Patent application number | Description | Published |
20100227969 | AZIRIDINE CROSSLINKING AGENTS FOR ACRYLIC ADHESIVES - A crosslinkable, pre-adhesive composition is described comprising an acid-functional (meth)acrylate copolymer and an aziridine crosslinking agent, which when crosslinked provides a pressure-sensitive adhesive and pressure-sensitive adhesive articles. | 09-09-2010 |
20110104486 | LOW SURFACE ENERGY ADHESIVE - Adhesives suitable for use with low surface energy materials are described. The adhesive contain an acrylic copolymer, a high glass transition temperature tackifier and a low glass transition temperature tackifier. The acrylic copolymer is the reaction product of a first alkyl(meth)acrylate having at least 5 carbon atoms in the alkyl group, a second alkyl(meth)acrylate having 1 to 4 carbon atoms in the alkyl group, and a vinyl carboxylic acid. Both tackifiers have a Tg greater than the Tg of the acrylic copolymer. The high glass transition temperature tackifier has a Tg of at least 20° C. and the low glass transition temperature tackifier has a Tg of less than 0° C. | 05-05-2011 |
20110237725 | PRESSURE-SENSITIVE ADHESIVES DERIVED FROM 2-ALKYL ALKANOLS - Pressure-sensitive adhesives are prepared from (meth)acrylate esters of 2-alkyl alkanols. The adhesives are characterized by exhibiting an overall balance of adhesive and cohesive characteristics and exceptional adhesion to low surface energy substrates. | 09-29-2011 |
20130045376 | Ceramic Shaped Abrasive Particles, Methods of Making the Same, and Abrasive Articles Containing the Same - A curable composition includes components: a) at least one ethylene-propylene-(nonconjugated diene) terpolymer; b) at least one ethylene-propylene copolymer; c) at least one bis(halomethyl)triazine crosslinker; and d) at least one tackifier. A weight ratio of component a) to component b) is in a range of from 15:85 to 85:15. A pressure-sensitive adhesive includes an at least partially crosslinked reaction product of the curable composition. Adhesive articles including the pressure-sensitive adhesive are disclosed. | 02-21-2013 |
20130108860 | Surface Modification of Pressure-Sensitive Adhesives with Nanoparticles | 05-02-2013 |
20140367040 | MULTILAYER PRESSURE-SENSITIVE ADHESIVE FILMS WITH A (METH)ACRYLIC-BASED ELASTOMERIC MATERIAL - The present invention is directed to a multilayer pressure sensitive adhesive (PSA) film, having a first pressure sensitive adhesive layer and at least an opposing layer, wherein the first pressure sensitive adhesive layer comprises a pressure-sensitive adhesive composition with a (meth)acrylic-based elastomeric material comprising a reaction product of polymerizable material comprising: (a) a first monomer which is an alkyl (meth)acrylate ester of a primary alcohol R | 12-18-2014 |
20140377553 | PRESSURE-SENSITIVE ADHESIVES WITH A (METH)ACRYLIC-BASED ELASTOMERIC MATERIAL - Pressure-sensitive adhesive compositions and articles containing the pressure-sensitive adhesives are provided. The pressure-sensitive adhesives contain an (meth)acrylic-based elastomeric material prepared an alkyl (meth)acrylate having an alkyl groups that is branched and that contains at least 14 carbon atoms. | 12-25-2014 |
20150044457 | PRESSURE-SENSITIVE ADHESIVE COMPOSITION - Disclosed is an adhesive composition comprising a low T | 02-12-2015 |
20160083629 | ADHESIVE COMPOSITION - Disclosed is a crosslinked adhesive composition comprising a low T | 03-24-2016 |
20160096980 | MULTILAYER PRESSURE SENSITIVE ADHESIVE ASSEMBLY - The present disclosure relates to a multilayer pressure sensitive adhesive assembly comprising at least a first pressure sensitive adhesive layer superimposed to a second polymer layer, wherein a curable liquid precursor of the first pressure sensitive adhesive polymer layer comprises a low Tg (meth)acrylate copolymer and a high Tg (meth)acrylate copolymer having a weight average molecular weight (Mw) of above 20,000 Daltons. The present disclosure also relates to a method of manufacturing such a pressure sensitive adhesive assembly and uses thereof. | 04-07-2016 |
20160108295 | LOW SURFACE ENERGY ADHESIVE - Adhesives suitable for use with low surface energy materials are described. The adhesive contain an acrylic copolymer, a high glass transition temperature tackifier and a low glass transition temperature tackifier. The acrylic copolymer is the reaction product of a first alkyl(meth)acrylate having at least 5 carbon atoms in the alkyl group, a second alkyl(meth)acrylate having 1 to 4 carbon atoms in the alkyl group, and a vinyl carboxylic acid. Both tackifiers have a Tg greater than the Tg of the acrylic copolymer. The high glass transition temperature tackifier has a Tg of at least 20° C. and the low glass transition temperature tackifier has a Tg of less than 0° C. | 04-21-2016 |
Patent application number | Description | Published |
20080256611 | METHOD AND APPARATUS FOR RESOURCE LOCATOR IDENTIFIER REWRITE - A method and apparatus for resource locator identifier rewrite have been presented. A security device receives from a resource host over a non-secure hypertext transfer protocol (HTTP) session a response to a request received from a client over a secure HTTP session. The response includes a uniform resource locator (URL) that is supposed to be for a resource host, but the URL does not designate a secure resource access protocol and the resource host requires the secure resource access protocol. The URL is located in the response and modified to designate the secure resource access protocol. After modification, the response is transmitted via the secure resource access protocol session to the client. | 10-16-2008 |
20100235543 | METHOD AND APPARATUS FOR RESOURCE LOCATOR IDENTIFIER REWRITE - A method and apparatus for resource locator identifier rewrite have been presented. A security device receives from a resource host over a non-secure hypertext transfer protocol (HTTP) session a response to a request received from a client over a secure HTTP session. The response includes a uniform resource locator (URL) that is supposed to be for a resource host, but the URL does not designate a secure resource access protocol and the resource host requires the secure resource access protocol. The URL is located in the response and modified to designate the secure resource access protocol. After modification, the response is transmitted via the secure resource access protocol session to the client. | 09-16-2010 |
20110158127 | WIRELESS EXTENDER SECURE DISCOVERY AND PROVISIONING - According to embodiments of the invention, a first wireless access point discovers a second wireless access point, the first wireless access point tunes its radio and privacy settings, without user input, based upon parameters automatically exchanged in response to the discovery of the second wireless access point, and a secure direct wireless connection is established between the first and second wireless access points using the radio and privacy settings. Adding the first wireless to an existing mesh network includes a determination of the best available direct wireless connection. | 06-30-2011 |
20120230491 | Wireless Extender Secure Discovery and Provisioning - According to embodiments of the invention, a first wireless access point discovers a second wireless access point, the first wireless access point tunes its radio and privacy settings, without user input, based upon parameters automatically exchanged in response to the discovery of the second wireless access point, and a secure direct wireless connection is established between the first and second wireless access points using the radio and privacy settings. Adding the first wireless to an existing mesh network includes a determination of the best available direct wireless connection. | 09-13-2012 |
20130227070 | METHOD AND APPARATUS FOR RESOURCE LOCATOR IDENTIFIER REWRITE - A method and apparatus for resource locator identifier rewrite have been presented. A security device receives from a resource host over a non-secure hypertext transfer protocol (HTTP) session a response to a request received from a client over a secure HTTP session. The response includes a uniform resource locator (URL) that is supposed to be for a resource host, but the URL does not designate a secure resource access protocol and the resource host requires the secure resource access protocol. The URL is located in the response and modified to designate the secure resource access protocol. After modification, the response is transmitted via the secure resource access protocol session to the client. | 08-29-2013 |
20140086215 | WIRELESS EXTENDER SECURE DISCOVERY AND PROVISIONING - According to embodiments of the invention, a first wireless access point discovers a second wireless access point, the first wireless access point tunes its radio and privacy settings, without user input, based upon parameters automatically exchanged in response to the discovery of the second wireless access point, and a secure direct wireless connection is established between the first and second wireless access points using the radio and privacy settings. Adding the first wireless to an existing mesh network includes a determination of the best available direct wireless connection. | 03-27-2014 |
20150055501 | WIRELESS EXTENDER SECURE DISCOVERY AND PROVISIONING - According to embodiments of the invention, a first wireless access point discovers a second wireless access point, the first wireless access point tunes its radio and privacy settings, without user input, based upon parameters automatically exchanged in response to the discovery of the second wireless access point, and a secure direct wireless connection is established between the first and second wireless access points using the radio and privacy settings. Adding the first wireless to an existing mesh network includes a determination of the best available direct wireless connection. | 02-26-2015 |
20150195265 | VIRTUAL PRIVATE NETWORK DEAD PEER DETECTION - Methods and systems are provided for detecting dead tunnels associated with a VPN. An indicator of a tunnel capability, for example, a DPD vendor ID, is received from a peer through a VPN connection. The tunnel capability is associated with one or more phase II tunnels associated with the VPN. Traffic generated by the peer is detected, and if traffic is detected at a tunnel, the tunnel is presumed to be alive. When no traffic is detected in a tunnel, a DPD packet exchange with the tunnel is initiated. A determination is made, based on the packet exchange, whether the tunnel is alive. | 07-09-2015 |
20150334598 | CENTRALIZED WIRELESS LAN LOAD BALANCING - A centralized wireless LAN load balancing mechanism is described herein. In one embodiment, in response to a request for entering a wireless network from a wireless station and forwarded from multiple access points (APs) of the wireless network, a network access device coupled to the multiple APs determines a load for each of the APs. The network access device then selects one of the APs based on the determined loads of the APs and instructs the selected AP to associate with the wireless station. The network access device further instructs the remaining APs to reject the request. Other methods and apparatuses are also described. | 11-19-2015 |
20150372983 | METHOD AND APPARATUS FOR RESOURCE LOCATOR IDENTIFIER REWRITE - A method and apparatus for resource locator identifier rewrite have been presented. A security device receives from a resource host over a non-secure hypertext transfer protocol (HTTP) session a response to a request received from a client over a secure HTTP session. The response includes a uniform resource locator (URL) that is supposed to be for a resource host, but the URL does not designate a secure resource access protocol and the resource host requires the secure resource access protocol. The URL is located in the response and modified to designate the secure resource access protocol. After modification, the response is transmitted via the secure resource access protocol session to the client. | 12-24-2015 |
Patent application number | Description | Published |
20080272711 | Apparatus and Method for Eliminating Electric Arc - The present invention relates to an apparatus and a method for eliminating electric arc in the field of lighting electronics. Whether or not electric arc is likely to be produced is determined through monitoring the current variation in the lighting circuit loop. If electric arc is likely to be produced, the lighting circuit loop is disconnected for a preset period of time to eliminate the voltage condition for producing electric arc so as to eliminate electric arc. Beyond the preset time when the lighting circuit loop is disconnected, the lighting circuit loop is connected normally, and works normally and unaffectedly. | 11-06-2008 |
20090302777 | PULSE GENERATOR USED FOR ELECTRONIC BALLAST - The present utility model proposes an impulse generator for driving an electronic ballast of a gas discharge lamp, the electronic ballast includes a resonance ignition circuit, characterized in that the impulse generator comprises: a micro-controller for generating a clock frequency signal, a logical time sequence control signal and a control voltage signal; a voltage controlled oscillator, coupled to the micro-controller, for receiving the logical time sequence control signal and the control voltage signal to generate oscillation and output a voltage controlled oscillating frequency signal; a phase comparator for receiving the clock frequency signal and the voltage controlled oscillating frequency signal to perform a logical exclusive-OR operation and output an impulse signal of corresponding frequency, thereby driving the resonance ignition circuit to generate a resonance voltage. In addition, the utility model also proposes an over-voltage protection circuit used for the electronic ballast. | 12-10-2009 |
20160102813 | POWER SOURCE MODULE FOR LED LAMP - A power source module for a LED lamp includes a filament-simulating circuit, a current limiting circuit, a rectifier, a filter, and a discharging circuit electrically connected to each other and a LED in the LED lamp. The filament-simulating circuit simulates a filament before the LED to pass through the pre-heating process of the electrical ballast in a fluorescent lamp base. The current limiting circuit, the rectifier, and the filter limit, rectify and filter the current from an external power source in the fluorescent lamp base to output a high frequency, direct current to drive the LED. The discharging circuit discharges the energy after turning the power switch off to prevent the LED lamp from flicker. Therefore, the power source module enables the LED lamp to be installed on the traditional fluorescent lamp base without modifying the circuit in the base. | 04-14-2016 |
Patent application number | Description | Published |
20090239338 | Method of Forming an Interconnect on a Semiconductor Substrate - The present invention relates to a method of forming a wire bond-free conductive interconnect area on a semiconductor substrate. A semiconductor substrate with an electrically conductive protrusion, defining a bond pad, is provided as well as a plurality of carbon nanotubes. The plurality of carbon nanotubes is immobilized on the bond pad by allowing at least one random portion along the length of the carbon nanotubes to attach to the surface of the bond pad. Thus an aggregate of loops of carbon nanotubes is formed on the surface of the bond pad. Thereby a conductive interconnect area is formed on the electrically conductive protrusion without heat treatment. | 09-24-2009 |
20110226841 | ROOM TEMPERATURE DIRECT METAL-METAL BONDING - A method for forming direct metal-metal bond between metallic surfaces is disclosed. The method comprises depositing a first nanostructured organic coating ( | 09-22-2011 |
20120199468 | TITANATE / TITANIA COMPOSITE NANOPARTICLE - The present invention relates to a photocatalytically active nanoparticulate material. A nanoparticle of the invention is a composite nanoparticle having two crystalline phases: hydrogen titanate and titania, which are uniformly mixed in the nanoparticle. The invention also relates to forming a nanoparticulate composite material by heating a basic titania sol under solvothermal conditions. | 08-09-2012 |
20130092545 | METHOD OF MANUFACTURING LAYERED METAL OXIDE PARTICLES AND LAYERED METAL OXIDE PARTICLES FORMED THEREOF - The present invention refers to a method of manufacturing layered metal oxide particles, the method comprising: placing a metal electrode in an electrolyte; and applying an electrical voltage to the electrode, wherein the metal electrode forms the anode, to form a metal oxide layer on the electrode surface, wherein the electrical voltage applied is higher than the breakdown voltage of the metal oxide, thereby breaking down the metal oxide layer formed on the electrode surface into metal oxide particles that react with the electrolyte to form the layered metal oxide particles. The present invention also refers to a layered metal oxide particle obtained from the method, and a method of manufacturing a crystalline metal oxide nanosheet or a crystalline metal oxide nanoribbon. | 04-18-2013 |
Patent application number | Description | Published |
20080267394 | Identity-Based Key Generating Methods and Devices - The present invention discloses a method and device of generating asymmetrical key pair (public key and private key) based on user identity. Key Management Center (KMC) generates public/private key calculating base, and publish the public key calculating base. Based on identity provided by a user, a private key is calculated and provided to the user. Any user can calculate other user's public key based on other user's identity and the published public key calculating base. Thus, when obtaining the public key of the communicating party, no third party CA certificate is needed, and no maintenance of mass parameters associated with users are needed. | 10-30-2008 |
20110255536 | METHOD, SYSTEM, AND APPARATUS FOR EXTRANET NETWORKING OF MULTICAST VIRTUAL PRIVATE NETWORK - A method, a system, and an apparatus for extranet networking of a multicast Virtual Private Network (VPN) are disclosed in the present invention. The method includes: establishing a multicast tunnel to a source VPN multicast instance and a multicast tunnel interface (MTI) connected to the multicast tunnel according to an added Share-Group address of a source VPN; sending an encapsulated Protocol Independent Multicast (PIM) protocol message to the MTI, forwarding the encapsulated PIM protocol message in a public network, and making the source VPN multicast instance generate a public network multicast data message of a Share-Group of the source VPN according to the encapsulated PIM protocol message; and decapsulating the received public network multicast data message of the Share-Group of the source VPN, and obtaining multicast data from the source VPN multicast instance. The present invention reduces the resource occupation of a router system, and alleviates the network load. | 10-20-2011 |
20140201619 | Method And Device For Implementing Local Operation On Web Page - A method and device for implementing a local operation on a web page are disclosed, which belong to the field of web technology. The method is applied to an electronic apparatus that includes a displaying unit and has an HTML operating environment. The method includes loading a web page in the HTML operating environment by address information; obtaining identification information for representing a status of local resources of the electronic apparatus, in the process of loading the web page; obtaining an operation request for representing a request for operating a first resource in the local resources; responding to the operation request with the first resource; and displaying a responding result of the responding to the operation request with the first resource on the displaying unit. The present method and device implement executing local operation on the web page, which improves the local calling capacity of a javascript code. | 07-17-2014 |
20150017999 | METHOD OF COGNITIVE RADIO AND DEVICE UTILIZING THE SAME - A method of implementing a cognitive radio (CR) technology and a device utilizing the same are provided. The method includes: when a first base station meets a requirement for entering a cognitive radio (CR) state, acquiring information on a potential frequency band which is assigned to a second base station; performing a band selection based on the potential frequency band to select a desired frequency band; and entering the CR state by accessing the first base station using the desired frequency band. | 01-15-2015 |
Patent application number | Description | Published |
20150189495 | PROVIDING DEVICE-TO-DEVICE CONNECTIVITY BY DETERMINING COMMUNICATION PREFERENCES IN REAL-TIME - A device may determine a condition for providing customer information to a mobile device. The device may detect the mobile device, and may request, from the mobile device and based on detecting the mobile device, information that identifies a user communication preference associated with providing the customer information to the mobile device. The device may receive, from the mobile device and based on the request, the information that identifies the user communication preference. The device may determine whether the customer information is to be provided to the mobile device based on the user communication preference and the condition, and may selectively provide the customer information and an instruction to the mobile device based on determining whether the customer information is to be provided to the mobile device. The instruction may cause the mobile device to relay the customer information to a network storage device. | 07-02-2015 |
20150244472 | METHOD AND SYSTEM FOR TRANSMITTING INFORMATION USING ULTRASONIC MESSAGES - A device includes an audio capture device for receiving an audio signal in an ultrasonic frequency range. The device includes a processor to determine whether the received audio signal corresponds to an ultrasonic message. The processor extracts a content of the ultrasonic message, when it is determined that the received audio signal corresponds to an ultrasonic message, automatically handles the ultrasonic message based on the extracted content, stores at least a portion of the content of the ultrasonic message, and displays the portion of the content of the ultrasonic message to a user of the mobile device at a time subsequent to a time of the receipt of the audio signal. | 08-27-2015 |
20160055573 | APPARATUS, METHOD AND SYSTEM FOR PROVIDING MACHINE-TO-MACHINE APPLICATIONS DEVELOPMENT - A framework for a machine-to-machine (M2M) application development is disclosed. The framework enables users to login and affect devices and applications that may interact with the devices by enabling M2M applications. The framework enables M2M application creation, management, and development of various profiled devices based on pre-defined data models associated with corresponding devices. Furthermore, the framework enables marketplace options to permit users to specify purchase options as well as to buy devices and applications. | 02-25-2016 |
Patent application number | Description | Published |
20150334090 | METHOD TO ENABLE DEEP PACKET INSPECTION (DPI) IN OPENFLOW-BASED SOFTWARE DEFINED NETWORK (SDN) - The present invention relates to a method and system for performing deep packet inspection of messages transmitted through a network switch in a Software Defined Network (SDN). Embodiments of the invention include a network switch, a controller, and a firewall in a software defined networking environment. In the present invention, the network switch is a simple network switch that is physically separate from the controller and the firewall. The invention may include a plurality of physically distinct network switches communicating with one or more controllers and firewalls. In certain instances, communications between the network switch, the controller, and the firewall are performed using the Open Flow standard communication protocol. | 11-19-2015 |
20160065551 | SINGLE LOGIN AUTHENTICATION FOR USERS WITH MULTIPLE IPV4/IPV6 ADDRESSES - Disclosed in the authentication and authorization of a client device to access a plurality of resources, requiring a user of a client device to enter only one set of login information. Authentication and authorization of a client device to access a plurality of resources after an initial set of login information is received by a networked computing environment. After the initial set of login information is received, a series of steps are performed that may be entirely transparent to the user of the client device. | 03-03-2016 |
20160094518 | METHOD TO ENABLE DEEP PACKET INSPECTION (DPI) IN OPENFLOW-BASED SOFTWARE DEFINED NETWORK (SDN) - The present invention relates to a method and system for performing deep packet inspection of messages transmitted through a network switch in a Software Defined Network (SDN). Embodiments of the invention include a network switch, a controller, and a firewall in a software defined networking environment. In the present invention, the network switch is a simple network switch that is physically separate from the controller and the firewall. The invention may include a plurality of physically distinct network switches communicating with one or more controllers and firewalls. In certain instances, communications between the network switch, the controller, and the firewall are performed using the Open Flow standard communication protocol. | 03-31-2016 |