Patent application number | Description | Published |
20120111104 | FIBER OPTIC CABLE FOR DISTRIBUTED ACOUSTIC SENSING WITH INCREASED ACOUSTIC SENSITIVITY - Methods and apparatus for performing Distributed Acoustic Sensing (DAS) using fiber optics with increased acoustic sensitivity are provided. Acoustic sensing of a wellbore, pipeline, or other conduit/tube based on DAS may have increased acoustic sensitivity through fiber optic cable design and/or increasing the Rayleigh backscatter property of a fiber's optical core. Some embodiments may utilize a resonant sensor mechanism with a high Q coupled to the DAS device for increased acoustic sensitivity. | 05-10-2012 |
20140339411 | OPTICAL COUPLERS USED IN A DOWNHOLE SPLITTER ASSEMBLY - Techniques and apparatus are provided for downhole sensing using optical couplers in a downhole splitter assembly to split interrogating light signals into multiple optical sensing branches. Each optical branch may then be coupled to an optical sensor (e.g., a pass-through or an optical single-ended transducer (OSET)) or to another optical coupler for additional branching. The sensors may be pressure/temperature (P/T) type transducers. Some systems may exclusively use OSETs as the optical sensors. In this manner, if one of the OSETs is damaged, it does not affect light traveling to any of the other sensors, and sensing information from remaining sensors is still returned. | 11-20-2014 |
20150160075 | CANE-BASED U-BEND - Large diameter optical waveguides (cane) may stiffen as diameter increases. The minimum bend radius may become larger than is practical for many applications. Standard-sized optical fibers may be fusion spliced to the ends of a cane segment where the fusion splice area is protected with a high temperature coating such as polyimide. The cane segment is then heated (e.g., using a hot flame torch or arc) and bent to form a U-bend, or other angle, that is free of bending stress. The heated glass may be shaped, while maintaining the waveguide properties of the cane. Once cooled, the cane maintains the new shape. Therefore, light may be propagated around the bend or angle. Thus, many configurations of cane devices may be fabricated. Some examples of cane configurations include coils, U-turns (U-bends), angled inputs/outputs, etc. Bent cane may be useful for loop-back operations, such as double-ended Raman distributed temperate sensing (DTS). | 06-11-2015 |
Patent application number | Description | Published |
20160087797 | SECURE REMOTE PASSWORD - Aspects of the present disclosure pertain to system and method of securing mobile devices using virtual certificates at a computer processor. A method may include receiving a request for access to a computer network associated with a computing device to an application associated with a network connected server processor; electronically receiving, at the server processor, a first security key fragment from the computing device; the first security key fragment being paired with a verifier key fragment unknown to the computing device; generating a conditional seed key fragment at the server processor associated with the verifier key fragment; comparing a first hash parameter to a second hash parameter at the server processor; transmitting, at the server processor, a session security key for enabling network access to the application associated with the server processor. | 03-24-2016 |
20160087950 | METHOD OF SECURING MOBILE APPLICATIONS USING DISTRIBUTED KEYS - Aspects of the present disclosure are directed to methods and systems for securing mobile computing applications with distributed keys. In one aspect, a computer implemented method or computer readable media include steps electronically receiving, at a computer processor of a computing device, a first security key fragment based on a user input to the computing device; electronically receiving, at the computer processor, a second security key fragment from a network connected storage entity; and electronically concatenating, at the computer processor, the first security key fragment and the second security key fragment to generate a third security key. | 03-24-2016 |
20160098717 | DYNAMIC CARD VALIDATION USING RANDOMLY DETERMINED CELL IDENTIFIERS - A card validation system receives a request to validate a card. The system receives a set of cell identifiers from a merchant, where the set of cell identifiers determined by the merchant. The system further receives a set of received cell values corresponding to the set of cell identifiers of a card validation matrix. The system determines a set of stored cell values corresponding to the set of cell identifiers of the card validation matrix. The system compares the set of received cell values to the set of stored cell values. Based at least in part upon the comparison, the system determines whether the card is validated. | 04-07-2016 |
20160098718 | DYNAMIC CARD VALIDATION USING PERIODICALLY COMMUNICATED CELL IDENTIFIERS - A card validation system determines a first set of cell identifiers of a card validation matrix to associate with a first merchant and a user and transmits the first set of cell identifiers to a first merchant. The system receives a request to validate a card and receives, from the first merchant, a first set of received cell values corresponding to the first set of cell identifiers of a card validation matrix. The system determines a first set of stored cell values corresponding to the first set of cell identifiers of the card validation matrix. The system compares the first set of received cell values to the first set of stored cell values. Based at least in part upon the comparison, the system determines whether the card is validated. | 04-07-2016 |
20160098725 | DYNAMIC CARD VALIDATION USING USER REQUESTED CELL IDENTIFIERS - A card validation system receives a request to validate a card and receives a request from a user for a set of cell identifiers. The system determines a set of cell identifiers of a card validation matrix to associate with the user and transmits the set of cell identifiers to the user. The system further receives a set of received cell values corresponding to set of cell identifiers of a card validation matrix. The system determines the set of stored cell values corresponding to the set of cell identifiers of the card validation matrix. The system compares the set of received cell values to the set of stored cell values. Based at least in part upon the comparison, the system determines whether the card is validated. | 04-07-2016 |