources. | 02-05-2009 |
20090044043 | System and method to support background initialization for controller that supports fast rebuild using in block data - A fast rebuild mechanism that includes a background initialization mechanism. The fast rebuild mechanism allows a RAID controller to be made aware of what blocks are actually in use so that only those blocks are rebuilt after a disk drive failure. The fast rebuild mechanism also includes functionality for an IO controller (such as storage controller) to detect whether a block has stored data to indicate that the block has valid data when the block is accessed. | 02-12-2009 |
20110173310 | SYSTEM AND METHOD FOR MANAGING SWITCH AND INFORMATION HANDLING SYSTEM SAS PROTOCOL COMMUNICATION - An SAS domain map is automatically generated at an SAS concentrator switch by a virtual mapping device that presents itself as a target for discovery by SAS devices interfaced with the concentrator, such as information handling systems and storage devices. During the SAS protocol discovery process, the virtual mapping device generates the SAS domain map by acquiring the device name and the device port for each concentrator port that interfaces with a device. A management application running on the concentrator applies the SAS domain map to provide network functions, such as zoning or diagnostics. | 07-14-2011 |
Patent application number | Description | Published |
20100229152 | PRESCRIPTIVE ARCHITECTURE FOR APPLICATION DEVELOPMENT - A prescriptive architecture for application development is provided. In some embodiments, the architecture comprises a service, a receiver, a sender, and a transport. The service functions to perform the actual business logic, is decorated with service deployment metadata; and is operable to communicate via types. The receiver is coupled to the service and is generated entirely from the service deployment metadata. The receiver is operable to receive messages, convert the received messages into types, and communicate with the service using the types. The sender is coupled to the receiver and is generated entirely from the service deployment metadata. The sender functions as a proxy for the service to a service consumer, and is operable to communicate using types with the service consumer. The sender is operable to convert the types to messages, and communicate with the receiver via messages. The transport functions as a message exchange technology that allows the sender and receiver to communicate, and is designated by the service deployment metadata and implemented as an underlying technology of the sender and the receiver. | 09-09-2010 |
20100229154 | DECLARATIVE ASPECTS AND ASPECT CONTAINERS FOR APPLICATION DEVELOPMENT - An aspect container being operable to generate an instance of itself at run time is provided. The aspect container comprises logic operable to create an instance of the aspect container by reading configuration information specifying a sequence of one or more aspects from an aspect container configuration file corresponding to the aspect container. The logic is also operable to generate instances of the aspects in the sequence, configure each aspect instance with its configuration information from an aspect configuration file corresponding to the aspect, and chain the aspect instances according to the specified sequence, such that the chain of aspect instances preamble and postamble activities of a class or method. | 09-09-2010 |
Patent application number | Description | Published |
20150147198 | AIR MAINTENANCE TIRE ASSEMBLY - A pumping device is used with a pneumatic tire mounted on a tire rim to keep the pneumatic tire from becoming underinflated. The pumping device includes a housing attached to the tire rim, a dynamic mass mechanically confined to radial movement relative to the housing and the tire rim, an intake port for ambient to enter the housing, and an exhaust port for forcing air into a tire cavity of the pneumatic tire for restoring air loss from an inflation volume within the tire cavity. | 05-28-2015 |
20150147199 | AIR MAINTENANCE TIRE ASSEMBLY - A pumping device is used with a pneumatic tire mounted on a tire rim to keep the pneumatic tire from becoming underinflated. The pumping device includes a housing attached to the tire rim, a dynamic mass mechanically confined to linear movement relative to the housing and the tire rim, the dynamic mass moving in response to shock loads transferred from the tire rim to the dynamic mass and pumping ambient air into the housing, an intake port for ambient air to enter the housing, and an exhaust port for forcing pressurized air into a tire cavity of the pneumatic tire for restoring air loss from an inflation volume within the tire cavity. | 05-28-2015 |
20150147200 | AIR MAINTENANCE TIRE ASSEMBLY - A pumping device is used with a pneumatic tire mounted on a tire rim to keep the pneumatic tire from becoming underinflated. The pumping device includes a housing attached to the tire rim, a dynamic mass mechanically confined to rotational movement relative to the housing and the tire rim, the dynamic mass moving in response to a minimum angular velocity of the tire rim and pumping ambient air into the housing, an intake port for ambient air to enter the housing, and an exhaust port for forcing pressurized air into a tire cavity of the pneumatic tire for restoring air loss from an inflation volume within the tire cavity. | 05-28-2015 |