Patent application number | Description | Published |
20090032310 | EARTH-BORING TOOLS HAVING PARTICLE-MATRIX COMPOSITE BODIES, METHODS FOR WELDING PARTICLE-MATRIX COMPOSITE BODIES AND METHODS FOR REPAIRING PARTICLE-MATRIX COMPOSITE BODIES - Methods for welding a particle-matrix composite body to another body and repairing particle-matrix composite bodies are disclosed. Additionally, earth-boring tools having a joint that includes an overlapping root portion and a weld groove having a face portion with a first bevel portion and a second bevel portion are disclosed. In some embodiments, a particle-matrix bit body of an earth-boring tool may be repaired by removing a damaged portion, heating the particle-matrix composite bit body, and forming a built-up metallic structure thereon. In other embodiments, a particle-matrix composite body may be welded to a metallic body by forming a joint, heating the particle-matrix composite body, melting a metallic filler material forming a weld bead and cooling the welded particle-matrix composite body, metallic filler material and metallic body at a controlled rate. | 02-05-2009 |
20100263935 | EARTH BORING ROTARY DRILL BITS AND METHODS OF MANUFACTURING EARTH BORING ROTARY DRILL BITS HAVING PARTICLE MATRIX COMPOSITE BIT BODIES - Methods of forming bit bodies for earth-boring bits include assembling green components, brown components, or fully sintered components, and sintering the assembled components. Other methods include isostatically pressing a powder to form a green body substantially composed of a particle-matrix composite material, and sintering the green body to provide a bit body having a desired final density. Methods of forming earth-boring bits include providing a bit body substantially formed of a particle-matrix composite material and attaching a shank to the body. The body is provided by pressing a powder to form a green body and sintering the green body. Earth-boring bits include a unitary structure substantially formed of a particle-matrix composite material. The unitary structure includes a first region configured to carry cutters and a second region that includes a threaded pin. Earth-boring bits include a shank attached directly to a body substantially formed of a particle-matrix composite material. | 10-21-2010 |
20100276205 | METHODS OF FORMING EARTH-BORING ROTARY DRILL BITS - Methods of forming earth-boring rotary drill bits include providing a bit body, providing a shank that is configured for attachment to a drill string, and attaching the shank to the bit body. Providing a bit body includes providing a green powder component having a first region having a first composition and a second region having a second, different composition, and at least partially sintering the green powder component. Other methods include providing a powder mixture, pressing the powder mixture to form a green component, and sintering the green component to a final density. A shank is provided that includes an aperture, and a feature is machined in a surface of the bit body. The aperture is aligned with the feature, and a retaining member is inserted through the aperture. An earth-boring bit includes a bit body comprising a particle-matrix composite material including a plurality of hard particles dispersed throughout a matrix material. A shank is attached to the bit body using a retaining member. | 11-04-2010 |
20110079446 | EARTH-BORING TOOLS AND COMPONENTS THEREOF AND METHODS OF ATTACHING COMPONENTS OF AN EARTH-BORING TOOL - Methods for welding a fixed-cutter bit body to a shank of an earth-boring bit are disclosed. An interface may be formed between the fixed-cutter bit body and the shank, and the interface may be friction stir welded. In some embodiments, the fixed-cutter bit body and the shank may overlap proximate to an exterior surface of the earth-boring bit. Methods for welding at least two portions of a bit body of a roller cone bit are also disclosed. An interface may formed between the at least two portions of the bit body of the roller cone bit and the interface may be friction stir welded. Earth-boring rotary drill bits formed using such methods are also disclosed. | 04-07-2011 |
Patent application number | Description | Published |
20080236899 | Shrink fit sleeve assembly for a drill bit, including nozzle assembly and method thereof - A shrink-fit sleeve assembly comprising a bit body includes at least one sleeve port with a substantially tubular sleeve disposed therein and interferingly engaged therewith. The sleeve port includes an internal surface of substantially circular cross-section, and the tubular sleeve includes an internal nozzle port and an external surface of substantially circular cross-section. A lateral dimension of the external surface is equal to or greater than the first dimension at ambient temperature. A nozzle assembly and a method of manufacturing or retrofitting a drill bit are also disclosed. | 10-02-2008 |
20100155147 | METHODS OF ENHANCING RETENTION FORCES BETWEEN INTERFERING PARTS, AND STRUCTURES FORMED BY SUCH METHODS - A shrink-fit sleeve assembly comprising a bit body includes at least one sleeve port with a substantially tubular sleeve disposed therein and interferingly engaged therewith. The sleeve port includes an internal surface of substantially circular cross-section, and the tubular sleeve includes an internal nozzle port and an external surface of substantially circular cross-section. A lateral dimension of an external surface is equal to or greater than a first dimension at ambient temperature. A nozzle assembly and a method of manufacturing or retrofitting a drill bit are also disclosed. | 06-24-2010 |
20110031026 | EARTH-BORING TOOLS AND COMPONENTS THEREOF INCLUDING EROSION RESISTANT EXTENSIONS, AND METHODS OF FORMING SUCH TOOLS AND COMPONENTS - Earth-boring drill bits include a bit body, an erosion-resistant extension, and a shank. The erosion-resistant extension includes a generally tubular body, and an erosion-resistant material lining the generally tubular body within a fluid passageway. The erosion-resistant material lining the generally tubular body within the fluid passageway exhibits an erosion resistance greater than an erosion resistance exhibited by a material of the generally tubular body. Methods of forming an erosion-resistant extension include lining at least a portion of a wall of a generally tubular body within a fluid passageway extending through the generally tubular body with an erosion-resistant material. | 02-10-2011 |
20120103691 | METHODS OF COUPLING COMPONENTS OF DOWNHOLE TOOLS, DOWNHOLE TOOLS AND COMPONENTS OF DOWNHOLE TOOLS - Methods of coupling a bearing assembly to a downhole tool include forming at least a portion of a downhole component from a diamond-enhanced material, applying a metal material to a surface of the downhole component using an ultrasonic molten metal process, and coupling at least a portion of the surface of the downhole component to at least another component of the downhole tool. Downhole tools include at least one component of a bearing assembly that is configured to move relative to a portion of the downhole tool. The at least one bearing component comprises a diamond-enhanced material and is coupled to a portion of the downhole tool by an ultrasonic molten metal process. | 05-03-2012 |
20120255743 | CORRODABLE BORING SHOES FOR WELLBORE CASING, AND METHODS OF FORMING AND USING SUCH CORRODABLE BORING SHOES - Earth-boring casing shoes include a crown configured for at least one of drilling and reaming a wellbore when the crown is attached to a section of casing and the casing is advanced into a wellbore. The crown includes a body comprising a corrodible composite material, and at least one cutting structure carried on the body. The casing shoes further include connection structure configured for attachment to a section of casing. Methods are used to form such casing shoes, and such casing shoes are used to install casing within wellbores. | 10-11-2012 |
20120298422 | CORRODIBLE TRIGGERING ELEMENTS FOR USE WITH SUBTERRANEAN BOREHOLE TOOLS HAVING EXPANDABLE MEMBERS AND RELATED METHODS - Expandable apparatus include a triggering element comprising an at least partially corrodible composite material. Methods are used to trigger expandable apparatus using such a triggering element and to form such triggering elements for use with expandable apparatus. | 11-29-2012 |
20140299386 | CORRODABLE BORING SHOES FOR WELLBORE CASING, AND METHODS OF FORMING SUCH CORRODABLE BORING SHOES - Earth-boring casing shoes include a crown configured for at least one of drilling and reaming a wellbore when the crown is attached to a section of casing and the casing is advanced into a wellbore. The crown includes a body comprising a corrodible composite material, and at least one cutting structure carried on the body. The casing shoes further include a connection structure configured for attachment to a section of casing. Methods are used to form such casing shoes, and such casing shoes are used to install casing within wellbores. | 10-09-2014 |
20140374123 | CORRODIBLE TRIGGERING ELEMENTS FOR USE WITH SUBTERRANEAN BOREHOLE TOOLS HAVING EXPANDABLE MEMBERS AND RELATED METHODS - Expandable apparatus include a triggering element comprising an at least partially corrodible composite material. Methods are used to trigger expandable apparatus using such a triggering element and to form such triggering elements for use with expandable apparatus. | 12-25-2014 |
Patent application number | Description | Published |
20140258082 | CROSS BORDER COMPETENCIES TOOL - According to one embodiment, an apparatus may comprise a memory unit and a processing unit. The memory unit may store loan and tax regulations of a plurality of countries. The processing unit may receive a country designation and a currency designation. The processing unit may determine, based at least in part upon the loan regulations associated with the country designation, at least one service location that is allowed to service a loan according to the currency designation and the country designation. The processing unit may further determine, based at least in part upon the retrieved tax regulations associated with the country designation, a tax withholding on the loan. | 09-11-2014 |
20140324657 | CROSS BORDER COMPETENCIES TOOL - According to one embodiment, an apparatus may comprise a memory, a network interface, and a processor communicatively coupled to the memory and to the network interface. The memory may store information associated with a previous loan. The network interface may receive a request associated with a loan. The processor may determine, based at least in part upon the information, that the previous loan is related to the loan, and predict, in response to the determination that the previous loan is related to the loan, information associated with the loan based at least in part upon the stored information associated with the previous loan. The network interface may further communicate a message indicating the predicted information. | 10-30-2014 |
20140324670 | CROSS BORDER COMPETENCIES TOOL - According to one embodiment, an apparatus may comprise a memory, a network interface, and a processor communicatively coupled to the memory and to the network interface. The memory may store at least one location-based rule, and store a template. The network interface may receive a message indicating a location associated with a loan. The processor may determine, based at least in part upon the location, at least one location-based rule, and modify the template based at least in part upon the at least one location-based rule to form a second template. The network interface may further communicate a second message comprising the second template in order to provide information associated with the loan. | 10-30-2014 |
20140324671 | Cross Border Competencies Tool - According to one embodiment, an apparatus may comprise a memory, a network interface, and a processor communicatively coupled to the memory and the network interface. The memory may store contact information associated with a plurality of lenders. The network interface may receive a request for a loan, wherein a portion of the loan is to be funded by a first lender, and receive a second request indicating a second lender selected from the plurality of lenders. The processor may determine an offer for a second portion of the loan to be funded by the second lender. The network interface may further communicate the offer based at least in part upon the contact information associated with the second lender. The second portion may not funded by the first lender. | 10-30-2014 |
20140324672 | CROSS BORDER COMPETENCIES TOOL - According to one embodiment, an apparatus may comprise a memory, a network interface, and a processor communicatively coupled to the memory and the network interface. The memory may store information associated with a loan, the information comprising a first date on which the information was generated and a plurality of previous dates associated with a previous loan. The processor may determine, based at least in part upon the first date and the plurality of previous dates, a second date on which the loan is estimated to close, and determine, based at least in part upon the first date and the plurality of previous dates, a third date on which a task associated with the loan should be completed in order for the loan to close by the second date. The network interface may communicate a message indicating the first date, the second date, the third date, and the task. | 10-30-2014 |
20140324673 | Cross Border Competencies Tool - According to one embodiment, an apparatus may comprise a memory, a network interface, and a processor communicatively coupled to the memory and to the network interface. The memory may store information associated with a first loan, the information comprising a competitor product selected to fund the first loan. The network interface may receive a request associated with a second loan. The processor may determine that the first loan is similar to the second loan. The network interface may further communicate, in response to the processor determining that the first loan is similar to the second loan, a message indicating that the competitor product should be offered to fund the second loan. | 10-30-2014 |
20140324715 | CROSS BORDER COMPETENCIES TOOL - According to one embodiment, an apparatus may comprise a memory, a network interface, and a processor communicatively coupled to the memory and to the network interface. The memory may store a regulation subscription associated with a loan regulation and a tax subscription associated with a tax regulation. The network interface may receive a regulation feed and a tax feed. The processor may determine, based at least in part upon the regulation feed and the tax feed, that at least one of the loan regulation and the tax regulation has changed. The network interface may further communicate, in response to the determination that at least one of the loan regulation and tax regulation has changed and based at least in part upon at least one of the regulation subscription and the tax subscription, a message indicating that at least one of the loan regulation and the tax regulation has changed. | 10-30-2014 |
20150066724 | CROSS BORDER COMPETENCIES TOOL - According to one embodiment, an apparatus may comprise a memory, a network interface, and a processor communicatively coupled to the memory and to the network interface. The memory may store a name of a foreign country where a previous loan occurred. The network interface may receive a request for a currency exchange rate for a loan in the foreign country. The processor may determine that the previous loan occurred in the foreign country. The processor may determine a competitor for the requested loan and an employee available to service the requested loan. The processor may determine a currency exchange rate for the previous loan and the currency exchange rate for the requested loan. The network interface may communicate a message indicating the currency exchange rate for the requested loan. The currency exchange rate for the requested loan is used to determine whether to apply for the requested loan. | 03-05-2015 |
Patent application number | Description | Published |
20080240420 | METHOD AND SYSTEM FOR A RECURSIVE SECURITY PROTOCOL FOR DIGITAL COPYRIGHT CONTROL - Systems and methods are described which utilize a recursive security protocol for the protection of digital data. These may include encrypting a bit stream with a first encryption algorithm and associating a first decryption algorithm with the encrypted bit stream. The resulting bit stream may then be encrypted with a second encryption algorithm to yield a second bit stream. This second bit stream is then associated with a second decryption algorithm. This second bit stream can then be decrypted by an intended recipient using associated keys. | 10-02-2008 |
20090052662 | METHOD AND SYSTEM FOR A RECURSIVE SECURITY PROTOCOL FOR DIGITAL COPYRIGHT CONTROL - Systems and methods are described which utilize a recursive security protocol for the protection of digital data. These may include encrypting a bit stream with a first encryption algorithm and associating a first decryption algorithm with the encrypted bit stream. The resulting bit stream may then be encrypted with a second encryption algorithm to yield a second bit stream. This second bit stream is then associated with a second decryption algorithm. This second bit stream can then be decrypted by an intended recipient using associated keys. | 02-26-2009 |
20100008529 | Speakerphone Including a Plurality of Microphones Mounted by Microphone Supports - In various embodiments, a speakerphone may comprise multiple (e.g., 16) microphones placed in a circular array around a central speaker. Each microphone may be mounted to the speakerphone through a microphone support. The microphone support may be made of a flexible material and have various features designed to minimize interference to the microphone (e.g., from the speaker and/or vibrations external to the speakerphone). The centrally mounted speaker may be coupled to a stiff internal speaker enclosure. The speaker enclosure may be made of a stiff, heavy material (e.g., a dense plastic) to prevent the speaker vibrations from excessively vibrating the speakerphone enclosure (which may affect the microphones). | 01-14-2010 |
20100122088 | METHOD AND SYSTEM FOR CONTROL OF CODE EXECUTION ON A GENERAL PURPOSE COMPUTING DEVICE AND CONTROL OF CODE EXECUTION IN A RECURSIVE SECURITY PROTOCOL - Embodiments of systems and methods which provide highly specific control over the execution of general-purpose code block are disclosed. These embodiments may allow the exact circumstances under which a given code block is allowed to execute to be determined with specificity. Such a control mechanism may be coupled with embodiments of a data hiding system and method, based for example, on an ordered execution of a set of code segments implemented via recursive execution. When embodiments of these systems and methods are utilized together an unencumbered generality as well as a level of protection against attack that surpasses many other security systems may be obtained. | 05-13-2010 |
20100235644 | Method and System for a Recursive Security Protocol for Digital Copyright Control - Systems and methods are described which utilize a recursive security protocol for the protection of digital data. These may include encrypting a bit stream with a first encryption algorithm and associating a first decryption algorithm with the encrypted bit stream. The resulting bit stream may then be encrypted with a second encryption algorithm to yield a second bit stream. This second bit stream is then associated with a second decryption algorithm. This second bit stream can then be decrypted by an intended recipient using associated keys. | 09-16-2010 |
20120219139 | Providing Audio Playback During a Conference Based on Conference System Source - In various embodiments, a system may include a first conferencing system with a first speaker and a second speaker. The first conferencing system may be coupled to a second conferencing system and a third conferencing system. In some embodiments, audio from the second conferencing system may be reproduced through the first speaker, and audio from the third conferencing system may be reproduced through the second speaker. In some embodiments, audio from various participants at various conferencing systems may be reproduced on audio system components relative to the location of participants at the conferencing system. For example, audio from a first participant on the left side of a camera at a second conferencing system may be reproduced through left side speakers at the first conferencing system. | 08-30-2012 |
20120224022 | Providing Audio Playback During a Conference Based on Location of Corresponding Video on a Display - In various embodiments, a system may include a first conferencing system with a first speaker and a second speaker. The first conferencing system may be coupled to a second conferencing system and a third conferencing system. In some embodiments, audio from the second conferencing system may be reproduced through the first speaker, and audio from the third conferencing system may be reproduced through the second speaker. In some embodiments, audio from various participants at various conferencing systems may be reproduced on audio system components relative to the location of participants at the conferencing system. For example, audio from a first participant on the left side of a camera at a second conferencing system may be reproduced through left side speakers at the first conferencing system. | 09-06-2012 |
20130227302 | METHOD AND SYSTEM FOR A RECURSIVE SECURITY PROTOCOL FOR DIGITAL COPYRIGHT CONTROL - Systems and methods are described which utilize a recursive security protocol for the protection of digital data. These may include encrypting a bit stream with a first encryption algorithm and associating a first decryption algorithm with the encrypted bit stream. The resulting bit stream may then be encrypted with a second encryption algorithm to yield a second bit stream. This second bit stream is then associated with a second decryption algorithm. This second bit stream can then be decrypted by an intended recipient using associated keys. | 08-29-2013 |
20130238902 | METHOD AND SYSTEM FOR CONTROL OF CODE EXECUTION ON A GENERAL PURPOSE COMPUTING DEVICE AND CONTROL OF CODE EXECUTION IN A RECURSIVE SECURITY PROTOCOL - Embodiments of systems and methods which provide highly specific control over the execution of general-purpose code block are disclosed. These embodiments may allow the exact circumstances under which a given code block is allowed to execute to be determined with specificity. Such a control mechanism may be coupled with embodiments of a data hiding system and method, based for example, on an ordered execution of a set of code segments implemented via recursive execution. When embodiments of these systems and methods are utilized together an unencumbered generality as well as a level of protection against attack that surpasses many other security systems may be obtained. | 09-12-2013 |
20130254494 | METHOD AND SYSTEM FOR PROCESS WORKING SET ISOLATION - Embodiments of systems and methods disclosed herein may isolate the working set of a process such that the data of the working set is inaccessible to other processes, even after the original process terminates. More specifically, in certain embodiments, the working set of an executing process may be stored in cache and for any of those cache lines that are written to while in secure mode those cache lines may be associated with a secure descriptor for the currently executing process. The secure descriptor may uniquely specify those cache lines as belonging to the executing secure process such that access to those cache lines can be restricted to only that process. | 09-26-2013 |
20150089231 | SYSTEMS AND METHODS FOR ESTABLISHING AND USING DISTRIBUTED KEY SERVERS - Systems and methods in which multiple key servers operate cooperatively to securely provide authorization codes to requesting devices. In one embodiment, a server cloud receives a device authorization code request and selects an “A server”. The “A server” requests authorization from one or more “B servers” and authorizes the “B servers” to respond. The “B servers” provide authorization to the “A server”, and may provide threshold key inputs to enable decryption of device authorization codes. The “A server” cannot provide the requested device authorization code without authorization from the “B server(s)”, and the “B server(s)” cannot provide the requested server authorization code and threshold inputs without a valid request from the “A server”. After the “A server” receives authorization from the “B server(s)”, it can provide the initially requested device authorization code to the requesting device. | 03-26-2015 |
20150294123 | SYSTEM AND METHOD FOR SHARING DATA SECURELY - Embodiments of systems and methods disclosed herein provide simple and effective methods for secure processes to share selected data with other processes, either secure or not, in a safe and secure manner. More specifically, in certain embodiments, systems and methods are disclosed that enable a secure data cache system to write certain data to main memory unencrypted. In other embodiments, systems and methods are disclosed that enable a secure data cache system to write encrypted data from one secure process to main memory, and to enable the decryption of the data by another secure process. In other embodiments, the ownership of data lines in a secure data cache is selectively changed from one process to another, effectively allowing different secure processes to share data. | 10-15-2015 |
20150295713 | SYSTEM AND METHOD FOR AN EFFICIENT AUTHENTICATION AND KEY EXCHANGE PROTOCOL - Embodiments of systems and methods disclosed herein provide a simple and effective method for authentication and key exchange that is secure from man-in-the-middle attacks and is characterized by perfect forward secrecy. More specifically, in certain embodiments, the systems and methods are disclosed that enable secure communications between a local device and a remote device(s) via a protocol that uses a Central Licensing Authority that shares derived secrets with the endpoints, without sharing the secrets themselves. The derived secrets may be comprised of public information, taking the form of nonces, in order to protect the system against replay-style attacks. Each endpoint can generate its own nonce with sufficient entropy such that neither endpoint is dependent on the trustworthiness of the other. | 10-15-2015 |