Woloszyn
Andrew Christopher Woloszyn, Fulbourn GB
Patent application number | Description | Published |
---|---|---|
20160001427 | SYSTEMS AND METHODS FOR WELDING - A welding fixture including an electromagnet, a non-magnetic support configured to receive at least two sheets of material to be welded, and one or more clamping shoes configured to cooperate with the electromagnet to apply a clamping pressure to the at least two sheets of material and the non-magnetic support as a result of a magnetic force produced by the electromagnet is provided. A first of the at least two sheets of material is in contact with at least one of the one or more clamping shoes, and a second of the at least two sheets of material is in contact with at least the non-magnetic support. The one or more clamping shoes being shaped such that a perimeter defined by the one or more clamping shoes is located in the vicinity of a defined weld line to be welded on the at least two sheets of material, the weld line remaining substantially free from optical obstruction during production of the magnetic force. | 01-07-2016 |
Terrence Peter Woloszyn, Orangeville CA
Patent application number | Description | Published |
---|---|---|
20120278504 | SYSTEM AND METHOD FOR TOKENIZATION OF DATA FOR STORAGE IN A CLOUD - An intercepting proxy server processes traffic between an enterprise user and a cloud application. The intercepting proxy server provides interception of real data elements in communications from the enterprise to the cloud and replacing them with obfuscating tokens which are randomly generated. To the cloud application real data are only visible as tokens. Tokens included in results returned from the cloud, are intercepted by the intercepting proxy server, and replaced with the corresponding real data elements. The obfuscating tokens are not computationally related to the original sensitive value. Each intercepted real data element is stored in a local persistent storage layer, and indexed by the corresponding obfuscating token, allowing the real data element to be retrieved when the token is returned from the cloud, for delivery to the user. | 11-01-2012 |
20120278621 | SYSTEM AND METHOD OF DATA INTERCEPTION AND CONVERSION IN A PROXY - An intercepting proxy server processes traffic between an enterprise user and a cloud application which provides Software as a Service (SaaS). The intercepting proxy server provides interception of real data elements in communications from the enterprise to the cloud and replacing them with obfuscating information by encrypting individual real data elements without disturbing the validity of the application protocol. To the processing cloud application real data are only visible as encrypted tokens. Tokens included in results returned from the cloud, are intercepted by the intercepting proxy server, and replaced with the corresponding sensitive real data. In this way, the enterprise is able to enjoy the benefits of the cloud application, while protecting the privacy of real data. | 11-01-2012 |
20120278872 | SYSTEM AND METHOD OF FEDERATED AUTHENTICATION WITH REVERSE PROXY - A Security Assertion Markup Language (SAML) conversation is intercepted in an enhanced Reverse Proxy server computer located in the path between a user and a server computer that provide cloud application services to the user. During authentication, the SAML assertion signature is modified in the enhanced Reverse Proxy such that the enhanced Reverse Proxy and the user can share an encryption key. The modified assertion signature permits a common session key to be shared by the enhanced Reverse Proxy and a targeted application in the server, thus enabling the user to be authenticated, and subsequently to communicate via the enhanced Reverse Proxy in a secure session with an application in the server. | 11-01-2012 |
20120278897 | SYSTEM AND METHOD OF SORT-ORDER PRESERVING TOKENIZATION - An intercepting proxy server processes traffic between an enterprise user and a cloud application. The intercepting proxy server provides interception of real data elements in communications from the enterprise to the cloud and replacing them with obfuscating tokens. Tokens included in results returned from the cloud, are intercepted by the intercepting proxy server, and replaced with the corresponding real data elements. In order for the sort order of the tokens to correspond to the sort order of the corresponding real data elements, a sort order preserving data compression is performed on parts of the real data elements, and the compressed values concatenated with the obfuscated tokens, thus producing sortable tokens which, even though they are obfuscated, appear in the correct sort order in the cloud application. | 11-01-2012 |
Thomas Woloszyn, Taylors, SC US
Patent application number | Description | Published |
---|---|---|
20140265033 | METHOD FOR IMPROVED TIRE MOLD MANUFACTURING - The present invention includes methods and apparatus for developing and forming a tire-related mold configured to at least mold a portion of a tire tread. Particular embodiments of such methods include creating a digital model representing a three-dimensional structure comprising a tread model molding member, the tread model molding member at least partially defining a molding cavity for forming a corresponding tire tread model. The three-dimensional structure comprising the tread model molding member is formed automatically using the digital model, the structure being formed by building the structure from one or more materials, the one or more materials including an elastic material such that the formed structure is an elastic structure. A tread model is molded using the tread model molding member, while a tread molding element for forming at least a portion of a tread is molded from the tread model. | 09-18-2014 |
Thomas Woloszyn, Northville, MI US
Patent application number | Description | Published |
---|---|---|
20140277828 | SYSTEM AND METHOD FOR WIRELESS VEHICLE CONTENT DETERMINATION - A fleet management system providing a manager with a tailored user interface based on the enabled features recognized in a vehicle. The fleet management system may monitor two or more vehicles, wherein each vehicle may have one or more processors. The one or more processors may receive an initialization signal from the fleet management system. The one or more processors may perform a query of one or more vehicle modules for enabled features in response to the initialization signal received from the fleet management system. The query of enabled vehicle features may be based on one or more criteria. The system may transmit to a server a signal indicating the enabled vehicle features installed in the vehicle. The system may output the enabled vehicle features to a user while tailoring the user screen data based on the enabled features. | 09-18-2014 |
20150161832 | Method and Apparatus for Virtual Key Delivery - A system includes a processor configured to receive a request for temporary vehicle usage. The processor is also configured to associate a requesting user with an available vehicle and generate a temporary vehicle access code and start code, usable during a predetermined time period. The processor is further configured to send the access code and start code to both the user and the vehicle. | 06-11-2015 |