Настройки

Укажите год
-

Небесная энциклопедия

Космические корабли и станции, автоматические КА и методы их проектирования, бортовые комплексы управления, системы и средства жизнеобеспечения, особенности технологии производства ракетно-космических систем

Подробнее
-

Мониторинг СМИ

Мониторинг СМИ и социальных сетей. Сканирование интернета, новостных сайтов, специализированных контентных площадок на базе мессенджеров. Гибкие настройки фильтров и первоначальных источников.

Подробнее

Форма поиска

Поддерживает ввод нескольких поисковых фраз (по одной на строку). При поиске обеспечивает поддержку морфологии русского и английского языка
Ведите корректный номера.
Ведите корректный номера.
Ведите корректный номера.
Ведите корректный номера.
Укажите год
Укажите год

Применить Всего найдено 183. Отображено 111.
13-02-2019 дата публикации

Material screening apparatus with multi-mode screen box

Номер: GB0002525155B
Принадлежит: TEREX GB LTD, Terex GB Limited

Подробнее
25-09-2019 дата публикации

A waste remediation apparatus and method

Номер: GB0002572265A
Принадлежит:

A waste remediation method for the treatment of pharmaceutical and/or contaminated medical waste, the method comprising the steps of sterilising the medical waste in a sterilising chamber, collecting liquid run-off during the sterilising step, capturing vapour evolved during the sterilising step and condensing the vapour, and combining the condensed vapour and liquid run-off together as liquid effluent for disposal in an incinerator. A waste remediation apparatus for the treatment of pharmaceutical and/or contaminated medical waste comprising a sterilising chamber, a run-off liquid collection mechanism, a vapour collection mechanism, a vapour capturing mechanism, a cooling device for condensing the vapour and an arrangement for combining the run-off liquid and the vapour as a liquid effluent.

Подробнее
18-08-2021 дата публикации

Valve assembly

Номер: GB2592068A
Принадлежит:

A valve assembly includes a valve arranged to move between an open position and a closed position by rotating an operating member 22 of the valve about an axis. An actuation unit 16 comprises a torsion spring 34, a trigger member 20, and a driving member 36. The driving member 36 engages with the operating member of the valve to drive rotation of the operating member 22. The torsion spring 34 applies a first torque to the driving member around the axis in a first rotational direction. An external second torque applied opposite to the first torque resets the valve to the open position in which the driving member 36 is held by a latching mechanism. The latching mechanism is arranged to hold the driving member only when the valve is in the open position. An external force applied to the trigger member 20 releases the driving member 36 from the latching mechanism, the first torque thereby rotating the driving member 36 to mechanically bias the valve to the closed position.

Подробнее
13-05-2020 дата публикации

A waste remediation apparatus and method

Номер: GB0002572265B
Принадлежит: SHARPSMART LTD, Sharpsmart Limited

Подробнее
27-06-2024 дата публикации

COMPUTERIZED TOOLS TO ACCESS AN ENTERPRISE DATA MODEL FOR IMPLEMENTING COMPONENT DATA OBJECTS

Номер: US20240211957A1
Автор: Neil Robinson, Shaun Doyle
Принадлежит: CERTINIA INC.

Various embodiments relate generally to data science and data analysis, computer software and systems, and computing architectures and data models configured to facilitate management and performance of enterprise functions, and, more specifically, to an enterprise computing and data processing platform configured to implement applications and computerized tools configured to facilitate implementation of an enterprise data model to generate and manage component data objects representing enterprise tasks and processes, as well as portions thereof, any of which may be used to create and modify an enterprise data flow or a process flow, for example, using an enterprise computerized tool. In some examples, a method includes activating one or more applications as computerized tools to receive multiple portions of executable code, at least one portion being accessed via an API, and configuring a component to form a portion of a workspace based on data representing a persona.

Подробнее
07-03-2017 дата публикации

Integrating custom policy rules with policy validation process

Номер: US0009589242B2

A system is provided for integrating custom policy rules with a policy validation process for validating forms within an organization. The system may enable the organization to create new policy rules and to customize existing policy rules for forms according to various specifications. The custom policy rules may be stored in policy database and the policy validation process may be applied to validate submitted forms against the custom policy rules for identifying policy rule violations. The system may automatically apply the policy validation process upon the submission of a form to the organization for identifying violations before posting the form to the organization's system. The system may generate a policy violation results list, and may provide a display message for indicating when policy violations have been identified in the submitted form, and may also present options to the user for addressing the policy violation and approving the form.

Подробнее
15-11-2016 дата публикации

Pharmaceutical composition for the treatment of Duchenne muscular dystrophy

Номер: US0009492433B2
Принадлежит: Summit Corporation Plc, SUMMIT CORP PLC

This invention relates to pharmaceutical compositions comprising 5-(ethylsulfonyl)-2-(naphthalen-2-yl)benzo[d]oxazole (C1100), to processes for preparing the compositions, and to various therapeutic uses of the combinations. Also provided is a method of treatment of Duchenne muscular dystrophy or Becker muscular dystrophy using the compositions.

Подробнее
13-08-2015 дата публикации

MATERIAL SCEENING APPARATUS WITH MULTI-MODE SCREEN BOX

Номер: US20150224540A1
Автор: Neil Robinson
Принадлежит:

A material screening apparatus is adaptable between a reduced-bearing mode and an additional-bearing mode. The apparatus comprises a screen box coupled to a frame and comprising at least one screen deck. A rotatable shaft is coupled to the screen box for imparting vibrational and/or oscillatory motion to the screen deck(s). Drive means imparts rotational motion to the shaft and a first set of bearings couples the shaft to the screen box. In the additional-bearing mode only, a second set of bearings couples the shaft to the frame. Changing between modes allows the screening characteristics of the apparatus to be adjusted. 1. A material screening apparatus adaptable between a reduced-bearing mode and an additional-bearing mode , the apparatus comprising:a screen box comprising at least one screen deck;a frame, the screen box being coupled to the frame;a rotatable shaft coupled to the screen box for imparting vibrational and/or oscillatory motion to said at least one screen deck;drive means operable to impart rotational motion to the shaft; anda first set of at least one bearings coupling said shaft to said screen box, wherein, in the additional-bearing mode only, a second set of at least one bearings couples the shaft to the frame.2. The apparatus of claim 1 , wherein the shaft is configured to removably receive said second set of at least one bearings.3. The apparatus of claim 1 , wherein in the additional-bearing mode the second set are fitted to the shaft and coupled to the frame claim 1 , while in the reduced-bearing mode the second set are preferably removed.4. The apparatus of claim 1 , wherein each set of bearings comprises first and second bearings claim 1 , a respective one located on either side of the screen box.5. The apparatus of claim 1 , wherein the second set claim 1 , when fitted claim 1 , are located around the shaft outwardly of the first set.6. The apparatus of claim 1 , wherein the screen box is coupled to the frame by coupling means that allows ...

Подробнее
14-05-2013 дата публикации

Decking template

Номер: US000D682123S1
Автор: Neil Robinson
Принадлежит:

Подробнее
27-09-2012 дата публикации

VIDEO SURVEILLANCE APPARATUS USING DUAL CAMERA AND METHOD THEREOF

Номер: US20120242809A1
Принадлежит:

The present invention relates to a video surveillance apparatus and method using a dual camera, which is capable of applying any camera videos with a result of video analysis made based on one selected from videos provided from a special purpose camera, such as a thermal image camera, and a visible light camera. Since the video surveillance apparatus and method is capable of arranging a visible light camera and a special-purpose camera in the same surveillance area, securing FOV differences between these cameras as pixel matching parameters between images by the medium of the same space corresponding to an image of each camera, performing selective video analysis for one of these parameters, and checking a result of the analysis in any camera images through the matching information in the same way, it is possible to guarantee autonomy of video switching, continuity of object tracking in video switching, and high reliability. 1. A video surveillance apparatus using a dual camera , comprising:a dual camera unit including a visible light camera and a special-purpose camera which are adjacent to each other, the special-purpose camera having a property different from a property of the visible light camera;a calibration unit which includes surveillance space calibration information for each camera of the dual camera unit;a video analysis unit which analyzes a video of one selected from videos of the cameras of the dual cameras by referring to the calibration information;a video matching unit which mutually matches videos of the two cameras of the dual camera unit by the medium of the surveillance space by using the calibration information for each camera of the calibration unit; anda representation unit which selects a video of one to be analyzed by the video analysis unit, of the cameras of the dual camera unit according to an external control signal or a preset criterion, selects a video of a camera to be provided to the outside, and displays a result of the analysis of ...

Подробнее
28-08-2003 дата публикации

Protection systems for power networks

Номер: US20030161084A1
Принадлежит: Alstom SA

A protection system for an electrical power network uses a method of determining the times of capture of current signals obtained by protection devices ( 3 A, 3 B) at first and second spaced points along a power line. Measurements are captured at the first device ( 3 A) and sent to the second device ( 3 B), which captures a second measurement and sends a reply to the first device. The timing of both measurements is synchronised using a GPS signal, and the total propagation time tp 1 +tp 2 ) of the outward and return signals (S 1, S 2 ) is stored in a memory. In the event that the GPS signal is lost, the stored propagation time is used to calculate the actual time of the second measurement relative to the first measurement.

Подробнее
21-03-2013 дата публикации

INTEGRATING CUSTOM POLICY RULES WITH POLICY VALIDATION PROCESS

Номер: US20130073531A1
Принадлежит: Microsoft Corporation

A system is provided for integrating custom policy rules with a policy validation process for validating forms within an organization. The system may enable the organization to create new policy rules and to customize existing policy rules for forms according to various specifications. The custom policy rules may be stored in policy database and the policy validation process may be applied to validate submitted forms against the custom policy rules for identifying policy rule violations. The system may automatically apply the policy validation process upon the submission of a form to the organization for identifying violations before posting the form to the organization's system. The system may generate a policy violation results list, and may provide a display message for indicating when policy violations have been identified in the submitted form, and may also present options to the user for addressing the policy violation and approving the form. 1. A method executed at least in part in a computing device for integrating custom policy rules with a policy validation process , the method comprising:enabling a user within an organization to create a policy rule for validating business forms used by the organization;storing the policy rule in a policy database;detecting submission of a business form to the organization;applying a policy validation process to the business form, wherein the policy validation process evaluates the business form against the policy rule stored in the policy database; andif one or more policy violations are identified in the business form, generating a policy violation results list.2. The method of claim 1 , further comprising:enabling the user to customize the policy rule for one or more sub-entities of the organization and storing the customized policy rule for the sub-entities in the policy database.3. The method of claim 2 , further comprising:enabling the user to customize the policy rule according to one of: an affiliated vendor of ...

Подробнее
31-08-2004 дата публикации

Cytokine production inhibitors

Номер: US0006784203B1

A 5,6-dihydro-alpha-pyrone of formula (I)wherein R is CO2H or CH3 and, when R is CO2H, a pharmaceutically or veterinarily acceptable salt thereof. Processes for producing compounds of formula (I) and their use as cytokine production inhibitors.

Подробнее
25-11-2014 дата публикации

People counter including setting interface and method for setting the same

Номер: US0008897492B2

Disclosed is a people counter including a setting interface and a setting method thereof. Since a reference width used to count of a moving object within an image is visibly arranged and displayed on a screen so that a detected width of the moving object can be compared with the reference width, setting and verification for count is very easy. In addition, since the interface can be freely moved for adjustment and comparison of a reference width using a pointing device such as a mouse, thereby providing verification and resetting which are intuitive and practical over conventional manual adjustment schemes, count accuracy can be easily increased in different environments depending on conditions or type of moving objects within an image.

Подробнее
16-03-2023 дата публикации

ACTUATION UNIT AND VALVE ASSEMBLY COMPRISING THE SAME

Номер: US20230079609A1
Принадлежит:

A valve assembly including a valve arranged to move between open and closed positions by rotating an operating member about an axis is provided. An actuation unit includes a torsion spring, a trigger member, and a driving member. The driving member engages with the operating member to drive rotation of the same. The torsion spring applies a first torque to the driving member around the axis in a first rotational direction. An external second torque opposite the first torque resets the valve to the open position in which the driving member is held by a latching mechanism. The latching mechanism is arranged to hold the driving member only when the valve is in the open position. An external force applied to the trigger member releases the driving member from the latching mechanism, the first torque thereby rotating the driving member to mechanically bias said valve to the closed position.

Подробнее
01-05-2014 дата публикации

PEOPLE COUNTER INCLUDING SETTING INTERFACE AND METHOD FOR SETTING THE SAME

Номер: US20140119594A1
Принадлежит:

Disclosed is a people counter including a setting interface and a setting method thereof. Since a reference width used to count of a moving object within an image is visibly arranged and displayed on a screen so that a detected width of the moving object can be compared with the reference width, setting and verification for count is very easy. In addition, since the interface can be freely moved for adjustment and comparison of a reference width using a pointing device such as a mouse, thereby providing verification and resetting which are intuitive and practical over conventional manual adjustment schemes, count accuracy can be easily increased in different environments depending on conditions or type of moving objects within an image. 1. A people counter for counting a moving object moving from region to region within an image received from a camera through an image analysis system , comprising:a setting interface which provides a screen on which the image is displayed and allows a user to select one or more preset visible components for count of the moving object and superimpose the selected visible component on the image in a drag & drop manner using a point device in order to set and manipulate the visible component;a line setting unit which provides a moving object crossing boundary line as one of the visible components;a reference width setting unit which provides a reference width for indication of a reference of a width of the moving object crossing the line, as one of the visible components; anda count unit which detects the width of the moving object crossing the line in the received image through a preset image analysis system and counts the moving object based on the reference width by means of a preset counting scheme.2. The people counter according to claim 1 , wherein the setting interface indicates the width of the detected moving object accumulatively in count of the moving object in such a manner that a new detected content is indicated in a ...

Подробнее
29-03-2016 дата публикации

Material screening apparatus with multi-mode screen box

Номер: US0009296017B2
Принадлежит: Terex GB Limited, TEREX GB LTD, TEREX GB LIMITED

A material screening apparatus is adaptable between a reduced-bearing mode and an additional-bearing mode. The apparatus comprises a screen box coupled to a frame and comprising at least one screen deck. A rotatable shaft is coupled to the screen box for imparting vibrational and/or oscillatory motion to the screen deck(s). Drive means imparts rotational motion to the shaft and a first set of bearings couples the shaft to the screen box. In the additional-bearing mode only, a second set of bearings couples the shaft to the frame. Changing between modes allows the screening characteristics of the apparatus to be adjusted.

Подробнее
27-06-2024 дата публикации

COMPUTERIZED TOOLS TO IMPLEMENT A PERMISSION WORKBENCH APPLICATION TO MODIFY SETS OF PERMISSIONS THAT PROVIDE ACCESS TO ENTERPRISE DATA OBJECTS

Номер: US20240211958A1
Принадлежит: Certinia Inc.

Various embodiments relate generally to data science and data analysis, computer software and systems, and computing architectures and data models configured to facilitate management and performance of enterprise functions, and, more specifically, to an enterprise computing and data processing platform configured to implement applications and computerized tools configured to facilitate implementation of an enterprise data model to generate and manage component data objects representing enterprise tasks and processes, as well as portions thereof, any of which may be used to create and modify an enterprise data flow or a process flow, for example, using an enterprise computerized tool. In some examples, a method includes activating one or more applications as computerized tools to access subsets of one or more permissions, identifying an enterprise function data object to generate a third subset of permissions.

Подробнее
09-08-2012 дата публикации

SHUNT REGULATOR FOR HIGH VOLTAGE OUTPUT USING INDIRECT OUTPUT VOLTAGE SENSING

Номер: US20120200272A1
Принадлежит: INTERSIL AMERICAS INC.

Embodiments disclosed herein provide for a voltage regulator having one or more Zener diodes coupled in series between an output voltage and system ground. The one or more Zener diodes are in a reverse biased configuration. A transistor is coupled in series with the one or more Zener diodes between the one or more Zener diodes and system ground. A control circuit is coupled to the transistor and configured to adjust the transistor to control a voltage level of the output voltage. The control circuit is configured such that transistor is adjusted substantially independent of values of the one or more Zener diodes. 1. A voltage regulator comprising:one or more Zener diodes coupled in series between an output and system ground, the one or more Zener diodes coupled such that a cathode is toward the output voltage and an anode is toward system ground;a transistor coupled in series with the one or more Zener diodes between the one or more Zener diodes and system ground; anda control circuit coupled to the transistor and configured to adjust the transistor to control a voltage level of the output voltage, the control circuit including a reference Zener diode having substantially matching characteristics to the one or more Zener diodes, the control circuit configured such that transistor is adjusted substantially independent of values of the one or more Zener diodes.2. The voltage regulator of claim 1 , wherein the one or more Zener diodes comprise multiple Zener diodes coupled in series with one another.3. The voltage regulator of claim 1 , wherein the control circuit includes an amplifier loop.4. The voltage regulator of claim 3 , wherein the amplifier loop controls the transistor such that a voltage between the one or more Zener diodes and the transistor does not rise above a value based on a reference voltage.5. The voltage regulator of claim 3 , wherein the amplifier loop comprises:a differential amplifier having an inverting input, a non-inverting input, and an output ...

Подробнее
19-09-2013 дата публикации

HIERARCHICAL BUDGET PROCESS ORCHESTRATION

Номер: US20130246106A1
Принадлежит: MICROSOFT CORPORATION

A hierarchical budgeting structure is generated and used for generating and reviewing budgets during the budget planning process. Automated workflows for generating the budget and iteratively reviewing the budget are determined based upon the hierarchical budgeting structure. The hierarchical budgeting structure is first defined and that hierarchical budgeting structure is used to control flow of the information during the budget planning process. Nodes in the hierarchal structure each have an associated workflow and a set of rules that control activities that can be performed at a given node and that control security features corresponding to that node. 1. A computer-implemented method of orchestrating a budget plan process , comprising:displaying, on a display device,a budget organizational hierarchy having hierarchically arranged nodes;receiving a first selection input selecting a first node in the budget organizational hierarchy;displaying, on a display device, budget plan generation user interface (UI) displays with user input mechanisms;receiving first budget plan inputs, through the user input mechanisms on the budget plan generation UI displays, the first budget plan inputs defining a corresponding first budget plan for the first node, the user input mechanisms including stages user input mechanisms to receive user inputs to define stages in the budget plan, and to order the stages according to a workflow; andautomatically executing tasks in the stages, with a computer processor, according to the workflow in the first budget plan to orchestrate the budget plan process.2. The computer-implemented method of and further comprising:receiving a second selection input selecting a second node in the budget organizational hierarchy; 'receiving second budget plan inputs, through the budget plan generation UI displays, defining a corresponding second budget plan for the second node, the second budget plan inputs further defining stages ordered according to a second ...

Подробнее
09-01-2020 дата публикации

COORDINATING MULTIPLE COMPONENTS

Номер: US20200012528A1
Принадлежит: Lookout, Inc.

Systems and methods for coordinating components can include: determining, by a first application executing on a client device, a need to perform a sharable functional task; identifying a first software component installed on the client device and capable of performing a first variation of the sharable functional task; identifying a second software component installed on the client device and capable of performing a second variation of the sharable functional task, wherein the second variation of the sharable functional task is functionally overlapping with and not identical to the first variation; identifying a set of characteristics of both the first software component and the second software component; selecting the second software component for performing the sharable functional task based on the set of characteristics, where the set of characteristics includes at least a version number; and delegating performance of the sharable functional task to the second software component. 1. A method , implemented by one or more processors , comprising:determining, by a first application executing on a client device, a need to perform a sharable functional task;identifying a first software component installed on the client device and capable of performing a first variation of the sharable functional task;identifying a second software component installed on the client device and capable of performing a second variation of the sharable functional task, wherein the second variation of the sharable functional task is functionally overlapping with and not identical to the first variation;identifying a set of characteristics of both the first software component and the second software component;selecting the second software component for performing the sharable functional task based on the set of characteristics, wherein the set of characteristics includes at least a version number; anddelegating, by the one or more processors, performance of the sharable functional task to the ...

Подробнее
24-04-2014 дата публикации

METHODS, DEVICES, AND MEDIUMS ASSOCIATED WITH OPTICAL LIFT MECHANISM

Номер: US20140110600A1
Автор: Robinson William Neil
Принадлежит: INTELLECTUAL VENTURES FUND 79 LLC

An apparatus includes a light foil device configured to move based on radiation pressure associated with light received by the light foil device. The apparatus includes a mechanism configured to transition between operational states in response to the movement of the light foil device, or includes a valve configured to control a flow of material through a conduit based, at least in part, on the movement of the light foil device. 1. An apparatus comprising:a light foil device configured to move in response to a presence of light received from a light source;pivots rotationally coupled to opposite ends of the light foil device, wherein the light foil device is configured to rotate about the pivots in response to the presence of light;a coupling member coupled to the pivots, wherein the light foil device is configured to move the coupling member in response to the presence of light; anda mechanism coupled to the coupling member, wherein the mechanism is configured to transition between operational states in response to the rotation of the light foil device.2. The apparatus of claim 1 , wherein the light foil device is elongated about a longitudinal center line and is configured to rotate about the longitudinal center line.3. The apparatus of claim 1 , wherein the light foil device comprises a substantially planar surface configured to reflect the light in a first direction claim 1 , and is further configured to rotate the light foil device in a second direction based claim 1 , at least in part claim 1 , on the light reflected in the first direction.4. The apparatus of claim 3 , wherein the rotation of the light foil device in the second direction transitions the mechanism into a first one of the operational states.5. The apparatus of claim 4 , wherein the light foil device is further configured to stop the rotation in response to a removal of the light.6. The apparatus of claim 1 , wherein the light foil device is further configured to:move the coupling member into a ...

Подробнее
20-02-2020 дата публикации

SYSTEMS AND METHODS FOR COMPUTING DEVICE PROTECTION

Номер: US20200058074A1
Принадлежит:

Embodiments of the present disclosure help protect computing devices by, among other things, identifying events that may pose a risk to a computing device based on data from sensors coupled to the computer device. 1. A method to protect a computing device , the method comprising:receiving sensor data from at least one sensor of the computing device; determining a plurality of computing devices having a characteristic in common with the computing device,', 'selecting a threshold based on historical data for the plurality of computing devices, and', 'determining that the received sensor data exceeds the threshold;, 'identifying, based on the sensor data, an event posing a risk of damage to the computing device, wherein identifying the event includesin response to identifying the event, transmitting an electronic message to the computing device regarding the event; andmodifying, based on the received sensor data, risk data for the plurality of computing devices.2. The method of claim 1 , further comprising obtaining results of diagnostics run on the computing device to assess health of the computing device claim 1 , wherein the electronic message includes the results of diagnostics.3. The method of claim 1 , further comprising analyzing a repair history of the computing device.4. The method of claim 1 , wherein identifying the event further includes obtaining results of diagnostics including data from a diagnostics program operating on the computing device.5. The method of claim 4 , wherein the results of diagnostics further include an image or video from a camera of the computing device.6. The method of claim 5 , wherein the image or video includes at least a portion of a screen of the computing device.7. The method of claim 1 , wherein identifying the event further includes detecting malware on the computing device.8. The method of claim 1 , wherein the selected threshold is associated with a force of impact claim 1 , and the historical data includes data associated ...

Подробнее
19-03-2020 дата публикации

DETERMINING A SECURITY STATE DESIGNATION FOR A COMPUTING DEVICE BASED ON A SOURCE OF SOFTWARE

Номер: US20200089869A1
Принадлежит:

For increased security, a source is determined for software to be installed on a computing device. In one approach, an application identifier is received from the computing device for an application to be installed. A source identifier of the application is determined. The application identifier and the source identifier are sent over a network to a server. A first state designation for the first application is received from the server. The first state designation represents a trusted state or an untrusted state. In response to receiving the first state designation, a second state designation is set. The second state designation is sent to the computing device. 1. A system , comprising:at least one processor; and receive, from a first computing device, a first application identifier for a first application;', 'determine a first source identifier of the first application;', 'send the first application identifier and the first source identifier over a network to a second computing device;', 'receive, from the second computing device, a first state designation for the first application, the first state designation representing a trusted state or an untrusted state;', 'in response to receiving the first state designation, set a second state designation; and', 'send the second state designation to the first computing device., 'memory storing instructions configured to instruct the at least one processor to2. The system of claim 1 , wherein the first source identifier is determined based on monitoring network activity.3. The system of claim 1 , wherein the first source identifier is determined by detecting the first source identifier on the first computing device.4. The system of claim 1 , wherein the first source identifier is determined by detecting code that operates in the network path from a network source to the first computing device.5. The system of claim 4 , wherein the code is detected operating in a network device.6. The system of claim 1 , wherein the first ...

Подробнее
02-06-2022 дата публикации

Determining a security state based on communication with an authenticity server

Номер: US20220174494A1
Принадлежит: LookOut Inc

For increased security, a source is determined for software to be installed on a computing device. In one approach, a side-load server receives, from a mobile device, data regarding an application to be installed on the mobile device. The server determines a source of the application, then sends, to an authenticity server, data regarding the source. The server receives, from the authenticity server, a first state designation for the application. In response to receiving the first state designation, the server sets a second state designation, and sends the second state designation to the mobile device (e.g., to permit or block installation of the application).

Подробнее
09-05-2019 дата публикации

MANAGING ACCESS TO SERVICES BASED ON FINGERPRINT MATCHING

Номер: US20190141030A1
Принадлежит:

A method includes: receiving a request regarding access by a first computing device (e.g., a mobile device of a user) to a service; in response to the request, performing, by a second computing device (e.g., a device risk evaluation server, or a server of an identity provider), an evaluation that includes creating a fingerprint of the first computing device; and determining, by the second computing device, whether the fingerprint matches a fingerprint of one or more other computing devices. The second computing devices determines whether to authorize access to the service based on the evaluation. 1. A method , comprising:receiving, by a first computing device, a request from a second computing device, wherein the request is for access by the second computing device to a service, and wherein access to the service requires that a software component is installed on the second computing device;in response to the request, determining whether the software component is installed on the second computing device;in response to determining that the software component is not installed on the second computing device, creating a fingerprint of the second computing device; anddetermining whether the fingerprint matches a fingerprint of a different computing device that has previously communicated with the first computing device.2. The method of claim 1 , wherein the fingerprint includes data extracted from at least one communication received by the first computing device from the second computing device.3. The method of claim 1 , further comprising:performing, by the first computing device, an evaluation of a configuration of the second computing device, wherein the evaluation comprises determining whether the fingerprint matches the fingerprint of the different computing device, and further comprises determining a risk level; andperforming, by the first computing device, an action based on the evaluation, wherein the action comprises sending a first communication to a computing ...

Подробнее
25-05-2017 дата публикации

DETERMINING SOURCE OF SIDE-LOADED SOFTWARE USING SIGNATURE OF AUTHORSHIP

Номер: US20170147810A1
Принадлежит:

A source of side-loaded software is determined. An action may be performed in response to the determination of the source. In one case, the handling of an application on a mobile device may be based on whether the source of the application is trusted or untrusted. If a software application being newly-installed on a mobile device of a user is determined to be untrusted, installation or execution is blocked. In one approach, the determination of the source includes: determining whether a first source identifier of a first application matches a white list of source identifiers or a black list of source identifiers; and sending the first source identifier, a first application identifier, and a signature of authorship for the first application to a different computing device. 1. A non-transitory computer-readable storage medium storing computer-readable instructions , which when executed , cause a first computing device to:store, in memory, a device state of the first computing device, the device state to vary between states comprising trusted, untrusted, and unknown;determine, by at least one processor of the first computing device, whether a first source identifier of a first application matches a first list of source identifiers;in response to determining that the first source identifier does not match the first list: set the device state to unknown, and send, by the at least one processor, over a network to a second computing device, at least one message comprising the first source identifier, a first application identifier for the first application, and a signature of authorship for the first application;receive, over the network, a first message from the second computing device, the first message comprising a value of a first state designation for the first application, wherein the first state designation can be set to values including trusted and untrusted, and the second computing device is configured to set the value for the first state designation based at ...

Подробнее
05-07-2018 дата публикации

DETERMINING SOURCE OF SIDE-LOADED SOFTWARE USING AN ADMINISTRATOR SERVER

Номер: US20180189478A1
Принадлежит:

An action may be performed in response to a determination of a source of side-loaded software. In one case, the handling of an application on a mobile device may be based on whether the source of the application is trusted or untrusted. If a software application being newly-installed on a mobile device of a user is determined to be untrusted, installation or execution is blocked. In one approach, the determination of the source includes: receiving, from the mobile device, a first application identifier and a first source identifier, each for a first application; sending the first application identifier and the first source identifier over a network to an administrator server; receiving, from the administrator server, a first state designation for the first application; setting a second state designation based on the first state designation; and sending the second state designation to the mobile device. 1. A system , comprising:at least one processor; and receive, from a first computing device, a first application identifier and a first source identifier, each for a first application;', 'determine whether the first source identifier matches at least one of a white list of source identifiers or a black list of source identifiers;', 'send the first application identifier and the first source identifier over a network to a second computing device;', 'receive, from the second computing device, a first state designation for the first application;', 'set a second state designation based on the first state designation; and', 'send the second state designation to the first computing device., 'memory storing instructions configured to instruct the at least one processor to2. The system of claim 1 , wherein the first computing device is configured to store an application state for the first application claim 1 , the application state to vary between states comprising trusted and untrusted claim 1 , and wherein sending the second state designation to the first computing device ...

Подробнее
19-08-2021 дата публикации

CONFIGURING ACCESS TO A NETWORK SERVICE BASED ON A SECURITY STATE OF A MOBILE DEVICE

Номер: US20210258304A1
Принадлежит:

In one approach, a first computing device receives a request from a second computing device. The request is for access by the second computing device to a service provided by a third computing device over a network. In response to receiving the request, the first computing device performs a security evaluation of the second computing device. The evaluation determines a risk level. The first computing device generates, based on the evaluation, a token for the second computing device. The token includes data encoding the risk level. The token is sent to the second computing device and/or third computing device. The sent data is used to configure the service provided to the second computing device. 1. A method , comprising:receiving, by a first computing device, a request from a second computing device, the request for access by the second computing device to a service provided by a third computing device;in response to receiving the request, performing, by the first computing device, an evaluation of the second computing device, wherein the evaluation comprises determining a risk level;generating, by the first computing device based on the evaluation, a token for the second computing device, the token comprising first data encoding the risk level; andsending the token to at least one of the second computing device or the third computing device, wherein the first data is used to configure the service provided to the second computing device.2. The method of claim 1 , wherein the service provided to the second computing device is configured by the third computing device according to a security state on the second computing device.3. The method of claim 2 , wherein the security state is determined by the third computing device based at least on the risk level determined from the evaluation by the first computing device.4. The method of claim 2 , further comprising receiving data from security software on the second computing device claim 2 , and determining the security ...

Подробнее
28-09-2017 дата публикации

COORDINATING MULTIPLE SECURITY COMPONENTS

Номер: US20170277570A1
Принадлежит:

A system and method for coordinating security components, including: determining, by an application executing on a client device, a need to perform a sharable functional task; identifying a first security component and a second security component installed on the client device and capable of performing variations of the sharable functional task, where variations of the sharable functional task are functionally overlapping and not identical; identifying a set of characteristics characterizing the first security component and the second security component; selecting the second security component as a primary security component for performing a variation of the sharable functional task based on the set of characteristics; delegating, by one or more processors, performance of the sharable functional task to the primary security component; and instructing the processors to cause functionality associated with the first security component to be at least partially suspended. 1. A method , implemented by one or more processors , comprising:determining, by a first security component of a first application executing on a client device, a need to perform a sharable functional task;identifying a set of software components installed on the client device and capable of performing variations of the sharable functional task, wherein variations of the sharable functional task are functionally overlapping and not identical;establishing inter-app communication between the first security component and at least a second security component of the set of software components;identifying a set of characteristics characterizing both the first security component and the second security component;selecting, using the first security component and the second security component, the second security component as a primary security component for performing a variation of the sharable functional task based on the set of characteristics, wherein the set of characteristics includes at least a version ...

Подробнее
06-10-2016 дата публикации

MONITORING SYSTEM AND METHOD FOR QUEUE

Номер: US20160292514A1
Принадлежит:

The present invention relates to a system and a method of monitoring a queue that allow for exactly recognizing objects in a queue and exactly monitoring the situation of the queue by tracking the recognized objects, using depth detection device such as a TOF camera. According to the present invention, it is possible to map a space and an image using depth information provided through a depth detection device without mapping a 3D space to an image taken by a camera and exactly measure the actual heights of objects from the ground using depth information of the objects and the background and initial parameters of the depth detection device so that desired objects can be exactly detected and recognized in filtering. Accordingly, the system can be less complicated. Further, waiting time is assigned to recognized objects so that they can be easily tracked. 1. A system for monitoring a queue , comprising:an image receiving unit that receives image information including depth information of objects and a background of a photographing space through a depth detection device;an object information collector that calculates actual heights of the objects using the depth information of the objects and the background obtained from the image information and initial parameters including a height and an angle measured by a sensing unit in the depth detection device;a filter that creates cluster set information composed of a plurality of items of cluster information calculated by filtering the objects in the image information to a plurality of different height values; andan object tracking unit that recognizes the objects by comparing the cluster set information with a predetermined pattern, assigns waiting time information for counting the time from the point of time when the objects are recognized, to the objects, and tracks the objects in the queue in accordance with the queue order.2. The system of claim 1 , wherein the depth detection device is any one of a TOF (Time Of Flight) ...

Подробнее
10-09-2020 дата публикации

QUARANTINE OF SOFTWARE BASED ON ANALYSIS OF UPDATED DEVICE DATA

Номер: US20200285752A1
Принадлежит:

A method includes: after installation of software on a first mobile device, receiving new data from a second mobile device; analyzing, using a data repository, the new data to provide a security assessment; determining, based on the security assessment, a new security threat associated with the software; and in response to determining the new security threat, causing the first mobile device to implement a quarantine of the software. 1. A method , comprising:analyzing software to determine whether a security threat is associated with the software;in response to determining that a security threat is not associated with the software, causing, by a first computing device, installation of the software on a second computing device;after installation of the software on the second computing device, receiving, by the first computing device, first data from a third computing device;analyzing, by the first computing device and using a data repository, the first data to provide a security assessment;determining, based on the security assessment, a first security threat associated with the software; andin response to determining the first security threat, causing sending of a message to the second computing device, the message causing the second computing device to perform an action.2. The method of claim 1 , wherein the action is implementing a quarantine of the software.3. The method of claim 1 , wherein the action is at least one of deleting the software claim 1 , uninstalling the software claim 1 , preventing the software from launching claim 1 , or changing a permission associated with the software.4. The method of claim 1 , wherein the action is displaying an alert to a user of the second computing device claim 1 , the alert requesting that the user perform at least one of disabling the software claim 1 , or changing a permission on the second computing device.5. The method of claim 1 , further comprising sending a message to a computing device of an administrator for the ...

Подробнее
10-09-2020 дата публикации

PERFORMING A SECURITY ACTION IN RESPONSE TO A DETERMINATION THAT A COMPUTING DEVICE IS LOST OR STOLEN

Номер: US20200287909A1
Принадлежит:

In response to a computing device of a user being reported as lost or stolen, various steps associated with security for the computing device are performed. In one approach, a database is marked to indicate that the computing device is lost or stolen. Applications that are installed on the lost or stolen computing device are determined, and a security action is selected based on this determination. In some cases, the selected security action reduces or denies service to the computing device, and/or blackholes traffic to or from the installed application. A service provider associated with the installed application is determined, and a notification is sent to the service provider. The notification indicates the installed application, and that the computing device of the user has been lost or stolen. 1. A method comprising:receiving, over a network, a communication indicating that a computing device of a user is lost or stolen; marking, in a record of a database, an indication that the computing device is lost or stolen;', 'determining at least one application that has been installed on the computing device, wherein the installed application is associated with a FIDO authentication capability of the computing device;', 'performing at least one action related to security and associated with the lost or stolen computing device, wherein the action is selected based on the determined installed application, and the selected action includes at least one of reducing service to the computing device, denying service to the computing device, or requiring authentication from the computing device;', 'determining a service provider that is associated with the installed application; and', 'sending a communication to a computing device of the service provider, the communication identifying the installed application and including an indication of the selected action., 'in response to receiving the communication2. The method of claim 1 , further comprising claim 1 , in response to ...

Подробнее
03-11-2016 дата публикации

DETERMINING SOURCE OF SIDE-LOADED SOFTWARE

Номер: US20160321452A1
Принадлежит:

A source of side-loaded software is determined. An action may be performed in response to the determination of the source. In one case, the handling of an application on a mobile device may be based on whether the source of the application is trusted or untrusted. If a software application being newly-installed on a mobile device of a user is determined to be untrusted, installation or execution is blocked. In one approach, the determination of the source includes: determining whether a first source identifier of a first application matches a white list of source identifiers or a black list of source identifiers; and sending the first source identifier and a first application identifier for the first application to a different computing device. 1. A non-transitory computer-readable storage medium storing computer-readable instructions , which when executed , cause a first computing device to:store, in memory, a device state of the first computing device, the device state to vary between states comprising trusted, untrusted, and unknown;determine, by at least one processor of the first computing device, whether a first source identifier of a first application matches a first list of source identifiers;in response to determining that the first source identifier does not match the first list: set the device state to unknown, and send, by the at least one processor, over a network to a second computing device, at least one message comprising the first source identifier and a first application identifier for the first application;receive, over the network, a first message from the second computing device, the first message comprising a value of a first state designation for the first application, wherein the first state designation can be set to values including trusted and untrusted, and the second computing device is configured to set the value for the first state designation; andin response to receiving the first message, change, in the memory, the device state from ...

Подробнее
24-11-2016 дата публикации

SYSTEMS AND METHODS FOR COMPUTING DEVICE PROTECTION

Номер: US20160343083A1
Принадлежит:

Embodiments of the present disclosure help protect computing devices by, among other things, identifying events that may pose a risk to a computing device based on data from sensors coupled to the computer device. 1. A computer-implemented method comprising:receiving data pertaining to a computing device from a sensor coupled to the computing device;identifying, based on the sensor data for the computing device, an event posing a risk to the computing device, wherein the risk comprises one or more of damage to the computing device and loss of the computing device; andpresenting, based on the identified event, an offer to insure the computing device to a user of the computing device.2. The method of claim 1 , wherein identifying the event posing the risk to the computing device includes comparing the sensor data for the computing device to risk data for a plurality of computing devices claim 1 , each of the plurality of computing devices having a characteristic in common with the computing device.3. The method of claim 1 , wherein presenting the offer to insure the computing device includes determining claim 1 , based on information retrieved from a database claim 1 , that the user does not have an existing insurance policy covering the computing device.4. The method of claim 1 , wherein presenting the offer to insure the computing device includes:transmitting the sensor data for the computing device and identification information for the user of the computing device to an insurance provider over a network; andreceiving, over the network, approval from the insurance provider to provide the offer to insure the computing device to the user of the computing device.5. The method of claim 1 , wherein identifying the event includes determining that the sensor data exceeds a predetermined threshold.6. The method of claim 5 , wherein the predetermined threshold is provided by an insurance provider associated with the offer to insure the computing device.7. The method of ...

Подробнее
30-11-2017 дата публикации

METHODS AND SYSTEMS FOR DETECTING AND PREVENTING NETWORK CONNECTION COMPROMISE

Номер: US20170346853A1
Принадлежит: Lookout, Inc.

The security of network connections on a computing device is protected by detecting and preventing compromise of the network connections, including man-in-the-middle (MITM) attacks. Active probing and other methods are used to detect the attacks. Responses to detection include one or more of displaying a warning to a user of the computing device, providing an option to disconnect the network connection, blocking the network connection, switching to a different network connection, applying a policy, and sending anomaly information to a security server. 1. A method for omitting to report that a connection is compromised , the method comprising:determining, by a security component on a computing device, that captive portal authentication is enabled for the computing device for a connection;requesting, by the security component, a response from a first server over the connection;in response to the requesting, receiving, by the security component, an indication that the connection is compromised; andomitting to report, by the security component, that the connection is compromised based on the determination that captive portal authentication is enabled for the computing device for the connection, wherein but for the determination that captive portal authentication is enabled, the security component would have reported that the connection is compromised to at least one of: a user, an administrator, and a security server.2. The method of claim 1 , wherein the indication that the connection is compromised includes:(i) not receiving, by the security component, a response from the first server; or(ii) when a response from the first server is received, comparing, by the security component, a received component of the response from the first server to an expected component, the comparing resulting in a second determination that the received component of the response is different from the expected component.3. The method of claim 1 , further comprising claim 1 , before the ...

Подробнее
13-12-2018 дата публикации

USE OF DEVICE RISK EVALUATION TO MANAGE ACCESS TO SERVICES

Номер: US20180359244A1
Принадлежит:

A method includes: receiving a request regarding access by a first computing device (e.g., a mobile device of a user) to a service; in response to the request, performing, by a second computing device (e.g., a device risk evaluation server, or a server of an identity provider), an evaluation of the first computing device; and performing, by the second computing device, an action (e.g., authorizing access to the service) based on the evaluation. 1. A method , comprising:receiving data in a communication from a computing device of an identity provider;subsequent to receiving the data, receiving, by a second computing device, a request from a first computing device, the request for access by the first computing device to a service, wherein the access requires authorization by the computing device of the identity provider, and access to the service requires that a software component is installed on the first computing device;in response to the request, performing, by the second computing device, an evaluation of a configuration of the first computing device, wherein the evaluation comprises determining a risk level, and wherein the evaluation is based at least in part on the received data from the identity provider;performing, by the second computing device, an action based on the evaluation, wherein the action comprises sending a first communication to the computing device of the identity provider, the first communication indicating the risk level, wherein the identity provider is of record with the second computing device to use for authorizing requests for access to the service, and wherein the identity provider is configured to authorize access to the service in response to receiving the first communication;determining whether the software component is installed on the first computing device; and creating a fingerprint of the first computing device, the fingerprint including data extracted from at least one communication from the first computing device; and', ' ...

Подробнее
29-12-2016 дата публикации

COORDINATING MULTIPLE COMPONENTS

Номер: US20160378558A1
Принадлежит:

A system and method including: determining, by a manager module, a need to determine a primary software component of a client device; identifying a first software component and a second software component of the client device; identifying a set of characteristics of the first software component and the second software component; determining that the first software component is the primary software component based on the set of characteristics of each software component, where determining the primary software component further includes comparing the set of characteristics of each software component and selecting the primary software component based on the set of characteristics with a highest priority; and instructing, by the manager module, the one or more processors to cause functionality associated with the second software component to be at least partially suspended. 1. A method , implemented by one or more processors , comprising:determining, by a manager module, a need to determine a primary software component of a client device;identifying a first software component and a second software component of the client device;identifying a set of characteristics of the first software component and the second software component;determining that the first software component is the primary software component based on the set of characteristics of each software component, wherein determining the primary software component further comprises comparing the set of characteristics of each software component and selecting the primary software component based on the set of characteristics with a highest priority; andinstructing, by the manager module, the one or more processors to cause functionality associated with the second software component to be at least partially suspended.2. The method of claim 1 , wherein instructing the one or more processors further comprises instructing the one or more processors to cause functionality associated with the primary software component ...

Подробнее
03-11-2022 дата публикации

SIGNAL DELAY MEASUREMENT

Номер: US20220353444A1
Автор: ROBINSON James Neil
Принадлежит: HITOMI LTD

A method for rolling shutter compensation during signal delay measurement, comprising displaying a video test pattern on a display, said video test pattern having a temporal event; capturing a video of the display, by a camera; monitoring a plurality of regions of the display in the video; detecting times () at which the temporal event appears in each monitored region of the display in the video; and extrapolating the detected times () to calculate the time () at which said temporal event would appear at a selected region of the video. 127-. (canceled)28. A method for rolling shutter compensation during signal delay measurement , comprising:displaying a video test pattern on a display, said video test pattern having a temporal event;capturing a video of the display, by a camera;monitoring a plurality of regions of the display in the video;detecting times at which the temporal event appears in each monitored region of the display in the video; andextrapolating the detected times to calculate the time at which said temporal event would appear at a selected region of the video.29. The method of wherein:said camera has an assumed update direction; andsaid plurality of regions are located at different points in the assumed update direction.30. The method of wherein said selected region is different to all of the monitored regions claim 28 , or wherein said selected region is the same as one of the monitored regions.31. The method of wherein:said display has a first update direction;said camera is a rolling shutter camera with a second update direction;said first update direction is substantially perpendicular to the second update direction; andsaid plurality of regions are located at different points in the second update direction.32. The method of wherein said selected region corresponds to a center of the captured video.33. The method of wherein the calculated time of said temporal event is used to measure the delay between a video signal corresponding to the video ...

Подробнее
22-12-1978 дата публикации

LOTS OF MAGNETIC HEADS MANUFACTURING PROCESS AND APPARATUS FOR ITS APPLICATION

Номер: FR2392463A1
Принадлежит: International Business Machines Corp

Procédé et appareil de fabrication par lots de têtes magnétiques dont les noyaux présentent des faces polaires inclinées. Deux barreaux 72 et 74 respectivement de ferrite et de céramique, sont simultanément usinés par un disque abrasif 16 qui découpe dans chacun d'eux des profils complémentaires en marches d'escaliers. Après mise en correspondance des profils et réunion des barreaux, au moyen d'un adhésif, l'ensemble constitué par les barreaux réunis est débité en noyaux individuels dont la largeur est égale à celle desdites marches. Procédé et appareil utilisables notamment pour la fabrication de têtes magnétiques pour la lecture/écriture de donnés numériques. A method and apparatus for batch manufacturing magnetic heads whose cores have inclined pole faces. Two bars 72 and 74 respectively of ferrite and ceramic, are simultaneously machined by an abrasive disc 16 which cuts in each of them complementary profiles in steps of stairs. After matching the profiles and joining the bars, by means of an adhesive, the assembly formed by the joined bars is cut into individual cores the width of which is equal to that of said steps. Method and apparatus which can be used in particular for the manufacture of magnetic heads for reading / writing digital data.

Подробнее
05-12-1997 дата публикации

METHOD AND APPARATUS FOR TRANSMISSION OF VERIFICATION DATA

Номер: FR2749460A1
Автор: William Neil Robinson
Принадлежит: Motorola Ltd

Un dispositif de communication (101) transmet des paquets d'informations par l'intermédiaire d'une liaison de communication (108). Un régisseur (106) couplé à l'émetteur et à un récepteur (110) calcule une première donnée de vérification en fonction d'un critère prédéterminé. Le régisseur (106) reçoit une deuxième donnée de vérification de l'autre dispositif de communication et compare les première et deuxième données de vérification. Les informations sont retransmises si les première et deuxième données de vérification ne sont pas égales. Le dispositif de communication récepteur comprend un régisseur (118). Le régisseur (118) calcule la deuxième donnée de vérification et commande à un émetteur (116) de transmettre la deuxième donnée de vérification au premier dispositif de communication. A communications device (101) transmits information packets through a communications link (108). A controller (106) coupled to the transmitter and to a receiver (110) calculates first verification data based on a predetermined criterion. The controller (106) receives second verification data from the other communication device and compares the first and second verification data. The information is retransmitted if the first and second verification data is not equal. The receiving communication device includes a controller (118). The controller (118) calculates the second verification data and commands a transmitter (116) to transmit the second verification data to the first communication device.

Подробнее
04-09-1987 дата публикации

IMPROVEMENTS ON ARTICULATED TRUCKS, ESPECIALLY SEMI-TRAILERS

Номер: FR2595077A1
Принадлежит: Fruehauf Corp

UNE SEMI-REMORQUE D'UN CAMION ARTICULE COMPORTE UNE SUSPENSION ARRIERE 3 AVEC DES BRAS TRAINANTS 8 COMMANDES PAR DES SACS A AIR 10. LES FREINS BLOQUENT LES ROUES 14 SUR DES ESSIEUX 11 QUI SONT FIXES AUX BRAS TRAINANTS 8. SI LA HAUTEUR DE LA SUSPENSION CHANGE ALORS, LES ROUES 14 PEUVENT ROULER SUR LE SOL, PROVOQUANT LE DEPLACEMENT VERS L'AVANT OU VERS L'ARRIERE DE L'ENSEMBLE DE LA SEMI-REMORQUE. LA BEQUILLE SITUEE A L'AVANT DE LA SEMI-REMORQUE COMPORTE DES PIEDS, QUI ROULENT ALORS SUR LE SOL, RATTRAPANT LE MOUVEMENT ET EMPECHANT QUE DES CONTRAINTES HORIZONTALES ELEVEES N'AGISSENT SUR LA BEQUILLE. A SEMI-TRAILER OF AN ARTICULATED TRUCK HAS A REAR SUSPENSION 3 WITH TRAILING ARMS 8 CONTROLS BY AIRBAGS 10. THE BRAKES LOCK THE WHEELS 14 ON AXLES 11 THAT ARE FIXED TO THE TRAILING ARMS 8. IF THE HEIGHT OF THE SUSPENSION CHANGES THEN WHEELS 14 MAY ROLL ON THE GROUND, MOVING FORWARD OR REAR OF THE SEMI-TRAILER ASSEMBLY. THE STAND LOCATED AT THE FRONT OF THE SEMI-TRAILER HAS FEET, WHICH THEN ROLL ON THE GROUND, CATCHING THE MOVEMENT AND PREVENTING HIGH HORIZONTAL STRESSES FROM ACTING ON THE STAND.

Подробнее
12-05-1995 дата публикации

Data network.

Номер: FR2712130A1
Принадлежит: Motorola Ltd

Un réseau X.25 est proposé et il comprend un terminal de données (10, 11) et un équipement d'infrastructure (22), le terminal de données étant agencé pour générer un paquet de données comprenant un identifieur de type de paquet qui est un identifieur du type enregistrement, un champ d'adresse de terminal et un champ supplémentaire non spécifique au réseau. Un unique code est inclus dans le champ supplémentaire et l'équipement d'infrastructure est agencé pour reconnaître ce code en tant que commande de reconfiguration et pour réaliser une reconfiguration des données aiguillées pour le terminal identifié dans le champ d'adresse afin d'aiguiller des données pour le terminal identifié dans le champ d'adresse sur ce terminal.

Подробнее
09-03-1982 дата публикации

Magnetic head having a jagged-edged gap, and method for producing such head

Номер: CA1119720A
Принадлежит: International Business Machines Corp

Abstract An AC magnetic erase head having improved AC erase characteristics, the magnetic head being formed of two half core of a magnetic material, preferably ferrite, defining an irregular edged or jagged-edged gap, and in-cluding a non-magnetic substance, preferably glass, within the gap. The magnetic head is preferably produced by ther-mally etching ferrite magnetic material forming the half core elements by means of relatively prolonged heat soak at an elevated temperature.

Подробнее
19-05-2015 дата публикации

Methods, devices, and mediums associated with optical lift mechanism

Номер: US9033304B2
Автор: William Neil Robinson
Принадлежит: INTELLECTUAL VENTURES FUND 79 LLC

An apparatus includes a light foil device configured to move based on radiation pressure associated with light received by the light foil device. The apparatus includes a mechanism configured to transition between operational states in response to the movement of the light foil device, or includes a valve configured to control a flow of material through a conduit based, at least in part, on the movement of the light foil device.

Подробнее
28-01-2016 дата публикации

Process of monitoring and/or configuring intelligent electronic devices installed in an electrical power system

Номер: WO2016012629A1
Принадлежит: ALSTOM Technology Ltd

Process of monitoring and/or configuring at least one remote Intelligent Electronic Device (IED 2 ) located in a remote substation (S 2 ) of an electrical power system, said remote Intelligent Electronic Device being linked by a teleprotection link (2) with a local Intelligent Electronic Device located in a local substation (S 1 ), said local Intelligent Electronic Device, remote Intelligent Electronic Device and teleptrotection link (2) forming a protection scheme intended to protect specific circuits of the electrical power system, characterized in that the process comprises a step of implementing monitoring actions on said remote Intelligent Electronic Device (IED 2 ) from a software running on said local Intelligent Electronic Device (IED 1 ), the data exchanged between the local Intelligent Electronic Device and the remote Intelligent Electronic Device during the running of the software being transmitted through the teleprotection link (2).

Подробнее
28-07-1997 дата публикации

Telecommunication systems and associated procedures

Номер: FI973132A0
Принадлежит: Motorola Ltd

Подробнее
29-09-1982 дата публикации

Method of manufacturing a multi-element magnetic transducing head

Номер: EP0060977A2
Принадлежит: International Business Machines Corp

A batch fabricated multi-element head is made from interlocking ferrite parts 35 to form a low contoured surface 33 for interfacing with a magnetic medium, such as a flexible disk. On another surface 34, a multi-turn conductive coil is formed by thin film process and cooperates with a flux path bar to define the magnetic flux field.

Подробнее
06-09-1991 дата публикации

IMPROVEMENTS ON ARTICULATED TRUCKS, ESPECIALLY SEMI-TRAILERS

Номер: FR2595077B1
Принадлежит: Fruehauf Corp

Подробнее
03-03-1999 дата публикации

Communications operating system and method therefor

Номер: EP0898847A2
Принадлежит: Motorola Ltd

A common communications system (119) provides information regarding the availability of other local communication systems (111-117) within the common communications system coverage area to a generic, programmable subscriber unit (120). Geographical location information is then supplied to the common communications system (119) indicating position of the subscriber unit (120). The geographic information is used by either the common communication system (119) or subscriber unit (120) to provide information pertinent only to one or more local communications systems (111-117) that the subscriber unit (120) may select. The common communication system (119) or the subscriber unit (120) can also be used to selectively filter or extract information such that the information presented to the user is related to the geographical location. The subscriber unit (120) then selects one of the local communications systems (111-117) and receives enabling programming from that local communication system. The enabling programming permits the subscriber unit (120) to configure itself to operate on the selected communication system.

Подробнее
24-12-1997 дата публикации

A multimedia conferencing system for use during cellular network handover and method of using same

Номер: WO1997044922A3

A multimedia conferencing terminal (300) for use in a cellular multimedia network utilizing a plurality of multimedia modes of transmission includes a transceiver (315) for transmitting and receiving a multimedia communications signal. A control channel processor (327) is used for providing status information concerning both currently used cells and candidate cells available for use in a cell handover. A media requirement and priority processor (329) supplies requirement information about each media currently in use during a multimedia call. A selection processor (325) is used for selecting a multimedia cell for handover and scheduling the hadover of the individual modes based on the status information and the mode requirement information such that only one or more modes may be handed over and the selection processor may store and forward selective multimedia communications modes to other cells at a later time.

Подробнее
15-02-2005 дата публикации

Telecommunication systems and associated procedures

Номер: FI115013B
Принадлежит: Motorola Ltd

Подробнее
28-12-2016 дата публикации

Systems and methods for computing device protection

Номер: GB2539779A
Принадлежит: LookOut Inc

Computer-implemented method and system for identifying events that may pose a risk to a computing device that comprises: receiving sensor data 110 from sensors coupled to the computing device; using the sensor data to identify an event posing a risk to the computing device 120; and presenting, based on the identified event, an offer to insure the computing device 130 to a user of the device. The risk comprises one or more of damage to the computing device and loss of the computing device. The sensors may be thermal detectors, location detectors, moisture sensors, altimeters, accelerometers, gyroscopes or magnetometers. An insurance provider can provide predetermined thresholds for the sensor data that are associated with the offer to insure. A risk event may be identified by detecting the presence of malware on the computing device. The computing device may be a smartphone, tablet, watch or laptop computer.

Подробнее
04-12-1997 дата публикации

Method and device for verifying a data transmission

Номер: DE19722201A1
Автор: William Neil Robinson
Принадлежит: Motorola Ltd

A communication device (101) transmits packets of information to over a communication link (108). A controller (106) coupled to the transmitter, calculates a first CRC verification data according to a predetermined criteria. The controller (106) receives second verification data from the receiving communication device (103) and compares the first and second verification data. The information is retransmitted if the first and second verification data are not equal. The receiving communication device includes a controller (118). The controller (118) calculates the second verification data and controls a transmitter (116) to transmit the second verification data to the first communication device. Preferably this uses rF.

Подробнее
23-04-2013 дата публикации

ESD clamp for multi-bonded pins

Номер: US8427799B2
Принадлежит: INTERSIL AMERICAS LLC

A circuit comprises a plurality of segments and a clamp circuit. Each of the plurality of segments comprises a bond pad coupled to a multi-bonded pin via a respective bond wire and a conductor coupling the bond pad to a respective internal connection. The bond pad from each of the plurality of segments is coupled to the same multi-bonded pin. The clamp circuit comprises a plurality of input pins and a plurality of clamp transistors. Each input pin is coupled to the bond pad of a respective one of the plurality of segments via the respective conductor. Each clamp transistor is coupled to a respective one of the input pins, wherein each of the plurality of clamp transistors is configured to prevent a voltage on the respective conductor from exceeding a respective voltage limit.

Подробнее
21-12-1994 дата публикации

Voltage controlled attenuator for speakerphones

Номер: EP0630105A2
Автор: Neil Robinson
Принадлежит: Exar Corp

An integrated circuit voltage controlled attenuator which reduces control voltage feedthrough by employing NPN transistors for both sets of current steering elements is disclosed. A pair of emitter coupled NPN transistors are provided, connected to a common current source. The collector currents of these transistors form input currents of two precision PNP current mirrors. Output currents from the mirrors are coupled to a second pair of emitter coupled NPN transistors, having a current source connected to their emitters, whose value is adjusted by feedback to exactly match the sum of output currents of the precision mirrors. A single set of control voltages is supplied to both sets of emitter coupled NPN transistors. Signal input and output current is coupled from the precision current source output legs and made available in voltage form through operational amplifiers which perform input voltage to current, and output current to voltage conversions, respectively. An integrated control voltage generation technique is also disclosed, which provides accurate gain settings for a voltage controlled attenuator without the need for absolute value external components or signal feedback between the voltage controlled attenuator and control circuit.

Подробнее
18-11-1994 дата публикации

Telecommunications system with random access to multiple channels.

Номер: FR2705181A1
Автор: Robinson William Neil
Принадлежит: Motorola Ltd

Un système de télécommunications comprend une unité centrale et un certain nombre d'unités éloignées, ainsi qu'une liaison descendante (10) assurant la communication de l'unité centrale avec les unités éloignées et une liaison montante (11) assurant la communication des unités éloignées avec l'unité centrale. Une voie de signalisation est prévue sur la liaison descendante, plusieurs voies de trafic sont prévues sur la liaison montante, et des informations de signalisation sont transmises sur la voie de signalisation de la liaison descendante pour indiquer positivement laquelle ou lesquelles des voies de trafic de la liaison montante doivent être utilisées comme voie de signalisation pour une demande d'accès aléatoire.

Подробнее
27-04-2023 дата публикации

Method and apparatus

Номер: WO2023067330A1
Принадлежит: Oxbotica Limited

A computer-implemented method of localizing a radar sensor, the method comprising: obtaining a first radar scan of a first environment of the radar sensor, wherein the first radar scan comprises a set of power-range spectra, including a first power-range spectrum; extracting a first set of landmarks, including a first landmark, from the first radar scan, wherein the first landmark is defined by a range and an azimuth; computing a respective first set of descriptors, including a first descriptor, of the first set of landmarks, wherein the first descriptor defines the first landmark by respective relative ranges and azimuths in relation to one or more landmarks included in the first set of landmarks; accessing one or more reference sets of landmarks of respective environments and computing respective reference sets of descriptors of the reference sets of landmarks; matching the first set of descriptors to a corresponding first reference set of descriptors; and localizing a first location of the radar sensor using a first result of the matching.

Подробнее
08-08-2002 дата публикации

Protection systems for power networks

Номер: CA2433581A1
Принадлежит: Individual

A protection system for an electrical power network uses a method of determining the times of capture of current signals obtained by protection devices (3A, 3B) at first and second spaced points along a power line. Measurements are captured at the first device (3A) and sent to the second device (3B), which captures a second measurement and sends a reply to the first device. The timing of both measurements is synchronised using a GPS signal, and the total propagation time (tp1 + tp2) of the outward and return signals (S1, S2) is stored in a memory. In the event that the GPS signal is lost, the stored propagation time is used to calculate the actual time of the second measurement relative to the first measurement.

Подробнее
24-08-1999 дата публикации

Radio communications device and method

Номер: US5943333A
Принадлежит: Motorola Inc

A radio communications device is arranged to communicate time divided signals (60 and 70) over first (40) and second (50) time discontinuous systems having first and second frame structures respectively. Switching device (120) switches between communicating signals (60) over the first system (40) during time periods of the first frame structure and communicating signals (70) over the second system (50) during time periods of the second frame structure. Hence over a given period of time the device simultaneously communicates time divided signals over the first (40) and second (50) systems.

Подробнее
19-07-1977 дата публикации

Magnetic head housing with wedge locking means

Номер: US4037264A
Принадлежит: International Business Machines Corp

This magnetic head construction includes two or more elements defining a transducing gap which are positioned and held together within a shell by a wedge. The magnetic head assembly disclosed normally includes a shell structure, a pair of transducer elements defining a transducing gap, a wedge and a wedge follower. The wedge follower may be present as either a separate element or as a surface carried by one of the transducer elements. The assembly is normally formed by the process of disposing the transducer elements, and the wedge follower, if present, within the shell wall, and then rough positioning these elements within the shell, followed by the insertion of the wedge against the wedge following surface to bring the parts into final position in a locked relationship. Generally speaking, locking is achieved by selecting the wedge angle, θ as a function of the coefficients of friction of the mating surfaces according to given formulae. This head structure and process requires no additional adhesive, glass, or other material to lock the parts of the structure together.

Подробнее
12-02-1980 дата публикации

Magnetic head having a jagged-edged gap, and method for producing such head

Номер: US4188649A
Принадлежит: International Business Machines Corp

An AC magnetic erase head having improved AC erase characteristics, the magnetic head being formed of two half core elements of a magnetic material, preferably ferrite, defining an irregular edged or jagged-edged gap, and including a non-magnetic substance, preferably glass, within the gap. The magnetic head is preferably produced by thermally etching ferrite magnetic material forming the half core elements by means of relatively prolonged heat soak at an elevated temperature.

Подробнее
12-09-2003 дата публикации

Process for extracting non-polar phytochemicals

Номер: WO2003074145A1
Принадлежит: Molecularnature Limited

A process for recovering polar phytochemicals from a plant comprising the steps of: a) providing a natural plant material, b) extracting a sample of said material with a non-polar solvent, c) subjecting the non-polar extract to hydrophobic interaction or reversed-phase chromatography, d) chromatographically fractionating the obtained extract to yield non-polar fractions comprising non-polar phytochemicals or a) providing a natural plant material, b) extracting a sample of said material with a polar solvent, c) extracting the non-polar residue with a non-polar solvent to obtain a non-polar extract, d) subjecting the non-polar extract to hydrophobic or reserved-phase chromatography, e) chromatographically fractionating the obtained to yield non-polar fractions comprising non-polar phytochemicals.

Подробнее
19-11-1997 дата публикации

Data packet transmission in a cellular radio communication system

Номер: GB2313254A
Принадлежит: Motorola Ltd

The traffic load between a busy cell and adjacent cells with spare capacity is optimized by allocating the transmission of delay unconstrained packet data, such as e-mail, to an adjacent cell. To maintain C/I ratio for the call, the transmitting terminal increases the energy per bit by, for example, reducing modulation rate (ie data rate), using modulation with fewer levels (such as 16 QAM to QPSK), increasing FEC overhead and/or spectrum spreading factor (increased redundancy), or increasing the interleaving depth (spreading interference more widely). As the nominal edge of cell will have been effectively extended, the mobile terminals transmitting data may be closer than normal to a remote cell which is re-using the same frequency. The terminal transmitting data therefore maintains or reduces power to avoid co-channel interference. Reducing power requires the addition of still further reduction in data rate in order to maintain the required energy per bit/symbol at the serving base station.

Подробнее
14-06-2023 дата публикации

Material screening apparatus with multi-mode screen box

Номер: EP2907589B1
Автор: Neil Robinson
Принадлежит: Terex GB Ltd

Подробнее
10-12-1997 дата публикации

Method for registration in a communications system

Номер: GB2286505B
Принадлежит: Motorola Ltd

A method as shown in FIG. 3 for registering a direct mode mobile station (16) with a system controller (12) of a trunked radio system by an independent gateway transceiver (14). The method includes registering the mobile station (16) with the system controller (12) of the trunked radio system by the gateway transceiver (14) using a third party registration scheme. <IMAGE>

Подробнее
02-08-2007 дата публикации

Methods and systems for providing access to a computing environment

Номер: CA2637980A1
Принадлежит: Individual

Published without an Abstract

Подробнее
07-08-1985 дата публикации

Signal processing circuit for pal colour television signals

Номер: EP0150963A2
Принадлежит: Mcmichael Ltd

A two delay line (2, 3) PAL t.v. signal decoder in which the input composite signal, A, and the one and two line delayed signals B and C, are combined (10, 11, 14) to provide signals (A + B-2B) and (C-A)-90°, both having zero vertical luminance, these signals then being added and substracted (15, 16) to produce two signals (H, I) respectively having only the u and only the v chrominance component, for separate demodulation. With this arrangement, both cross-colour on vertical luminance and «Hanover bars» are suppressed in the decoder output. The signal (A + C-28) and a signal (A + C) are also individually rectified (22, 25) and then combined (26, 27, 28) to produce an output control signal (MC) to modify the decoding mode for vertical colour transitions but not for signals consisting only of vertical luminance in the chrominance band.

Подробнее
11-06-2003 дата публикации

Information management unit and method therefor

Номер: EP1317843A2
Автор: William Neil Robinson
Принадлежит: Motorola Inc

In an information circuit, it is necessary to ensure that all devices forming the information circuit are authenticated. The invention provides a method and apparatus for securely authenticating the devices forming the information circuit, the apparatus comprising session managers (900, 908, 916) for managing a service record (924, 926, 930) corresponding to a service. The session managers (900, 908, 916) are also able to manage a partner identify record (928, 932, 934, 936, 938, 940) corresponding to a partner device. Security managers (902, 910, 918) are also provided to manage authentication of devices.

Подробнее
26-02-2019 дата публикации

Use of device risk evaluation to manage access to services

Номер: US10218697B2
Принадлежит: LookOut Inc

A method includes: receiving a request regarding access by a first computing device (e.g., a mobile device of a user) to a service; in response to the request, performing, by a second computing device (e.g., a device risk evaluation server, or a server of an identity provider), an evaluation of the first computing device; and performing, by the second computing device, an action (e.g., authorizing access to the service) based on the evaluation.

Подробнее
29-10-2003 дата публикации

Protection systems for power networks

Номер: EP1356564A1
Принадлежит: Alstom SA

A protection system for an electrical power network uses a method of determining the times of capture of current signals obtained by protection devices (3A, 3B) at first and second spaced points along a power line. Measurements are captured at the first device (3A) and sent to the second device (3B), which captures a second measurement and sends a reply to the first device. The timing of both measurements is synchronised using a GPS signal, and the total propagation time (tp1 + tp2) of the outward and return signals (S1, S2) is stored in a memory. In the event that the GPS signal is lost, the stored propagation time is used to calculate the actual time of the second measurement relative to the first measurement.

Подробнее
04-05-1976 дата публикации

Intermediate product assembly of a magnetic head

Номер: US3955213A
Принадлежит: International Business Machines Corp

A head is moved toward and rotated against an abrasive while its resistance is monitored by a four-lead bridge. Prior to final manufacture, the head includes a highly conductive segment which surrounds the active head element on three sides and is electrically connected to it at one point. The segment is ground away during manufacture. Two leads from the head are connected to two slip rings, and each slip ring has two pairs of brushes, each wire from the bridge going to a different brush pair. Head movement toward the abrasive is terminated when a predetermined head resistance is detected by the bridge.

Подробнее
15-04-2020 дата публикации

Use of device risk evaluation to manage access to services

Номер: EP3635985A1
Принадлежит: LookOut Inc

A method includes: receiving a request regarding access by a first computing device (e.g., a mobile device of a user) to a service; in response to the request, performing, by a second computing device (e.g., a device risk evaluation server, or a server of an identity provider), an evaluation of the first computing device; and performing, by the second computing device, an action (e.g., authorizing access to the service) based on the evaluation.

Подробнее
08-01-1998 дата публикации

Communications operating system and method therefor

Номер: WO1997044974A3

A common communications system (119) provides information regarding the availability of other local communication systems (111-117) within the common communications system coverage area to a generic, programmable subscriber unit (120). Geographical location information is then supplied to the common communications system (119) indicating position of the subscriber unit (120). The geographic information is used by either the common communication system (119) or subscriber unit (120) to provide information pertinent only to one or more local communications systems (111-117) that the subscriber unit (120) may select. The common communication system (119) or the subscriber unit (120) can also be used to selectively filter or extract information such that the information presented to the user is related to the geographical location. The subscriber unit (120) then selects one of the local communications systems (111-117) and receives enabling programming from that local communication system. The enabling programming permits the subscriber unit (120) to configure itself to operate on the selected communication system.

Подробнее
08-11-1995 дата публикации

Inter system handover in a multisystem mobile radio environment

Номер: GB2289191A
Принадлежит: Motorola Inc

A method for determining handover between different communications systems 10, 12, 14 eg. cellular, cordless, wireless PABX. Handover may be initiated manually or automatically, by reference to records of the associations of cells belonging to different systems, stored by the mobile. Bulletin boarder broadcasting details of available systems may also be used and the mobile 16, 18 may also scan for available systems. <IMAGE>

Подробнее
11-10-1995 дата публикации

Methods and apparatus for call handover between different mobile radio networks

Номер: GB2288301A
Принадлежит: Motorola Inc

In a method for handing over a call from an initial communications network to a target communications network, a call is established between a mobile subscriber unit (12) and the initial communications network (10 or 11) using a first identification number allocated to that unit in the initial network. A desire to handover to the target network is identified and a new link in the target network (11 or 10 respectively) is established using a second identification number allocated to the unit (12) in the target network.

Подробнее
01-10-1965 дата публикации

Gas storage process in underground caverns

Номер: FR1412628A
Принадлежит:

Подробнее
09-08-2012 дата публикации

Esd clamp for multi-bonded pins

Номер: WO2012106311A2
Принадлежит: INTERSIL AMERICAS INC.

A circuit comprises a plurality of segments and a clamp circuit. Each of the plurality of segments comprises a bond pad coupled to a multi-bonded pin via a respective bond wire and a conductor coupling the bond pad to a respective internal connection. The bond pad from each of the plurality of segments is coupled to the same multi-bonded pin. The clamp circuit comprises a plurality of input pins and a plurality of clamp transistors. Each input pin is coupled to the bond pad of a respective one of the plurality of segments via the respective conductor. Each clamp transistor is coupled to a respective one of the input pins, wherein each of the plurality of clamp transistors is configured to prevent a voltage on the respective conductor from exceeding a respective voltage limit.

Подробнее
28-05-1998 дата публикации

Communications system and a method therefor

Номер: AU692055B2
Принадлежит: Motorola Ltd

Подробнее
14-03-2002 дата публикации

Information delivery system and method therefor

Номер: WO2002021835A1
Автор: William Neil Robinson
Принадлежит: Motorola Inc

In the field of digital broadcast services, for example, video-on-demand, a subscriber to the digital broadcast service is required to connect a set-top box to a network terminator point of a fixed land-line. The invention obviates such a requirement by providing a cellular communication apparatus (106) to form a feedback path in an information circuit (201, 262, 263, 242). The subscriber consequently has greater flexibility in terms of portability of subscription and choice of telecommunications service providers.

Подробнее
08-05-2003 дата публикации

Coordination among mobile stations servicing terminal equipment

Номер: WO2003039178A1

Coordination among mobile stations enables a terminal device (114) to establish a most appropriate wireless network connection. According to the present invention, a connection request, including network connectivity requirements, is communicated from the terminal device (114) to a first mobile station (116). The first mobile station (116) then transmits the network connectivity requirements to a second mobile station (117 - 119) that is also capable of establishing a wireless network connection. A determination based in part or in whole on the network connectivity requirements is then made at one of the first and second mobile stations (116 - - 119) which station can provide a most appropriate wireless network connection. A network connection is then established through one of the first and second mobile stations (116 -- 119) based on the determination of which of the first and second mobile stations (116 -- 119) can provide the most appropriate wireless network connection.

Подробнее
22-07-2004 дата публикации

Method and apparatus for communicating with multimode receiving device in non-synchronized wireless systems

Номер: WO2004062168A2
Автор: William Neil Robinson
Принадлежит: MOTOROLA, INC.

An apparatus, such as a network element (112), for use in a system that communicates with a multimode receiving device (110), employs an information gating buffer (400) that is operably coupled to a first wireless system transmitter (404) and receives information to be transmitted by the first wireless system transmitter (404). A synchronization controller (402), operably coupled to the information gating buffer (400) receives synchronization information (132) from a second wireless system using a second wireless system receiver circuit (130), and uses the timing synchronization information (132) to control the information gating buffer (400) to gate broadcast information for transmission from a first wireless system transmission circuit (128) to the multimode receiving device (110). A method includes receiving (200) timing synchronization information from the first wireless system, and using (204) the timing synchronization information to gate the transmission of information transmitted from the second wireless system to the multimode receiving device.

Подробнее
15-07-2011 дата публикации

Vorrichtung und verfahren zum verwalten von fähigkeiten in einem kommunikationsnetzwerk

Номер: ATE515164T1
Автор: William Neil Robinson
Принадлежит: Motorola Mobility Inc

Подробнее
30-11-2023 дата публикации

Aparato de cribado de materiales con caja de criba multimodo

Номер: ES2955359T3
Автор: Neil Robinson
Принадлежит: Terex GB Ltd

Un aparato de cribado de material (10) es adaptable entre un modo de soporte reducido y un modo de soporte adicional, el aparato comprende una caja de tamiz (12) acoplada a un marco (30) y que comprende al menos una plataforma de tamiz (14), una El eje giratorio (18) está acoplado a la caja de criba (12) para impartir movimiento vibratorio y/u oscilatorio a la(s) plataforma(s) de criba, los medios de accionamiento (24, 25, 26, 34a, 34b) imparten movimiento de rotación al eje (18) y un primer juego de cojinetes (20a) acopla el eje (18) a la caja de criba (12), solo en el modo de cojinete adicional, un segundo juego de cojinetes (20b) acopla el eje (18) al marco. (30), el cambio entre modos permite ajustar las características de detección del aparato (10). (Traducción automática con Google Translate, sin valor legal)

Подробнее
27-10-2022 дата публикации

Signal variation measurement

Номер: US20220345689A1
Автор: James Neil ROBINSON
Принадлежит: HITOMI LTD

A method for identifying variations introduced in signals transmitted over a signal path, the method comprising sending, over the signal path, one or more test patterns with functional features to a test pattern analyser, wherein said functional features are for determining aspects of variations introduced in the one or more test patterns during transmission over the signal path; and including a data pattern in at least one of the test patterns prior to said sending, said data pattern comprising meta-data on functional features of the at least one test pattern.

Подробнее
19-12-2023 дата публикации

Coordinating multiple components

Номер: US11847499B2
Принадлежит: LookOut Inc

Systems and methods for coordinating components can include: determining, by a first application executing on a client device, a need to perform a sharable functional task; identifying a first software component installed on the client device and capable of performing a first variation of the sharable functional task; identifying a second software component installed on the client device and capable of performing a second variation of the sharable functional task, wherein the second variation of the sharable functional task is functionally overlapping with and not identical to the first variation; identifying a set of characteristics of both the first software component and the second software component; selecting the second software component for performing the sharable functional task based on the set of characteristics, where the set of characteristics includes at least a version number; and delegating performance of the sharable functional task to the second software component.

Подробнее
07-04-2022 дата публикации

Coordinating Multiple Components

Номер: US20220107843A1
Принадлежит: LookOut Inc

Systems and methods for coordinating components can include: determining, by a first application executing on a client device, a need to perform a sharable functional task; identifying a first software component installed on the client device and capable of performing a first variation of the sharable functional task; identifying a second software component installed on the client device and capable of performing a second variation of the sharable functional task, wherein the second variation of the sharable functional task is functionally overlapping with and not identical to the first variation; identifying a set of characteristics of both the first software component and the second software component; selecting the second software component for performing the sharable functional task based on the set of characteristics, where the set of characteristics includes at least a version number; and delegating performance of the sharable functional task to the second software component.

Подробнее
24-12-2020 дата публикации

Recrystallisation of 5-methoxy-n,n-dimethyltryptamine (5-meo-dmt) in methyl tert.-butyl ether (mtbe) and less than 5 wt% of an aliphatic anti-solvent

Номер: WO2020254584A1
Принадлежит: Gh Research Limited

A method of purifying 5-methoxy-N,N-dimethyltryptamine (5-MeO-DMT) is provided which comprises dissolving crude 5-MeO-DMT in a solvent at a temperature above room temperature, cooling the obtained solution to a temperature below room temperature to precipitate solid 5-MeO- DMT, separating the solid 5-MeO-DMT from the remaining solution and removing solvent from the crystalline 5-MeO-DMT. In the method, the solvent comprises one or more ethers and less than 5 wt% anti-solvent.

Подробнее
14-09-2023 дата публикации

Materiaalien seulontalaite, jossa on monitilainen seulalaatikko

Номер: FI2907589T3
Автор: Neil Robinson
Принадлежит: Terex GB Ltd

Подробнее
15-11-2004 дата публикации

Verfahren und vorrichtung zum zugriff auf mehrere kommunikationsnetze

Номер: ATE282281T1
Автор: William Neil Robinson
Принадлежит: Motorola Ltd

Подробнее
04-08-2004 дата публикации

Coordination among mobile stations servicing terminal equipment

Номер: EP1442622A1
Принадлежит: Motorola Inc

Coordination among mobile stations enables a terminal device (114) to establish a most appropriate wireless network connection. According to the present invention, a connection request, including network connectivity requirements, is communicated from the terminal device (114) to a first mobile station (116). The first mobile station (116) then transmits the network connectivity requirements to a second mobile station (117 - 119) that is also capable of establishing a wireless network connection. A determination based in part or in whole on the network connectivity requirements is then made at one of the first and second mobile stations (116 - - 119) which station can provide a most appropriate wireless network connection. A network connection is then established through one of the first and second mobile stations (116 -- 119) based on the determination of which of the first and second mobile stations (116 -- 119) can provide the most appropriate wireless network connection.

Подробнее
07-07-2010 дата публикации

Coordination among mobile stations servicing terminal equipment

Номер: EP1442622A4
Принадлежит: Motorola Inc

Подробнее
06-10-2011 дата публикации

Aparato para gestionar las capacidades de una red de comunicaciones y método para el mismo.

Номер: ES2365505T3
Автор: William Neil Robinson
Принадлежит: MOTOROLA MOBILITY LLC

Un método de gestionar capacidades de servicios en una red de telecomunicaciones en respuesta a una petición de servicio que comprende las etapas de: determinar qué puertas de enlace de una lista de puertas de enlace disponibles (302) son adecuadas para el servicio solicitado; extraer las normas de limitaciones de la puerta de enlace adecuada (306 hasta 312) desde un almacén de normas de las puertas de enlace (304); extraer las normas apropiadas para el servicio solicitado; transferir cualesquiera normas de restricciones debidas al uso de la puerta de enlace y las normas para el servicio solicitado a la unidad del analizador de servicios (202); seleccionar parámetros técnicos para la ejemplificación del servicio consistentes con las normas de las limitaciones transferidas; y establecer el servicio usando las capacidades del servicio conforme con los parámetros técnicos seleccionados.

Подробнее
18-09-2023 дата публикации

Materialesigteanordning med flertilstandssigtekasse

Номер: DK2907589T3
Автор: Neil Robinson
Принадлежит: Terex GB Ltd

Подробнее
27-02-1987 дата публикации

Perfezionamenti in e relativi ad autocarri articolati.

Номер: IT8719524A0
Принадлежит: Fruehauf Corp

Подробнее
15-06-2005 дата публикации

Datenverarbeitungssystem und verfahren dafür

Номер: ATE297102T1
Принадлежит: Motorola Inc

Подробнее
16-09-2012 дата публикации

Shunt regulator for high voltage output using indirect output voltage sensing

Номер: TW201237590A
Принадлежит: Intersil Inc

Подробнее
27-11-2023 дата публикации

Urządzenie do przesiewania materiałów z wielotrybową skrzynią sitową

Номер: PL2907589T3
Автор: Neil Robinson
Принадлежит: Terex GB Limited

Подробнее
27-12-2023 дата публикации

Signal delay measurement

Номер: GB2614455B
Автор: Neil Robinson James
Принадлежит: HITOMI LTD

Подробнее