Patent application number | Description | Published |
20110218958 | SYSTEM, METHOD AND COMPUTER PROGRAM PRODUCT FOR PERFORMING ONE OR MORE ACTIONS UTILIZING A UNIFORM RESOURCE LOCATOR - In accordance with embodiments, there are provided mechanisms and methods for performing one or more actions utilizing a uniform resource locator. These mechanisms and methods for performing one or more actions utilizing a uniform resource locator can enable improved overall URL usage, more efficient search engine URL results, improved URL comprehension by users, etc. | 09-08-2011 |
20110225263 | SYSTEM, METHOD AND COMPUTER PROGRAM PRODUCT FOR SERVING AN APPLICATION FROM A CUSTOM SUBDOMAIN - In accordance with embodiments, there are provided mechanisms and methods for serving an application from a custom subdomain. These mechanisms and methods for serving an application from a custom subdomain can enable improved data security, enhanced system performance, optimized resource utilization, etc. | 09-15-2011 |
20110246969 | SYSTEM, METHOD AND COMPUTER PROGRAM PRODUCT FOR DEBUGGING AN ASSERTION - In accordance with embodiments, there are provided mechanisms and methods for debugging an assertion. These mechanisms and methods for debugging an assertion can enable improved interpretation and analysis of data validation results, more efficient development associated with data validation, etc. | 10-06-2011 |
20140032632 | SYSTEM, METHOD AND COMPUTER PROGRAM PRODUCT FOR PERFORMING ONE OR MORE ACTIONS UTILIZING A UNIFORM RESOURCE LOCATOR - In accordance with embodiments, there are provided mechanisms and methods for performing one or more actions utilizing a uniform resource locator. These mechanisms and methods for performing one or more actions utilizing a uniform resource locator can enable improved overall URL usage, more efficient search engine URL results, improved URL comprehension by users, etc. | 01-30-2014 |
20140156794 | SYSTEM, METHOD AND COMPUTER PROGRAM PRODUCT FOR SERVING AN APPLICATION FROM A CUSTOM SUBDOMAIN - In accordance with embodiments, there are provided mechanisms and methods for serving an application from a custom subdomain. These mechanisms and methods for serving an application from a custom subdomain can enable improved data security, enhanced system performance, optimized resource utilization, etc. | 06-05-2014 |
20140164843 | SYSTEM, METHOD AND COMPUTER PROGRAM PRODUCT FOR DEBUGGING AN ASSERTION - In accordance with embodiments, there are provided mechanisms and methods for debugging an assertion. These mechanisms and methods for debugging an assertion can enable improved interpretation and analysis of data validation results, more efficient development associated with data validation, etc. | 06-12-2014 |
20150301992 | SYSTEM, METHOD AND COMPUTER PROGRAM PRODUCT FOR PERFORMING ONE OR MORE ACTIONS UTILIZING A UNIFORM RESOURCE LOCATOR - In accordance with embodiments, there are provided mechanisms and methods for performing one or more actions utilizing a uniform resource locator. These mechanisms and methods for performing one or more actions utilizing a uniform resource locator can enable improved overall URL usage, more efficient search engine URL results, improved URL comprehension by users, etc. | 10-22-2015 |
Patent application number | Description | Published |
20100252576 | Apparatus and Method for Dispensing Discrete Amounts of Viscous Material - Apparatus and methods for dispensing small amounts of a viscous material onto a workpiece. The narrow-profile dispensing apparatus includes a fluid chamber, a nozzle, and a valve seat disk representing individual components that are removable from a main body of the dispensing apparatus for cleaning and/or replacement. The nozzle is coupled with the fluid chamber by a heat transfer body that may be cooled by, for example, a cooling fluid routed through an air pathway defined in the heat transfer body. The main body of the dispensing apparatus may be cooled by air exhausted from an air cavity of a pneumatic actuator regulating the movement of a needle to control the flow of viscous material in the dispensing apparatus. | 10-07-2010 |
20110048575 | VISCOUS MATERIAL NONCONTACT JETTING SYSTEM - A viscous material noncontact jetting system has a jetting dispenser mounted for relative motion with respect to a surface. A control is operable to cause the jetting dispenser to jet a viscous material droplet that is applied to the surface as a viscous material dot. A device, such as a camera or weigh scale, is connected to the control and provides a feedback signal representing a size-related physical characteristic of the dot applied to the surface. The size-related physical characteristics of subsequently applied dots is controlled by heating and cooling, or adjusting a piston stroke in the jetting dispenser, in response to the size-related physical characteristic feedback. Dispensed material volume control and velocity offset compensation are also provided. | 03-03-2011 |
20110114673 | APPARATUS AND METHOD FOR DISPENSING DISCRETE AMOUNTS OF VISCOUS MATERIAL - Apparatus and methods for dispensing small amounts of a viscous material onto a workpiece. The narrow-profile dispensing apparatus includes a fluid chamber, a nozzle, and a valve seat disk representing individual components that are removable from a main body of the dispensing apparatus for cleaning and/or replacement. The nozzle is coupled with the fluid chamber by a heat transfer body that may be cooled by, for example, a cooling fluid routed through an air pathway defined in the heat transfer body. The main body of the dispensing apparatus may be cooled by air exhausted from an air cavity of a pneumatic actuator regulating the movement of a needle to control the flow of viscous material in the dispensing apparatus. | 05-19-2011 |
20110184569 | VISCOUS MATERIAL NONCONTACT JETTING SYSTEM - A viscous material noncontact jetting system has a jetting dispenser mounted for relative motion with respect to a surface. A control is operable to cause the jetting dispenser to jet a viscous material droplet that is applied to the surface as a viscous material dot. A device, such as a camera or weigh scale, is connected to the control and provides a feedback signal representing a size-related physical characteristic of the dot applied to the surface. The size-related physical characteristics of subsequently applied dots is controlled by heating and cooling, or adjusting a piston stroke in the jetting dispenser, in response to the size-related physical characteristic feedback. Dispensed material volume control and velocity offset compensation are also provided. | 07-28-2011 |
20110315232 | AUTOMATED VACUUM ASSISTED VALVE PRIMING SYSTEM AND METHODS OF USE - An automated system ( | 12-29-2011 |
20120205392 | Apparatus and Method for Dispensing Discrete Amounts of Viscous Material - Apparatus and methods for dispensing small amounts of a viscous material onto a workpiece. The narrow-profile dispensing apparatus includes a fluid chamber, a nozzle, and a valve seat disk representing individual components that are removable from a main body of the dispensing apparatus for cleaning and/or replacement. The nozzle is coupled with the fluid chamber by a heat transfer body that may be cooled by, for example, a cooling fluid routed through an air pathway defined in the heat transfer body. The main body of the dispensing apparatus may be cooled by air exhausted from an air cavity of a pneumatic actuator regulating the movement of a needle to control the flow of viscous material in the dispensing apparatus. | 08-16-2012 |
20120285990 | Viscous Material Noncontact Jetting System - A viscous material noncontact jetting system has a jetting dispenser mounted for relative motion with respect to a surface. A control is operable to cause the jetting dispenser to jet a viscous material droplet that is applied to the surface as a viscous material dot. A device, such as a camera or weigh scale, is connected to the control and provides a feedback signal representing a size-related physical characteristic of the dot applied to the surface. The size-related physical characteristics of subsequently applied dots is controlled by heating and cooling, or adjusting a piston stroke in the jetting dispenser, in response to the size-related physical characteristic feedback. Dispensed material volume control and velocity offset compensation are also provided. | 11-15-2012 |
20130048759 | MODULAR JETTING DEVICES - Modular devices for jetting a fluid material and components for modular jetting devices. The devices may include a pressurized air or positive displacement pump fluid supply module to supply a fluid module inlet. A syringe may feed material through a check valve to a positive displacement pump, which feeds material through another check valve to the fluid module. Inside the fluid module is a valve element moved to contact a valve seat and jet a droplet of material by contact between an external drive pin and a movable element of the fluid module. Either a piezoelectric actuator, a pneumatic actuator, or another actuator may move the drive pin. A controller may coordinate the supply of fluid from the positive displacement pump with the rate at which material is jetted. The fluid module and positive displacement pump are easily removable from the jetting device. | 02-28-2013 |
20130052359 | PNEUMATICALLY-DRIVEN JETTING VALVES WITH VARIABLE DRIVE PIN VELOCITY, IMPROVED JETTING SYSTEMS AND IMPROVED JETTING METHODS - An improved pneumatic jetting valve includes a housing with first and second chambers. A pneumatic piston is enclosed between the chambers. First and second solenoid valves are configured to respectively supply air pressure to the chambers and to exhaust the chambers. A controller is operable to regulate the pressurization and venting of the chambers. The controller controls the timing of control signals for the first and second solenoid valves to control the overlap time during which both the first and second chambers are pressurized. By controlling this overlap time, the controller controls the speed of the drive pin of the jetting valve and thereby the speed at which the valve closes to jet a droplet of material. This allows a valve speed to be selected that is most appropriate for the viscosity of the material being jetted. Numerous new methods for utilizing the improved jetting valve and system are disclosed. | 02-28-2013 |
20140158214 | AUTOMATED VACUUM ASSISTED VALVE PRIMING SYSTEM AND METHODS OF USE - Automated systems and methods for priming a fluid chamber of a fluid dispensing valve with fluid from a fluid material source that includes a vacuum source, a valve priming station, a vacuum switch, and a controller. The valve priming station has a boot, a vacuum chamber, and a vacuum channel in the boot. The vacuum channel connects with the vacuum source via the vacuum chamber. The boot sealingly engages a valve nozzle of the fluid dispensing valve so that the vacuum chamber connects the vacuum source with the fluid chamber. The vacuum switch couples with the vacuum channel via the vacuum chamber and has an opened and closed position based upon a vacuum level in the vacuum chamber. The controller is electrically connected with the vacuum source and vacuum switch and controls priming of the fluid dispensing valve based upon whether the vacuum switch is opened or closed. | 06-12-2014 |
Patent application number | Description | Published |
20080288786 | System with access keys - In an embodiment, a secure module is provided that provides access keys to an unsecured system. In an embodiment, the secure module may generate passcodes and supply the passcodes to the unsecured system. In an embodiment, the access keys are sent to the unsecured system after the receiving the passcode from the unsecured system. In an embodiment, after authenticating the passcode, the secure module does not store the passcode in its memory. In an embodiment, the unsecured module requires the access key to execute a set of instructions or another entity. In an embodiment, the unsecured system does not store access keys. In an embodiment, the unsecured system erases the access key once the unsecured system no longer requires the access key. In an embodiment, the unsecured system receives a new passcode to replace the stored passcode after using the stored passcode. Each of these embodiments may be used separately. | 11-20-2008 |
20090158049 | Building a security access system - In an embodiment, a secure module is provided that provides access keys to an unsecured system. In an embodiment, the secure module may generate passcodes and supply the passcodes to the unsecured system. In an embodiment, the access keys are sent to the unsecured system after receiving the passcode from the unsecured system. In an embodiment, after authenticating the passcode, the secure module does not store the passcode in its memory. In an embodiment, the unsecured module requires the access key to execute a set of instructions or another entity. In an embodiment, the unsecured system does not store access keys. In an embodiment, the unsecured system erases the access key once the unsecured system no longer requires the access key. In an embodiment, the unsecured system receives a new passcode to replace the stored passcode after using the stored passcode. Each of these embodiments may be used separately. | 06-18-2009 |
20090178115 | Receiving an access key - In an embodiment, a secure module is provided that provides access keys to an unsecured system. In an embodiment, the secure module may generate passcodes and supply the passcodes to the unsecured system. In an embodiment, the access keys are sent to the unsecured system after receiving the passcode from the unsecured system. In an embodiment, after authenticating the passcode, the secure module does not store the passcode in its memory. In an embodiment, the unsecured module requires the access key to execute a set of instructions or another entity. In an embodiment, the unsecured system does not store access keys. In an embodiment, the unsecured system erases the access key once the unsecured system no longer requires the access key. In an embodiment, the unsecured system receives a new passcode to replace the stored passcode after using the stored passcode. Each of these embodiments may be used separately. | 07-09-2009 |
20100275265 | System for securing transactions across insecure networks - A new system is presented here that can effectively protect users' identities, their sensitive data and help secure transactions. The security of this system does not depend on the integrity of the host personal computer nor on the security of the network computers that execute network traffic. Furthermore, the system is designed to help prevent identity theft. This system can be implemented for governments, financial exchanges and health care systems where security is a primary concern. | 10-28-2010 |
20110066833 | CHURCH-TURING THESIS: THE TURING IMMORTALITY PROBLEM SOLVED WITH A DYNAMIC REGISTER MACHINE - A new computing machine and new methods of executing and solving heretofore unknown computational problems are presented here. The computing system demonstrated here can be implemented with a program composed of instructions such that instructions may be added or removed while the instructions are being executed. The computing machine is called a Dynamic Register Machine. The methods demonstrated apply to new hardware and software technology. The new machine and methods enable advances in machine learning, new and more powerful programming languages, and more powerful and flexible compilers and interpreters. | 03-17-2011 |
20110274273 | Generation of registration codes, keys and passcodes using non-determinism - In an embodiment, a secure module is provided that provides access keys to an unsecured system. In an embodiment, the secure module may generate passcodes and supply the passcodes to the unsecured system. In an embodiment, the access keys are sent to the unsecured system after the receiving the passcode from the unsecured system. In an embodiment, after authenticating the passcode, the secure module does not store the passcode in its memory. In an embodiment, the unsecured module requires the access key to execute a set of instructions or another entity. In an embodiment, the unsecured system does not store access keys. In an embodiment, the unsecured system erases the access key once the unsecured system no longer requires the access key. In an embodiment, the unsecured system receives a new passcode to replace the stored passcode after using the stored passcode. In an embodiments, a registration code is generated using non-determinism. In an embodiments, a key is generated using non-determinism. Each of these embodiments may be used separately. | 11-10-2011 |
20120185698 | Protecting Codes, Keys and User Credentials with Identity and Patterns - Computer security applications use cryptography keys, cryptography codes—such as one-time passcodes—and other user credentials to protect the secrecy, authenticity and integrity of applications such as financial information, financial transactions and infrastructure (e.g. the electrical grid, power plants, and defense systems). The prior art attempted to generate (e.g. derive) an invariant from a biometric template, biometric print or non-biometric pattern that is used as a security key or code. Biometric variability has been a difficult obstacle for the prior art. | 07-19-2012 |
20120198560 | Secure active element machine - Based upon the principle of Turing incomputability, and novel properties of the Active Element Machine, a malware-resistant computing machine is constructed. This new computing machine is a non-Turing, non-register machine (non von-Neumann), called an Active Element Machine (AEM). AEM programs are designed so that the purpose of the computation is difficult to apprehend by an adversary and hijack with malware. These methods can help hinder reverse engineering of proprietary algorithms and hardware design. | 08-02-2012 |
20130042111 | SECURING TRANSACTIONS AGAINST CYBERATTACKS - Methods and systems are provided for performing a secure transaction. Users register biometric and/or other identifying information. A registration code and an encryption key are generated from the biometric information and/or information obtained from a unpredictable physical process and are stored in a secure area of a device and also transmitted to a service provider. A transaction passcode generator may be computed based on the stored registration code. In at least one embodiment, a unique transaction passcode depends upon the transaction information, so that on the next step of that transaction, only that unique transaction passcode will be valid. In an embodiment, the passcode includes the transaction information. In at least one embodiment, if the transaction information has been altered relative to the transaction information stored in the device's secure area, then the transaction passcode sent during this step will be invalid and transaction may be aborted. | 02-14-2013 |
20140201536 | One-Time Passcodes with Asymmetric Keys - Protecting the security of an entity by using passcodes is disclosed. A user's passcode device generates a passcode. In an embodiment, the passcode is generated in response to receipt of user information. The passcode is received by another system, which authenticates the passcode by at least generating a passcode from a passcode generator, and comparing the generated passcode with the received passcode. The passcode is temporary. At a later use a different passcode is generated from a different passcode generator. In these embodiments, there are asymmetric secrets stored on the passcode device and by the administrator. This adds more security so that if the backend servers are breached, the adversary cannot generate valid passcodes. In some embodiments, the passcode depends on the rounded time. | 07-17-2014 |
20150067786 | VISUAL IMAGE AUTHENTICATION AND TRANSACTION AUTHORIZATION USING NON-DETERMINISM - Methods and systems described herein perform a secure transaction. A display presents images that are difficult for malware to recognize but a person can recognize. In at least one embodiment, a person communicates transaction information using visual images received from the service provider system. In at least one embodiment, a universal identifier is represented by images recognizable by a person, but difficult for malware to recognize. | 03-05-2015 |
20150163383 | MICROPHONE AND CAMERA DISRUPTION APPARATUS AND METHOD - An apparatus for use with an electronic device having a microphone and a camera. The apparatus comprises a structure configured to detachably couple to the device, and a shutter supported by the structure and comprising a lens shutter configured to obscure a lens of the camera when in an engaged position. A generator is supported by the structure and configured to generate a force that acts on the microphone and renders the microphone unresponsive to voice sounds. | 06-11-2015 |
20150186683 | Non-Deterministic Secure Active Element Machine - Based upon the principles of Turing incomputability, connectedness and novel properties of the Active Element Machine, a malware-resistant computing machine is constructed. This new computing machine is a non-Turing, non-register machine (non von-Neumann), called an active element machine (AEM). AEM programs are designed so that the purpose of the AEM computations are difficult to apprehend by an adversary and hijack with malware. These methods can also be used to help thwart reverse engineering of proprietary algorithms, hardware design and other areas of intellectual property. | 07-02-2015 |
20150261541 | DYNAMIC REGISTER MACHINE - In one embodiment, a dynamic register machine that edits program instructions while the instructions are running on the machine is disclosed. In another embodiment, an execution node pair machine is disclosed that represents programs as collections of execution node pairs. In another embodiment, computer program instructions are represented as matrices, which are multiplied together to represent sequences of instructions applied to specific input data, which facilitate finding situations resulting in infinite loops having a periodic behavior. In an embodiment, infinite loops in a general computer program are detected, via the dynamic register machine, by exploring combinations of sequences of linked execution-node-pairs, thereby obtaining the results of executing sequence of computer program instructions is disclosed. | 09-17-2015 |
Patent application number | Description | Published |
20090193808 | SYSTEM AND METHOD FOR STORING ENERGY - A system includes at least one body, a link for suspending the body for movement with gravity from a first elevation position to a second elevation position, and an electrical energy generator coupled with the body through the link to drive the generator to generate electricity upon movement of the body with gravity from the first to the second elevation position. The at least one body has a mass of at least approximately 100 tonnes; the first and the second elevation positions define a distance therebetween of at least approximately 200 meters; and/or the system further includes an operator configured to operate the link to controllably move the at least one body against gravity from the second to the first elevation position to increase a gravitational potential energy of the at least one body, and to maintain the gravitational potential energy of the at least one body. | 08-06-2009 |
20120134790 | SYSTEM AND METHOD FOR STORING ENERGY - A system includes at least one body, a link for suspending the body for movement with gravity from a first elevation position to a second elevation position, and an electrical energy generator coupled with the body through the link to drive the generator to generate electricity upon movement of the body with gravity from the first to the second elevation position. The at least one body has a mass of at least approximately 100 tonnes; the first and the second elevation positions define a distance therebetween of at least approximately 200 meters; and/or the system further includes an operator configured to operate the link to controllably move the at least one body against gravity from the second to the first elevation position to increase a gravitational potential energy of the at least one body, and to maintain the gravitational potential energy of the at least one body. | 05-31-2012 |
20120204563 | SYSTEM AND METHOD FOR STORING ENERGY - A system includes at least one body, a link for suspending the body for movement with gravity from a first elevation position to a second elevation position, and an electrical energy generator coupled with the body through the link to drive the generator to generate electricity upon movement of the body with gravity from the first to the second elevation position. The at least one body has a mass of at least approximately 100 tonnes; the first and the second elevation positions define a distance therebetween of at least approximately 200 meters; and/or the system further includes an operator configured to operate the link to controllably move the at least one body against gravity from the second to the first elevation position to increase a gravitational potential energy of the at least one body, and to maintain the gravitational potential energy of the at least one body. | 08-16-2012 |
20150056085 | SYSTEM AND METHOD FOR STORING ENERGY - A system for storing energy includes a body and a shaft having walls defining an internal volume for containing a fluid, a seal member disposed between the body and the walls of the shaft, and a fluid passage in fluid communication with the shaft. The body is disposed within the internal volume of the shaft for movement with gravity from a first elevation position to a second elevation position within the internal volume of the shaft. The seal member divides the internal volume into a first portion located below the body and a second portion located above the body. The fluid passage communicates fluid with the first portion of the interior volume of the shaft. The system further includes a pump/turbine operatively coupled with the fluid passage to drive a motor/generator to generate electricity upon movement of the body from the first elevation position to the second elevation position. | 02-26-2015 |