Staker
Allan Robert Staker, Holladay, UT US
Patent application number | Description | Published |
---|---|---|
20150237037 | WEB INTEGRATION, TIMING, ACCESS, AND DISTRIBUTION CONTROL - The present disclosure provides systems and techniques for improved back-end integration of third-party content and an administrative framework allowing for user experience management for a computer-based environment. Described herein, for example, are approaches to improving secure access to multiple web-based systems, integrating web-based content, and controlling timing of web interaction. The problems addressed herein relate to coordinating access and delivery of web content from and to multiple sources and multiple users in an integrated and time-controlled manner. | 08-20-2015 |
Bart Lee Staker, Poulsbo, WA US
Patent application number | Description | Published |
---|---|---|
20150330974 | Digital Analysis of Molecular Analytes Using Single Molecule Detection - Methods and systems are provided for small molecule analyte detection using digital signals, key encryption, and communications protocols. The methods provide detection of a large numbers of proteins, peptides, RNA molecules, and DNA molecules in a single optical or electrical detection assay within a large dynamic range. | 11-19-2015 |
Douglas Lynn Staker, Spokane, WA US
Patent application number | Description | Published |
---|---|---|
20100006356 | Electric Vehicle Charging Methods, Battery Charging Methods, Electric Vehicle Charging Systems, Energy Device Control Apparatuses, and Electric Vehicles - Electric vehicle charging methods, battery charging methods, electric vehicle charging systems, energy device control apparatuses, and electric vehicles are described. In one arrangement, an electric vehicle charging method includes receiving information regarding charging of an electric vehicle with energy from an electric power grid, determining an amount of energy stored by an energy storage device coupled to the electric power grid, and controlling a transfer of the energy stored by the energy storage device to the electric power grid using the information regarding the charging of the electric vehicle. Other arrangements are described. | 01-14-2010 |
Heather Clayton Staker, Holladay, UT US
Patent application number | Description | Published |
---|---|---|
20150237037 | WEB INTEGRATION, TIMING, ACCESS, AND DISTRIBUTION CONTROL - The present disclosure provides systems and techniques for improved back-end integration of third-party content and an administrative framework allowing for user experience management for a computer-based environment. Described herein, for example, are approaches to improving secure access to multiple web-based systems, integrating web-based content, and controlling timing of web interaction. The problems addressed herein relate to coordinating access and delivery of web content from and to multiple sources and multiple users in an integrated and time-controlled manner. | 08-20-2015 |
Matt Staker US
Patent application number | Description | Published |
---|---|---|
20120166818 | SYSTEMS AND METHODS FOR SECURE MULTI-TENANT DATA STORAGE - Systems and methods are provided for transmitting data for secure storage. For each of two or more data sets, a plurality of shares are generated containing a distribution of data from an encrypted version of the data set. The shares are then stored in a shared memory device, wherein a data set may be reconstructed from a threshold number of the associated plurality of shares using an associated key. Also provided are systems and methods for providing access to secured data. A plurality of shares containing a distribution of data from an encrypted version of a data set are stored in a memory device. A client is provided with a virtual machine that indicates the plurality of shares, and the capability to reconstruct the data set from the plurality of shares using an associated key. | 06-28-2012 |
20120179916 | SYSTEMS AND METHODS FOR SECURING VIRTUAL MACHINE COMPUTING ENVIRONMENTS - Systems and methods are provided for securing data in virtual machine computing environments. A request is received for a security operation from a first virtual machine operating in a host operating system of a first device. In response to receiving the request, a first security module executes the security operation, the first security module implemented in a kernel of the host operating system. The result of the security operation is provided to the first virtual machine. | 07-12-2012 |