Patent application number | Description | Published |
20090031413 | VLAN Router with Firewall Supporting Multiple Security Layers - A router containing a firewall capable of supporting a plurality of different security levels. The router of the present invention creates a plurality of Virtual Local Area Networks (VLANs) using a network switch. The VLAN Rules Table (VRT) allows a network administrator to designate a trust level for each VLAN. The trust level may be different for every VLAN and the administrator may designate different rules for each VLAN. The Security Program (SP) analyzes each packet passing through the firewall and determines if the packet is permitted under the rules for the VLAN trust level. An alternative embodiment in which the switch in the router is divided into a plurality of sub-switches is also disclosed. In the alternative embodiment, the firewall need only compare the packet to rules which were not applied in the lower trust levels, eliminating the redundant rules from the comparison process. | 01-29-2009 |
20100217891 | Document Source Debugger - Embodiments of the invention are directed to a data transfer network having a server side and a client side, wherein content is sent from the server side to the client side in successive output streams to dynamically create a document on the client side, and the content for different output streams is provided, respectively from different ones of a plurality of originating sources that are located on the server side. One embodiment, directed to a method, includes the steps of intercepting a given output stream, and determining whether or not a debug directive can be inserted into the intercepted output stream, wherein the determination is made in conformance with prespecified lexeme rules associated with the intercepted output stream. Responsive to a determination that a debug directive can be inserted into the intercepted stream, a debug directive is created that contains information identifying the originating source on the server side which provided the content for the intercepted output stream. The method further includes inserting the created debug directive into the intercepted stream at a selected insertion location. | 08-26-2010 |
20110246965 | CORRECTING DOCUMENT GENERATION FOR POLICY COMPLIANCE - A method, system, and computer usable program product for correcting document generation for policy compliance are provided in the illustrative embodiments. An error is detected in an electronic document at a first application. A code location associated with the error is identified. The electronic document has embedded debugging code including a set of code locations including the code location. An input is received, the input being usable in correcting the error. An information usable in correcting the error is created, the information including the input. The information is sent to a second application executing in a second data processing system. The information is usable to modify a third application. | 10-06-2011 |
20120042037 | SOURCE IDENTIFICATION FOR MULTIPART CONTENT VALIDATION - A method, system, and computer usable program product for source identification for multipart content validation are provided in the illustrative embodiments. An identification information of a source server is obtained by parsing an update request, the update request being configured to request from the source server an update of a part of the multipart content. The identification information is recorded. A change in a part of the multipart content is observed. The change in the part results in an updated multipart content. A debugging directive is constructed, the debugging directive including the identification information of the source server. The debugging directive is inserted relative to the part that has changed thereby associating the source server with the part of the multipart content. The updated multipart content including the debugging directive is transmitted to a validation server executing in a second data processing system. | 02-16-2012 |
20130007116 | SOURCE IDENTIFICATION FOR MULTIPART CONTENT VALIDATION - A method, system, and computer usable program product for source identification for multipart content validation are provided in the illustrative embodiments. An identification information of a source server is obtained by parsing an update request, the update request being configured to request from the source server an update of a part of the multipart content. The identification information is recorded. A change in a part of the multipart content is observed. The change in the part results in an updated multipart content. A debugging directive is constructed, the debugging directive including the identification information of the source server. The debugging directive is inserted relative to the part that has changed thereby associating the source server with the part of the multipart content. The updated multipart content including the debugging directive is transmitted to a validation server executing in a second data processing system. | 01-03-2013 |
Patent application number | Description | Published |
20090322410 | SYSTEM AND METHOD FOR MONITORING A CAPACITIVE SENSOR ARRAY - A capacitive touch sensor circuitry comprises an interface for interconnecting with a plurality of I/O pins that connect to rows and columns of a capacitive sensor array. Monitoring circuitry, responsive to inputs from the plurality of I/O pins, determines when a capacitive switch in the capacitive sensor array has been actuated and stores an indication of the actuation of the capacitive switch. The monitoring circuitry then generates an interrupt responsive to the determined actuation. A control engine controls a manner in which the monitoring circuitry monitors the plurality of I/O pins. The control engine and the monitoring circuitry may be configured to monitor the plurality of I/O pins in a plurality of operating modes. | 12-31-2009 |
20090322711 | LCD CONTROLLER CHIP - An integrated circuit comprises a host interface control block for providing a connection between the integrated circuit and a master controller device. The integrated circuit further includes a plurality of I/O pins. A capacitive touch sense circuitry enables detection of actuation of at least one capacitor switch of a capacitive sensor array connected to at least a portion of the plurality of I/O pins. An LCD controller drives at least one LCD connected to at least a portion of the plurality of I/O pins. The integrated circuit, responsive to signals received from the master controller device over the host interface control block, may be configured to monitor outputs from the capacitive sensor array in a first mode of operation. In a second mode of operation, the capacitive sensor array may be configured to drive at least one LCD. Finally, in a third mode of operation, the integrated circuit may be configured to both monitor outputs of the capacitive sensor array and drive the at least one LCD. | 12-31-2009 |
20110062785 | SYSTEM AND METHOD FOR SUPPORTING HIGH BURST CURRENT IN A CURRENT LIMITED SYSTEM - A current limited system for providing a burst current capability comprises a variable load having a first mode of operation requiring a first current level and a burst current mode of operation requiring a second current level. The second current level is greater than the first current level. A control processor provides control signals for the current limited system. A voltage source is connected to the variable load to provide a source current. The source current provides the variable load the first current level in the first mode of operation. A burst mode circuit provides the second current level to the variable load in the burst current mode of operation, responsive to the control signals from the control processor and the voltage source. | 03-17-2011 |
20110065399 | SYSTEM AND METHOD FOR DYNAMICALLY REGULATING VOLTAGE TO MINIMIZE POWER CONSUMPTION - A system includes a voltage regulator connected to a voltage source for providing a regulated voltage at a first level in a first mode of operation and at least one second level in a second mode of operation. The second voltage level is higher than the first voltage level. A control processor provides control signals to select between the first and the second modes of operation. A component associated with the voltage regulator. The component is disabled in the first mode of operation and enabled in the second mode of operation. The control processor generates control signals to configure the voltage regulator to generate the voltage at the first level in the first mode of operation when the component is disabled and to configure the voltage regulator to generate the voltage at the at least one second level in the second mode of operation when the component is enabled. | 03-17-2011 |
20140184116 | APPARATUS FOR MOTOR CONTROL SYSTEM AND ASSOCIATED METHODS - A motor control apparatus to control a motor external to the motor control apparatus includes a microcontroller unit (MCU). The MCU includes mixed signal motor control circuitry adapted to perform back electromotive force (EMF) motor control in a first mode of operation. The mixed signal motor control circuitry is further adapted to perform field oriented control (FOC) in a second mode of operation. | 07-03-2014 |
Patent application number | Description | Published |
20090193343 | METHOD FOR AVOIDING VIRTUAL WORLD FATIGUE BY MAINTAINING AVATAR CHARACTERISTICS IN AN AVATAR WALLET - A method of avoiding virtual world fatigue by generating an active avatar in an avatar wallet. The method includes creating and storing an active avatar in the avatar wallet, selecting target worlds for the active avatar to visit, modifying the initial appearance, the user information, the contact map and the characteristic sharing information of the active avatar in accordance with user preferences with respect to each of the target worlds so as to generate a version of the active avatar for each of the target worlds, and initiating a submission of a version of the active avatar to the corresponding target world such that the version is automatically tailored to allowable avatar properties of the corresponding target world. | 07-30-2009 |
20100058486 | METHOD FOR SECURE ACCESS TO AND SECURE DATA TRANSFER FROM A VIRTUAL SENSITIVE COMPARTMENTED INFORMATION FACILITY (SCIF) - The present disclosure is directed to a method for limiting access to a virtual sensitive compartmented information facility (SCIF) and secure transport of information between two virtual SCIFs. The method may comprise creating a virtual SCIF, allowing access to the to the virtual SCIF to only those virtual subjects having the proper security clearance as analyzed by an access rule set loaded into an object request broker, creating a second virtual SCIF, creating a key lockable secure container to transport the information from the first virtual SCIF to the second virtual SCIF, and restricting access to the key to unlock the secure container in the second virtual SCIF. | 03-04-2010 |
20110067113 | Classification Separation Router - A method and system are provided to classify and convey data to satisfy a client request. The classification system is a two dimensional data classification system, including a first dimension pertaining to subject matter and a second dimension pertaining to data security. A partition is dynamically created, and data that satisfies the request populates the created partition to convey parsed data based satisfying both dimensions of the request. | 03-17-2011 |
20130086383 | VIRTUAL MACHINE IMAGES ENCRYPTION USING TRUSTED COMPUTING GROUP SEALING - A host machine provisions a virtual machine from a catalog of stock virtual machines. The host machine instantiates the virtual machine. The host machine configures the virtual machine, based on customer inputs, to form a customer's configured virtual machine. The host machine creates an image from the customer's configured virtual machine. The host machine unwraps a sealed customer's symmetric key to form a customer's symmetric key. The host machine encrypts the customer's configured virtual machine with the customer's symmetric key to form an encrypted configured virtual machine. The host machine stores the encrypted configured virtual machine to non-volatile storage. | 04-04-2013 |
20140279985 | Extending Platform Trust During Program Updates - An approach is provided in which a computer system generates a current hash value of a computer program in response to receiving a request to execute the computer program. Next, the computer system determines that the current hash value fails to match a reference hash value that was previously generated subsequent to installing the computer program on the computer system. Since the two hash values do not match each other, the computer system matches the current hash value to an updated hash value that was previously generated in response to modifying the computer program on the computer system. In turn, the computer system executes the computer program when the current hash value matches the updated hash value. | 09-18-2014 |
20140282946 | Controlled Password Modification Method - A method which controls modification of passwords. An end user designates, in advance, a universe of social media contacts such as friends on social media web sites such as Facebook and LinkedIn. Contacts so identified are used as a set of potential identity verifiers. In order to enable a reset or modification of an account password, a subset of the universe is required to assert that they have verified the identity of the user requesting to reset a password. Such verification can be accomplished by varying means by those to whom an inquiry has been directed. | 09-18-2014 |
20140282955 | Controlled Password Modification Method and Apparatus - Apparatus which control modification of passwords by implementing a procedure by which end user designates, in advance, a universe of social media contacts such as friends on social media web sites such as Facebook and LinkedIn. Contacts so identified are used as a set of potential identity verifiers. In order to enable a reset or modification of an account password, a subset of the universe is required to assert that they have verified the identity of the user requesting to reset a password. Such verification can be accomplished by varying means by those to whom an inquiry has been directed. The apparatus may be in the form of a computer system or a computer readable storage medium. | 09-18-2014 |
20150180897 | Intermediate Trust State - Embodiments of the invention relate to implementation of an intermediate trusted state of an electronic account based upon questionable account communication(s). A profile of malicious or unauthorized activity is created, and a profile of account activity is created. As account activity takes place, the activity is assessed against one or both of the profiles to statistically determine if the activity resembles that associated with malicious or unauthorized intent. The state of the account is placed in the intermediate trusted state if the activity statistically matches the unauthorized activity profile. An authentication activity enables the trusted state to be removed and for the account activity to resume. | 06-25-2015 |
20150271193 | INTRUSION MANAGEMENT - A computer implemented method for managing a network intrusion is disclosed. The method can include monitoring, by an intrusion management system, a set of nodes of a computer network. The method can also include determining a node workload for the set of nodes. Further, the method can include classifying an intrusion signature for the network intrusion. Classifying the intrusion signature can be performed in response to detecting a network intrusion related to the set of nodes. The method can include determining a response for managing a security vulnerability of the set of nodes based on the node workload and the intrusion signature. The method can also include instantiating, by the intrusion management system, the response to the set of nodes. | 09-24-2015 |
Patent application number | Description | Published |
20150199500 | AUTHENTICATOR FOR USER STATE MANAGEMENT - Different types of soft-lockout policies can be associated with different organizations (or groups) in an identity management system. Each soft-lockout policy can indicate different parameters such as a number of login attempts allowed and an amount of time that a user account will be locked-out if the maximum allowed attempts are exceeded unsuccessfully. Users can be associated with the different organizations. For each user, the soft-lockout policies for the organization with which that user is associated are applied to that user when that user attempts to log in. Thus, different groups of users can be handled with different security behaviors regarding unsuccessful login attempts. If, for example, a user were to become moved from one organization to another, then the soft-lockout policies associated with the user's new organization would become applicable to that user. | 07-16-2015 |
20150199535 | ORGANIZATION-BASED POLICIES - Techniques for representating, managing and storing data related to an organization are provided. An identity management system is disclosed that is configured to manage, represent and store data related to an organization. The identity management system reads data pertaining to an organization from a directory and generates a data model of the organization. The identity management system performs operations to manage the data related to an organization using the data model. The operations include adding logical organizations to the data model and defining user-membership policies associated with entities and logical organizations in the data model. The operations may further include identifying policies to be applied to the users of the organization. In some embodiments, the operations include re-assigning a logical organization and its associated user membership policies to different entities within in the data model while maintaining user-membership policies associated with the logical organization. | 07-16-2015 |
20150199625 | LOGICAL AND PHYSICAL ORGANIZATION MANAGEMENT - Techniques for representating, managing and storing data related to an organization are provided. An identity management system is disclosed that is configured to manage, represent and store data related to an organization. The identity management system reads data pertaining to an organization from a directory and generates a data model of the organization. The identity management system performs operations to manage the data related to an organization using the data model. The operations include adding logical organizations to the data model and defining user-membership policies associated with entities and logical organizations in the data model. The operations may further include identifying policies to be applied to the users of the organization. In some embodiments, the operations include re-assigning a logical organization and its associated user membership policies to different entities within in the data model while maintaining user-membership policies associated with the logical organization. | 07-16-2015 |
Patent application number | Description | Published |
20090125596 | METHOD AND APPARATUS FOR FORWARDING EMAILS TO PREVIOUS RECIPIENTS - The illustrative embodiments of the present invention described herein provide a computer implemented method, apparatus, and computer program product for forwarding a reply email message. The process dynamically inserts email addresses associated with a plurality of recipients of an original email message and with an email address associated with the sender of the original email message into a recipient field of the reply email message. The email address associated with the sender of the original email message is identified to form an identified email address, wherein a copy of the reply email message is unsent to the identified email address. However, the identified email address remains part of the recipient field. In response to receiving a send command, the reply email message is sent to the email addresses associated with the recipient field excluding the identified email address. | 05-14-2009 |
20090193009 | VIEWING TIME OF SEARCH RESULT CONTENT FOR RELEVANCY - Amounts of time that search result content is displayed for viewing can be collected and used for relevancy ranking. Selection of a first of a plurality of search results is detected. The plurality of search results is received in response to submission of a set of one or more search terms. An amount of time content of the first search result is displayed for viewing is determined. The content is loaded in response to the selection of the first search result. An indication of the amount of time is supplied as input for ranking relevancy of the first search result with respect to the set of one or more search terms. | 07-30-2009 |
20100094534 | ELECTRONIC MAP ROUTES BASED ON ROUTE PREFERENCES - Users typically use routing systems including GPS systems, handheld devices, and online map routing services to navigate from one point to another (sometimes through several intermediate points). Routing systems typically calculate a route based on information derived from roadway maps. Typically, routing options focus on determining a shortest route, a route that can be traversed in the least amount of time, a route with the least use of freeways and toll roads, etc. Although routing options may be oriented towards helping users save time and money, the directions are generally confusing and do not take the users' driving preferences into account. Functionality can be implemented to determine a simplified route, regardless of time and distance, may present a driver with the least challenging set of directions. This may prevent the driver from missing a direction and navigating off the path. | 04-15-2010 |
Patent application number | Description | Published |
20090063434 | Method for Provision and Use of a Visual Representation of Website Browsing History - Embodiments of the invention provide site browsing history information that pertains to a specified network site user. One embodiment, directed to a method, comprises the step of acquiring data for a database, wherein the acquired data identifies multiple sites that are accessed by the user in an order, during a specified period of time. The method further comprises accessing at least a portion of the data from the database. From the accessed data, a pictorial representation of a plurality of the websites accessed during the specified time period is generated. The pictorial representation further illustrates the order in which at least some of the websites of the plurality were accessed. | 03-05-2009 |
20090063513 | METHOD, SYSTEM AND PROGRAM PRODUCT FOR A WEB SERVICE FOLDER INTERFACE - A method of utilizing a Web Service folder interface. A user defines a folder in a local folder directory as a Web Services enabled folder. The folder includes file data and metadata corresponding to the file data. The metadata includes a configurable Web Services type property that corresponds to a remote Web Service. The metadata also includes a configurable data handling property that includes one or more allowable file formats. When a user submits the file data to the remote Web Service by selecting an option in a pull down menu of a graphical user interface (GUI) or dropping the file data in a local output folder, the operating system (OS) sends the file data to the remote Web Service. The OS automatically converts an output file received from the remote Web Service into one of the allowable file formats and updates the local file data with the output file. | 03-05-2009 |
20090063997 | METHOD AND SYSTEM FOR RETAINING LINKING PAGES THROUGH A BROWSER SESSION - A method of retaining linking pages through a browser session. A browser window presents a first web page that includes one or more links. A user marks the first web page in as a “thumbtacked” web page. A thumbtack utility iteratively determines whether or not a graphical cursor is in proximity to a link among one of the one or more links included in the first web page. When the cursor is in close proximity to one of the links, the thumbtack utility displays a hidden pane in a first portion of the browser window. The hidden pane includes data from a second web page corresponding to the link. The browser also displays the first web page concurrently in a second portion of the browser window. When the cursor is not in close proximity to one of the links, the thumbtack utility removes the hidden pane from view. | 03-05-2009 |
20090064006 | Techniques for Performing Tasks Associated with Custom Folder Controls - A technique for associating user defined tasks with electronic files includes associating a custom control with an electronic folder. In this case, the custom control corresponds to a user defined task and the electronic folder includes multiple electronic files grouped according to a defined relationship. The user defined task is then executed on at least one of the multiple electronic files when the custom control, which does not correspond to a system control, is selected. | 03-05-2009 |
20090138438 | System and Method for Implementing Browser Milestone Navigation in a Data Processing System - A system and method for implementing browser milestone navigation in a data processing system. According to an embodiment of the present invention, a browser queries a search engine with at least one search term. In response to the query, the browser retrieves at least one web page that includes a collection of search results. The web page that includes the collection of search results is designated as a first master page. In response to the selection, the browser places a first address of the first master page on a master page address data structure. The browser traverses at least one page greater than one level removed from the first master page. The browser retrieves the first address from the master page address data structure, in response to receiving a first request to retrieve the first master page. The browser displays the first master page in the browser window without displaying any intermediate pages between the at least one web page greater than one level removed from the first master page and the first master page. | 05-28-2009 |
20100302277 | Image Modification for Web Pages - Provided is a method of providing a feature in a web browser that enables a user to adjust a downloaded image to correctly display on the user's computer screen. The disclosed technology provides a mechanism that enables a user to adjust images in a web page. The claimed subject matter provides “rotate” buttons, displayed in conjunction with the particular image, so that the user can rotate the image into an appropriate orientation. In addition, a “sizing” button or buttons are provided. Different web pages may display differently on different computer screens, depending upon both the size of the screen and the size of the window in which the web page is displayed. The disclosed technology enables a user to adjust, in addition to the rotation, the size of an image so that the image displays properly and completely on the user's screen and in the corresponding window. | 12-02-2010 |
20100306663 | Sequential Clicked Link Display Mechanism - Provided is a method to facilitate screen navigation in conjunction with a web browser. Specifically, a navigation history documenter and display module (NHDD) is employed in conjunction with a web browser to enhance the functionality of the browser. Using static links, categorical-hierarchical web sites, search engines or any combination of the three, a user freely navigates through multiple web sites and particular locations within web sites. The NHDD maintains a record of the navigation path. In conjunction with the specific sites and materials included in the navigation path, the NHDD maintain a record corresponding to the relations among the points along the path. In response to a user input, the NHDD displays navigation history information related to the order in which the points along a navigation path were traversed. In one embodiment, the information is displayed as sequentially order markers overlaid on a web page. | 12-02-2010 |
Patent application number | Description | Published |
20080256222 | STRUCTURE FOR A FLEXIBLY CONFIGURABLE MULTI CENTRAL PROCESSING UNIT (CPU) SUPPORTED HYPERTRANSPORT SWITCHING - A design structure embodied in a machine readable storage medium for designing, manufacturing, and/or testing a design for addressing deficiencies of the art in respect to hypertransport-based switching for multi-CPU systems and for flexibly configurable multi-CPU supported hypertransport switching is provided. The design structure can include a hypertransport switching data processing system. The system can include a CPU and at least two I/O bridges. Each I/O bridge can provide a communications path for data driven to a corresponding peripheral device from the CPU. Notably, the system can include a flexibly configurable hypertransport switch. The switch can include a first configuration adapting the CPU to both of the I/O bridges, and a second configuration adapting the CPU to a first one of the I/O bridges and a second CPU to a second one of the I/O bridges. | 10-16-2008 |
20100125731 | METHOD FOR SECURELY MERGING MULTIPLE NODES HAVING TRUSTED PLATFORM MODULES - Method, apparatus and computer program product are provided for operating a plurality of computer nodes while maintaining trust. A primary computer node and at least one secondary computer node are connected into a cluster, wherein each of the clustered computer nodes includes a trusted platform module (TPM) that is accessible to software and includes security status information about the respective computer node. Each clustered computer node is then merged into a single node with only the TPM of the primary computer node being accessible to software. The TPM of the primary computer node is updated to include the security status information of each TPM in the cluster. Preferably, the step of merging is controlled by power on self test (POST) basic input output system (BIOS) code associated with a boot processor in the primary node. | 05-20-2010 |
20130086383 | VIRTUAL MACHINE IMAGES ENCRYPTION USING TRUSTED COMPUTING GROUP SEALING - A host machine provisions a virtual machine from a catalog of stock virtual machines. The host machine instantiates the virtual machine. The host machine configures the virtual machine, based on customer inputs, to form a customer's configured virtual machine. The host machine creates an image from the customer's configured virtual machine. The host machine unwraps a sealed customer's symmetric key to form a customer's symmetric key. The host machine encrypts the customer's configured virtual machine with the customer's symmetric key to form an encrypted configured virtual machine. The host machine stores the encrypted configured virtual machine to non-volatile storage. | 04-04-2013 |
20140006793 | Trusted System Network | 01-02-2014 |
20140281504 | Authorizing Use Of A Test Key Signed Build - Methods, apparatuses, and computer program products for authorizing use of a test key signed build are provided. Embodiments include transmitting to an update provider system, unique data associated with a target system; receiving from the update provider system, a signed update capsule file; determining, by the target system, that a signature within the signed update capsule file is valid; in response to determining that the signature is valid, determining that the validation data within the signed update capsule file matches the unique data associated with the target system; and in response to determining that the validation data matches the unique data, determining that the target system is authorized to use a test key signed build to update the firmware of the target system. | 09-18-2014 |
Patent application number | Description | Published |
20140321235 | ACOUSTIC SONAR IMAGING AND DETECTION SYSTEM FOR FIREFIGHTING APPLICATIONS - Techniques for navigating a high temperature low visibility environment are supported. A system may employ appropriate sonar signals to determine and display the location or distance to remote structures that may be obscured in the high temperature low visibility environment. Firefighters, military personnel, and other individuals that must navigate through obscured, high temperature environments may interact with suitable devices, such as a handheld device, to access and display the approximate location or distance of the remote structures or pathways. These devices may facilitate effective navigation of high temperature low visibility environments, thereby minimizing the risk of traumatic or fatal bodily injuries posed by the dangerous conditions. | 10-30-2014 |
20150083520 | Underwater Noise Abatement Panel and Resonator Structure - A system for reducing noise emissions in underwater environments is presented. The system can be extended to applications in any two-fluid environments where one fluid (gas) is contained in an enclosed resonator volume connected to the outside environment at an open end of the resonator body. The resonators act as gas-containing (e.g., air) Helmholtz resonators constructed into solid panels that are submerged in the fluid medium (e.g., sea water) in the vicinity of a noise generating source. The oscillations of the trapped air volume in the resonators causes reduction of certain noise energy and a general reduction in the transmitted noise in the environment of the system. | 03-26-2015 |
20150191987 | Underwater Noise Abatement Apparatus and Deployment System - A deployable underwater noise abatement system allowing packing and deploying an organized set of grouped resonators is disclosed. The system allows relatively compact storage and transportation of the noise abatement apparatus when not in use, then, when deployed, the apparatus can be lowered into the water and extended. | 07-09-2015 |
Patent application number | Description | Published |
20090294139 | Vehicle for Fire Control and Fire Rescue Operations in Extreme Wildlands - A mid-sized firefighting and fire rescue vehicle capable of accessing a range of off-road wildland environments that is also “street legal” for rapid on-road transportation. The vehicle is configured to be outfitted as needed with any of a variety of different firefighting or fire rescue systems packaged as removable modules, fixed in place in the bed of the vehicle. The vehicle achieves stability and ruggedness through the use of three military type axles, two of which (the rear axles) are both drive axles. The vehicle is further configured with an open bed structured to receive, position, and retain an integrated, modularly structured, firefighting or fire rescue system in such a manner as may be switched out with alternate systems as required for the type of service into which the vehicle is called. The vehicle has a narrow gauge (width) that allows it to access remote and obstructed areas but is still large enough to adequately carry personnel and equipment safely to and from most wildland fire environments. The bed of the vehicle utilizes a quick load and unload system that includes either rails or alignment guide posts in a manner that allows the user to quickly change the vehicle's primary function. | 12-03-2009 |
20100079274 | System for Wireless Activation of Communication Indicators within an Industrial or Professional Working Environment - A system for the wireless activation or deactivation of one or more switches associated with one or more communication indicators within an industrial or professional working environment. The system includes at least one portable, handheld transmitter comprising at least one manually operated switch and a signal transmitter. Further included is at least one fixed indicator assembly comprising a signal receiver, at least one automatically operational switch, and at least one indicator capable of audibly or visually communicating a condition to workers within the industrial or professional working environment. The wireless indicator switch system is a highly flexible combination of a lightweight, small key fob type transmitter paired with a flexible receiver circuit board for controlling a variety of industrial and/or professional working environment indication devices. The wireless indicator switch will allow the indication device to be placed at its optimal location while allowing the worker to remain at their location and still activate the device. With the key fob sized transmitter, for example, the operator can easily activate an indicator light without leaving the work station. | 04-01-2010 |
20140167404 | Components for Fabrication of a Stable Base and Support Structure - A tetrahedron shaped pipe section core connector and an optional end connector that enable the quick fabrication of a stable tripod base with a stable post support. The core connector is made by machining, molding, casting, or forging the material from which the pipe connector is constructed (typically metal or plastic). The core component (hereinafter the “knuckle connector”) provides four pipe connections oriented at 109.5° angles to each other, forming a regular tetrahedron shape. Pipe sections may be screwed or press fit into each of the four pipe connections. Three of these fitted pipes may be oriented to form a tripod base. The remaining pipe connection extends vertically up to form a post support. The body of the knuckle connector optionally incorporates one or more smaller apertures, preferably threaded, that extend through the wall of the body of the connector. These apertures provide attachment points for ancillary components. | 06-19-2014 |