Patent application number | Description | Published |
20100328391 | FIRING SIGNAL FORWARDING IN A FLUID EJECTION DEVICE - A method for forwarding a firing signal within a nozzle group of a fluid ejection device includes receiving warm data and fire data. A firing signal having a firing pulse preceded by a warming pulse is received. The firing signal is conditionally modified according to of the fire data. The conditionally modified firing signal is forwarded to a particular nozzle circuit of the nozzle group. | 12-30-2010 |
20130278656 | Determining an Issue with an Inkjet Nozzle Using an Impedance Difference - A method for determining an issue with an inkjet nozzle using an impedance difference includes taking a first impedance measurement with a sensor to detect a drive bubble in an ink chamber after a drive bubble formation mechanism is activated; and subtracting the first impedance measurement from a reference. | 10-24-2013 |
20130278657 | Calibrating a Program that Detects a Condition of an Inkjet Nozzle - A method for calibrating a program that detects a condition of an inkjet nozzle includes receiving measurement information from a sensor positioned to detect a drive bubble in an ink chamber of an inkjet nozzle; and modifying a program that determines a condition of said inkjet nozzle. | 10-24-2013 |
20130293623 | Printhead Apparatus, Printer System and Method of Printhead Built-In Test - A printhead apparatus, an inkjet printer system, and a method of built-in test employ a test flag transmitted through a data channel of a printhead. The apparatus includes a plurality of printheads, a data register at each printhead, and a status channel. Each printhead has a unidirectional data channel (UDC) to provide data to the printhead. The data register detects proper reception of a test flag received by the printhead through the UDC. The status channel reports printhead status information including whether or not proper reception of the test flag was detected by the data register. The system includes the apparatus and a controller to generate the test flag and receive the printhead status information. The method includes sending a test flag, and verifying proper reception thereof. | 11-07-2013 |
20140098155 | HEATER CONTROLLER AND METHOD THEREOF - A heater controller to maintain a uniform temperature of a printhead is provided herein. The heater controller monitors the temperature of the printhead and controls the heating of the printhead. The heater controller enables at least two of a plurality of warming groups based on warming power requirements of the printhead. The heater controller alternates activation of the at least two of the plurality of warming groups by rotating each of the at least two of the plurality of warming groups between an on mode and an off mode to uniformily distribute heating power to the printhead. | 04-10-2014 |
20140152726 | WAVEFORM SELECTION AND/OR SCALING FOR DRIVING NOZZLE OF FLUID-JET PRINTING DEVICE - A controller is for driving a nozzle of a fluid-jet printing device. The controller can select a waveform from a number of waveforms based at least on values for the nozzle. The controller can scale the waveform based on the values for the nozzle. The waveform drives the nozzle to cause the nozzle to eject fluid therefrom. | 06-05-2014 |
20140333694 | Detecting a Drive Bubble Formation and Collapse - Measuring an inkjet nozzle may nozzle may include taking at least one impedance measurement after the firing command is sent to detect the presence of a drive bubble and taking another impedance measurement to detect a collapse of the drive bubble. | 11-13-2014 |
20150022575 | PEAK ENERGY REDUCTION PRINTHEAD SYSTEM - A printhead system to reduce peak energy usage may include a printhead including a plurality of primitives including nozzles. A printhead control module may control the printhead to increase printed pixel resolution and to reduce peak pixel fill density for print media. The printhead control module may further control the printhead such that all the nozzles with a same address generally disposed in a column do not fire at the same time. | 01-22-2015 |
20150029252 | Determining an Issue in an Inkjet Nozzle with Impedance Measurements - A method for determining an issue in an inkjet nozzle with impedance measurements, includes taking a first impedance measurement to detect a drive bubble with an impedance sensor, and taking a second impedance measurement to detect said drive bubble with said impedance sensor after said first impedance measurement. | 01-29-2015 |
Patent application number | Description | Published |
20090222392 | DYMANIC INTERACTIVE ENTERTAINMENT - Disclosed are various embodiments of systems and methods for generating composite mediasets from mediasets, each comprising media items, associated with a plurality of users. In some embodiments, individual and/or group recommendations are provided for creating a group playlist by aggregating user taste data for a plurality of users in a group. In other embodiments, systems and methods are provided which allow for sharing and playing of a group playlist by users in a group, each of which has a media playback device. In still other embodiments, systems and methods are provided for dynamically building a composite playlist that may be updated as users enter and/or leave the group. One example of an interactive entertainment application also is described for use at a venue to entertain live guests with music selections that are dynamically influenced by the guests' individual tastes. | 09-03-2009 |
20090276368 | SYSTEMS AND METHODS FOR PROVIDING PERSONALIZED RECOMMENDATIONS OF PRODUCTS AND SERVICES BASED ON EXPLICIT AND IMPLICIT USER DATA AND FEEDBACK - The present describes systems and methods to support personal financial management by recommending financial products and services responsive to a user's particular financial health or situation based on explicit and implicit user data and feedback. | 11-05-2009 |
20100161595 | RECOMMENDER SYSTEM FOR IDENTIFYING A NEW SET OF MEDIA ITEMS RESPONSIVE TO AN INPUT SET OF MEDIA ITEMS AND KNOWLEDGE BASE METRICS - Systems and methods are disclosed for identifying a new set of media items in response to an input set (or “query set”) of media items and knowledge base metrics. The system uses a knowledge base consisting of a collection of mediasets. Various metrics among media items are considered by analyzing how the media items are grouped to form the mediasets in the knowledge base. Such association or “similarity” metrics are preferably stored in a matrix form that allows the system to efficiently identify a new set of media items that complements the input set of media items. | 06-24-2010 |
20100313167 | SYSTEM FOR BROWSING THROUGH A MUSIC CATALOG USING CORRELATION METRICS OF A KNOWLEDGE BASE OF MEDIASETS - A system and method to navigate through a media item catalog using correlation metrics (FIGS. | 12-09-2010 |
20110099521 | SYSTEM FOR BROWSING THROUGH A MUSIC CATALOG USING CORRELATION METRICS OF A KNOWLEDGE BASE OF MEDIASETS - A system and method to navigate through a media item catalog and generate recommendations using behavioral metrics such as correlation metrics (FIGS. | 04-28-2011 |
20110213776 | SYSTEM FOR BROWSING THROUGH A MUSIC CATALOG USING CORRELATION METRICS OF A KNOWLEDGE BASE OF MEDIASETS - A system and method to navigate through a media item catalog and generate recommendations using behavioral metrics such as correlation metrics (FIGS. | 09-01-2011 |
20130080455 | RECOMMENDER SYSTEM FOR IDENTIFYING A NEW SET OF MEDIA ITEMS RESPONSIVE TO AN INPUT SET OF MEDIA ITEMS AND KNOWLEDGE BASE METRICS - Systems and methods are disclosed for identifying a new set of media items in response to an input set (or “query set”) of media items and knowledge base metrics. The system uses a knowledge base consisting of a collection of mediasets. Various metrics among media items are considered by analyzing how the media items are grouped to form the mediasets in the knowledge base. Such association or “similarity” metrics are preferably stored in a matrix form that allows the system to efficiently identify a new set of media items that complements the input set of media items. | 03-28-2013 |
20130191318 | RECOMMENDER SYSTEM FOR IDENTIFYING A NEW SET OF MEDIA ITEMS RESPONSIVE TO AN INPUT SET OF MEDIA ITEMS AND KNOWLEDGE BASE METRICS - Systems and methods are disclosed for identifying a new set of media items in response to an input set (or “query set”) of media items and knowledge base metrics. The system uses a knowledge base consisting of a collection of mediasets. Various metrics among media items are considered by analyzing how the media items are grouped to form the mediasets in the knowledge base. Such association or “similarity” metrics are preferably stored in a matrix form that allows the system to efficiently identify a new set of media items that complements the input set of media items. | 07-25-2013 |
20140101076 | PREDICTIVE MODELING AND DATA ANALYSIS IN A SECURE SHARED SYSTEM - A system and method enables users to selectively expose and optionally monetize their data resources, for example on a web site. Data assets such as datasets and models can be exposed by the proprietor on a public gallery for use by others. Fees may be charged, for example, per new model, or per prediction using a model. Users may selectively expose public datasets or public models while keeping their raw data private. | 04-10-2014 |
20140237361 | DYNAMIC INTERACTIVE ENTERTAINMENT VENUE - Disclosed are various embodiments of systems and methods for generating composite mediasets from mediasets, each comprising media items, associated with a plurality of users. In some embodiments, individual and/or group recommendations are provided for creating a group playlist by aggregating user taste data for a plurality of users in a group. In other embodiments, systems and methods are provided which allow for sharing and playing of a group playlist by users in a group, each of which has a media playback device. In still other embodiments, systems and methods are provided for dynamically building a composite playlist that may be updated as users enter and/or leave the group. One example of an interactive entertainment application also is described for use at a venue to entertain live guests with music selections that are dynamically influenced by the guests' individual tastes. | 08-21-2014 |
Patent application number | Description | Published |
20140096068 | DEVICE AND METHOD FOR SECURE USER INTERFACE GESTURE PROCESSING USING PROCESSOR GRAPHICS - A device and method for securely rendering content on a gesture-enabled computing device includes initializing a secure execution environment on a processor graphics of the computing device. The computing device transfers view rendering code and associated state data to the secure execution environment. An initial view of the content is rendered by executing the view rendering code in the secure execution environment. A gesture is recognized, and an updated view of the content is rendered in the secure execution environment in response to the gesture. The gesture may include a touch gesture recognized on a touch screen, or a physical gesture of the user recognized by a camera. After the updated view of the content is rendered, the main processor of the computing device may receive updated view data from the secure execution environment. | 04-03-2014 |
20140123235 | Allocating Memory Access Control Policies - Enabling access control caches for co-processors to be charged using a VMX-nonroot instruction. As a result a transition to VMX-root is not needed, saving the cycles involved in such a transition. | 05-01-2014 |
20140157349 | Verified Sensor Data Processing - Sensor data may be filtered in a secure environment. The filtering may limit distribution of the sensor data. Filtering may modify the sensor data, for example, to prevent identification of a person depicted in a captured image or to prevent acquiring a user's precise location. Filtering may also add or require other data use controls to access the data. Attestation that a filter policy is being applied and working properly or not may be provided as well. | 06-05-2014 |
20140157404 | VIRTUALIZING A HARDWARE MONOTONIC COUNTER - Embodiments of an invention for virtualizing a hardware monotonic counter are disclosed. In one embodiment, an apparatus includes a hardware monotonic counter, virtualization logic, a first non-volatile storage location, and a second non-volatile storage location. The virtualization logic is to create a virtual monotonic counter from the hardware monotonic counter. The first non-volatile storage location is to store an indicator that the count of the hardware monotonic counter has changed. The second non-volatile storage location is to store an indicator that the count of the virtual monotonic counter has changed. | 06-05-2014 |
20140157410 | Secure Environment for Graphics Processing Units - In accordance with some embodiments, a protected execution environment may be defined for a graphics processing unit. This framework not only protects the workloads from malware running on the graphics processing unit but also protects those workloads from malware running on the central processing unit. In addition, the trust framework may facilitate proof of secure execution by measuring the code and data structures used to execute the workload. If a part of the trusted computing base of this framework or protected execution environment is compromised, that part can be patched remotely and the patching can be proven remotely throughout attestation in some embodiments. | 06-05-2014 |
20140181925 | Privacy Enhanced Key Management For A Web Service Provider Using A Converged Security Engine - In an embodiment, a security engine of a processor includes an identity provider logic to generate a first key pair of a key pairing associating system user and a service provider that provides a web service and having a second system coupled to the system via a network, to perform a secure communication with the second system to enable the second system to verify that the identity provider logic is executing in a trusted execution environment, and responsive to the verification, to send a first key of the first key pair to the second system. This key may enable the second system to verify an assertion communicated by the identity provider logic that the user has been authenticated to the system according to a multi-factor authentication. Other embodiments are described and claimed. | 06-26-2014 |
20140189356 | METHOD OF RESTRICTING CORPORATE DIGITAL INFORMATION WITHIN CORPORATE BOUNDARY - A method of enforcing a virtual corporate boundary may include a client device requesting sensitive content from a network site on a server device responsive to a user's interaction with the client device. The server device can determine whether the user and/or client device are permitted to access the sensitive content. A secure element on the client device can establish a session key between the server device and the client device. The server device can render the sensitive content and send it to the client device, which can display the content to the user. | 07-03-2014 |
20140189807 | METHODS, SYSTEMS AND APPARATUS TO FACILITATE CLIENT-BASED AUTHENTICATION - Methods, systems and apparatus are disclosed to facilitate client-based authentication. An example method includes associating an identity authority with a client platform in an isolated execution environment, associating a user identity with the identity authority, generating a first key pair associated with a first service provider, generating an attestation based on a first authorization sequence of the client platform, and signing the attestation with a portion of the key pair and sending the signed attestation to the first service provider to authorize communication between the client platform and the first service provider. | 07-03-2014 |
20140205085 | PREVENTING PATTERN RECOGNITION IN ELECTRONIC CODE BOOK ENCRYPTION - In general, in one aspect, noise is injected into a bitmap associated with content to be presented on a display to create a noisy bitmap. The noisy bitmap is encrypted using electronic code book (ECB) encryption. The resulting ciphertext does not include recognizable patterns from the content as is typical with ECB encryption. The injection of noise may include modifying pixel values for at least a subset of pixels in the bitmap. The pixel values may be modified by using a counter, a known modification pattern, or a random number generator. The bitmap may be analyzed to determine how the bitmap can be modified to maximize the randomness of the bitmap while ensuring that the noisy bitmap is visually perceptually similar when presented. The noise may be injected into a block of pixels prior to the block being encrypted. | 07-24-2014 |
20140282868 | Method And Apparatus To Effect Re-Authentication - A system is provided to determine whether to re-authenticate a user based on identification parameter measurements of low power sensors. According to an embodiment of the invention, a system may include a processor that includes analysis logic to determine whether to re-authenticate the user based on parameter values received from at least one of one or more agents. The system may also include authentication logic to re-authenticate the user that includes a confirmation of whether the user is authenticated based on input received from one or more authentication sensors. Other embodiments are described and claimed. | 09-18-2014 |
20140282893 | REDUCING AUTHENTICATION CONFIDENCE OVER TIME BASED ON USER HISTORY - Technologies are provided in embodiments to manage an authentication confirmation score. Embodiments are configured to identify, in absolute session time, a beginning time and an ending time of an interval of an active user session on a client. Embodiments are also configured to determine a first value representing a first subset of a set of prior user sessions, where the prior user sessions of the first subset were active for at least as long as the beginning time. Embodiments can also determine a second value representing a second subset of the set of prior user sessions, where the prior user sessions of the second subset were active for at least as long as the ending time. Embodiments also determine, based on the first and second values, a decay rate for the authentication confidence score of the active user session. In some embodiments, the set is based on context attributes. | 09-18-2014 |
20140282945 | TECHNOLOGIES FOR SECURE STORAGE AND USE OF BIOMETRIC AUTHENTICATION INFORMATION - Generally, this disclosure describes technologies for securely storing and using biometric authentication information, such as biometric reference templates. In some embodiments, the technologies include a client device that stores one or more biometric reference templates in a memory thereof. The client device may transfer such templates to an authentication device. The transfer may be conditioned on verification that the authentication device includes a suitable protected environment for the templates and will execute an acceptable temporary storage policy. The technologies may also include an authentication device that is configured to temporarily store biometric reference templates received from a client device in a protected environment thereof. Upon completion of biometric authentication or the occurrence of a termination event, the authentication devices may delete the biometric reference templates from the protected environment. | 09-18-2014 |
20140304649 | TRUSTED USER INTERACTION - In one embodiment a controller comprises a memory module, and logic configured to receive a request for trusted input from a user, define, on a region of a display device coupled to the secure controller, a dialog box, lock the dialog box such that input/output operations conducted in the dialog box are visible only to the secure controller, present, in the dialog box, one or more anti-spoof indicators and at least one input mechanism, receive a user input from the at least one input mechanism and process the user input in the secure controller. Other embodiments may be described. | 10-09-2014 |
20140366111 | CONTINUOUS AUTHENTICATION CONFIDENCE MODULE - Generally, this disclosure describes a continuous authentication confidence module. A system may include user device including processor circuitry configured to determine presence data; a confidence factor including at least one of a sensor configured to capture sensor input and a system monitoring module configured to monitor activity of the user device; memory configured to store a confidence score and an operating system; and a continuous authentication confidence module configured to determine the confidence score in response to an initial authentication of a specific user, update the confidence score based, at least in part, an expectation of user presence and/or selected presence data, and notify the operating system that the authentication is no longer valid if the updated confidence score is within a tolerance of a session close threshold; the initial authentication configured to open a session, the confidence score configured to indicate a current strength of authentication during the session. | 12-11-2014 |
20140366128 | ADAPTIVE AUTHENTICATION SYSTEMS AND METHODS - An embodiment includes a method executed by at least one processor comprising: determining a first environmental factor for a mobile communications device; determining a first security authentication level based on the determined first environmental factor; and allowing access to a first module of the mobile communications device based on the first security authentication level. Other embodiments are described herein. | 12-11-2014 |
20150057839 | CONFIGURING USER CUSTOMIZABLE OPERATIONAL FEATURES OF A VEHICLE - Embodiments of apparatus and methods for configuring user customizable operational features of a vehicle are described. In embodiments, an apparatus may include a communication module configured to be disposed in the vehicle, and communicate with a mobile device a user. The apparatus may further include a controller configured to be disposed in the vehicle and coupled with the communication module, to obtain from the mobile device, one or more preferences of the user for one or more user customizable features of the vehicle, and adjust the one or more user customizable operational features of the vehicle based at least in part on the one or more preferences of the user obtained. Other embodiments may be described and/or claimed. | 02-26-2015 |
20150070134 | AUTHENTICATION SYSTEM USING WEARABLE DEVICE - A wearable device (“WD”) stores a token after its wearer completes a successful strong authentication on a primary protected device (“primary PD”). Other protected devices (“secondary PDs”) recognize the stored token as representing a strong authentication and grant the user access while the user continues to wear the WD within a “digital leash-length” proximity. The WD constantly monitors whether the user continues to wear the device. Upon sensing that the user has removed the WD, the WD deletes, disables, or invalidates the token, The user must then repeat the strong authentication to gain further access to the protected devices. | 03-12-2015 |
20150086012 | SECURE VIDEO OUPUT PATH - Systems and methods for secure delivery of output surface bitmaps to a display engine. An example processing system comprises: an architecturally protected memory; and a processing core communicatively coupled to the architecturally protected memory, the processing core comprising a processing logic configured to implement an architecturally-protected execution environment by performing at least one of: executing instructions residing in the architecturally protected memory and preventing an unauthorized access to the architecturally protected memory; wherein the processing logic is further configured to provide a secure video output path by generating an output surface bitmap encrypted with a first encryption key and storing an encrypted first encryption key in an external memory, wherein the encrypted first encryption key is produced by encrypting the first encryption key with a second encryption key. | 03-26-2015 |
20150113241 | ESTABLISHING PHYSICAL LOCALITY BETWEEN SECURE EXECUTION ENVIRONMENTS - Embodiments of an invention for establishing physical locality between secure execution environments are disclosed. In one embodiment, a processor includes a storage location and an execution core. The storage location is to store a locality nonce. The execution core is to execute a first instruction to create a secure execution environment. The execution core is also to execute, from within the secure execution environment, a second instruction to read the locality nonce from the storage location. | 04-23-2015 |
20150135258 | MECHANISM FOR FACILITATING DYNAMIC CONTEXT-BASED ACCESS CONTROL OF RESOURCES - A mechanism is described for facilitating context-based access control of resources for according to one embodiment. A method of embodiments, as described herein, includes receiving a first request to access a resource of a plurality of resources. The first request may be associated with one or more contexts corresponding to a user placing the first request at a computing device. The method may further include evaluating the one or more contexts. The evaluation of the one or more contexts may include matching the one or more contexts with one or more access policies associated with the requested resource. The method may further include accepting the first request if the one or more contexts satisfy at least one of the access policies. | 05-14-2015 |
20150304195 | PLATFORM-ENFORCED USER ACCOUNTABILITY - Embodiments for implementing platform-enforced user accountability are generally described herein. A policy is accessed at a computing platform, the policy to define an expected behavior of a user of the system. Based on the policy, a sensor to use to enforce the policy is determined Data is obtained from the sensor, with the data indicative of an activity performed by the user, and using the data, a determination is made whether the user is in compliance with the expected behavior defined in the policy. | 10-22-2015 |
20150304736 | TECHNOLOGIES FOR HARDENING THE SECURITY OF DIGITAL INFORMATION ON CLIENT PLATFORMS - Technologies for hardening the security of digital information on a client device are described. In some embodiments, the client device includes a secure processing environment such as a secure enclave, which may be used to protect digital information on a client platform. The secure environment(s) may also protect assets which may be used to access the digital information. Using the secure processing environment(s), the described technologies may protect digital information as it is provided to, stored on, accessed on, and/or processed for display by a client device, even if the client device may be infested with malware or subject to attack by another entity. | 10-22-2015 |
20150341332 | Privacy Enhanced Key Management For A Web Service Provider Using A Converged Security Engine - In an embodiment, a security engine of a processor includes an identity provider logic to generate a first key pair of a key pairing associating system user and a service provider that provides a web service and having a second system coupled to the system via a network, to perform a secure communication with the second system to enable the second system to verify that the identity provider logic is executing in a trusted execution environment, and responsive to the verification, to send a first key of the first key pair to the second system. This key may enable the second system to verify an assertion communicated by the identity provider logic that the user has been authenticated to the system according to a multi-factor authentication. Other embodiments are described and claimed. | 11-26-2015 |
20150347768 | Policy-Based Trusted Inspection of Rights Managed Content - An embodiment includes a method executed by at least one processor comprising: initializing first and second secure enclaves each comprising a trusted software execution environment that prevents software executing outside the first and second secure enclaves from having access to software and data inside the first and second secure enclaves; the first secure enclave (a)(i) inspecting a policy, (a)(ii) authenticating the second secure enclave in response to inspecting the policy; and (a)(iii) communicating encrypted content to the second secure enclave in response to authenticating the second secure enclave; and the second secure enclave (b)(i) decrypting the encrypted content to produce decrypted content, and (b)(ii) inspecting the decrypted content. Other embodiments are described herein. | 12-03-2015 |
20150350255 | Verified Sensor Data Processing - Sensor data may be filtered in a secure environment. The filtering may limit distribution of the sensor data. Filtering may modify the sensor data, for example, to prevent identification of a person depicted in a captured image or to prevent acquiring a user's precise location. Filtering may also add or require other data use controls to access the data. Attestation that a filter policy is being applied and working properly or not may be provided as well. | 12-03-2015 |
20150373007 | Continuous Authentication Confidence Module - Generally, this disclosure describes a continuous authentication confidence module. A system may include user device including processor circuitry configured to determine presence data; a confidence factor including at least one of a sensor configured to capture sensor input and a system monitoring module configured to monitor activity of the user device; memory configured to store a confidence score and an operating system; and a continuous authentication confidence module configured to determine the confidence score in response to an initial authentication of a specific user, update the confidence score based, at least in part, an expectation of user presence and/or selected presence data, and notify the operating system that the authentication is no longer valid if the updated confidence score is within a tolerance of a session close threshold; the initial authentication configured to open a session, the confidence score configured to indicate a current strength of authentication during the session. | 12-24-2015 |
20150381634 | TRUSTED TIME SERVICE FOR OFFLINE MODE - Systems and methods for providing trusted time service for the off-line mode of operation of a processing system. An example processing system comprises: a first processing device communicatively coupled to a real-time clock, the first processing device to modify an epoch value associated with the real-time clock responsive to detecting a reset of the real-time clock; and a second processing device to execute, in a first trusted execution environment, a first application to receive, from the first processing device, a first time value outputted by the real-time clock and a first epoch value associated with the real-time clock. | 12-31-2015 |
Patent application number | Description | Published |
20090319230 | Multi-Sensor Monitoring of Athletic Performance - Athletic performance monitoring systems and methods, many of which utilize, in some manner, global positioning satellite (“GPS”) data, provide data and information to athletes and/or to equipment used by athletes during an athletic event. Such systems and methods may provide route information to athletes and/or their trainers, e.g. for pre-event planning, goal setting, and calibration purposes. Such systems and methods optionally may provide real time information to the athlete while the event takes place, e.g., to assist in reaching the pre-set goals. Additionally, data and information collected by such systems and methods may assist in post-event analysis for athletes and their trainers, e.g., to evaluate past performances and to assist in improving future performances. | 12-24-2009 |
20100210421 | Multi-Sensor Monitoring of Athletic Performance - Athletic performance monitoring systems and methods, many of which utilize, in some manner, global positioning satellite (“GPS”) data, provide data and information to athletes and/or to equipment used by athletes during an athletic event. Such systems and methods may provide route information to athletes and/or their trainers, e.g., for pre-event planning, goal setting, and calibration purposes. Such systems and methods optionally may provide real time information to the athlete while the event takes place, e.g., to assist in reaching the pre-set goals. Additionally, data and information collected by such systems and methods may assist in post-event analysis for athletes and their trainers, e.g., to evaluate past performances and to assist in improving future performances. | 08-19-2010 |
20120078396 | Multi-Sensor Monitoring of Athletic Performance - Athletic performance monitoring systems and methods, many of which utilize, in some manner, global positioning satellite (“GPS”) data, provide data and information to athletes and/or to equipment used by athletes during an athletic event. Such systems and methods may provide route information to athletes and/or their trainers, e.g., for pre-event planning, goal setting, and calibration purposes. Such systems and methods optionally may provide real time information to the athlete while the event takes place, e.g., to assist in reaching the pre-set goals. Additionally, data and information collected by such systems and methods may assist in post-event analysis for athletes and their trainers, e.g., to evaluate past performances and to assist in improving future performances. | 03-29-2012 |
20120083353 | Putter Heads and Putters - Putter heads and putters include one or more of: (a) a main putter body portion including a first arm and a second arm; (b) a first polymeric and/or damping element engaged with the first arm; and (c) a second polymeric and/or damping element engaged with the second arm. The putter heads further may include polymeric material within the putter head structure and exposed at a central ball striking portion of the ball striking face, e.g., in elongated openings provided in the ball striking face. Grooves may be provided in the material of the ball striking face and/or in the exposed polymeric material to affect the ball launch. The putter heads may have various additional features or structures, e.g., relating to weighting features, alignment aid features, putter head constructions or parts, polymeric material exposure features, groove features, etc. | 04-05-2012 |
20120220386 | Putter Heads and Putters - Putter heads include a ball striking head body member and a rear body member. In some putter heads, the ball striking head body member includes a rearwardly extending body support having an opening defined therein, and the rear body member extends through this opening. In other putter heads, the rear body member includes a forwardly projecting platform that includes an alignment aid thereon. In still other putter heads, the ball striking head body member includes rearward extending arms at the heel and toe sides that extend rearward at an angle to a location outside the heel and toe edges, respectively, of the ball striking face. Additionally, the rear body member of other putter heads have a first end engaged at a heel side of the ball striking head body member and a free second end that is not engaged with any portion of the putter head. | 08-30-2012 |
20120228318 | Reusable Beverage Container Insulator and Handle - A family of reusable insulating cup handles featuring an interesting haptic “click” characteristic and a grip-enhancing resilient, tacky surface, which may be made from a variety of materials. | 09-13-2012 |
20130020317 | Bottle Protector and Handle - A baby-bottle protector and grip is secured to the bottle by screwing a mounting collar between the bottle and the cap, or by stretching the mounting collar around the bottle neck or cap. The protector forms a generally ball-shaped cage around the bottle, where bars or ribs of the cage can be grasped by an infant. The ribs help protect the bottle if it is dropped. In some embodiments, the protector pulls the bottle into the ball to provide better protection. | 01-24-2013 |
20130142371 | Detachable Audio Speakers for Portable Devices and Methods for Manufacturing such Speakers - A portable audio speaker system is configured as a generally tubular structure with a slot along its side, into which the edge of a laptop screen or tablet computer may be inserted. Audio drivers within the structure reproduce sounds from the computer. Embodiments may be wired or wireless. Other features and manufacturing techniques are described and claimed. | 06-06-2013 |
20130203522 | Putter Heads and Putters - A putter head has a putter body having a base member defining a ball striking face surface. The putter body further has a first arm extending away from the base member and a second arm extending away from the base member, and a central member extending away from the base member and positioned between the first arm and the second arm. A weight assembly is supported by the putter body. The weight assembly has a beam member having a first end, a second end and a central portion. The central portion is supported by the central member along a first plane, and the first end of the beam member is supported by the first arm along a second plane. The second plane is generally transverse to the first plane. | 08-08-2013 |
20140330409 | Multi-Sensor Monitoring of Athletic Performance - Athletic performance monitoring systems and methods, many of which utilize, in some manner, global positioning satellite (“GPS”) data, provide data and information to athletes and/or to equipment used by athletes during an athletic event. Such systems and methods may provide route information to athletes and/or their trainers, e.g., for pre-event planning, goal setting, and calibration purposes. Such systems and methods optionally may provide real time information to the athlete while the event takes place, e.g., to assist in reaching the pre-set goals. Additionally, data and information collected by such systems and methods may assist in post-event analysis for athletes and their trainers, e.g., to evaluate past performances and to assist in improving future performances. | 11-06-2014 |
Patent application number | Description | Published |
20080274907 | FLUOROGENIC PH SENSITIVE DYES AND THEIR METHOD OF USE - A new class of pH sensitive fluorescent dyes and assays relating thereto are described. The dyes and assays are particularly suited for biological applications including phagocytosis and monitoring intracellular processes. The pH sensitive fluorescent dyes of the present invention include compounds of Formula I: | 11-06-2008 |
20090029389 | FLUORESCENT METAL ION INDICATORS WITH LARGE STOKES SHIFTS - The present invention provides fluorogenic compounds for the detection of target metal ions wherein the compounds exhibit a Stokes shift greater than 50 nm and the detectable signal is modulated by photoinduced electron transfer (PET). The present compounds consist of three functional elements, the ion sensing moiety (chelating moiety), the reporter moiety (fluorophore or fluorescent protein) and spacer or linker between the sensing and reporter moieties of the present compound that allows for PET upon binding of a metal ion and excitation by an appropriate wavelength. | 01-29-2009 |
20100068748 | Fluorescent Ion Indicators for Cadmium and Lanthanide Ion Detection - The present invention provides a metal chelator and methods that facilitate binding, detecting, monitoring and quantitating of heavy metal ions in a sample. This metal chelating moiety has the following formula | 03-18-2010 |
20100196922 | FLUORESCENT METAL ION INDICATORS WITH LARGE STOKES SHIFTS - The present invention provides fluorogenic compounds for the detection of target metal ions wherein the compounds exhibit a Stokes shift greater than 50 nm and the detectable signal is modulated by photoinduced electron transfer (PET). The present compounds consist of three functional elements, the ion sensing moiety (chelating moiety), the reporter moiety (fluorophore or fluorescent protein) and spacer or linker between the sensing and reporter moieties of the present compound that allows for PET upon binding of a metal ion and excitation by an appropriate wavelength. | 08-05-2010 |
20100330584 | LONG WAVELENGTH FLUOROGENIC INTRACELLULAR ION INDICATORS THAT ARE WELL RETAINED IN THE CYTOSOL - Cell permeable metal ion indicator compounds and methods of their use and synthesis are described. The compound comprises a metal chelating moiety (M | 12-30-2010 |
20110306082 | "BENZOXAZOLE-BASED FLUORESCENT METAL ION INDICATORS" - Disclosed are benzoxazole-based compounds, kits, and methods of producing and using the described compounds in fluorescence-based detection of analytes (e.g., metal ions). Also disclosed are uses of benzoxazole-based compounds as ratiometric metal ion indicators. | 12-15-2011 |
20120009683 | Fluorescent Metal Ion Indicators with Large Stokes Shifts - The present invention provides fluorogenic compounds for the detection of target metal ions wherein the compounds exhibit a Stokes shift greater than 50 nm and the detectable signal is modulated by photoinduced electron transfer (PET). The present compounds consist of three functional elements, the ion sensing moiety (chelating moiety), the reporter moiety (fluorophore or fluorescent protein) and spacer or linker between the sensing and reporter moieties of the present compound that allows for PET upon binding of a metal ion and excitation by an appropriate wavelength. | 01-12-2012 |
20130096300 | LONG WAVELENGTH FLUOROGENIC INTRACELLULAR ION INDICATORS THAT ARE WELL RETAINED IN THE CYTOSOL - Cell permeable metal ion indicator compounds and methods of their use and synthesis are described. The compound comprises a metal chelating moiety (M | 04-18-2013 |
20140045171 | BENZOXAZOLE-BASED FLUORESCENT METAL ION INDICATORS - Disclosed are benzoxazole-based compounds, kits, and methods of producing and using the described compounds in fluorescence-based detection of analytes (e.g., metal ions). Also disclosed are uses of benzoxazole-based compounds as ratiometric metal ion indicators. | 02-13-2014 |
20140363824 | Fluorescent Metal Ion Indicators with Large Stokes Shifts - The present invention provides fluorogenic compounds for the detection of target metal ions wherein the compounds exhibit a Stokes shift greater than 50 nm and the detectable signal is modulated by photoinduced electron transfer (PET). The present compounds consist of three functional elements, the ion sensing moiety (chelating moiety), the reporter moiety (fluorophore or fluorescent protein) and spacer or linker between the sensing and reporter moieties of the present compound that allows for PET upon binding of a metal ion and excitation by an appropriate wavelength. | 12-11-2014 |
20140363839 | LONG WAVELENGTH FLUOROGENIC INTRACELLULAR ION INDICATORS THAT ARE WELL RETAINED IN THE CYTOSOL - Cell permeable metal ion indicator compounds and methods of their use and synthesis are described. The compound comprises a metal chelating moiety (M | 12-11-2014 |
20150037834 | FLUOROGENIC PH SENSITIVE DYES AND THEIR METHOD OF USE - A new class of pH sensitive fluorescent dyes and assays relating thereto are described. The dyes and assays are particularly suited for biological applications including phagocytosis and monitoring intracellular processes. The pH sensitive fluorescent dyes of the present invention include compounds of Formula I: | 02-05-2015 |