Leo R.
Leo R. Benetti-Longhini, Tullahoma, TN US
Patent application number | Description | Published |
---|---|---|
20110277560 | WHEEL FORCE MEASUREMENT SYSTEM - A system for measuring forces applied to a moving vehicle is disclosed. The system includes a sensor plate that is configured to be mounted between a wheel and a hub of the vehicle. The sensor plate is further configured to sense at least one of the set of longitudinal, vertical, and lateral forces as well as longitudinal and vertical moments that are transferred between the wheel and the hub through the sensor plate. The system also includes an electronics package that is coupled to the sensor plate. The electronics package is configured to measure the forces and moments sensed by the sensor plate and provide an output comprising at least one signal representative of at least a portion of the measurements. The system also includes data system coupled to the electronics package, the data system configured to receive the output of the electronics package. | 11-17-2011 |
Leo R. Croisetiere, King George, VA US
Patent application number | Description | Published |
---|---|---|
20090056193 | Bait launcher - A device is disclosed that pneumatically propels a fishing lure or bait/weight combination a great distance. Pneumatic pressure is provided in combination with a conventional ice chest. A pneumatic tube is releasably provided from the ice chest. The pneumatic tube also operates as a handle to pull the ice chest on wheels when the pneumatic tube is in storage position. A power piston located within the pneumatic tube propels the fishing lure or bait/weight combination with pneumatic pressure is released with a valve mechanism. | 03-05-2009 |
Leo R. Mindick, Great Neck, NY US
Patent application number | Description | Published |
---|---|---|
20110077669 | Laparoscopic Anastomosis Tools And Technique - An anastomosis normally closed clip comprising a first side including at least one first suture guide, the first suture guide being disposed on a top of the clip, the first end portion and the first suture guide defining a first suture space open toward the top of the clip, the first side further including a first carrier slot on the bottom of the clip; and a second side which is the mirror image of the first side. An introducer device is used to open the clip and introduce it into a patient over two organ segments to be sutured together and allow the clip to close. The suture spaces allow for continuous suturing of the organ segments. The introducer device is used to remove the clip from the patient after the suture procedure. | 03-31-2011 |
Leo R. Takaoka, Newton, MA US
Patent application number | Description | Published |
---|---|---|
20120214794 | HETEROARYLS AND USES THEREOF - This invention provides compounds of formula I-A or I-B: | 08-23-2012 |
20150148334 | HETEROARYLS AND USES THEREOF - This invention provides compounds of formula I-A or I-B: | 05-28-2015 |
Leo R. Versola, San Francisco, CA US
Patent application number | Description | Published |
---|---|---|
20160080415 | NETWORK INTRUSION DIVERSION USING A SOFTWARE DEFINED NETWORK - Methods, devices, and systems are described for diverting a computer hacker from a physical or other targeted production computer to a decoy software-based host emulator that emulates the physical computer. The decoy has the exact same IP address as the physical computer. In order to avoid packet collisions, a programmable physical switch and a virtual networking switch are employed, both of which can use software-defined networking (SDN). The virtual switch prevents packets from the decoy from flowing out of its virtual network until commanded. Upon a command, the physical switch redirects specific flows to the virtual switch, and the virtual switch opens specific flows from the decoy. The specific flows are those with packets containing the hacker's computer IP address, production computer IP address, and production computer port. The packets are associated with TCP connections or UDP sessions. The decoy host emulator can be a virtual machine (VM) running alongside many other VMs in a single computer. If the hacker performs a horizontal scan of the network, additional flows are diverted to other decoy host emulators. | 03-17-2016 |