Patent application number | Description | Published |
20080262130 | Processing Aids for Elastomeric Compositions - The invention provides for processes to produce elastomeric compositions, the processes including contacting at least one elastomer with a processing aid, wherein the processing aid comprises at least one functionalized polymer having at least one halogen group. The invention also provides for articles such as innerliners for tires produced from the aforementioned elastomeric compositions. | 10-23-2008 |
20080281021 | Processing Aids for Elastomeric Compositions - The invention provides for processes to produce elastomeric compositions, the processes including contacting at least one elastomer with a processing aid, wherein the processing aid comprises at least one functionalized polymer having at least one anhydride group. The invention also provides for articles such as innerliners for tires produced from the aforementioned elastomeric compositions. | 11-13-2008 |
20080290049 | Methods for Separating Slurry Components - The invention relates to methods for separating slurry components. In particular, the invention relates to the concentration of polymer particles in a slurry from the polymerization of C | 11-27-2008 |
20080293892 | Halogenation Processes - The invention discloses improved processes to halogenate polymers. In particular, the invention discloses to improved processes to halogenate polymers made from C | 11-27-2008 |
20080319119 | Processing Aids for Elastomeric Compositions - The invention provides for processes to produce elastomeric compositions, the processes including contacting at least one elastomer with a processing aid, wherein the processing aid includes the reaction product of at least one functionalized polymer having at least one anhydride group contacted with at least one polyamine, wherein the at least one polyamine includes at least one primary amine. The invention also provides for articles such as innerliners for tires produced from the aforementioned elastomeric compositions. | 12-25-2008 |
20110136987 | Halogenation Processes - The invention discloses improved processes to halogenate polymers. In particular, the invention discloses to improved processes to halogenate polymers made from C | 06-09-2011 |
Patent application number | Description | Published |
20140105446 | DETERMINING WELLBORE FLUID PROPERTIES - Computer-implemented methods, software, and systems for determining a property of a wellbore fluid are disclosed. In some implementations, a computing system receives an image of a first sample of the wellbore fluid filling a conduit to a threshold volume of the conduit. The computing system determines a first time duration of the first sample of the wellbore fluid filling the conduit to the threshold volume of the conduit based on the image of the first sample. The computing system receives an image of a second sample of the wellbore fluid filling the conduit to the threshold volume of the conduit. The computing system determines a second time duration of the second sample of the wellbore fluid filling the conduit to the threshold volume of the conduit based on the image of the second sample. A property of the wellbore fluid is determined based on a difference between the first and second time durations. | 04-17-2014 |
20140352960 | Ampholyte Polymeric Compounds in Subterranean Applications - Ampholyte polymeric compound that comprises at least one nonionic monomer, at least one sulfonic acid-containing monomer, and at least one cationic monomer may be useful in viscosifying treatment fluids for use in subterranean operations at a concentration of about 0.5 v/v % to about 30 v/v % of the treatment fluid. Such operations may involve introducing the treatment fluid into a wellbore penetrating a subterranean formation optionally at a pressure sufficient to create or extend at least one fracture in the subterranean formation. | 12-04-2014 |
20140352962 | Ampholyte Polymeric Compounds in Subterranean Applications - Ampholyte polymeric compounds that comprise at least one nonionic monomer, at least one sulfonic acid-containing monomer, and at least one cationic monomer may be useful as friction reducing agents in treatment fluids for use in subterranean operations at a concentration of about 0.001 v/v % to about 0.5 v/v % of the treatment fluid. Such operations may involve introducing the treatment fluid into a wellbore penetrating a subterranean formation optionally at a rate and/or a pressure sufficient to create or extend at least one fracture in the subterranean formation. | 12-04-2014 |
20140352969 | AMPHOLYTE POLYMERS AND METHODS OF TREATING SUBTERRANEAN FORMATIONS WITH THE SAME - Various embodiments disclosed relate to a composition including a crosslinkable ampholyte polymer or a crosslinked product of the same, methods of making and using the composition, and systems including the composition. In various embodiments, the present invention provides a method of treating a subterranean formation. The method can include obtaining or providing a composition including a crosslinkable ampholyte polymer. The crosslinkable ampholyte polymer can include an ethylene repeating unit including a —C(O)NH | 12-04-2014 |
20140367108 | ACIDIZING COMPOSITIONS INCLUDING AMPHOLYTE POLYMERS - Various embodiments disclosed relate to acidizing compositions including an ampholyte polymer. Various embodiments provide a method of treating a subterranean formation. The method can include placing in a subterranean formation an ampholyte polymer including an ethylene repeating unit including a —C(O)NH | 12-18-2014 |
20150133347 | AQUEOUS AMPHOLYTE POLYMER CONTAINING SOLUTIONS FOR SUBTERRANEAN APPLICATIONS - A aqueous solution that includes water, from 100,000 to 300,000 ppm of dissolved solids, from 0.5 to 3 gallons per thousand gallons of a water-in-oil emulsion, and an inverting surfactant. The water-in oil emulsion includes an oil phase and an aqueous phase where the oil phase is a continuous phase comprising an inert hydrophobic liquid and the aqueous phase is present as dispersed distinct particles in the oil phase. The aqueous phase contains water, a water soluble polymer, and surfactants. The water soluble polymer includes 30 to 50 weight percent of a non-ionic monomer, 5 to 15 weight percent of a sulfonic acid containing monomer, and 40 to 60 weight percent of a cationic monomer. The water soluble polymer makes up from 10 to 35 weight percent of the water-in-oil emulsion. | 05-14-2015 |
Patent application number | Description | Published |
20090070853 | Security Policy Validation For Web Services - Methods, apparatus, and products are disclosed for security policy validation for web services that include: transforming a security policy for a web service into a policy predicate logic representation; providing a profile predicate logic representation that represents one or more rules of a security policy profile; and determining whether the security policy satisfies the security policy profile in dependence upon the policy predicate logic representation and the profile predicate logic representation. | 03-12-2009 |
20090077615 | Security Policy Validation For Web Services - Methods, apparatus, and products are disclosed for security policy validation for web services that include: transforming a security policy for a web service into a policy predicate logic representation; providing a profile predicate logic representation that represents one or more rules of a security policy profile; determining whether the security policy satisfies the security policy profile in dependence upon the policy predicate logic representation and the profile predicate logic representation; and notifying a user that the security policy is valid if the security policy satisfies the security policy profile | 03-19-2009 |
20130117564 | MANAGING SECURITY FOR COMPUTER SERVICES - A system or computer usable program product for providing security for a business application including receiving a request from a server including a server public key and a security token, deploying a virtual node implementing the business application in response to the request, using the security token in a bootstrap process by the virtual node to provide authentication to the server, and authenticating a message from the server using a server public key. | 05-09-2013 |
20130117567 | MANAGING SECURITY FOR COMPUTER SERVICES - A method for providing security for a business application including receiving a request from a server including a server public key and a security token, deploying a virtual node implementing the business application in response to the request, using the security token in a bootstrap process by the virtual node to provide authentication to the server, and authenticating a message from the server using a server public key. | 05-09-2013 |
Patent application number | Description | Published |
20080222697 | Application Server Object-level Security for Distributed Computing Domains - Objects on application servers may be defined into classes which receive different levels of security protection, such as definition of user objects and administrative objects. Domain-wide security may be enforced on administrative objects, which user object security may be configured separately for each application server in a domain. In a CORBA architecture, IOR's for shared objects which are to be secured on a domain-wide basis, such as administrative objects, are provided with tagged components during IOR creation and exporting to a name server. Later, when the IOR is used by a client, the client invokes necessary security measures such as authentication, authorization and transport protection according to the tagged components. | 09-11-2008 |
20080235258 | Method and Apparatus for Processing Extensible Markup Language Security Messages Using Delta Parsing Technology - A computer implemented method, apparatus, and computer program product for processing markup language security messages. A template corresponding to a markup language security message is identified. The markup language security message is parsed for variable values using the template. A transition sequence is generated that represents the entire markup language security message. Each transition in the transition sequence is associated with a portion of the markup language security message. A lightweight data model of the markup language security message is populated using the transition sequence. The lightweight data model includes nodes for the variable values and a set of selected constant values. | 09-25-2008 |
20090007253 | FILTERING TECHNIQUE FOR PROCESSING SECURITY MEASURES IN WEB SERVICE MESSAGES - A message gateway apparatus is provided for use in a web service system to process a message containing a request for a destination web service application, in which the message includes a plurality of events within a structured document conforming to a web service protocol and each event of the plurality of events has a name and a content thereof. The message gateway apparatus comprises a message parsing module configured to sequentially identify the events of the plurality of events of the message, an input object creation module configured to sequentially extract the events of the plurality of events from the message parsing module, and a message filtering module configured to sequentially access the events of the plurality of events as the events are extracted from the message parsing module by the input object creation module to analyze the name of each event and perform security processing on the content of each event for which the corresponding name indicates that security measures have been applied according to a security protocol. The input object creation module is configured to construct an input object including input parameters for the destination web service application based on the message. The input object creation module constructing the input object by adding a representation of each event of the plurality of events to the input object after each event is accessed by the message filtering module. | 01-01-2009 |
20090138951 | Dynamic Cache Lookup Based on Dynamic Data - A system and method for tracking user security credentials in a distributed computing environment. The security credentials of an authenticated user includes not just his unique user identifier, but also a set of security attributes such as the time of authentication, the location where the user is authenticated (i.e., intranet user v. internet user), the authentication strength, and so on. The security attributes are used in access control decisions. The same user can be given different authorization if he has a different security attribute value. Security credentials may be generated either by WebSphere security code or by third party security provider code. This invention stores the user credentials in a distributed cache and provides a system and method to compute the unique key based on the dynamic security credentials for cache lookup | 05-28-2009 |
20090265771 | System and method for hosting multiple kerberos service principal names - An authentication system and method for allowing an administrator to host a plurality of service principal names (SPNs) over a common network port of a backend server. The authentication system includes a client computer, a backend server, and a service principal name (SPN) apparatus. The client computer sends an authentication request to the backend server. The backend server performs an authentication procedure in response to a reception of the authentication request from the client computer. The SPN apparatus configures a plurality of service SPNs for the web service application over the common network port. | 10-22-2009 |
20100268952 | Optimization of Signing SOAP Body Element - An XML digital signature mechanism for providing message integrity. A sending party serializes a source XML document into a serialized byte array, calculates the source offset and length of the array of the signed part in the serialized byte array, and calculates a source hash value using the serialized array and the source offset and length. The serialized byte array is a non-canonicalized array. The array and source hash value used to sign a part or the whole of the serialized byte array is sent to a receiving party. The receiving party calculates the target offset and length of the signed part in the serialized byte array and calculates a target hash value of the signed part by using the array and the target offset and length. The receiving party compares the target hash value and the source hash value to verify the integrity of the target XML document. | 10-21-2010 |
20120210396 | PROCESSING EXTENSIBLE MARKUP LANGUAGE SECURITY MESSAGES USING DELTA PARSING TECHNOLOGY - Markup language security messages are processed. A template corresponding to a markup language security message is identified. The markup language security message is parsed for variable values using the template. A transition sequence is generated that represents the entire markup language security message. Each transition in the transition sequence is associated with a portion of the markup language security message. A lightweight data model of the markup language security message is populated using the transition sequence. The lightweight data model includes nodes for the variable values and a set of selected constant values. | 08-16-2012 |
20150095657 | Processing Extensible Markup Language Security Messages Using Delta Parsing Technology - Markup language security messages are processed. A template corresponding to a markup language security message is identified. The markup language security message is parsed for variable values using the template. A transition sequence is generated that represents the entire markup language security message. Each transition in the transition sequence is associated with a portion of the markup language security message. A lightweight data model of the markup language security message is populated using the transition sequence. The lightweight data model includes nodes for the variable values and a set of selected constant values. | 04-02-2015 |
Patent application number | Description | Published |
20120101473 | Decision-Assist Method of Resuscitation of Patients - A method for providing decision-assist to medical staff resuscitating a burn patient includes receiving patient information, calculating an infusion rate, outputting the infusion rate, obtaining a urinary output, calculating a new infusion rate using infusion rate model based constants, and outputting the new infusion rate. In some embodiments, the method includes notifying medical staff when problems arise, displaying information regarding the resuscitation, and setting limits regarding the infusion rates. | 04-26-2012 |
20140142539 | Decision-Assist Method of Resuscitation of Patients - A method for providing decision-assist to medical staff resuscitating a burn patient includes receiving patient information, calculating an infusion rate, outputting the infusion rate, obtaining a urinary output, calculating a new infusion rate using infusion rate model based constants, and outputting the new infusion rate. In some embodiments, the method includes notifying medical staff when problems arise, displaying information regarding the resuscitation, and setting limits regarding the infusion rates. | 05-22-2014 |