Mckeeth
Dave Mckeeth, Arcadia, WI US
Patent application number | Description | Published |
---|---|---|
20130318951 | SENSOR CONNECTION INTEGRATION DEVICE - An article of manufacture includes a housing having three input ports and an output port. An electronic sensor operationally coupled to an exhaust flowpath is coupled to the first input port via an electrical conduit. A first fluid conduit fluidly couples the second input port to the exhaust flowpath upstream of a particulate filter, and a second fluid conduit fluidly couples the third input port to the exhaust flowpath downstream of the particulate filter. A differential pressure sensor in the housing determines a differential pressure in response to a first pressure at the second input port and a second pressure at the third input port. The article includes a communication module that provides electronic information representative of the differential pressure and output from the electronic sensor at the output port, wherein the communication module is disposed in the housing. | 12-05-2013 |
Dave J. Mckeeth, Arcadia, WI US
Patent application number | Description | Published |
---|---|---|
20090188113 | APPARATUS, SYSTEM, AND METHOD FOR CUTTING TUBES - An apparatus, system, and method for cutting tubes has a scarf cut made in a direction transverse to a cut-off direction. The scarf cut passes through a thickness of a tube wall and forms an opening that receives a tip of a cut-off blade. The cut-off blade has cutting edges with an angle that engage ends of the opening such that a slug is forced upward and outward relative to the tubes. The scarf blade, the cut-off blade, and a clamping jaw may be moved in a coordinated manner by separate drivers operated under control of an electronic controller. | 07-30-2009 |
James Mckeeth, Nampa, ID US
Patent application number | Description | Published |
---|---|---|
20110119759 | SYSTEM AND METHOD FOR CONTROLLING USER ACCESS TO AN ELECTRONIC DEVICE - A method and system for authenticating a user to access a computer system. The method comprises communicating security information to the computer system, and providing the computer system with an implicit input. The method further comprises determining whether the security information and implicit input match corresponding information associated with the user. The method further comprises granting the user access to the computer system in the event of a satisfactory match. When authenticating the user, the method and system consider the possibility of the user being legitimate but subject to duress or force by a computer hacker. | 05-19-2011 |
20110225597 | COMMAND LINE OUTPUT REDIRECTION - In one embodiment the invention provides a method to provide command line utility output to an application without the need of temporary files. The method includes receiving an identifier, receiving output from a command line utility, and storing the command line utility output in a system storage at a location identified by the identifier. In one illustrative embodiment, command line utility output is stored in a system registry database. In another illustrative embodiment, command line utility output is stored in a shared system memory. The method may be stored in any media that is readable and executable by a computer system. | 09-15-2011 |
20110225598 | COMMAND LINE OUTPUT REDIRECTION - In one embodiment the invention provides a method to provide command line utility output to an application without the need of temporary files. The method includes receiving an identifier, receiving output from a command line utility, and storing the command line utility output in a system storage at a location identified by the identifier. In one illustrative embodiment, command line utility output is stored in a system registry database. In another illustrative embodiment, command line utility output is stored in a shared system memory. The method may be stored in any media that is readable and executable by a computer system. | 09-15-2011 |
20120198544 | SYSTEM AND METHOD FOR CONTROLLING USER ACCESS TO AN ELECTRONIC DEVICE - A method and system for authenticating a user to access a computer system. The method comprises communicating security information to the computer system, and providing the computer system with an implicit input. The method further comprises determining whether the security information and implicit input match corresponding information associated with the user. The method further comprises granting the user access to the computer system in the event of a satisfactory match. When authenticating the user, the method and system consider the possibility of the user being legitimate but subject to duress or force by a computer hacker. | 08-02-2012 |
20140344833 | COMMAND LINE OUTPUT REDIRECTION - In one embodiment the invention provides a method. The method includes invoking, via an application, a call of a command line utility; providing, via the application, an identifier in the call of the command line utility, wherein the identifier comprises an operating system controlled memory location; storing output from the command line utility in operating system shared memory at the operating system controlled memory location identified by the identifier; and retrieving, by the application, the command line utility output from the operating system shared memory at the operating system controlled memory location identified by the identifier. | 11-20-2014 |
James Mckeeth, Boise, ID US
Patent application number | Description | Published |
---|---|---|
20130185790 | SYSTEM AND METHOD FOR CONTROLLING USER ACCESS TO AN ELECTRONIC DEVICE - A method and system for authenticating a user to access a computer system. The method comprises communicating security information to the computer system, and providing the computer system with an implicit input. The method further comprises determining whether the security information and implicit input match corresponding information associated with the user. The method further comprises granting the user access to the computer system in the event of a satisfactory match. When authenticating the user, the method and system consider the possibility of the user being legitimate but subject to duress or force by a computer hacker. | 07-18-2013 |
20140351928 | SYSTEM AND METHOD FOR CONTROLLING USER ACCESS TO AN ELECTRONIC DEVICE - A method and system for authenticating a user to access a computer system. The method comprises communicating security information to the computer system, and providing the computer system with an implicit input. The method further comprises determining whether the security information and implicit input match corresponding information associated with the user. The method further comprises granting the user access to the computer system in the event of a satisfactory match. When authenticating the user, the method and system consider the possibility of the user being legitimate but subject to duress or force by a computer hacker. | 11-27-2014 |
Jim Mckeeth, Nampa, ID US
Patent application number | Description | Published |
---|---|---|
20100057802 | METHOD AND SYSTEM FOR UPDATING A SEARCH ENGINE - A method and a system for maintaining the freshness of a search engine server's database. A popularity parameter is defined, and a popularity value is assigned to each link in the search engine's database. The most popular links are selected for updating the contents stored, or associated with, the site to which the links refer. In one embodiment, popularity is based at least in part on the search results generated by the search engine in response to user queries. | 03-04-2010 |
20120011116 | METHOD AND SYSTEM FOR UPDATING A SEARCH ENGINE - A method and a system for maintaining the freshness of a search engine server's database. A popularity parameter is defined, and a popularity value is assigned to each link in the search engine's database. The most popular links are selected for updating the contents stored, or associated with, the site to which the links refer. In one embodiment, popularity is' based at least in part on the search results generated by the search engine in response to user queries. | 01-12-2012 |