Hay
Alf Gerhard Hay, Solbergmoen NO
Patent application number | Description | Published |
---|---|---|
20090284901 | SUBSEA SWITCHGEAR APPARATUS - A subsea switchgear apparatus including a frame, at least one electrical power inlet mounted to the frame, at least one electrical power outlet mounted to the frame, a distribution chamber mounted to the frame, and at least one canister mounted to the frame. The at least one canister includes a chamber accommodating at least one high voltage circuit breaker. Electrical connections are arranged in the distribution chamber for electrically connecting a respective circuit breaker of a canister to an associated power inlet and power outlet of the switchgear apparatus. The chamber of the respective canister is separated from the distribution chamber by a pressure barrier. | 11-19-2009 |
Andrew Frank Hay, Rolystone AU
Patent application number | Description | Published |
---|---|---|
20120168227 | DRILL ROD GUIDE - Implementations of the present invention include a drill rod guide configured to align a first drill rod and a second drill rod. The drill rod guide includes a cylindrical section and a tapered or frusta-conical section. The cylindrical section is sized and configured to concentrically surround a first drill rod. The tapered or frusta-conical section is sized and configured to guide a second drill rod into the cylindrical section and into alignment with the first drill rod. The drill rod guide may include first and second guide members that form symmetrical halves of the drill rod guide. The first and second guide members may be connected to first and second jaws of the clamp. The guide may include a window configured to allow a user to visually confirm that the first and second drill rods are aligned. | 07-05-2012 |
Cameron Hay, Haberfield AU
Patent application number | Description | Published |
---|---|---|
20140312638 | SPREADER AND USE THEREOF - A spreader assembly comprising a spreader having container engagement devices for engaging and disengaging a container; a lid engagement device mounted to the spreader, said lid engagement device having an actuator for positioning a lid engagement frame proximate to a lid of said container, said frame arranged to engage said lid so as to permit the actuator to move said lid relative to the container. | 10-23-2014 |
Cameron Hay, Singapore SG
Patent application number | Description | Published |
---|---|---|
20100320265 | METHOD AND APPARATUS FOR TWIST LOCK MANIPULATION - A manipulation device ( | 12-23-2010 |
Choon Teck Hay, Singapore SG
Patent application number | Description | Published |
---|---|---|
20100140167 | WATER RECLAMATION WITHOUT BIOSLUDGE PRODUCTION - An apparatus for cleaning of wastewater comprising a submerged membrane biological reactor system (MBR) and a submerged membrane module (MBD) wherein the MBR is in fluid communication with the MBD for feeding excess sludge from the MBR to the MBD and wherein the MBR comprises an outlet which releases permeate passed through the membrane of the MBR and the MBD is in fluid communication with the MBR for feeding permeate passed throug the membrane of the MBD back into the MBR and comprises an outlet for releasing gas. | 06-10-2010 |
Christopher Hay, Causeway Bay HK
Patent application number | Description | Published |
---|---|---|
20150201819 | SURFACE CLEANING DEVICE - The present invention is concerned with an improved surface cleaning device. The device has a utility portion for engaging a surface to be cleaned and a handle portion connected to the utility portion. The utility portion defines a lower surface facing a surface to be cleaned, and is adapted to accommodate a sheet of cleaning substrate for covering the lower surface and contacting a surface to be cleaned in use. The utility portion includes a plurality of projection members protruding from the lower surface for providing one or more raised regions on the cleaning sheet substrate which otherwise is fitted against the lower surface, such that in use the one or more raised regions are accessible to recessed area of a surface to be cleaned. | 07-23-2015 |
David Hay, Haifa IL
Patent application number | Description | Published |
---|---|---|
20110167030 | STATE MACHINE COMPRESSION FOR SCALABLE PATTERN MATCHING - A method for processing data includes encoding a finite automaton, which includes states and transitions between the states that express a plurality of predefined patterns, by grouping the states of the automaton into sets according to a common property shared by the states in each set, and assigning codes to the states according to the grouping. The codes are stored in an electronic memory, along with rules that are associated with the patterns. The automaton is traversed in order to identify one or more of the patterns in an input sequence of data elements by iteratively reading out the codes from the memory responsively to the data elements and to the codes that have been previously read out. Upon identifying a given pattern in the input sequence, an associated action is performed. | 07-07-2011 |
20120117431 | EFFICIENT DETECTION OF ERRORS IN ASSOCIATIVE MEMORY - A method for error detection includes storing in an associative memory ( | 05-10-2012 |
David Hay, Tel Aviv IL
Patent application number | Description | Published |
---|---|---|
20130254197 | METHOD AND SYSTEM FOR DECOMPRESSION-FREE INSPECTION OF SHARED DICTIONARY COMPRESSED TRAFFIC OVER HTTP - A system and a method for decompression-free inspection of compressed data are provided herein. The method includes the following stages: obtaining a dictionary file comprising a string of symbols, each associated with a respective index; obtaining at least one delta file associated with said dictionary file, wherein said delta file comprises a sequence of instructions that include at least one copy instruction pointing to an index within said dictionary and a length of a copy substring to be copied; scanning said dictionary using a pattern matching algorithm associated with a plurality of patterns and implemented as a Deterministic Finite Automaton (DFA), to yield DFA execution data; scanning said at least one delta file, using said pattern matching algorithm, wherein said DFA execution data is used to skip at least part of the scanning of the copy substrings for at least one of the copy instructions. | 09-26-2013 |
Don Hay, Houston, TX US
Patent application number | Description | Published |
---|---|---|
20160023843 | SUBSEA FLUID STORAGE SYSTEM - The present disclosure relates, according to some embodiments, to subsea fluid storage systems that may automatically and/or continuously compensate for subsea pressure changes. A subsea fluid storage unit with passive pressure compensation may comprise a vessel and a deformable bladder disposed within the vessel. A vessel may comprise a top port, a bottom port, and an internal vessel volume. A deformable bladder may comprise a first end and a second end. A second end may comprise a bladder opening that may be fluidically connected to a top port or a bottom port of a vessel. A deformable bladder may define an internal bladder volume that may be suitable for storage of fluids and/or chemicals. | 01-28-2016 |
Donald Hay, Houston, TX US
Patent application number | Description | Published |
---|---|---|
20160025085 | SUBSEA PRESSURE COMPENSATING PUMP APPARATUS - The present disclosure relates, according to some embodiments, to fluid pump apparatuses. A fluid pump apparatus may comprise a suction compensator, a housing compensator, and a pump. A suction compensator may comprise an ambient fluid compensator, an ambient fluid bladder, and a spring compensator, wherein the spring compensator comprises a first separator partitioning an internal volume of the spring compensator into a first suction fluid chamber and a compensation fluid chamber. A housing compensator may comprise a second separator partitioning an internal volume of the housing compensator into a second suction fluid chamber and a lubrication fluid chamber. The compensation fluid chamber may be in fluid communication with the suction compensator. The first suction fluid chamber may be in fluid communication with the second suction fluid chamber. A pump may comprise a housing defining a lubrication fluid compartment in fluid communication with the lubrication fluid chamber. | 01-28-2016 |
Douglas Hay, Ottsville, PA US
Patent application number | Description | Published |
---|---|---|
20150374689 | Use of Levosimendan to Treat Left Ventricular Systolic Dysfunction in Patients Undergoing Cardiac Surgery Requiring Cardiopulmonary Bypass - Methods of (i) reducing morbidity and/or mortality in a human patient undergoing cardiac surgery; (ii) preventing, or reducing the risk of development of, LCOS in a human patient undergoing cardiac surgery; or (iii) reducing the risk of, intensity of, or occurrence of, one or more postoperative adverse events in a human patient undergoing cardiac surgery. The methods can involve (a) a first period of administering to the patient levosimendan for about 1 hour, in which the administration of levosimendan during the first period is initiated: (i) before skin incision for the cardiac surgery, and (ii) at an infusion dose of about 0.2 μg/kg/min; and (b) a second period of administering to the patient levosimendan for about 23 hours, in which the administration of levosimendan during the second period is initiated at an infusion dose of about 0.1 μg/kg/min. | 12-31-2015 |
Florent Hay, Ixelles BE
Patent application number | Description | Published |
---|---|---|
20130111546 | SYSTEMS, METHODS, AND COMPUTER PROGRAM PRODUCTS FOR MANAGING SECURE ELEMENTS | 05-02-2013 |
20140298322 | SYSTEMS, METHODS, AND COMPUTER PROGRAM PRODUCTS FOR MANAGING SERVICE INSTALLATION - Systems, methods, and computer program products are provided for managing installation of services on a secure element having a secure element profile. A request to install a service on the secure element is received. There is a determination of a preferred version of the service corresponding to the secure element profile of the secure element. There is also a determination of an existing version of the service loaded on the secure element. Using a rules engine, there is a determination of whether to install on the secure element either the existing version of the service or the preferred version of the service. A command is transmitted to either (a) install the existing version of the service or (b) delete the existing version of the service and load and install the preferred version of the service, based on the determination using the rules engine. | 10-02-2014 |
Gadi Hay, Haifa IL
Patent application number | Description | Published |
---|---|---|
20120151136 | INSTANT DATA RESTORATION - Various embodiments are provided for restoration of data by a processor. In one embodiment, by way of example only, an exposed Internet Small Computer System Interface (iSCSI) target of a backup repository is defined as a source of, and a storage volume to be recovered as a target of, a mirrored pair of storage resources. The iSCSI target represents a point-in-time backup snapshot. Data from the iSCSI target is synchronized to the storage volume. The mechanisms of the illustrated embodiments leverage iSCSI with Instant Restore to reduce a Recovery Time Objective (RTO) and provide a secure transport when recovering a volume over a WAN. | 06-14-2012 |
20120254535 | INSTANT DATA RESTORATION - An exposed Internet Small Computer System Interface (iSCSI) target of a backup repository is defined as a source of, and a storage volume to be recovered as a target of, a mirrored pair of storage resources. The iSCSI target represents a point-in-time backup snapshot. Data from the iSCSI target is synchronized to the storage volume. The mechanisms of the illustrated embodiments leverage iSCSI with Instant Restore to reduce a Recovery Time Objective (RTO) and provide a secure transport when recovering a volume over a WAN. | 10-04-2012 |
Gal Hay, Rosh Pina IL
Patent application number | Description | Published |
---|---|---|
20110114684 | LOAD CARRYING SYSTEM - In an embodiment, a load carrying system for a wearer includes a carrier made of at least one flexible carrier material and comprises a front portion to be disposed at the wearer's front, and a back portion to be disposed at the wearer's back, when the system is worn by the wearer; a load attachment arrangement for detachably attaching a load to at least the front portion; a front load distribution arrangement comprising at least one elongated front load distribution element made of a material more rigid than the carrier material and attached to the front portion of the carrier by a front attachment member different from, and operating independently of, the load attachment arrangement; and a back load distribution arrangement disposed in the back portion of the carrier and separated from the front load distribution arrangement by the material of the carrier. | 05-19-2011 |
Gean Ricardo Hay, Joinville BR
Patent application number | Description | Published |
---|---|---|
20110012493 | MOBILE SHELF FOR REFRIGERATORS AND FREEZERS - A mobile shelf is horizontal and displaceably mounted in rails fixed to the cabinet of refrigerator or freezer, inwardly to a refrigerator chamber. The shelf comprises an actuator device operatively associated to the shelf and cabinet. The actuator device is driven to an inoperative armed position, achieved when the shelf is displaced backwards, to a retracted position, and an operative distended position, in which the shelf is displaced forward, to a forward position. The actuator device is actuated, from the inoperative armed position to an operative distended position, when applying a manual instantaneous axial force backwards, against the shelf. | 01-20-2011 |
Gregory Malcolm Hay, Taren Point Nsw AU
Patent application number | Description | Published |
---|---|---|
20100126107 | ROOFING TILE CLIP AND INSTALLATION METHOD - A roof clip ( | 05-27-2010 |
Jacob Hay, Circleville, OH US
Patent application number | Description | Published |
---|---|---|
20160067790 | TOOL ATTACHMENT AND THROUGH SPINDLE COOLANT SYSTEMS FOR USE WITH ULTRASONIC MACHINING MODULES - An ultrasonic machining module that includes an ultrasonic transducer, wherein the ultrasonic transducer is adapted to receive a machining tool and a vibration-isolating housing adapted to be both compatible with a machining system and to receive the ultrasonic transducer therein, wherein the housing further includes at least one modification for isolating all vibrations generated by the ultrasonic transducer when the device is in operation except axial vibrations transmitted to the machining tool, thereby preventing unwanted vibrations from traveling backward or upward into the machining system. The ultrasonic machining module may also include an acoustically tuned collet and/or an acoustically tuned system for delivering coolant fluid through the module to a machining tool or target substrate. | 03-10-2016 |
20160067791 | HIGH-SPEED ROTARY ELECTRICAL CONNECTOR FOR USE IN ULTRASONICALLY ASSISTED MACHINING - An ultrasonic machining module that includes an ultrasonic transducer, wherein the ultrasonic transducer is adapted to receive a machining tool; a vibration-isolating housing adapted to be both compatible with a machining system and to receive the ultrasonic transducer therein, wherein the housing further includes at least one modification for isolating all vibrations generated by the ultrasonic transducer when the device is in operation except axial vibrations transmitted to the machining tool, thereby preventing unwanted vibrations from traveling backward or upward into the machining system; and a connector in electrical communication with the ultrasonic transducer, wherein the connector is operative to supply electrical energy to the ultrasonic transducer, and wherein the connector is adapted to rotate at a predetermined rate of speed. | 03-10-2016 |
Judith A. Hay, Basel CH
Patent application number | Description | Published |
---|---|---|
20150026336 | SYSTEMS, METHODS, AND DEVICES FOR DYNAMIC RESOURCE MONITORING AND ALLOCATION IN A CLUSTER SYSTEM - In an embodiment, the systems, methods, and devices disclosed herein comprise a computer resource monitoring and allocation system. In an embodiment, the resource monitoring and allocation system can be configured to allocate computer resources that are available on various nodes of a cluster to specific jobs and/or sub-jobs and/or tasks and/or processes. | 01-22-2015 |
Michael Hay, Yokohama JP
Patent application number | Description | Published |
---|---|---|
20120102080 | COMPUTER SYSTEM AND STORAGE CAPACITY EXTENSION METHOD - Provided is a computer system configured so that security compliance problems can be avoided and an access control model which can be uniquely customized can be implemented by extending the storage capacity to an external storage service by means of integrated management of an existing NAS(s) and the external storage service, and controlling the optimum data placement according to the confidentiality and importance level of data. | 04-26-2012 |
Michael B. Hay, Montpellier FR
Patent application number | Description | Published |
---|---|---|
20140244355 | Smart Analytics for Forecasting Parts Returns for Reutilization - An approach is provided in which the approach maps first parts included in a first system to second parts included in a second system. The approach then utilizes functioning first parts returns data, which indicates an amount of parts included in the first system that have been returned and are functioning, to forecast an amount of functioning parts corresponding to the second system to be returned. As such, the approach generates a functioning second parts returns forecast based upon the amount of functioning second parts that are forecast to be returned. | 08-28-2014 |
20140244356 | Smart Analytics for Forecasting Parts Returns for Reutilization - An approach is provided in which the approach maps first parts included in a first system to second parts included in a second system. The approach then utilizes functioning first parts returns data, which indicates an amount of parts included in the first system that have been returned and are functioning, to forecast an amount of functioning parts corresponding to the second system to be returned. As such, the approach generates a functioning second parts returns forecast based upon the amount of functioning second parts that are forecast to be returned. | 08-28-2014 |
Michael C. Hay, Yokohama JP
Patent application number | Description | Published |
---|---|---|
20110238715 | COMPLEX OBJECT MANAGEMENT THROUGH FILE AND DIRECTORY INTERFACE - A method for representing a computer-related resource in a computer-related system environment comprises creating an object model of the resource, the object model including objects that correspond to components of the resource, configuration information of the objects, and relationships among the objects; providing a resource application program interface to allow communication with and access to the components of the resource; mapping the objects of the object model to files and directories of a file and directory structure; presenting the file and directory structure via a file system application program interface to allow an application to manipulate the files and directories so as to manipulate the components of the resource via the resource application program interface; and manipulating the components of the resource based on manipulation of the files and directories from the application. | 09-29-2011 |
Michael Cameron Hay, Yokohama JP
Patent application number | Description | Published |
---|---|---|
20100241820 | RECLAIMING STORAGE ON A THIN-PROVISIONING STORAGE DEVICE - A method, medium and apparatus for managing storage in a thin-provisioning storage device. The method includes ceasing to use storage on thinly provisioned storage delivered by a thin-provisioning storage device and notifying the thin-provisioning storage device of the unused storage. The method may further include reclaiming the unused storage in response to the notification. Alternatively, the notification may include recognizing the storage being freed and communicating the recognition to the storage device. In another form, the invention is a method, medium and apparatus for managing storage in a thin-provisioning storage device. This method includes delivering thinly provisioned storage and receiving notification that part of the thinly provisioned storage is no longer in use. The method may further include reclaiming that part of the thinly provisioned storage in response to the notification. Between receiving and reclaiming, the method may wait for a time to pass. | 09-23-2010 |
Michael P. Hay, Aukland NZ
Patent application number | Description | Published |
---|---|---|
20110105436 | HETEROARYL COMPOUNDS, COMPOSITIONS, AND METHODS OF USE IN CANCER TREATMENT - Provided herein are novel heteroaryl compounds, compositions comprising the compounds, and methods of treatment or prevention comprising administration of the compounds. The compounds are effective in the targeting of cells defective in the von Hippel-Lindau gene and in inducing autophagic cell death. The methods are directed to treating or preventing diseases such as cancer, and in particular cancers resulting from von Hippel-Lindau disease. The compounds of the invention may be administered in combination with another therapeutic agent. | 05-05-2011 |
Michael Patrick Hay, Auckland NZ
Patent application number | Description | Published |
---|---|---|
20090186886 | Tricyclic 1,2,4-Triazine Oxides and Compositions for Therapeutic Use in Cancer Treatments - The invention relates to novel tricyclic 1,2,4-triazine-1-oxides and novel tricyclic 1,2,4-triazine-1,4-dioxides of formula I | 07-23-2009 |
20120077811 | PRODRUG FORMS OF KINASE INHIBITORS AND THEIR USE IN THERAPY - The invention provides novel prodrug compounds comprising a kinase inhibitor and a reductively-activated fragmenting aromatic nitroheterocycle or aromatic nitrocarbocycle trigger, where the compound carries a positive charge. In preferred embodiments, the compounds are of Formula I: | 03-29-2012 |
20120225862 | HETEROARYL BENZAMIDES, COMPOSITIONS AND METHODS OF USE - Provided are certain heteroaryl benzamides, compositions, and methods of their manufacture and use. | 09-06-2012 |
20140024649 | Substituted Benzamides and Their Uses - Provided herein are Substituted Benzamides, compositions, and method of their manufacture and use. | 01-23-2014 |
20140128397 | SYNTHETIC LETHAL TARGETING OF GLUCOSE TRANSPORT - The present invention provides methods for inhibiting growth and proliferation of HIF pathway proficient cells by administering GLUT1 inhibitors of the invention to HIF pathway proficient cells. | 05-08-2014 |
20150072976 | SUBSTITUTED BENZAMIDES AND THEIR USES - Provided herein are Substituted Benzamides, compositions, and method of their manufacture and use. | 03-12-2015 |
20150329503 | SUBSTITUTED BENZAMIDES AND THEIR USES - Provided herein are Substituted Benzamides, compositions, and method of their manufacture and use. | 11-19-2015 |
20160002222 | PRODRUG FORMS OF KINASE INHIBITORS AND THEIR USE IN THERAPY - The invention provides novel prodrug compounds comprising a kinase inhibitor and a reductively-activated fragmenting aromatic nitroheterocycle or aromatic nitrocarbocycle trigger, where the compound carries a positive charge. In preferred embodiments, the compounds are of Formula I: | 01-07-2016 |
Nissim Hay, Netanya IL
Patent application number | Description | Published |
---|---|---|
20130144281 | Tissue Treatment Apparatus with Interchangeable Instrument/Accessories - A tissue treatment apparatus is provided for surgical and medical procedures and operations including an instrument and accessory base adapted for receiving one or more instruments and/or accessories configured for different procedures and operations and for a variety of modes of use of the treatment apparatus. | 06-06-2013 |
Ori Hay, Haifa IL
Patent application number | Description | Published |
---|---|---|
20080234571 | Method and Apparatus For Generating Multiple Studies - Information indicative of multiple regions of the anatomy of a patient ( | 09-25-2008 |
20080253634 | Method and Apparatus for Predicting Enhancement in Angiography - A technique for use in angiography includes obtaining data from a tracking scan following injection of a contrast agent according to a test injection profile. A region of interest ( | 10-16-2008 |
20120143090 | Assessment of Spinal Anatomy - A method for modeling a spine, comprising providing at least one image of the spine, extracting a plurality of anatomical elements of the spine from the at least one image, and constructing a model representing the anatomy of the spine using the anatomical elements. | 06-07-2012 |
Ori Hay, Moshav Aviel IL
Patent application number | Description | Published |
---|---|---|
20150031979 | DERIVING INDIVIDUAL THORACIC PARAMETERS OF A SUBJECT - A method of deriving one or more individual thoracic parameters of a subject. The method comprises instructing a subject to perform a thoracic volume manipulation, receiving a plurality of measurements of a plurality of EM signals from a thoracic intrabody area of lungs of the subject during the thoracic volume manipulation, deriving a plurality of thoracic volume values at a plurality of different intervals during the thoracic volume manipulation so that each the thoracic volume value correspond with another of a plurality of estimated thoracic volumes achieved during the thoracic volume manipulation, and calculating at least one individual thoracic parameter of the subject by combining between the plurality of measurements and the plurality of thoracic volume values. | 01-29-2015 |
Peter Stewart Hay, Mandurah AU
Patent application number | Description | Published |
---|---|---|
20120175240 | METHOD AND APPARATUS FOR ODORANT REMOVAL - Odorant from a process stream is removed by passing the stream ( | 07-12-2012 |
Phillip Hay, Victoria AU
Patent application number | Description | Published |
---|---|---|
20090247407 | Glyceride Ester Derivatives of Herbicidal Compounds and Compositions Thereof - A herbicidal compound and composition comprising at least one compound of formula I wherein R is independently selected from hydrogen, and the group (CH | 10-01-2009 |
Ran Eliyahu Hay, Rosh Hahayin IL
Patent application number | Description | Published |
---|---|---|
20130185472 | TECHNIQUES FOR IMPROVING THROUGHPUT AND PERFORMANCE OF A DISTRIBUTED INTERCONNECT PERIPHERAL BUS - A method for accelerating execution of read operations in a distributed interconnect peripheral bus is provided. The method comprises generating a first number of speculative read requests addressed to an address space related to a last read request served on the bus; sending the speculative read requests to a root component connected to the bus; receiving a second number of read completion messages from the root component of the bus; and sending a read completion message out of the received read completion messages component to the endpoint component only if the read completion message is respective of a real read request or a valid speculative read request out of the speculative read requests, wherein a real read request is issued by the endpoint component. | 07-18-2013 |
20130185517 | TECHNIQUES FOR IMPROVING THROUGHPUT AND PERFORMANCE OF A DISTRIBUTED INTERCONNECT PERIPHERAL BUS CONNECTED TO A HOST CONTROLLER - A method for accelerating execution of read operations in a distributed interconnect peripheral bus, the distributed interconnect peripheral bus is coupled to a host controller being connected to a universal serial bus (USB) device. The method comprises synchronizing on at least one ring assigned to the USB device; pre-fetching transfer request blocks (TRBs) maintained in the at least one ring, wherein the TRBs are saved in a host memory; saving the pre-fetched TRBs in an internal cache memory; upon reception of a TRB read request from the host controller, serving the request by transferring the requested TRB from the internal cache memory to the host controller; and sending a TRB read completion message to the host controller. | 07-18-2013 |
Robert Hay, Turner Australian Capital Territory AU
Patent application number | Description | Published |
---|---|---|
20140244685 | METHOD OF SEARCHING AND GENERATING A RELEVANT SEARCH STRING - A computer implemented method of searching for records. The method comprises generating a relevant search string based on extracted text and related contextual information. | 08-28-2014 |
Roee Hay, Haifa IL
Patent application number | Description | Published |
---|---|---|
20100299754 | Identifying Security Breaches Caused by Web-Enabled Software Applications - Identifying a security breach caused when a computer-based software application uses a computer-based web browser application, including identifying at least one function within a computer-based software application that causes a computer-based web browser application to access data from a source that is external to the software application, at least partially replacing the data with malicious content that is configured to cause a predefined action to occur when the malicious content is accessed by the web browser application, where the predefined action is associated with a known security breach when the predefined action occurs subsequent to the malicious content being accessed by the web browser application, causing the software application to perform the function, and determining whether the predefined action is performed. | 11-25-2010 |
20110066807 | Protection Against Cache Poisoning - Protecting computers against cache poisoning, including a cache-entity table configured to maintain a plurality of associations between a plurality of data caches and a plurality of entities, where each of the caches is associated with a different one of the entities, and a cache manager configured to receive data that is associated with any of the entities and store the received data in any of the caches that the cache-entity table indicates is associated with the entity, and receive a data request that is associated with any of the entities and retrieve the requested data from any of the caches that the cache-entity table indicates is associated with the requesting entity, where any of the cache-entity table and cache manager are implemented in either of computer hardware and computer software embodied in a computer-readable medium. | 03-17-2011 |
20110087892 | Eliminating False Reports of Security Vulnerabilities when Testing Computer Software - A system for eliminating false reports of security vulnerabilities when testing computer software, including a taint analysis engine configured to identify a tainted variable v in a computer application, a data mapping identification engine configured to identify a variable x within the application that holds data derived from v, where x is in a different format than v, an AddData identification engine configured to identify an AddData operation within the application that is performed on x, a signature identification engine configured to identify a Sign operation within the application that is performed on the results of the AddData operation on x, a signature comparison identification engine configured to identify an operation within the application that compares the results of the Sign operation with another value | 04-14-2011 |
20110126282 | System, Method and Apparatus for Simultaneous Definition and Enforcement of Access-control and Integrity Policies - Access-control and information-flow integrity policies are enforced in a computing system by detecting security-sensitive sinks in software code for an application running on the computing system and retrieving an access-control policy from a database accessible to the computing system. The access-control policy maps a set of access permissions within the computing system to each one of a plurality of principals. For each detected security-sensitive sink, all principals that influence that security-sensitive sink are detected and an overall access permission is assigned to each security-sensitive sink by taking the intersection of the access permission sets for all influencing principals of that security-sensitive sink. If this permission set is inadequate, an integrity violation is reported. In addition, permission labels are assigned to each value of variables used in the security-sensitive sinks. Each permission label is a set of permissions. | 05-26-2011 |
20110131656 | IDENTIFYING SECURITY VULNERABILITY IN COMPUTER SOFTWARE - Identifying a security vulnerability in a computer software application by identifying at least one source in a computer software application, identifying at least one sink in the computer software application, identifying at least one input to any of the sinks, determining whether the input derives its value directly or indirectly from any of the sources, determining a set of possible values for the input, and identifying a security vulnerability where the set of possible values for the input does not match a predefined specification of legal values associated with the sink input. | 06-02-2011 |
20110162072 | DETERMINING THE VULNERABILITY OF COMPUTER SOFTWARE APPLICATIONS TO ATTACKS - Determining the vulnerability of computer software applications to attacks by identifying a defense-related variable within a computer software application that is assigned results of a defense operation defending against a predefined type of attack, identifying a control-flow predicate dominating a security-sensitive operation within the application, identifying a data-flow dependent variable in the application that is data-flow dependent on the defense-related variable, determining whether the control-flow predicate uses the data-flow dependent variable to make a branching decision and whether a control-flow path leading to the security-sensitive operation is taken only if the data-flow dependent variable is compared against a value of a predefined type, determining that the security-sensitive operation is safe from the attack if both control-flow conditions are true, and determining that the application is safe from the attack if all security-sensitive operations in the application are determined to be safe from the attack. | 06-30-2011 |
20110321016 | INJECTION CONTEXT BASED STATIC ANALYSIS OF COMPUTER SOFTWARE APPLICATIONS - Embodiments of the invention generally relate to injection context based static analysis of computer software applications. Embodiments of the invention may include selecting a sink within a computer software application, tracing a character output stream leading to the sink within the computer software application, determining an injection context of the character output stream at the sink, where the injection context is predefined in association with a state of the character output stream at the sink, identifying any actions that have been predefined in association with the identified injection context, and providing a report of the actions. | 12-29-2011 |
20110321168 | THWARTING CROSS-SITE REQUEST FORGERY (CSRF) AND CLICKJACKING ATTACKS - Embodiments of the invention generally relate to thwarting fraud perpetrated with a computer by receiving a request from a computer to perform a transaction. Embodiments of the invention may include receiving the request together with transaction data and a cookie, where the transaction data are separate from the cookie; determining in accordance with predefined validation criteria whether the cookie includes a valid representation of the transaction data; and performing the transaction only if the cookie includes a valid representation of the transaction data. | 12-29-2011 |
20120023486 | Verification of Information-Flow Downgraders - A method includes determining grammar for output of an information-flow downgrader in a software program. The software program directs the output of the information-flow downgrader to a sink. The method includes determining whether the grammar of the output conforms to one or more predetermined specifications of the sink. The method includes, in response to a determination the grammar of the output conforms to the one or more predetermined specifications of the sink, determining the information-flow downgrader is verified for the sink, wherein determining grammar, determining whether the grammar, and determining the information-flow downgrader are performed via static analysis of the software program. Apparatus and computer program products are also disclosed. An apparatus includes a user interface providing a result of whether or not output of an information-flow downgrader in the software program conforms to one or more predetermined specifications of a sink in the software program. | 01-26-2012 |
20120110551 | SIMULATING BLACK BOX TEST RESULTS USING INFORMATION FROM WHITE BOX TESTING - Systems, methods are program products for simulating black box test results using information obtained from white box testing, including analyzing computer software (e.g., an application) to identify a potential vulnerability within the computer software application and a plurality of milestones associated with the potential vulnerability, where each of the milestones indicates a location within the computer software application, tracing a path from a first one of the milestones to an entry point into the computer software application, identifying an input to the entry point that would result in a control flow from the entry point and through each of the milestones, describing the potential vulnerability in a description indicating the entry point and the input, and presenting the description via a computer-controlled output medium. | 05-03-2012 |
20120254839 | SIMULATING BLACK BOX TEST RESULTS USING INFORMATION FROM WHITE BOX TESTING - Systems, methods are program products for simulating black box test results using information obtained from white box testing, including analyzing computer software (e.g., an application) to identify a potential vulnerability within the computer software application and a plurality of milestones associated with the potential vulnerability, where each of the milestones indicates a location within the computer software application, tracing a path from a first one of the milestones to an entry point into the computer software application, identifying an input to the entry point that would result in a control flow from the entry point and through each of the milestones, describing the potential vulnerability in a description indicating the entry point and the input, and presenting the description via a computer-controlled output medium. | 10-04-2012 |
20150089637 | System, Method and Apparatus for Simultaneous Definition and Enforcement of Access-control and Integrity Policies - Access-control and information-flow integrity policies are enforced in a computing system by detecting security-sensitive sinks in software code for an application running on the computing system and retrieving an access-control policy from a database accessible to the computing system. The access-control policy maps a set of access permissions within the computing system to each one of a plurality of principals. For each detected security-sensitive sink, all principals that influence that security-sensitive sink are detected and an overall access permission is assigned to each security-sensitive sink by taking the intersection of the access permission sets for all influencing principals of that security-sensitive sink. If this permission set is inadequate, an integrity violation is reported. In addition, permission labels are assigned to each value of variables used in the security-sensitive sinks. Each permission label is a set of permissions. | 03-26-2015 |
20150096032 | DETECTING VULNERABILITY TO RESOURCE EXHAUSTION - In an aspect of managing resource exhaustion, a method includes receiving a program code that is configured for generating a random number. The generating is identified as vulnerable to a resource exhaustion. The method also includes identifying a statement in the program code at which a value of a variable associated with the generating of the random number is affected, inserting a hooking code in the statement for monitoring the variable at the statement, and running the program code in a plurality of iterations. A consumption level of the resource is varied in the plurality of iterations. The method further includes monitoring a plurality of values of the variable in the plurality of iterations. The method also includes executing a regression analysis on the plurality of values and returning a root cause of the vulnerability. | 04-02-2015 |
20150271196 | COMPARING SOURCE AND SINK VALUES IN SECURITY ANALYSIS - Techniques for determining differences between source and sink values are described herein. The techniques may include identifying a data-flow source statement within a computer program, and recording a value read at the source statement. The techniques may include identifying a sink of the data flow, and record a value flowing into the sink. The source value may be compared to the sink value to determine whether a potential security leak exists. | 09-24-2015 |
20150271198 | COMPARING SOURCE AND SINK VALUES IN SECURITY ANALYSIS - Techniques for determining differences between source and sink values are described herein. The techniques may include identifying a data-flow source statement within a computer program, and recording a value read at the source statement. The techniques may include identifying a sink of the data flow, and record a value flowing into the sink. The source value may be compared to the sink value to determine whether a potential security leak exists. | 09-24-2015 |
Roee Hay, Herzliya IL
Patent application number | Description | Published |
---|---|---|
20110088023 | SYSTEM AND METHOD FOR STATIC DETECTION AND CATEGORIZATION OF INFORMATION-FLOW DOWNGRADERS - A system and method for static detection and categorization of information-flow downgraders includes transforming a program stored in a memory device by statically analyzing program variables to yield a single assignment to each variable in an instruction set. The instruction set is translated to production rules with string operations. A context-free grammar is generated from the production rules to identify a finite set of strings. An information-flow downgrader function is identified by checking the finite set of strings against one or more function specifications. | 04-14-2011 |
20120266246 | PINPOINTING SECURITY VULNERABILITIES IN COMPUTER SOFTWARE APPLICATIONS - A build process management system can acquire data pertaining to a software build process that is currently being executed by an automated software build system. The software build process can include executable process steps, metadata, and/or environmental parameter values. An executable process step can utilize a build artifact, representing an electronic document that supports the software build process. The acquired data can then be synthesized into an immutable baseline build process and associated baseline artifact library. The baseline artifact library can store copies of the build artifacts. The immutable baseline build process can include baseline objects that represent data values and dependencies indicated in the software build process. In response to a user-specified command, an operation can be performed upon the baseline build process and associated baseline artifact library. | 10-18-2012 |
20120266248 | PINPOINTING SECURITY VULNERABILITIES IN COMPUTER SOFTWARE APPLICATIONS - A build process management system can acquire data pertaining to a software build process that is currently being executed by an automated software build system. The software build process can include executable process steps, metadata, and/or environmental parameter values. An executable process step can utilize a build artifact, representing an electronic document that supports the software build process. The acquired data can then be synthesized into an immutable baseline build process and associated baseline artifact library. The baseline artifact library can store copies of the build artifacts. The immutable baseline build process can include baseline objects that represent data values and dependencies indicated in the software build process. In response to a user-specified command, an operation can be performed upon the baseline build process and associated baseline artifact library. | 10-18-2012 |
20120311712 | TESTING WEB APPLICATIONS FOR FILE UPLOAD VULNERABILITIES - A system for detecting file upload vulnerabilities in web applications is provided. The system may include a black-box tester configured to upload, via a file upload interface exposed by a web application, a file together with a signature associated with the file. An execution monitor may be configured to receive information provided by instrumentation instructions within the web application during the execution of the web application. The execution monitor may be configured to recognize the signature of the uploaded file as indicating that the uploaded file was uploaded by the black-box tester. The execution monitor may also be configured to use any of the information to make at least one predefined determination assessing the vulnerability of the web application to a file upload exploit. | 12-06-2012 |
20120311714 | TESTING WEB APPLICATIONS FOR FILE UPLOAD VULNERABILITIES - A system for detecting file upload vulnerabilities in web applications is provided. The system may include a black-box tester configured to upload, via a file upload interface exposed by a web application, a file together with a signature associated with the file. An execution monitor may be configured to receive information provided by instrumentation instructions within the web application during the execution of the web application. The execution monitor may be configured to recognize the signature of the uploaded file as indicating that the uploaded file was uploaded by the black-box tester. The execution monitor may also be configured to use any of the information to make at least one predefined determination assessing the vulnerability of the web application to a file upload exploit. | 12-06-2012 |
20130166676 | DETECTION OF CUSTOM PARAMETERS IN A REQUEST URL - Identifying at least one custom parameter in a request uniform resource locator (URL). At least a first portion of source code of a Web application that typically consumes the custom parameter provided in the request URL can be identified. The Web application can be instrumented at the first portion of the source code. The Web application can receive the request URL and the Web application can be executed with the instrumented source code. At least one run-time value consumed by the second portion of the source code can be identified, and the run-time value can be compared to the request URL to determine whether the run-time value intersects with the request URL. Responsive to determining that the run-time value intersects with the request URL, the run-time value can be identified as the custom parameter. A custom parameter rule can be generated based on the comparison. | 06-27-2013 |
20130167124 | DETECTION OF CUSTOM PARAMETERS IN A REQUEST URL - Identifying at least one custom parameter in a request uniform resource locator (URL). The method can include identifying at least a first portion of source code of a Web application that typically consumes the custom parameter provided in the request URL and, via a processor, instrumenting the Web application at the first portion of the source code. The Web application can receive the request URL and the Web application can be executed with the instrumented source code. At least one run-time value consumed by the second portion of the source code can be identified, and the run-time value can be compared to the request URL to determine whether the run-time value intersects with the request URL. Responsive to determining that the run-time value intersects with the request URL, the run-time value can be identified as the custom parameter. A custom parameter rule can be generated based on the comparison. | 06-27-2013 |
20140096240 | IDENTIFYING WHETHER AN APPLICATION IS MALICIOUS - Identifying whether a first application is malicious. The first application can be presented for installation on a processing system. The first application can be scanned, via a static analysis implemented by a processor, to determine whether a user interface layout of the first application is suspiciously similar to a user interface layout of a second application installed on the processing system. When the user interface layout of the first application is suspiciously similar to the user interface layout of the second application installed on the processing system, an alert can be generated indicating that the first application is malicious. | 04-03-2014 |
20140096248 | IDENTIFYING WHETHER AN APPLICATION IS MALICIOUS - Identifying whether a first application is malicious. The first application can be presented for installation on a processing system. The first application can be scanned, via a static analysis implemented by a processor, to determine whether a user interface layout of the first application is suspiciously similar to a user interface layout of a second application installed on the processing system. When the user interface layout of the first application is suspiciously similar to the user interface layout of the second application installed on the processing system, an alert can be generated indicating that the first application is malicious. | 04-03-2014 |
20140157418 | DETECTING SECURITY VULNERABILITIES ON COMPUTING DEVICES - Identifying security vulnerabilities on computing devices by detecting an inter-process communication on a computing device, determining whether the inter-process communication is consistent with a predefined specification of a security vulnerability, and causing a predefined action to be performed on the computing device responsive to determining that the inter-process communication is consistent with a predefined specification of a security vulnerability. | 06-05-2014 |
20140157421 | DETECTING SECURITY VULNERABILITIES ON COMPUTING DEVICES - Identifying security vulnerabilities on computing devices by detecting an inter-process communication on a computing device, determining whether the inter-process communication is consistent with a predefined specification of a security vulnerability, and causing a predefined action to be performed on the computing device responsive to determining that the inter-process communication is consistent with a predefined specification of a security vulnerability. | 06-05-2014 |
20140310812 | IDENTIFYING SECURITY VULNERABILITIES RELATED TO INTER-PROCESS COMMUNICATIONS - Identifying security vulnerabilities related to inter-process communications by identifying within the instructions of a computer software application an object creation location configured to create an inter-process communications object, identifying within the instructions of the computer software application a location of an inter-process communications method, determining whether a path exists for an inter-process communications object created at the object creation location to propagate to the inter-process communications method, classifying with a classification selected from a plurality of predefined classifications, any of the inter-process communications object, the object creation location, and the location of the inter-process communications method, and reporting as a security vulnerability the classified inter-process communications object, object creation location, or location of the inter-process communications method if the path exists and if the classification is predefined to indicate that reporting is warranted. | 10-16-2014 |
20140310814 | IDENTIFYING SECURITY VULNERABILITIES RELATED TO INTER-PROCESS COMMUNICATIONS - Identifying security vulnerabilities related to inter-process communications by identifying within the instructions of a computer software application an object creation location configured to create an inter-process communications object, identifying within the instructions of the computer software application a location of an inter-process communications method, determining whether a path exists for an inter-process communications object created at the object creation location to propagate to the inter-process communications method, classifying with a classification selected from a plurality of predefined classifications, any of the inter-process communications object, the object creation location, and the location of the inter-process communications method, and reporting as a security vulnerability the classified inter-process communications object, object creation location, or location of the inter-process communications method if the path exists and if the classification is predefined to indicate that reporting is warranted. | 10-16-2014 |
20140373158 | DETECTING SECURITY VULNERABILITIES ON COMPUTING DEVICES - Identifying security vulnerabilities on computing devices by gathering information about a first software application with which a computing device is configured, selecting, using any of the information, an attack specification from a set of predefined attack specifications, attacking the first software application on the computing device with an attack that is in accordance with the selected attack specification, identifying a post-attack condition associated with the first software application, determining whether the post-attack condition is consistent with a predefined security vulnerability, and performing a predefined action associated with the predefined security vulnerability responsive to determining that the post-attack condition is consistent with the predefined security vulnerability, where the gathering, selecting, attacking, identifying, determining, and performing are performed by a second software application during execution of the second software application on the computing device. | 12-18-2014 |
Scott Hay, Arlington, TX US
Patent application number | Description | Published |
---|---|---|
20160045326 | INTERBODY SPACER SYSTEM - A device, system, and method are disclosed that supplements a human spinal column's structure by replacing a damaged intervertebral disc with a machined spacer comprising a movable pair of blades that rotate to expand from the spacer in-situ to interlock with a patient's vertebras, and a locking system that provides secondary protection from blade movement within the spacer. | 02-18-2016 |
Stephan Hay, Singapore SG
Patent application number | Description | Published |
---|---|---|
20150310930 | EQUIVALENT FUSE CIRCUIT FOR A ONE-TIME PROGRAMMABLE READ-ONLY MEMORY ARRAY - Technologies are provided for measuring a programming current (PC) for a memory cell (MC) of a one-time programmable read-only memory array. The MC includes a fuse equivalent circuit (FEC) that includes a first current path (CP) having a first node, a second CP having a fuse of the memory cell and a second node, and a third CP. The PC is split into a first current, a second current and a third current that flow over the first CP, the second CP, and the third CP, respectively. A first voltage applied along the first path is divided to generate a second voltage at the first node, and an output voltage generated by an operational amplifier controls the second current to maintain a third voltage at the second node at substantially the same value as the second voltage so that the second current has a sufficiently low value and does not burn the fuse. | 10-29-2015 |
Stephane Hay, Ingremare FR
Patent application number | Description | Published |
---|---|---|
20150137643 | RADIAL MAGNETIC BEARING AND METHOD OF MANUFACTURE - A radial magnetic bearing having an inner rotor including a central shaft having a ferromagnetic armature mounted on the shaft and an outer stator providing a plurality of electromagnets including poles made of ferromagnetic material which project radially inwardly towards the rotor is provided. As such, air-gaps (e) are left between end faces of the poles and the ferromagnetic armature, and coils wound around the poles. The poles are extended through outer portions attached to a supporting member. Each pole and the corresponding outer portion are included in an angularly segmented module providing a stack of laminations made of ferromagnetic material. The outer portion defines shoulders with respect to the corresponding pole, the outer portion contacting outer portions of neighboring segmented modules and the outer portions of all segmented modules being assembled by clamping rings, wherein the coils located in free spaces around the poles are mounted in a string. | 05-21-2015 |
Stuart Hay, New South Wales AU
Patent application number | Description | Published |
---|---|---|
20130113678 | RECONFIGURABLE SELF COMPLEMENTARY ARRAY - An antenna structure for the transmission or receipt of electromagnetic signals, the structure formed as a self complementary array having a series of high and low impedance patches, with predetermined low impedance patches interconnected to one another by an impedance matching amplifier network so as to provide self complementary properties. | 05-09-2013 |
Stuart Gifford Hay, Kogarah Bay AU
Patent application number | Description | Published |
---|---|---|
20150084827 | Enhanced Connected Tiled Array Antenna - An antenna device including: a conductive ground sheet of a substantially planar form; and a series of spaced apart conductive patches arranged substantially in a plane parallel to the conductive ground plane; a series of conductive feed interconnections electromagnetically coupled to the spaced apart array of conductive patches. | 03-26-2015 |
Stuart Gifford Hay, Marsfield AU
Patent application number | Description | Published |
---|---|---|
20160072193 | Large Scale Phased Array Structure and Method of Fabrication - A phased array antenna device including: a conductive ground plane body structure including a series of through apertures; a structural spacing layer having known dielectric and structural properties, for holding an active layer in a predetermined stable spaced apart relationship to the ground plane body structure; a active surface layer spaced apart from the ground plane body structure and supported by said structural spacing layer, said active layer including a series of tile components, said tile components including a number of active conductive elements formed on a non conductive substrate, said active components being interconnected to corresponding driving electronics by conductive feeds formed through said apertures. | 03-10-2016 |
Timothy Nicholas Hay, Cambridge UK
Patent application number | Description | Published |
---|---|---|
20140143633 | APPARATUS AND METHOD FOR CORRECTING ERRORS IN DATA ACCESSED FROM A MEMORY DEVICE - An apparatus and method for correcting errors in data accessed from a memory device. A plurality of read symbols are read from a memory device. Syndrome information is then determined from the n data symbols and associated m error correction code symbols. Error correction circuitry uses the syndrome information in order to attempt to locate each read symbol containing an error and to correct the errors in each of those located read symbols. Error tracking circuitry tracks which memory regions the located read symbols containing an error originate from, and, on detecting an error threshold condition, sets at least one memory region as an erasure memory region. The correction circuitry treats each read symbol as a located read symbol containing an error, such that the read symbols to be located are not all randomly distributed and more than PMAX read symbols containing errors can be corrected. | 05-22-2014 |
William Hay, Thebarton AU
Patent application number | Description | Published |
---|---|---|
20100251481 | APPARATUS FOR TRANSFERRING A PERSON FROM A WHEELCHAIR TO A FIXED SEAT - Apparatus for transferring a person from a wheelchair to a fixed seat is disclosed, including a wheeled gantry that includes opposed front and rear legs and an upper portion connecting the legs, the gantry spanning a transfer station with a side entry for the wheelchair, and being capable of spanning the fixed seat; and a holding apparatus including a transfer seat and support frame, the transfer seat being sized to fit within the fixed seat; a lift for raising and lowering the transfer seat; and a support arm for rotating the support frame within the transfer station. The wheelchair can be wheeled into the transfer station, the person can be raised out of the wheelchair and rotated to face the front leg, the wheeled gantry can be moved to span the fixed seat, the person can be lowered into the fixed seat, and the wheeled gantry can be withdrawn. | 10-07-2010 |
William C. Hay, Heppenheim DE
Patent application number | Description | Published |
---|---|---|
20100134793 | OPTICAL EVALUATION METHOD BY MEANS OF LASER PULSES AND CORRESPONDING APPARATUS - An optical evaluation method and an apparatus for performing said method are described. First laser pulses of a first type and second laser pulses of a second type that differs from the first type are sent onto a sample to be examined. The sample is hit with first incident light from the two laser pulses in at least one manner of simultaneously, within a very short time lag between the two laser pulses, and a time-correlated manner of the two laser pulses, thereby generating a first optical signal, and hit with second incident light from the two laser pulses, thereby generating a second optical signal. The generated first and second optical signals are detected with at least one detector; and an electronic difference between the first and second optical signals is generated. | 06-03-2010 |
20110273768 | TUNABLE MULTIPLE LASER PULSE SCANNING MICROSCOPE AND METHOD OF OPERATING THE SAME - A tunable multiple laser pulse scanning microscope and a method of operating the same is described, applying two pulsed laser beams with distinct wavelengths incident on a scanning spot of a sample to be imaged simultaneously or at a specific time delay. The microscope comprises at least two pulsed laser light sources emitting laser light of distinct wavelengths, an acousto-optic tunable filter (AOTF) for tuning at least one of the laser pulses, a delay stage provided upstream of the AOTF, and an actuator for moving delay stage depending on the time delay. As a result, the wavelength of at least one type of pulses is tuned, and the delay between at least two pulses of distinct wavelengths is adjusted. | 11-10-2011 |