Goodes
Amelia Goodes, Los Angeles, CA US
Patent application number | Description | Published |
---|---|---|
20100087766 | TOE PROTECTING DEVICE - A toe protecting device for supporting and keeping the toe from curling is disclosed. The device includes a thin plastic strip for placing the toe straight, a plurality of washer rings through which a toe can be inserted, a cloth that surrounds the device provides cushion and an elastic band secures the toe and the strip. A plurality of washer rings attached to the flat surface of the plastic strip is lifted so as to insert at least one of a big toe and little toe. An elastic band that surrounds the toe and the device provides sufficient grip. A plurality of objects on the strip that supports and straightens the little toe is made of lightweight plastic. | 04-08-2010 |
Christopher Geoffrey Goodes, Victoria AU
Patent application number | Description | Published |
---|---|---|
20090188348 | Continuous process - A process for producing a metal from the corresponding metal halide by reaction of the metal halide at elevated temperature in a reactor comprising a fluidised bed, the fluidised bed comprising seed particles of an inert material that has a melting point higher than that of the metal. | 07-30-2009 |
20120018550 | METHOD AND APPARATUS FOR REDUCING THE SIZE OF MATERIALS - A method of reducing the size of material, such as rocks of mined ore, is disclosed. The method comprises comminuting and electro-fracturing rocks of the material and thereby reducing the rock size. | 01-26-2012 |
Christopher Geoffrey Goodes, Eltham AU
Patent application number | Description | Published |
---|---|---|
20130073077 | SORTING MINED MATERIAL ON THE BASIS OF TWO OR MORE PROPERTIES OF THE MATERIAL - A method and an apparatus for sorting mined material is based on using a range of options for sensing multiple properties of a mined material on a fragment by fragment basis and then analysing the multiple types of data and making decisions about the classification of each fragment and then sorting the fragment based on the analysis. The multiple sensing options include the response of the fragments to electromagnetic radiation. Other sensing options may include sensors that look at the response of fragments of a mined material to an acoustic wave or a magnetic field or optical sensors that evaluate texture or other surface characteristics of fragments. | 03-21-2013 |
Christopher Geoffrey Goodes, Hampton AU
Patent application number | Description | Published |
---|---|---|
20150337410 | HEAP LEACHING - A heap of a material to be leached to recover a valuable metal from the material includes an electromagnetic heating system to generate heat in situ in the heap. | 11-26-2015 |
Grant Goodes, Manotick CA
Patent application number | Description | Published |
---|---|---|
20160004859 | METHOD AND SYSTEM FOR PLATFORM AND USER APPLICATION SECURITY ON A DEVICE - A method and system for platform and user application security on a computing device is provided. The method includes: verifying integrity of operating system code on the computing device to establish a trusted execution environment in the operating system of the computing device; and in response to success of the integrity verification of the operating system code, binding a user-space application on the computing device to the operating system on the computing device. | 01-07-2016 |
Grant Stewart Goodes, Ottawa CA
Patent application number | Description | Published |
---|---|---|
20140007252 | Change-Tolerant Method of Generating an Identifier for a Collection of Assets in a Computing Environment Using a Secret Sharing Scheme | 01-02-2014 |
20140020112 | Method of Securing Memory Against Malicious Attack - A method and system for secure dynamic memory management using heap memory, or analogous dynamic memory allocation, that includes initializing a heap memory segment, having a plurality of buffers, within a random access memory. When an allocation request to store data in the heap memory segment is received, one of the buffers is randomly selected. Metadata, containing details of allocated and unallocated buffers of the heap memory segment, is then maintained in a portion of the memory separate from the heap object. According to certain embodiments, the secure heap of the present disclosure can securely implement the functions of those portions of the C/C++ stdlib library related to dynamic memory management, specifically malloc ( ) free ( ) and their variants. | 01-16-2014 |
Grant Stewart Goodes, Manotick CA
Patent application number | Description | Published |
---|---|---|
20110067012 | SYSTEM AND METHOD FOR GENERATING WHITE-BOX IMPLEMENTATIONS OF SOFTWARE APPLICATIONS - A development suite for generating files, such as DRM-protected files, using white-box cryptography. The suite consists of a code generation tool, a data transformation engine, and a white-box data generation tool, and a white-box library. In the white-box cryptography context, the data transformation engine is used to protect the boundary between the cryptographic operation and the surrounding code. In particular, the data transformation engine is used to apply data transformations to the inputs to and outputs from the cryptographic operations. If the user specifies that transformations are required via a white-box parameterization file, the code generation tool puts the information specified by the user into a form the data transformation engine understands, namely as qualifiers on data variables and function prototypes. The data transformation engine then applies the specified transformations, and passes information to the data generation tool regarding which transformations were chosen. | 03-17-2011 |
20130014274 | System and Method for Encapsulating and Enabling Protection Through Diverse Variations in Software Libraries - A flexible software library in which the software modules are defined as an abstract intermediate representation. The flexible library allows security transformation and performance attribute selections to be made by the end-user, rather than the library creator. Furthermore, since the flexible library contains an abstract representation of the software modules, the library can also be provisioned to contain an arbitrary number of named instances, representing specific sets of values for security and performance decisions, along with the corresponding native object-code resulting from those decisions. This permits distribution of software modules in a completely platform-independent manner while avoiding the disclosure of proprietary information, such as source-files. | 01-10-2013 |
20130014275 | Method For Linking and Loading to Protect Applications - A linker or loader, and associated method, is described, whereby the application of security transformations to object-code modules can be deferred until link or load-time, through, for example, memory relocation, selection from diverse instances of a module, and late-binding of constants. This provides several benefits over conventional source-to-source security transformations. These deferred security transformations can be applied in a very light-weight manner and create many opportunities for diversity in the resulting executable program, enhancing security, while at the same time minimizing the impact on execution performance and correctness, and reducing the complexity of debugging. | 01-10-2013 |
20140006803 | System And Method For Securely Binding And Node-Locking Program Execution To A Trusted Signature Authority | 01-02-2014 |