White, VA
Amy White, Warrenton, VA US
Patent application number | Description | Published |
---|---|---|
20120179765 | E-MAIL ALERT SYSTEM - An e-mail sender is provided with an option to send a notification to the prospective recipient(s) of an e-mail indicating to the recipient that an e-mail has been sent to his or her attention or to a business or other entities attention. The notification can be advantageously sent by a different communications route, such as by mail, courier, telephone call, facsimile, social network, or other method. Back up notifications can also be sent on an automated basis. The notification can be sent automatically and/or sent a period of time after the e-mail is sent if an acknowledgment or reply is not received. | 07-12-2012 |
Brandy J. White, Alexandria, VA US
Patent application number | Description | Published |
---|---|---|
20100081205 | FLUOROPHORE EMBEDDED/INCORPORATING/BRIDGED PERIODIC MESOPOROUS ORGANOSILICAS AS RECOGNITION ELEMENTS FOR OPTICAL SENSORS - Periodic mesoporous organosilicas (PMO) which incorporate an optically active molecule into the material for use as an optical indicator of target binding. This material combines the stability, selectivity, and high density of binding sites characteristic of the PMO with the sensitivity and selectivity of the optically active molecule. The material undergoes a change when exposed to a sample containing a target molecule. The change can be observed by visual inspection or through the use of fluorescence spectra. | 04-01-2010 |
Bryan Allan White, Newport News, VA US
Patent application number | Description | Published |
---|---|---|
20080281917 | Segmented media publishing system - A system and method of publishing digital media content works is provided in which an individual content work is divided into multiple segments, and when a subscriber initiates a subscription to the content work, each individual content work segment is published via email to the subscriber on a fixed periodic basis until either the work is completely published or the subscriber terminates the subscription. The subscriber may interactively access the segments of the digital media content work via directly accessing the publication website or via an embedded link in the published segment. During interactive access, the subscriber may update subscription control data controlling segment publication so that the next segment published to the subscriber will be the next successive segment after the segment being accessed interactively. A table of unique book positions is maintained to control segment publication and thereby avoid excess accesses to underlying subscription data for a subscriber. The subscription control data and book position data is recorded independently of segment positions to enable modification of segment boundaries data while assuring subscriber receipt of the entirety of the segmented digital media content work. | 11-13-2008 |
Carter T. White, Annandale, VA US
Patent application number | Description | Published |
---|---|---|
20140166984 | Graphene Resonant Tunneling Transistor - A graphene device having a ribbon structure with soft boundaries formed between two thin parallel transport barriers in a “railroad track” configuration. Such a structure permits transport along the ribbon, and also permits transport of electrons across the barriers by means of resonant tunneling through quasi-bound states within the railroad track confinement. The transport barriers can be of any form of so long as transport through the barriers leads to the formation of isolated resonant bands with a transport gap. In some embodiments, the transport barriers can be in the form of a pair of parallel line defects, wherein the line defects delineate the central ribbon section and the two lateral sections. In some such embodiments, the line defects are chemically decorated by the adsorption of diatomic gases. In other embodiments, the transport barriers can be formed by the application of large local potentials directly to the graphene sheet. | 06-19-2014 |
Christopher Jules White, Blacksburg, VA US
Patent application number | Description | Published |
---|---|---|
20130179991 | SYSTEMS AND METHODS FOR ENFORCING SECURITY IN MOBILE COMPUTING - Methods and systems described herein relate to enhancing security on a device by configuring one or more software functions in a trusted zone of a processor using object firewalls, IPC mechanisms, and/or a policy engine. | 07-11-2013 |
20130227641 | SYSTEMS AND METHODS TO ENFORCE SECURITY POLICIES ON THE LOADING, LINKING, AND EXECUTION OF NATIVE CODE BY MOBILE APPLICATIONS RUNNING INSIDE OF VIRTUAL MACHINES - Methods and systems described herein relate to enhancing security on a device by enforcing one or more policies on the loading, linking, and/or executing of native code by one or more applications executing on the device. | 08-29-2013 |
20130268997 | SYSTEMS AND METHODS FOR ENFORCING ACCESS CONTROL POLICIES ON PRIVILEGED ACCESSES FOR MOBILE DEVICES - Methods and systems described herein relate to enhancing security on a device by enforcing security and access control policies on privileged code execution. | 10-10-2013 |
20130312058 | SYSTEMS AND METHODS FOR ENHANCING MOBILE SECURITY VIA ASPECT ORIENTED PROGRAMMING - Methods and systems described herein relate to enhancing security on a mobile device. A method for enhancing mobile device security includes applying a security policy to process code by an aspect-oriented program. | 11-21-2013 |
20140059347 | SYSTEMS AND METHODS FOR RESTRICTING ACCESS TO NETWORK RESOURCES VIA IN-LOCATION ACCESS POINT PROTOCOL - Methods and systems described herein relate to enhancing security on a mobile device. Systems and methods for mobile device security include restricting access to network resources via an in-location access point device, based on whether the mobile device is in proximity of the in-location access point device. | 02-27-2014 |
20140157355 | SYSTEMS AND METHODS FOR ENHANCING MOBILE DEVICE SECURITY WITH A PROCESSOR TRUSTED ZONE - Methods and systems described herein relate to enhancing security on a mobile device. A method for enhancing mobile device security includes providing a trusted zone of a processor, and configuring various items in the trusted zone. Such items may include a specialized debugging interface; a remote auditing tool; an inter-process communication mechanism; a secure daemon; a package manager; a virtual machine, a configuration function, a device management system, touch screen management software, and a geo-localization function. | 06-05-2014 |
Conor White, Fairfax, VA US
Patent application number | Description | Published |
---|---|---|
20110209200 | METHODS AND SYSTEMS FOR AUTHENTICATING USERS - A method of authenticating users to reduce transaction risks includes indicating a desire to conduct a transaction and determining whether the transaction requires access to protected resources. Moreover, the method determines whether inputted information is known, determines a state of a communications device when the inputted information is known, and transmits a biometric authentication request from a server to an authentication system when the state of the communications device is enrolled. Additionally, the method includes validating the communications device, capturing biometric authentication data in accordance with a biometric authentication data capture request with the communications device, biometrically authenticating the user, generating a one-time pass-phrase and storing the one-time pass-phrase on the authentication system when the user is authenticated, comparing the transmitted one-time pass-phrase against the stored one-time pass-phrase, and granting access to the protected resources when the transmitted and stored one-time pass-phrases match. | 08-25-2011 |
Conor Robert White, Vienna, VA US
Patent application number | Description | Published |
---|---|---|
20110188709 | METHOD AND SYSTEM OF ACCOUNTING FOR POSITIONAL VARIABILITY OF BIOMETRIC FEATURES - A method of text-based authentication that accounts for positional variability of biometric features between captured biometric data samples includes capturing biometric data for a desired biometric type from an individual, and processing the captured biometric data to generate a biometric image and a biometric feature template. A selected conversion algorithm is executed by superimposing a positional relationship medium on the biometric image. The positional relationship medium includes a plurality of cells textually describable with words derivable from the positional relationship medium. The positions of biometric features are permitted to vary in overlapping border regions within the positional relationship medium. The method also includes identifying the position of at least one biometric feature within the overlapping border regions and generating a plurality of words for the at least one biometric feature. | 08-04-2011 |
20120042171 | METHOD AND SYSTEM FOR BIOMETRIC AUTHENTICATION - A method of authentication is provided that includes capturing biometric data for a desired biometric type from an individual, determining an algorithm for converting the biometric data into authentication words, converting the captured biometric data into authentication words in accordance with the determined algorithm, including the authentication words in a probe, and comparing the probe against identity records stored in a server system. Each of the identity records includes enrollment biometric words of an individual obtained during enrollment. Moreover, the method includes identifying at least one of the identity records as a potential matching identity record when at least one of the authentication words included in the probe matches at least one of the enrollment biometric words included in the at least one identity record, and generating a list of potential matching identity records. | 02-16-2012 |
Conor Robert White, Fairfax, VA US
Patent application number | Description | Published |
---|---|---|
20110035788 | METHODS AND SYSTEMS FOR AUTHENTICATING USERS - A method of authenticating users to reduce transaction risks includes indicating a desire to conduct a transaction, inputting information in a workstation, and determining whether the inputted information is known. Moreover, the method includes determining a state of a communications device when the inputted information is known, and transmitting a biometric authentication request from a server to an authentication system when the state of the communications device is enrolled. Additionally, the method includes obtaining biometric authentication data in accordance with a biometric authentication data capture request with the communications device, biometrically authenticating the user, generating a one-time pass-phrase and storing the one-time pass-phrase on the authentication system when the user is authenticated, comparing the transmitted one-time pass-phrase against the stored one-time pass-phrase, and conducting the transaction when the transmitted and stored one-time pass-phrases match. | 02-10-2011 |
20110231911 | METHODS AND SYSTEMS FOR AUTHENTICATING USERS - A method of authenticating users to reduce transaction risks includes indicating a desire to conduct a transaction, inputting information in a workstation, and determining whether the inputted information is known. Moreover, the method includes determining a state of a communications device when the inputted information is known, and transmitting a biometric authentication request from a server to a workstation when the state of the communications device is enrolled. Additionally, the method includes obtaining biometric authentication data in accordance with a biometric authentication data capture request with the communications device, biometrically authenticating the user, generating a one-time pass-phrase and storing the one-time pass-phrase on the authentication system when the user is authenticated, comparing the transmitted one-time pass-phrase against the stored one-time pass-phrase, and conducting the transaction when the transmitted and stored one-time pass-phrases match. | 09-22-2011 |
20120188055 | METHODS AND SYSTEMS FOR CAPTURING BIOMETRIC DATA - A method of capturing biometric data is provided that includes activating a security application in a device. The security application is activated by an operator of the device and is configured to cause the device to display an outline image. Moreover, the method includes displaying the outline image in a stationary position on a display of the device, positioning desired biometric data proximate the device such that the desired biometric data appears as a biometric image on the device display, and monitoring the outline and biometric images shown on the device display. Furthermore, the method includes positioning the device and the desired biometric data to better align the outline and biometric images when the outline and biometric images do not align and capturing the desired biometric data from an individual after approximately aligning the outline image with the biometric image. | 07-26-2012 |
20120278193 | METHODS AND SYSTEMS FOR CONDUCTING PAYMENT TRANSACTIONS - A method of eliminating the need to wait in line to conduct a payment transaction in a retail establishment includes initiating a network-based electronic payment transaction with a communications device in a retail establishment. A shopper initiates the network-based electronic payment transaction. Moreover, the method includes entering a machine readable code from at least one good with the communications device, determining a price of the at least one good and a total payment transaction cost, and displaying the total payment transaction cost on a screen of the communications device. Furthermore, the method includes determining whether to approve payment for the electronic payment transaction, authenticating the shopper, completing the electronic payment transaction in the retail establishment, and transmitting a transaction complete message to the communications device when the shopper is authenticated. | 11-01-2012 |
20130024918 | METHODS AND SYSTEMS FOR AUTHENTICATING USERS OVER NETWORKS - A method for authenticating users over networks includes requesting a one-time password, entering a personal identification number into a communications device, and retrieving a replaceable shared secret stored in the communications device. Moreover, the method includes generating a hashed personal identification number from the entered personal identification number, combining the hashed personal identification number with the replaceable shared secret to generate a modified shared secret, and generating a one-time password with the modified shared secret and the time of requesting the one-time password. | 01-24-2013 |
20130024947 | METHODS AND SYSTEMS FOR REPLACING SHARED SECRETS OVER NETWORKS - A method for replacing a shared secret over a network is provided that includes determining that a security breach could have occurred, determining that a shared secret of a user is to be replaced, and transmitting a renewal message to an authentication system requesting a new shared secret and an associated effective life for the user. Moreover, the method includes generating a new shared secret and an associated effective life at the authentication system for the user, and replacing the shared secret and associated effective life in an enrollment data record of the user with the new shared secret and associated effective life. Furthermore, the method includes transmitting the new shared secret and associated effective life to a communications device associated with the user, and replacing a shared secret and associated effective life stored in the communications device with the new shared secret and associated effective life. | 01-24-2013 |
20130074194 | METHODS AND SYSTEMS FOR INCREASING THE SECURITY OF ELECTRONIC MESSAGES - A method for generating e-mail messages with increased security includes receiving an e-mail message at a control system. The e-mail message has recipients, a security level, control attributes, and e-mail message contents. Moreover, the method includes verifying the recipients at the control system, and storing the recipients, security level, control attributes, and e-mail message contents in the control system when each of the recipients is verified. Furthermore, the method includes generating modified e-mail messages from the e-mail message, transmitting each of the modified e-mail messages to a respective recipient, and capturing authentication data from one of the recipients when the one recipient indicates a desire to view the e-mail message contents with a communications device operated by the one recipient. When the one recipient is successfully authenticated, the method includes permitting the one recipient to view the e-mail message contents in accordance with the control attributes. | 03-21-2013 |
20130074195 | METHODS AND SYSTEMS FOR INCREASING THE SECURITY OF ELECTRONIC MESSAGES - A method for accessing e-mail messages from a control system includes requesting access to e-mail message contents of a user stored in the control system, determining whether the user is enrolled in and activated by the control system, and authenticating the user when the user is enrolled in and activated by the control system. Moreover, the method includes permitting the user to view a list of e-mail messages when the user is successfully authenticated. The e-mail messages included in the list are associated with the user. Furthermore, the method includes permitting the user to access the contents of e-mail messages in the list having a security level equal to or less than a security level associated with the successful authentication. | 03-21-2013 |
20130212640 | METHODS AND SYSTEMS FOR AUTHENTICATING USERS - A method of authenticating users to reduce transaction risks includes indicating a desire to conduct a transaction, inputting information in a workstation, and determining whether the inputted information is known. Moreover, the method includes determining a state of a communications device when the inputted information is known, and transmitting a biometric authentication request from a server to a workstation when the state of the communications device is enrolled. Additionally, the method includes obtaining biometric authentication data in accordance with a biometric authentication data capture request with the communications device, biometrically authenticating the user, generating a one-time pass-phrase and storing the one-time pass-phrase on the authentication system when the user is authenticated, comparing the transmitted one-time pass-phrase against the stored one-time pass-phrase, and conducting the transaction when the transmitted and stored one-time pass-phrases match. | 08-15-2013 |
20130227666 | METHODS AND SYSTEMS FOR AUTHENTICATING USERS - A method of authenticating users to reduce transaction risks includes indicating a desire to conduct a transaction and determining whether the transaction requires access to protected resources. Moreover, the method determines whether inputted information is known, determines a state of a communications device when the inputted information is known, and transmits a biometric authentication request from a server to an authentication system when the state of the communications device is enrolled. Additionally, the method includes validating the communications device, capturing biometric authentication data in accordance with a biometric authentication data capture request with the communications device, biometrically authenticating the user, generating a one-time pass-phrase and storing the one-time pass-phrase on the authentication system when the user is authenticated, comparing the transmitted one-time pass-phrase against the stored one-time pass-phrase, and granting access to the protected resources when the transmitted and stored one-time pass-phrases match. | 08-29-2013 |
20130317991 | METHODS AND SYSTEMS FOR CONDUCTING PAYMENT TRANSACTIONS - A method of eliminating the need to wait in line to conduct a payment transaction in a retail establishment includes initiating a network-based electronic payment transaction with a communications device in a retail establishment. A shopper initiates the network-based electronic payment transaction. Moreover, the method includes entering a machine readable code from at least one good with the communications device, determining a price of the at least one good and a total payment transaction cost, and displaying the total payment transaction cost on a screen of the communications device. Furthermore, the method includes determining whether to approve payment for the electronic payment transaction, authenticating the shopper, completing the electronic payment transaction in the retail establishment, and transmitting a transaction complete message to the communications device when the shopper is authenticated. | 11-28-2013 |
20130347086 | METHODS AND SYSTEMS FOR CAPTURING BIOMETRIC DATA - A method of capturing biometric data is provided that includes activating a security application in a device. The security application is activated by an operator of the device and is configured to cause the device to display an outline image. Moreover, the method includes displaying the outline image in a stationary position on a display of the device, positioning desired biometric data proximate the device such that the desired biometric data appears as a biometric image on the device display, and monitoring the outline and biometric images shown on the device display. Furthermore, the method includes positioning the device and the desired biometric data to better align the outline and biometric images when the outline and biometric images do not align and capturing the desired biometric data from an individual after approximately aligning the outline image with the biometric image. | 12-26-2013 |
20140013405 | METHODS AND SYSTEMS FOR IMPROVING THE ACCURACY PERFORMANCE OF AUTHENTICATION SYSTEMS - A method for improving the accuracy performance of authentication systems includes determining an authentication data requirement for a desired transaction and at least one new verification phrase. The method also includes capturing authentication data from a user with a communications device in accordance with the authentication data requirement, and capturing biometric data of the at least one new verification phrase from the user with the communications device. Moreover, the method includes adding the determined at least one new verification phrase to an enrollment phrase registry and storing the biometric data captured for the at least one new verification phrase in an enrollment data record of the user after successfully authenticating the user. | 01-09-2014 |
20140020058 | METHODS AND SYSTEMS FOR IMPROVING THE SECURITY OF SECRET AUTHENTICATION DATA DURING AUTHENTICATION TRANSACTIONS - A method for improving the security of secret authentication data during authentication transactions is provided that includes converting the secret authentication data of a user into scrambled secret authentication data by associating a different text-string with each item of information included in the secret authentication data. The method also includes capturing the scrambled secret authentication data with a communications device, and conducting an authentication transaction with the captured authentication data. | 01-16-2014 |
20140020074 | METHODS AND SYSTEMS FOR IMPROVING THE SECURITY OF SECRET AUTHENTICATION DATA DURING AUTHENTICATION TRANSACTIONS - A method for improving the security of secret authentication data during authentication transactions is provided that includes converting the secret authentication data of a user into scrambled secret authentication data by associating a different text-string with each item of information included in the secret authentication data. The method also includes capturing the scrambled secret authentication data with a communications device, and conducting an authentication transaction with the captured authentication data. | 01-16-2014 |
20140130186 | METHODS AND SYSTEMS FOR INCREASING THE SECURITY OF ELECTRONIC MESSAGES - A method for accessing e-mail messages from a control system includes requesting access to e-mail message contents of a user stored in the control system, determining whether the user is enrolled in and activated by the control system, and authenticating the user when the user is enrolled in and activated by the control system. Moreover, the method includes permitting the user to view a list of e-mail messages when the user is successfully authenticated. The e-mail messages included in the list are associated with the user. Furthermore, the method includes permitting the user to access the contents of e-mail messages in the list having a security level equal to or less than a security level associated with the successful authentication. | 05-08-2014 |
20140208402 | METHODS AND SYSTEMS FOR INCREASING THE SECURITY OF ELECTRONIC MESSAGES - A method for generating e-mail messages with increased security includes receiving an e-mail message at a control system. The e-mail message has recipients, a security level, control attributes, and e-mail message contents. Moreover, the method includes verifying the recipients at the control system, and storing the recipients, security level, control attributes, and e-mail message contents in the control system when each of the recipients is verified. Furthermore, the method includes generating modified e-mail messages from the e-mail message, transmitting each of the modified e-mail messages to a respective recipient, and capturing authentication data from one of the recipients when the one recipient indicates a desire to view the e-mail message contents with a communications device operated by the one recipient. When the one recipient is successfully authenticated, the method includes permitting the one recipient to view the e-mail message contents in accordance with the control attributes. | 07-24-2014 |
20140283022 | METHODS AND SYSEMS FOR IMPROVING THE SECURITY OF SECRET AUTHENTICATION DATA DURING AUTHENTICATION TRANSACTIONS - A method for improving the security of secret authentication data during authentication transactions is provided that includes converting the secret authentication data of a user into scrambled secret authentication data by associating a different text-string with each item of information included in the secret authentication data. The method also includes capturing the scrambled secret authentication data with a communications device, and conducting an authentication transaction with the captured authentication data. | 09-18-2014 |
20140366107 | METHODS AND SYSTEMS FOR ENHANCING THE ACCURACY PERFORMANCE OF AUTHENTICATION SYSTEMS - A method for enhancing the accuracy performance of authentication systems includes determining an authentication data requirement for a desired transaction and at least one new verification phrase. The method also includes capturing authentication data from a user with a communications device in accordance with the authentication data requirement, and capturing biometric data of the at least one new verification phrase from the user with the communications device. Moreover, the method includes adding the determined at least one new verification phrase to an enrollment phrase registry and storing the biometric data captured for the at least one new verification phrase in an enrollment data record of the user after successfully authenticating the user. | 12-11-2014 |
20150026771 | METHODS AND SYSTEMS FOR AUTHENTICATING USERS - A method of authenticating users to reduce transaction risks includes indicating a desire to conduct a transaction and determining whether the transaction requires access to protected resources. Moreover, the method determines whether inputted information is known, determines a state of a communications device when the inputted information is known, and transmits a biometric authentication request from a server to an authentication system when the state of the communications device is enrolled. Additionally, the method includes validating the communications device, capturing biometric authentication data in accordance with a biometric authentication data capture request with the communications device, biometrically authenticating the user, generating a one-time pass-phrase and storing the one-time pass-phrase on the authentication system when the user is authenticated, comparing the transmitted one-time pass-phrase against the stored one-time pass-phrase, and granting access to the protected resources when the transmitted and stored one-time pass-phrases match. | 01-22-2015 |
20150295927 | METHODS AND SYSTEMS FOR CAPTURING BIOMETRIC DATA - A method of capturing biometric data is provided that includes activating a security application in a device. The security application is activated by an operator of the device and is configured to cause the device to display an outline image. Moreover, the method includes displaying the outline image in a stationary position on a display of the device, positioning desired biometric data proximate the device such that the desired biometric data appears as a biometric image on the device display, and monitoring the outline and biometric images shown on the device display. Furthermore, the method includes positioning the device and the desired biometric data to better align the outline and biometric images when the outline and biometric images do not align and capturing the desired biometric data from an individual after approximately aligning the outline image with the biometric image. | 10-15-2015 |
20150347808 | METHODS AND SYSTEMS FOR CAPTURING BIOMETRIC DATA - A method of capturing biometric data is provided that includes activating a security application in a device. The security application is activated by an operator of the device and is configured to cause the device to display an outline image. Moreover, the method includes displaying the outline image in a stationary position on a display of the device, positioning desired biometric data proximate the device such that the desired biometric data appears as a biometric image on the device display, and monitoring the outline and biometric images shown on the device display. Furthermore, the method includes positioning the device and the desired biometric data to better align the outline and biometric images when the outline and biometric images do not align and capturing the desired biometric data from an individual after approximately aligning the outline image with the biometric image. | 12-03-2015 |
20150379363 | METHODS AND SYSTEMS FOR CAPTURING BIOMETRIC DATA - A method of capturing biometric data is provided that includes activating a security application in a device. The security application is activated by an operator of the device and is configured to cause the device to display an outline image. Moreover, the method includes displaying the outline image in a stationary position on a display of the device, positioning desired biometric data proximate the device such that the desired biometric data appears as a biometric image on the device display, and monitoring the outline and biometric images shown on the device display. Furthermore, the method includes positioning the device and the desired biometric data to better align the outline and biometric images when the outline and biometric images do not align and capturing the desired biometric data from an individual after approximately aligning the outline image with the biometric image. | 12-31-2015 |
20160042167 | METHODS AND SYSTEMS FOR AUTHENTICATING USERS - A method of authenticating users to reduce transaction risks includes indicating a desire to conduct a transaction and determining whether the transaction requires access to protected resources. Moreover, the method determines whether inputted information is known, determines a state of a communications device when the inputted information is known, and transmits a biometric authentication request from a server to an authentication system when the state of the communications device is enrolled. Additionally, the method includes validating the communications device, capturing biometric authentication data in accordance with a biometric authentication data capture request with the communications device, biometrically authenticating the user, generating a one-time pass-phrase and storing the one-time pass-phrase on the authentication system when the user is authenticated, comparing the transmitted one-time pass-phrase against the stored one-time pass-phrase, and granting access to the protected resources when the transmitted and stored one-time pass-phrases match. | 02-11-2016 |
20160099937 | METHODS AND SYSTEMS FOR AUTHENTICATING USERS - A method of authenticating users to reduce transaction risks includes indicating a desire to conduct a transaction and determining whether the transaction requires access to protected resources. Moreover, the method determines whether inputted information is known, determines a state of a communications device when the inputted information is known, and transmits a biometric authentication request from a server to an authentication system when the state of the communications device is enrolled. Additionally, the method includes validating the communications device, capturing biometric authentication data in accordance with a biometric authentication data capture request with the communications device, biometrically authenticating the user, generating a one-time pass-phrase and storing the one-time pass-phrase on the authentication system when the user is authenticated, comparing the transmitted one-time pass-phrase against the stored one-time pass-phrase, and granting access to the protected resources when the transmitted and stored one-time pass-phrases match. | 04-07-2016 |
Daniel White, Haymarket, VA US
Patent application number | Description | Published |
---|---|---|
20120085673 | DEVICE AND METHOD FOR SOFTENING, FRESHENING, PREVENTING STATIC, AND DE-WRINKLING CLOTHES - A device and process for softening, freshening, preventing static and de-wrinkling clothes in a timely and non-labor-intensive manner. The device includes a generally spherical holder with an exterior support with an exterior support surface, generally bounding the interior of the holder. Absorbent material is in the interior of the holder. The exterior support surface has one or more retainers to secure a fabric softener sheet on the outside of the holder. The absorbent material may also include a chamber to hold a nested stack or roll of fabric softener sheets. The fabric softener sheets are dispensed through an opening in the chamber and then through an opening in the exterior support. A user moistens the holder with water, dispenses a fabric softener sheet and secures the sheet to the outside of the holder using the at least one retainer. He then places the holder in the laundry dryer with wrinkled, stale or staticky clothes and operates the laundry dryer. The heat from the laundry dryer causes moisture to be released from the absorbent material to relax wrinkles and fabric softener to release from the sheet to soften, freshen and prevent static. | 04-12-2012 |
David Clark White, Charlottesville, VA US
Patent application number | Description | Published |
---|---|---|
20150198956 | Water Monitoring and Control System and Method Thereof - Disclosed is a system and method usable for controlling multiple flows of water. The system may include a first sensor configured to sense a condition, a first drain tile, a first flow regulator configured to control a flow of water in the first drain tile, and a first transceiver configured to control the first flow regulator based on the sensed condition. | 07-16-2015 |
Eric R. White, Fredericksburg, VA US
Patent application number | Description | Published |
---|---|---|
20090240660 | INTEGRATION FOR INTELLIGENCE DATA SYSTEMS - A system includes one or more server computing devices coupled to a data network. One or more storage devices are associated with each of the one or more server computing devices. A search device is configured to search intelligence data residing on one or more of the storage devices. | 09-24-2009 |
20090240661 | INTEGRATION FOR INTELLIGENCE DATA SYSTEMS - A method and computer program product for creating a document library and uploading content to the document library. An application programming interface of a metadata framework is exposed. Metadata associated with the content is generated based upon, at least in part, one or more defined schemas. | 09-24-2009 |
20090240662 | INTEGRATION FOR INTELLIGENCE DATA SYSTEMS - A method and computer program product for searching one or more intelligence data stores to generate a result set. At least a portion of the results set is overlaid onto a graphical map to define one or more available pieces of content. The one or more of the one or more available pieces of content is accessed. | 09-24-2009 |
20090240699 | INTEGRATION FOR INTELLIGENCE DATA SYSTEMS - A method and computer program product allow for accessing one or more intelligence data stores distributed across a network. The one or more of the intelligence data stores are searched. The method and computer program product further allow at least a portion of the content of the one or more intelligence data stores to be managed. | 09-24-2009 |
Glenn A. White, Falls Curch, VA US
Patent application number | Description | Published |
---|---|---|
20120330474 | METHOD AND APPARATUS FOR EVALUATING REPAIR AND REMEDIATION ALTERNATIVES FOR HEAT EXCHANGERS - A method is provided for evaluating simultaneously the effects of multiple, interdependent heat-exchanger degradation modes for a heat exchanger of a power plant in the context of a series of alternative heat-exchanger remediation strategies. The method includes calculating time-varying predicted future progressions of heat exchanger performance metrics for a plurality of alternative heat-exchanger remediation strategies, and calculating time-varying predicted future progressions of financial metrics describing the accumulated financial benefit of each of the strategies. The calculations may be provided in probabilistic terms. A strategy may then be chosen based, at least in part, on the calculated results. | 12-27-2012 |
James Blair White, Centreville, VA US
Patent application number | Description | Published |
---|---|---|
20130160346 | RETICLE - A reticle is provided and may include a vertical line and a horizontal line cooperating to form a center-aiming point. A first plurality of indicia may be located along the vertical line and may each include two normal sides that are formed normal to the vertical line and two parallel sides that are formed parallel to the vertical line. A second plurality of indicia may be located along the horizontal line and may each include two normal sides that are formed normal to the horizontal line and two parallel sides that are formed parallel to the horizontal line. | 06-27-2013 |
Jeffrey White, Purcellville, VA US
Patent application number | Description | Published |
---|---|---|
20130332219 | DISCOVERY METHOD AND DISCOVERY SYSTEM USING LOCATION-TIME INTERSECTIONS - A system for providing predictive discovery services to a user. The system includes a mobile, hand-held device having a display for displaying and storing information and a user interface for allowing input of user interest data comprising event and product preferences, user interest criteria, current hand-held device location, and event calendar information about future occurrences and locations for events and products; a database(s) remote from the hand-held device for storing the user interest data; a processing device in data communication with the database that is structured and arranged to identify a proximity boundary near the user's current and future locations; and a data mining device that is adapted to identify factors of discrete interest for the user based on the user's historical, expressed interests input on at least one remote accessible Web site. | 12-12-2013 |
Jeffrey P. White, Vinton, VA US
Patent application number | Description | Published |
---|---|---|
20120103692 | METHOD AND SYSTEM FOR DRILLING USING GAS AS A DRILLING FLUID - A system and method of drilling. The method may generally include providing a drilling system including a rotary motor operable to rotationally drive a drill bit and providing a supply of compressible drill fluid, the supply producing an operating volumetric flow rate of fluid in a normal operating condition. The rotary motor operates at a rotational operating speed under a first volumetric flow rate of fluid, and the supply provides a volumetric flow rate of fluid greater than the first volumetric flow rate of fluid. The method further includes supplying the first volumetric flow rate of fluid from the supply to the rotary motor, and diverting a portion of fluid flow from the supply through a jet sub. | 05-03-2012 |
Jesse White, Blacksburg, VA US
Patent application number | Description | Published |
---|---|---|
20110151015 | IMMUNOMODULATOR PARTICLES AND METHODS OF TREATING - A method of stimulating an immune response in a subject including administering a micrometer-sized particle coupled with an antigen to the subject, wherein increasing the aspect ratio of the micrometer-sized particle increases the immune response. A method of stimulating an immune response in a subject including administering to the subject a plurality of particles, wherein each particle is coupled with an immuno stimulating agent and a protein. A vaccine particle composition including a plurality of particles configured to release a first protein at a first rate and a second protein at a second rate and configured to provide priming and boosting capability in a single dose. | 06-23-2011 |
20150273079 | IMMUNOMODULATOR PARTICLES AND METHODS OF TREATING - A method of stimulating an immune response in a subject including administering a micrometer-sized particle coupled with an antigen to the subject, wherein increasing the aspect ratio of the micrometer-sized particle increases the immune response. A method of stimulating an immune response in a subject including administering to the subject a plurality of particles, wherein each particle is coupled with an immuno stimulating agent and a protein. A vaccine particle composition including a plurality of particles configured to release a first protein at a first rate and a second protein at a second rate and configured to provide priming and boosting capability in a single dose. | 10-01-2015 |
Judith M. White, Charlottesville, VA US
Patent application number | Description | Published |
---|---|---|
20130336939 | ANTINEMATODAL METHODS AND COMPOSITIONS - There are provided methods and compositions useful in cell-cell fusion using Fusion Family (FF) proteins of nematode origin. There are further provided antinematodal methods and compositions, utilizing fusogenic proteins of the nematode Fusion Family. | 12-19-2013 |
Justin L. White, Arlington, VA US
Patent application number | Description | Published |
---|---|---|
20160005128 | SYSTEMS AND METHODS OF APPLYING HIGH PERFORMANCE COMPUTATIONAL TECHNIQUES TO ANALYSIS AND EXECUTION OF FINANCIAL STRATEGIES - Systems and method of the present disclosure are directed to a strategy assessment tool that facilitates developing a financial strategy, testing the financial strategy on historical data, and applying the strategy in real time to activate trades. The strategy assessment tool can retrieve, obtain, or otherwise identify financial data related financial instruments. The tool can store the financial data in a database or data structure such that the tool can efficient analyze the data using one or more financial strategies running on multiple threads of a GPU. | 01-07-2016 |
Kevin White, Richmond, VA US
Patent application number | Description | Published |
---|---|---|
20120097709 | POUCH AND PUMP DISPENSING SYSTEM - A bellow actuated pump may be attached to a pouch using a pouch fitment integrated with a base of the pump or to which the pump may be attached, wherein the pouch fitment includes one or more curved wings and each of the wings has one or more weld ribs wherein at least two weld ribs cross to provide a contact for sealing with a pouch. | 04-26-2012 |
Patrick E. White, Vienna, VA US
Patent application number | Description | Published |
---|---|---|
20100150142 | Telephone Service Via Packet-Switched Networking - A system and method for providing telephone type services over the internetwork commonly known as the Internet. Public switched telephone networks utilizing program controlled switching systems are arranged in an architecture with the Internet to provide a methodology for facilitating telephone use of the Internet by customers on an impromptu basis. Provision is made to permit a caller to set-up and carry out a telephone call over the Internet from telephone station to telephone station without access to computer equipment, without the necessity of maintaining a subscription to any Internet service, and without the requiring Internet literacy or knowledge. Calls may be made on an inter or intra LATA, region or state, nationwide or worldwide basis. Billing may be implemented on a per call, timed, time and distance or other basis. Usage may be made of common channel interoffice signaling to set up the call and establish the necessary Internet connections and addressing. Calls may be made from telephone station to telephone station, from telephone station to computer or computer to telephone station. | 06-17-2010 |
Phillip White, Warrenton, VA US
Patent application number | Description | Published |
---|---|---|
20120179765 | E-MAIL ALERT SYSTEM - An e-mail sender is provided with an option to send a notification to the prospective recipient(s) of an e-mail indicating to the recipient that an e-mail has been sent to his or her attention or to a business or other entities attention. The notification can be advantageously sent by a different communications route, such as by mail, courier, telephone call, facsimile, social network, or other method. Back up notifications can also be sent on an automated basis. The notification can be sent automatically and/or sent a period of time after the e-mail is sent if an acknowledgment or reply is not received. | 07-12-2012 |
Robert C. White, Fairfax, VA US
Patent application number | Description | Published |
---|---|---|
20120010487 | SYSTEMS AND METHODS FOR MONITORING HEALTH AND DELIVERING DRUGS TRANSDERMALLY - The present invention pertains to a system and method for transdermal sampling, comprising: at least one sampler for retrieving and transferring at least one analyte obtained transdermally from the skin of a subject; at least one detector system for identifying and quantifying said at least one analyte; and at least one logic module for (i) receiving and storing input data from said at least one detector, (ii) relating the input data to other data obtained from the subject, (iii) displaying output information, (iv) transmitting the output information to another system, and (v) controlling the operation of said at least one sampler and at least one detector. | 01-12-2012 |
Roger White, Warrenton, VA US
Patent application number | Description | Published |
---|---|---|
20120179765 | E-MAIL ALERT SYSTEM - An e-mail sender is provided with an option to send a notification to the prospective recipient(s) of an e-mail indicating to the recipient that an e-mail has been sent to his or her attention or to a business or other entities attention. The notification can be advantageously sent by a different communications route, such as by mail, courier, telephone call, facsimile, social network, or other method. Back up notifications can also be sent on an automated basis. The notification can be sent automatically and/or sent a period of time after the e-mail is sent if an acknowledgment or reply is not received. | 07-12-2012 |
Sean J. White, Arlington, VA US
Patent application number | Description | Published |
---|---|---|
20140279313 | SYSTEM FOR AND METHOD FOR COMPREHENSIVE SALES AND SERVICE METRIC REPORTING - A system and method in accordance with example embodiments for comprehensive sales and service data reporting. Sales and service events that take place at a front end branch of an enterprise may be input into a front end system and transmitted to a backend system where various modules then use the front end system data to generate various data and reports to display various data, such as, for example, sales incentive metrics and key performance indicators. | 09-18-2014 |
Taylor A. White, Stafford, VA US
Patent application number | Description | Published |
---|---|---|
20120132708 | FIELD DENSITY ALTITUDE COMPENSATOR APPARATUS, KIT, AND METHOD - An apparatus, a kit, and a method of use thereof for assisting snipers or long-range shooters in arriving at a firing solution for adjustment of an aiming system are provided. The apparatus can include a housing including a viewing area and a slide including a matrix of firing solutions printed thereon based on a plurality of density altitude values. The slide is movable with respect to the housing such that a portion of the matrix of firing solutions is viewable in the viewing area of the housing based on a density altitude value. This allows a user to adjust the trajectory compensation of a telescopic sight or any other aiming system by using the current measured density altitude. | 05-31-2012 |
Troy White, Charlottesville, VA US
Patent application number | Description | Published |
---|---|---|
20090320389 | PHOTOVOLTAIC SHINGLES FOR ROOFING AND METHOD FOR CONNECTING THE SHINGLES - A shingle including a flexible sheet; a photovoltaic panel attached to the flexible sheet; an electrical conductive path extending from a first side of the shingle to an opposite side of the shingle; a connector on one end of the electrical conductive path, and a mating connector on an opposite end of the electrical conductive path. | 12-31-2009 |
William C. White, Norfolk, VA US
Patent application number | Description | Published |
---|---|---|
20160101896 | KNOCKDOWN CRATE AND METHOD OF DISPLAY PACKAGING - An improved knockdown crate and method of display for sale thereof. The knockdown crate generally includes two end panels, each with a bottom edge and opposing side edges, each edge comprising an interior groove extending the length thereof; a bottom panel comprising a plurality of longitudinal slats and two transverse connection members connecting the plurality of longitudinal slats in parallel, the transverse connection members have a geometric cross section which seat with the interior grooves of the bottom edges of the two end panels; and two side panels each comprising a plurality of longitudinal slats and two transverse connection members connecting the plurality of longitudinal slats in parallel, the transverse connection members have a geometric cross section which seat with the interior grooves of the opposing side edges of the two end panels respectively. | 04-14-2016 |
William S. White, Glen Allen, VA US
Patent application number | Description | Published |
---|---|---|
20130317866 | SYSTEMS AND METHODS FOR PROVIDING A BENEFIT PRODUCT WITH PERIODIC GUARANTEED INCOME - A computer implemented method and system that implements a benefit product that provides a guaranteed income amount for a participant, the benefit product generates the guaranteed income amount by participating in a plurality of guaranteed income products (GI products). The system may comprise: (1) an income aggregator portion; (2) a savings recordkeeper portion that maintains an investment account associated with the benefit product, the investment account into which the payments to the benefit product pass; and (3) at least one income recordkeeper portion, each income recordkeeper portion administering one or more GI products, each income recordkeeper portion: determining, based on an attributable allocation to a particular GI product, a guaranteed income associated with such particular GI product, each guaranteed income being an amount, attributable to the particular GI product, that is payable to a participant. The income aggregator performs allocation processing, the allocation processing being performed based on funds transfer data, the funds transfer data including (1) first funds transfer data that reflects activity of the investment account and benefit product associated therewith, and (2) second funds transfer data that reflects activity of a respective GI product. | 11-28-2013 |