Patent application number | Description | Published |
20110317703 | Asymmetric Network Address Encapsulation - A network component comprising a receiver configured to receive an outgoing frame from a local host, a logic circuit configured to map a destination address (DA) for a target host in the outgoing frame to a DA for a target location of the target host and encapsulate the outgoing frame using the DA for the target location, and a transmitter configured to receive a pre-encapsulated outgoing frame from a local switch, and send the pre-encapsulated outgoing frame to a gateway at a target location, wherein the transmitter does not encapsulate frames received from local switches and decapsulates an incoming frame from a remote gateway destined towards local hosts. | 12-29-2011 |
20120008528 | Layer Two Over Multiple Sites - An apparatus comprising a service network, and a plurality of Layer 2 sites connected by the service network via a plurality of gateways, wherein the gateways are configured to map a plurality of Internet Protocol (IP) addresses of a plurality of hosts under a plurality of virtual local area networks (VLANs) in a plurality of Layer 2 sites to a plurality of addresses (e.g. MAC or others) of the corresponding gateways inform the other gateways in the other Layer 2 sites of the mapped IP addresses under each of the VLANs in the local Layer 2 sites, and forward data frames originated from the hosts in the local Layer 2 sites to the other gateways in the other Layer 2 sites when the data frames' destinations are residing in the other Layer 2 sites. | 01-12-2012 |
20120014387 | Virtual Layer 2 and Mechanism to Make it Scalable - An apparatus comprising a service network and a plurality of Layer 2 networks at a plurality of different physical locations coupled to the service network via a plurality of edge nodes at the Layer 2 networks, wherein the edge nodes are configured to maintain a plurality of Internet Protocol (IP) addresses of a plurality of hosts across the Layer 2 networks, and wherein the IP addresses of the hosts in each of the Layer 2 networks are mapped by the other Layer 2 networks to a Media Access Control (MAC) address of each of the edge nodes in the same Layer 2 networks of the hosts. | 01-19-2012 |
20150078387 | Asymmetric Network Address Encapsulation - A network component comprising a receiver configured to receive an outgoing frame from a local host, a logic circuit configured to map a destination address (DA) for a target host in the outgoing frame to a DA for a target location of the target host and encapsulate the outgoing frame using the DA for the target location, and a transmitter configured to receive a pre-encapsulated outgoing frame from a local switch, and send the pre-encapsulated outgoing frame to a gateway at a target location, wherein the transmitter does not encapsulate frames received from local switches and decapsulates an incoming frame from a remote gateway destined towards local hosts. | 03-19-2015 |
20150222534 | Layer Two Over Multiple Sites - An apparatus including a service network and a plurality of Layer 2 sites connected by the service network via a plurality of gateways is provided. The gateways are configured to map a plurality of Internet Protocol (IP) addresses of a plurality of hosts under a plurality of virtual local area networks (VLANs) in a plurality of Layer 2 sites to a plurality of addresses (e.g., MAC or others) of the corresponding other gateways, inform the other gateways in other Layer 2 sites of the IP addresses mapped under each of the VLANs in the local Layer 2 sites, and forward data frames originated from the hosts in the local Layer 2 sites to the other gateways in the other Layer 2 sites when destinations of the data frames are residing in the other Layer 2 sites. | 08-06-2015 |
20150229618 | System and Method for Securing Source Routing Using Public Key based Digital Signature - Embodiments are provided for securing source routing using public key based digital signature. If a protected source route is tampered with, a public key based method allows a downstream node to detect the tampering. The method is based on using digital signatures to protect the integrity of source routes. When creating a source route for a traffic flow, a designated network component computes a digital signature and adds the digital signature to the packets. When the packets are received at a node on the route, the node uses the digital signature and a public key to verify the source route and determines accordingly whether the source route has been tampered with. If tampering is detected, the receiving node stops the forwarding of the packets. | 08-13-2015 |
20150244583 | System and Method for Creating Service Chains and Virtual Networks in the Cloud - Embodiments are provided herein for creating virtual networks with service chains, such as n-tier networks, in the cloud. In an embodiment, a network diagram for a virtual network is received from a user via a graphical user interface. The network diagram comprises elements that represent virtual or physical network components. The network components include switches, routers, firewalls, links, service appliances, virtual machines, servers, or other network components. Upon successfully validating the network diagram, via a validation step, the network diagram is compiled into application programming interface (API) calls ready for execution. The executed APIs are used to establish the virtual network on a physical network infrastructure. The virtual network comprises virtual network components corresponding to the elements or the network diagram. | 08-27-2015 |
20150326470 | System and Method for Loop Suppression in Transit Networks - An embodiment method of loop suppression in a layer-two transit network with multiprotocol label switching (MPLS) encapsulation includes receiving a packet at a provider edge (PE) router for the layer-two transit network. The packet is stored in a non-transitory memory on the PE router. The packet is stored according to a packet data structure having an MPLS label field and a layer-two header. A time-to-live (TTL) attribute is then determined for the packet. The TTL attribute is written to the non-transitory memory in the MPLS label field. The packet is then routed according to information in the layer-two header. | 11-12-2015 |
Patent application number | Description | Published |
20100172270 | Distributed Storage of Routing Information In a Link State Protocol Controlled Network - A distributed hash table is implemented to store routing information on a network. Node IDs exchanged in connection with implementation of a link state routing protocol are used as keys in the distributed hash table, and routes are stored at one or more nodes on the network. When a route is learned, the route is processed against the set of keys to determine which nodes should store the route. When a route is needed, the route is processed against the set of keys to determine which nodes should have the route information. The manner in which the route is processed against the set of keys is the same in both instances, so that the DHT may be used to store and retrieve route information on the network. The DHT may be implemented to store MAC addresses, IP addresses, MPLS labels, or other information of interest to enable routes to be stored and learned by network elements on the network. | 07-08-2010 |
20110032936 | MULTICAST IMPLEMENTATION IN A LINK STATE PROTOCOL CONTROLLED ETHERNET NETWORK - Forwarding state may be installed for sparse multicast trees in a link state protocol controlled Ethernet network by enabling intermediate nodes to install state for one or more physical multicast trees, each of which may have multiple logical multicast trees mapped to it. By mapping multiple logical multicasts to a particular physical multicast, and installing state for the physical multicast, fewer FIB entries are required to implement the multiple multicasts to reduce the amount of forwarding state in forwarding tables at the intermediate nodes. Mapping may be performed by destination nodes before advertising membership in the physical multicast, or may be performed by the intermediate nodes before installing state when a destination node advertises membership in a logical multicast. Intermediate nodes will install state for the physical multicast tree if they are on a shortest path between a source and at least one destination of one of the logical multicasts that has been mapped to the physical multicast. | 02-10-2011 |
20120134357 | MULTICAST IMPLEMENTATION IN A LINK STATE PROTOCOL CONTROLLED ETHERNET NETWORK - Forwarding state is installed for sparse multicast trees in a link state protocol controlled Ethernet network by enabling intermediate nodes to install state for one or more physical multicast trees, each of which may have multiple logical multicast trees mapped to it. By mapping multiple logical multicasts to a particular physical multicast, and installing state for the physical multicast, fewer FIB entries are required to implement the multiple multicasts. Mapping may be performed by destination nodes before advertising membership in the physical multicast, or may be performed by the intermediate nodes before installing state when a destination node advertises membership in a logical multicast. Intermediate nodes will install state for the physical multicast tree if they are on a shortest path between a source and at least one destination of one of the logical multicasts that has been mapped to the physical multicast. | 05-31-2012 |
20120207061 | Distributed Storage of Routing Information in a Link State Protocol Controlled Network - A distributed hash table is implemented to store routing information on a network. Node IDs exchanged in connection with implementation of a link state routing protocol are used as keys in the distributed hash table, and routes are stored at one or more nodes on the network. When a route is learned, the route is processed against the set of keys to determine which nodes should store the route. When a route is needed, the route is processed against the set of keys to determine which nodes should have the route information. The manner in which the route is processed against the set of keys is the same in both instances, so that the DHT may be used to store and retrieve route information on the network. | 08-16-2012 |
20120263075 | Method and Apparatus for Exchanging Routing Information and the Establishment of Connectivity Across Multiple Network Areas - Routes may be installed across multiple link state protocol controlled Ethernet network areas by causing ABBs to leak I-SID information advertised by BEBs in a L1 network area into an L2 network area. ABBs will only leak I-SIDs for BEBs where it is the closest ABB for that BEB. Where another ABB on the L2 network also leaks the same I-SID into the L2 network area from another L1 network area, the I-SID is of multi-area interest. ABBs will advertise I-SIDs that are common to the L1 and L2 networks back into their respective L1 network. Within each L1 and L2 network area, forwarding state will be installed between network elements advertising common interest in an ISID, so that multi-area paths may be created to span the L1/L2/L1 network areas. The L1/L2/L1 network structure may recurse an arbitrary number of times. | 10-18-2012 |
20120314582 | METHOD AND APPARATUS FOR SIMPLIFYING THE COMPUTATION OF ALTERNATE NETWORK PATHS - An alternate path calculation process may be terminated after considering some of a source node's neighbors and without considering each of its neighbors, to reduce the amount of processing required to perform the alternate path calculations. The neighbors may be ranked according to the number of alternate paths that the neighbor has historically been able to provide on the network. The influence of historical success or failure may degrade over time so that the rankings may be adjusted to reflect changes in network topography. A given source node, when computing alternate paths through the network, may preferentially select neighbors to perform alternate path calculations on historically higher scoring nodes before performing calculations on historically lower scoring nodes. Several different criteria may be used to stop the alternate path calculation process before considering all neighbors. The neighbors may be loop free neighbors or U-turn neighbors. | 12-13-2012 |
20130148660 | MULTICAST IMPLEMENTATION IN A LINK STATE PROTOCOL CONTROLLED ETHERNET NETWORK - Forwarding state is installed for sparse multicast trees in a link state protocol controlled Ethernet network by enabling intermediate nodes to install state for one or more physical multicast trees, each of which may have multiple logical multicast trees mapped to it. By mapping multiple logical multicasts to a particular physical multicast, and installing state for the physical multicast, fewer FIB entries are required to implement the multiple multicasts. Mapping may be performed by destination nodes before advertising membership in the physical multicast, or may be performed by the intermediate nodes before installing state when a destination node advertises membership in a logical multicast. Intermediate nodes will install state for the physical multicast tree if they are on a shortest path between a source and at least one destination of one of the logical multicasts that has been mapped to the physical multicast. | 06-13-2013 |
20140140243 | METHOD AND APPARATUS FOR LAYER 2 FAST RE-CONFIGURATION IN A ROUTING BRIDGE NETWORK - A method and apparatus in provided which enables fast layer 2 reconfiguration in a network that includes Routing Bridges. Each Routing Bridge stores, for each forwarding target, identifiers of a primary next Rbridge and an alternate next Rbridge. The forwarding target may be a network end node, or an Egress Rbridge associated with the network end node. In response to a trigger condition, layer 2 communications are selectively switched from a path that includes the primary next Rbridge device to a path that includes the alternate next Rbridge device. | 05-22-2014 |
20140153579 | Distributed Storage of Routing Information in a Link State Protocol Controlled Network - A distributed hash table is implemented to store routing information on a network. Node IDs exchanged in connection with implementation of a link state routing protocol are used as keys in the distributed hash table, and routes are stored at one or more nodes on the network. When a route is learned, the route is processed against the set of keys to determine which nodes should store the route. When a route is needed, the route is processed against the set of keys to determine which nodes should have the route information. The manner in which the route is processed against the set of keys is the same in both instances, so that the DHT may be used to store and retrieve route information on the network. The DHT may be implemented to store MAC addresses, IP addresses, MPLS labels, or other information. | 06-05-2014 |
Patent application number | Description | Published |
20110261784 | METHOD, SYSTEM AND APPARATUS FOR MANAGING CALL HANDOFF - According to embodiments described in the specification, a method, system and apparatus for managing call handoff are provided, comprising: receiving a request from a mobile electronic device to initiate handover of a first media session between the mobile electronic device and a private branch exchange (PBX) from a first transport to a second transport; establishing a second media session with the mobile electronic device over the second transport; shuffling call media from the first media session to the second media session; and responsive to shuffling the call media, terminating the first media session. | 10-27-2011 |
20110264746 | Apparatus and Method For Resolving A Race Condition Between Two Session Initiation Protocol (SIP) End Points - An apparatus and method are described for resolving a glare condition between two SIP endpoints. The method allows a third party call control controller to resolve the glare condition when the ownership status of each dialog is the same, by initiating a back-off period of time at the apparatus based on the ownership status of the SIP dialog and re-sending a re-INVITE message to the end point after expiry of the back-off period of time. | 10-27-2011 |
20110275352 | SYSTEMS AND METHODS OF TIMING DTMF TONES FOR TELEPHONY CONTROL - Control and status information between a mobile device and another device can be signaled over a voice channel using DTMF tones, e.g., a pre-defined sequence of DTMF tones can signal a desired message (more generally, a feature code). Tones sent are separated from each other by a time gap (T | 11-10-2011 |
Patent application number | Description | Published |
20100322394 | Method, system and apparatus for storing voicemail - A method and apparatus, and system for storing voicemail data are provided. Voicemail data is generated at a telephony device engaged in a communication session with a calling telephony device, the voicemail data comprising a voice message. E-mail data is then automatically generating after the voicemail data is generated, the e-mail data comprising data identifying the voicemail data, the e-mail data further comprising the voicemail data. The e-mail data is then transmitted to a network address associated with a remote e-mail server, such that the e-mail data, including the voicemail data, is stored at the remote e-mail server. | 12-23-2010 |
20110051910 | Method and apparatus for Forwarding Voicemail - A method and apparatus for forwarding voicemail is provided. A voicemail server determines that voicemail data stored in a memory device has been classified as urgent, the voicemail data for forwarding to a recipient communication device. Availability data associated with the recipient communication device is processed to determine an availability of the recipient communication device. If the availability data is indicative that the recipient communication device is available for receiving calls, then the voicemail data is provided to the recipient communication device. | 03-03-2011 |
20110063406 | System and method for cascaded teleconferencing - A system and method for forming a cascaded teleconference between digital telephony devices is disclosed. The method comprises selecting a plurality of digital telephony devices for a teleconference. Each digital telephony device includes a microphone, a speaker, an input port, and at least one output port. A cascaded peer to peer network is formed between the selected digital telephony devices. A sum of the local microphone signal and at least one conference microphone signal is transmitted at the output of each of the plurality of digital telephony devices. The at least one conference microphone signal is broadcast over the speaker at each of the plurality of digital telephony devices to provide the cascaded teleconference. | 03-17-2011 |
Patent application number | Description | Published |
20090108710 | High Frequency Piezocomposite And Methods For Manufacturing Same - A transducer with triangular cross-sectional shaped pillars is described for suppressing lateral modes within a composite, and a method for producing the same. According to one aspect of the present application, a plurality of triangular cross-sectional shaped pillars extends outwardly from a substrate and form an array of pillars. The resulting array of pillars is configured to suppress the lateral modes of the transducer at higher operating frequencies, such as, at or above 15 MHz, at or above 20 MHz, or at or above 30 MHz. | 04-30-2009 |
20110273059 | HIGH FREQUENCY PIEZOCOMPOSITE AND METHODS FOR MANUFACTURING SAME - A transducer with triangular cross-sectional shaped pillars is described for suppressing lateral modes within a composite, and a method for producing the same. According to one aspect of the present application, a plurality of triangular cross-sectional shaped pillars extends outwardly from a substrate and form an array of pillars. The resulting array of pillars is configured to suppress the lateral modes of the transducer at higher operating frequencies, such as, at or above 15 MHz, at or above 20 MHz, or at or above 30 MHz. | 11-10-2011 |
20130193805 | HIGH FREQUENCY PIEZOCOMPOSITE AND METHODS FOR MANUFACTURING SAME - A transducer with triangular cross-sectional shaped pillars is described for suppressing lateral modes within a composite, and a method for producing the same. According to one aspect of the present application, a plurality of triangular cross-sectional shaped pillars extends outwardly from a substrate and form an array of pillars. The resulting array of pillars is configured to suppress the lateral modes of the transducer at higher operating frequencies, such as, at or above 15 MHz, at or above 20 MHz, or at or above 30 MHz. | 08-01-2013 |
20140354113 | HIGH FREQUENCY PIEZOCOMPOSITE AND METHODS FOR MANUFACTURING SAME - A transducer with triangular cross-sectional shaped pillars is described for suppressing lateral modes within a composite, and a method for producing the same. According to one aspect of the present application, a plurality of triangular cross-sectional shaped pillars extends outwardly from a substrate and form an array of pillars. The resulting array of pillars is configured to suppress the lateral modes of the transducer at higher operating frequencies, such as, at or above 15 MHz, at or above 20 MHz, or at or above 30 MHz. | 12-04-2014 |
Patent application number | Description | Published |
20140366118 | CLOUD BASED LOGGING SERVICE - Methods and systems are provided for providing access to a cloud-based logging service to a user without requiring user registration. Methods and systems are also provided for providing cloud-based logging service to users by integrating the cloud-based logging service within a network security gateway appliance, thereby enabling the users to use the cloud-based logging service by accessing the gateway appliance. The cloud-based logging service can be accessed via an Application Programming Interface (API) without requiring user registration and allows easy and efficient access to log files, viewing of log files, and data security to stored log files and generated reports. Methods and systems of the present invention can also be used for multiple other purposes apart from using the cloud-based logging service without registration including, but not limited to, reducing the complexity of a network architecture, providing better and more effective GUI representation and minimizing distribution of data over a controlled network, among other such purposes. | 12-11-2014 |
20150188784 | CLOUD BASED LOGGING SERVICE - Methods and systems are provided for providing access to a cloud-based logging service to a user without requiring user registration. According to one embodiment, access to a cloud-based logging service is integrated within a network security gateway appliance by automatically configuring access settings for the logging service without registering the gateway appliance with the logging service. A traffic or event log is transparently created within the logging service by making use of the automatically configured access settings and treating the logging service as a logging device. A request is received, by the gateway appliance, from an administrator to access data associated with the log. Responsive to the request, the data from the logging service is transparently retrieved, by the gateway appliance, and presented to the administrator via a graphical user interface (GUI) of the gateway appliance. | 07-02-2015 |
20150372977 | FIREWALL POLICY MANAGEMENT - Methods and systems are provided for creation and implementation of firewall policies. Method of the present invention includes enabling a firewall device to maintain a log of network traffic flow observed by the device. The method further includes enabling firewall device to receive an administrator request for a customized report to be generated based on log of network traffic and generating the report by extracting information from the log based on report parameters, where the report includes desired network traffic items that are associated with one or more action objects. The method further provides for firewall device to receive a directive to implement an appropriate firewall policy on one or more network traffic items responsive to interaction of administrator with one or more action objects corresponding to the network traffic items. Based on the directive and information from log, the firewall then defines and/or establishes appropriate firewall policy. | 12-24-2015 |
Patent application number | Description | Published |
20140138080 | TONG SYSTEM FOR TRIPPING RODS AND TUBULARS - The present disclosure provides a tong system which includes a tong assembly and at least one string gripping device. The tong assembly is configured to engage a rod or tubular string at the junction between a first rod or tubular and a second rod or tubular of a rod or tubular string and unthread the first rod or tubular from the second rod or tubular. The tong assembly can also thread the first rod or tubular onto the rod or tubular string. The string gripping device is configured to hold a tubular string for at least a portion of the time. The tong system further holds the rod or tubular string against torque applied onto the first rod or tubular by the tong assembly | 05-22-2014 |
20140138081 | MECHANIZED AND AUTOMATED WELL SERVICE RIG - The present disclosure provides a well service rig for tripping rods and tubulars. The well service rig includes a service rig base unit, a mast coupled to the well service rig base unit movable between a folded position and an upright position, a vertical guide mounted to the mast, and a traveling block system coupled to the vertical guide at a first end and configured to travel up and down at least a portion of a length of the vertical guide. The traveling block system is couplable to a rod, a tubular, or both at a second end. | 05-22-2014 |
20140138100 | METHODS OF MECHANIZED AND AUTOMATED TRIPPING OF RODS AND TUBULARS - The present disclosure provides techniques and methods of tripping rods and tubulars. Specifically, the disclosure provides techniques for pulling a rod string out of hole and delivering the pulled out rod segments into a rod storage and racking system. The disclosure also provides techniques for pulling a tubular string out of hole and delivering the pulled out tubular segments into a tubular storage and racking system. The disclosure further provides techniques for delivering rods from the rod storage and racking system and running the rods down-hole. The disclosure also provides techniques for delivering tubulars from the tubular storage and racking system and running the tubulars down-hole. | 05-22-2014 |
20140140790 | ROD AND TUBULAR RACKING SYSTEM - The present disclosure includes a racking system for receiving, storing, and/or delivering rods and tubulars. The racking system includes a rack having a plurality of beams configured to support a plurality of rods, a plurality of tubulars, or both. each of the plurality of beams includes a proximal end and a distal end. The racking system further includes a plurality of indexers aligned with or proximal to the proximal ends of the plurality of base beams, wherein each of the plurality of indexers includes a series of rotating holders configured to transport the plurality of rods, tubulars, or both to and from the rack. Additionally, the racking system further includes a jack coupled to the distal end each of the plurality of base beams, wherein the jack raises and lowers the distal end of the base beam in relation to the proximal end. | 05-22-2014 |
20140140791 | MECHANIZED AND AUTOMATED CATWALK SYSTEM - The present disclosure provides a catwalk system. The catwalk system includes a base unit and a carriage disposed on the base unit and coupled to the base unit at one end and extends towards an opposite end of the base unit. The carriage is movable between a horizontal position and a sloped position, and between an extended position and a retracted position. The catwalk system further includes a racking system coupled to one or both sides of the base unit. The racking system includes a plurality of racking layers configured to store and support a plurality of rods and/or tubulars. | 05-22-2014 |
20140151021 | MECHANIZED AND AUTOMATED WELL SERVICE RIG SYSTEM - A well service rig system includes a well service rig, a catwalk, a racking system, and a tong system. The well service rig system provides techniques for tripping rods and/or tubulars with improved efficiency, such as reducing the need for operator intervention by providing process automation. The well service rig system is further adaptable for use with rods, tubulars, or both. The well servicing rig system also provides rod and/or tubular storage and delivery solutions via the integrated racking system. Furthermore, the present disclosure provides improved methods for tripping rods and/or tubulars. | 06-05-2014 |
Patent application number | Description | Published |
20130313187 | Resilient Ion Exchange Membranes - A process for producing a resilient ion exchange membrane. The process comprises the steps of ( | 11-28-2013 |
20140353241 | RESILIENT ANION EXCHANGE MEMBRANES - A resilient anion exchange membrane including a porous matrix impregnated with a cross-linked homogenous ion-transferring polymer that fills the pores and substantially covers the surfaces of the porous matrix. The cross-linked homogenous ion-transferring polymer formed by polymerizing a homogeneous solution including (i) a hydrophilic ionic monomer selected from a group consisting of 3-methacryloylaminopropyl trimethylammonium chloride, vinylbenzyl trimethylammonium chloride, 3-acrylamidopropyl trimethylammonium chloride, 2-acryloyloxyethyl trimethylammonium chloride, and mixtures thereof, with (ii) a hydrophobic cross-linking oligomer selected from a group consisting of polyurethane oligomer diacrylate, polyester oligomer diacrylate, epoxy oligomer diacrylate, polybutadiene oligomer diacrylate, silicone diacrylate, dimethacrylate counterparts thereof, polyurethane oligomers having three or more vinyl groups, polyester oligomers having three or more vinyl groups, and mixtures thereof. | 12-04-2014 |
20140357740 | RESILIENT CATION EXCHANGE MEMBRANES - A resilient cation exchange membrane including a porous matrix impregnated with a cross-linked homogenous ion-transferring polymer that fills the pores and substantially covers the surfaces of the porous matrix. The cross-linked homogenous ion-transferring polymer formed by polymerizing a homogeneous solution including (i) a hydrophilic ionic monomer selected from a group consisting of 2-acrylamido-2-methyl-1-propanesulfonic acid, 2-acrylamido-2-methyl-1-propanesulfonic acid salts, sodium 4-vinylbenzenesulfonate, and 3-sulfopropyl acrylate potassium, with (ii) a hydrophobic cross-linking oligomer selected from a group consisting of polyurethane oligomer diacrylate, polyester oligomer diacrylate, epoxy oligomer diacrylate, polybutadiene oligomer diacrylate, silicone diacrylate, dimethacrylate counterparts thereof, polyurethane oligomers having three or more vinyl groups, polyester oligomers having three or more vinyl groups, and mixtures thereof. | 12-04-2014 |
20150044366 | RESILIENT ION EXCHANGE MEMBRANES PREPARED BY POLYMERIZING IONIC SURFACTANT MONOMERS - A method for making a resilient ion exchange membrane comprising polymerizing a composition containing at least an ionic surfactant monomer having an ethylenic group and a long hydrophobic alkyl group filling the pores of and covering the surfaces of a porous substrate. The hydrophobic long alkyl group in the ionic surfactant monomer provides ion exchange membranes with improved mechanical properties, and good chemical stability. | 02-12-2015 |
20150232627 | Acrylamide-Based Crosslinking Monomers, Their Preparation, And Uses Thereof - A process for preparing an acrylamide-based crosslinking monomer comprising reacting in the presence of a catalyst an isocyanate compound containing at least two isocyanate groups with one of acrylic acid or methacrylic acid. These acrylamide-based crosslinking monomers are used in the preparation of coating compositions, adhesive compositions curable by applying thermal or radiation energy, and in the preparation of cation or anion exchange membranes. | 08-20-2015 |