Patents - stay tuned to the technology

Inventors list

Assignees list

Classification tree browser

Top 100 Inventors

Top 100 Assignees


George, WA

Ajesh George, Redmond, WA US

Patent application numberDescriptionPublished
20150178409ART SEARCH RESULTS - One or more techniques and/or systems are provided for populating an interactive map with art search results. For example, an art search query may be received (e.g., a user may submit a query “French Cubism”). A set of art search results, such as artwork, artists, galleries, geographical locations and/or other art search results, may be identified based upon the art search query. An interactive map may be populated with the set of art search results. For example, the interactive map may be populated with map pins representing galleries that display French Cubist artwork. Various task completion functionality may be supported, such as travel planning to a gallery, purchasing prints, reserving gallery tickets, sharing art search results through a social network, etc. In this way, the user may explore artwork and/or locations, such as galleries, that display such artwork.06-25-2015

Annie George, Redmond, WA US

Patent application numberDescriptionPublished
20140235179PERFORMANCE EVALUATION OF SERVICES AND APPLICATIONS ON DEVICES IN LIVE WIRELESS ENVIRONMENTS - Services and applications running on devices placed in live wireless environments are tested and reported to determine the relative performance of the device under test. Multiple logs collected from the device under test are combined and transmitted to a remote backend system. The backend system stores and analyzes the combined logs to generate reports containing factual and relative performance information regarding the device during the testing period. The nature of the test, the collected log information, and the report format may all be modified according to the criteria of the requestor.08-21-2014

Boby George, Bellevue, WA US

Patent application numberDescriptionPublished
20100274937PROVIDING LOCK-BASED ACCESS TO NODES IN A CONCURRENT LINKED LIST - A method of providing lock-based access to nodes in a concurrent linked list includes providing a plurality of striped lock objects. Each striped lock object is configured to lock at least one of the nodes in the concurrent linked list. An index is computed based on a value stored in a first node to be accessed in the concurrent linked list. A first one of the striped lock objects is identified based on the computed index. The first striped lock object is acquired, thereby locking and providing protected access to the first node.10-28-2010
20120254139PROVIDING LOCK-BASED ACCESS TO NODES IN A CONCURRENT LINKED LIST - A method of providing lock-based access to nodes in a concurrent linked list includes providing a plurality of striped lock objects. Each striped lock object is configured to lock at least one of the nodes in the concurrent linked list. An index is computed based on a value stored in a first node to be accessed in the concurrent linked list. A first one of the striped lock objects is identified based on the computed index. The first striped lock object is acquired, thereby locking and providing protected access to the first node.10-04-2012

Brent M. George, Mercer Island, WA US

Patent application numberDescriptionPublished
20130178960SYSTEMS AND METHODS FOR REMOTE MONITORING OF EXERCISE PERFORMANCE METRICS - The present technology describes various embodiments of systems and methods for remote monitoring of exercise performance metrics. In several embodiments, for example, a method of evaluating an exercise performed by a patient includes providing the patient with a pre-recorded avatar showing an exemplary instance of a prescribed exercise. The method further includes sensing the patient's movement during an exercise session and generating a real-time avatar based on the sensing. The pre-recorded avatar can be overlaid with the real-time avatar. The graphic overlay readily shows the patient whether and where his motion and/or body position deviate from the prescribed exercise. The overlay can be made in real time. In several embodiments, the patient's independently-recorded avatar and/or performance metrics are transmitted to the exercise prescriber to monitor the fidelity with which the patient is able to reproduce the exercise outside the prescriber's supervision.07-11-2013

Christopher Matthew George, Seattle, WA US

Patent application numberDescriptionPublished
20140274354INTELLIGENT MERCHANDISING OF GAMES - User activity with respect to media content, such as games, may be tracked and collected. Data associated with the user activity may be utilized to generate one or more predictive models, which may determine correlations between users that accessed the media content, the media content, or genres relating to the media content. Additional media content may be recommended and/or promoted to users based at least in part on the correlations and/or the likelihood that the additional content would be of interest to the users. The additional content may be presented to the users via one of multiple communication channels, such as an application associated with a user device, a site associated with the additional content, via messages transmitted to the users, and/or any other manner of communicating the additional content.09-18-2014
20140274355DYNAMIC RECOMMENDATION OF GAMES - A user may utilize a user device to interact with a plurality of games via an application stored on the user device and/or a site associated with the plurality of games. The user may also select at least one of the plurality of games to view, try, play, download, install, and/or acquire. In response to a user selection of at least one of the plurality of games, one or more additional games may be dynamically presented and/or recommended to the user. The one or more additional games may be determined to have a higher likelihood of being of interest to the user. An area in which the one or more additional games are presented to the user may be persistently displayed to the user via a display of the user device.09-18-2014
20140279121CUSTOMIZABLE AND ADJUSTABLE PRICING OF GAMES - One or more games may be accessed by a plurality of user devices. A current geographic location of a user device or a geographic location associated with the user device may be detected. A language associated with the one or more games and/or a type of currency of a rate associated with the one or more games may be customized based at least in part on the current geographic location and/or the geographic location. An identity of a user associated with the user device may also determined. Based at least in part on the identity of the user, the rate associated with the one or more games may be dynamically adjusted.09-18-2014

Jeu George, Redmond, WA US

Patent application numberDescriptionPublished
20090190726END-TO-END DEPLOYMENT VALIDATION OF COMMUNICATION SYSTEM - End-to-end testing of a communications network, specifically a unified communications network, is accomplished by employing one or more sets of agents controlled by one or more organizers. Agents, capable of initiating, emulating, and recording various aspects of communication, are deployed such that call can be made through a wide range of network paths. Test scenarios defined dynamically based on network conditions or based on administrator input are executed by an organizer, which directs the agents reporting to it. Collected results are analyzed for subsequent reporting and/or corrective actions. Alert criteria may also be defined causing an alert to be issued if a significant fault is discovered.07-30-2009

Kychakoff George, Maple Valley, WA US

Patent application numberDescriptionPublished
20120292523DETECTION OF PLUGGAGE IN APPARATUS OPERATING IN HOT, PARTICLE-LADEN ENVIRONMENTS - A device for detection of pluggage in an ash hopper of a coal fired boiler to identify when the opening in the bottom of the ash hopper becomes blocked by obstructions, so that timely and effective measures can be taken to remove the blockage without incurring economic loss in the operation of the boiler. At least one microwave or Terahertz transmitter unit configured to produce a microwave beam in either X or K band frequencies or at Terahertz frequencies (300 GHz to 3 THz), and at least one microwave receiver unit or beams that are interrupted by a blockage in the ash hopper, and produce an output to indicate obstruction of the beam or beams by the blockage. When the beam is interrupted, an output signal is produced to indicate obstruction of the beam by the blockage. The output signal is to notify process operators of the need to remove said blockage, and to control a blockage removal process.11-22-2012

Mathew George, Redmond, WA US

Patent application numberDescriptionPublished
20130097211DATA COMMUNICATION PROTOCOL - Described is a data communication protocol, in which a client and server negotiate in a manner that does not require the client to retry negotiation when servers are not capable of the client-desired protocol. In one example implementation, the desired protocol is SMB 2.0 or greater. The protocol describes a create command with possibly additional context data attached for built-in extensibility, and a compound command comprising a plurality of related commands or unrelated commands. A multi-channel command requests data transfer on a separate data channel, a signed capability verification may be used to ensure that a secure connection is established, and the protocol provides the ability to transfer extended error data from the server in response to a request.04-18-2013

Mathew George, Bellevue, WA US

Patent application numberDescriptionPublished
20080240144File server pipelining with denial of service mitigation - A method of metering bandwidth allocation on a server using credits is disclosed. The method may receive a request for data from a client, respond to the request for data and determining if the request for data for the client exceeds a current data allocation credit limit for the client. Using the round trip time, the method may calculate a connection throughput for a client and may increase the current data allocation credit limit for the client if the server has resources to spare, the client is actively using the current pipeline depth allowed and network connection latency and bandwidth indicate a deeper pipeline is necessary for saturation. The method may decrease the current data allocation credit limit for the client if the server does not have resources to spare.10-02-2008
20080320155Aggregation and re-ordering of input/output requests for better performance in remote file systems - A method and system for managing remote file system requests between client and server redirectors where a set of data request packets may be aggregated and/or ordered at a server based on hint information from a client.12-25-2008
20090327360EFFICIENT FILE MANAGEMENT THROUGH GRANULAR OPPORTUNISTIC LOCKING - Improved methods and systems for granular opportunistic locking mechanisms (oplocks) are provided for increasing file caching efficiency. Oplocks can be specified with a combination of three possible granular caching intentions: read, write, and/or handle. An oplock can be specified with an identifier that indicates a client/specific caller to avoid breaking the original oplock due to an incompatibility from other requests of the same client. An atomic oplock flag is added to create operations that allow callers to request an atomic open with an oplock with a given file.12-31-2009
20100185704CLIENT-BASED CACHING OF REMOTE FILES - A lease system is described herein that allows clients to request a lease to a remote file, wherein the lease permits access to the file across multiple applications using multiple handles without extra round trips to a server. When multiple applications on the same client (or multiple components of the same application) request access to the same file, the client specifies the same lease identifier to the server for each open request or may handle the request from the cache based on the existing lease. Because the server identifies the client's cache at the client level rather than the individual file request level, the client receives fewer break notifications and is able to cache remote files in more circumstances. Thus, by providing the ability to cache data in more circumstances common with modern applications, the lease system reduces bandwidth, improves server scalability, and provides faster access to data.07-22-2010
20120072400DIRECTORY OPLOCK - Current file systems may implement opportunistic locks on files that allow clients to locally cache file data, while promoting data consistency when multiple clients read/write the same file. Unfortunately, when a client locally caches directory content of a directory, the file system may lack a mechanism for notifying the client of changes to the directory that would render the cached directory content “stale”. Accordingly, one or more systems and/or techniques for managing a directory oplock are disclosed herein. A directory oplock may be generated based upon an oplock request comprising a first target key and a first parent key. Subsequent access requests for access to the directory or objects therein may be compared with the directory oplock to determine whether to break the directory oplock, and notify the client (e.g., directory oplock is broken if the client submitting the access request is different than the client owning the directory oplock).03-22-2012
20120072596Directory Leasing - Described are embodiments for allowing clients that access a distributed file system to locally cache directory metadata. The client may request a read lease which allows the client to cache the directory metadata locally and service requests received from the same application which originally requested the directory metadata using the cache. In addition, the client may also request a handle lease which allows a client to delay the closing of a directory handle and allow the handle to be reused to service subsequent directory metadata requests from the same or a different application. A client may also request a write lease which allows an application on the client to modify the directory metadata, such as by creating or deleting new files in the directory, or changing their attributes, and cache those changes.03-22-2012
20120102272EFFICIENT FILE MANAGEMENT THROUGH GRANULAR OPPORTUNISTIC LOCKING - Improved methods and systems for granular opportunistic locking mechanisms (oplocks) are provided for increasing file caching efficiency. Oplocks can be specified with a combination of three possible granular caching intentions: read, write, and/or handle. An oplock can be specified with an identifier that indicates a client/specific caller to avoid breaking the original oplock due to an incompatibility from other requests of the same client. An atomic oplock flag is added to create operations that allow callers to request an atomic open with an oplock with a given file.04-26-2012
20120143999CLIENT-BASED CACHING OF REMOTE FILES - A lease system is described herein that allows clients to request a lease to a remote file, wherein the lease permits access to the file across multiple applications using multiple handles without extra round trips to a server. When multiple applications on the same client (or multiple components of the same application) request access to the same file, the client specifies the same lease identifier to the server for each open request or may handle the request from the cache based on the existing lease. Because the server identifies the client's cache at the client level rather than the individual file request level, the client receives fewer break notifications and is able to cache remote files in more circumstances. Thus, by providing the ability to cache data in more circumstances common with modern applications, the lease system reduces bandwidth, improves server scalability, and provides faster access to data.06-07-2012
20120144019MULTICHANNEL CONNECTIONS IN FILE SYSTEM SESSIONS - A multi-connection information system is described herein that uses multiple connections to connect to a resource in a single file system session in a way that is controllable from protocols above a transport layer. The system also allows a single connection to be shared by multiple sessions. Sessions can be bound to multiple connections to enable communication over multiple transports. During the initial negotiation of a session, a client and a server determine whether multiple connections are supported between the client and the server within a session. After establishing an initial connection, additional connections can be established and bound to the existing session. The multiple connections can be used for failover and/or load balancing. The multi-connection information system provides a protocol for discovering a capability to establish multiple channels within a session and information about the available connections between two particular resources.06-07-2012
20120151249PROVIDING TRANSPARENT FAILOVER IN A FILE SYSTEM - A connection state system is described herein that allows a client to resume a connection with a server or a different replacement server by remotely storing client state information in association with a resume key. The system provides a resume key filter operating at the server that facilitates the storing of volatile server state information. The state information can include information such as oplocks, leases granted to a client, and in-flight operations on a file handle. The resume key filter driver sits above the file system, which allows multiple file access protocols to use the filter. Upon a failover event, such as a server going down or losing connectivity to a client, the system can bring up another server or the same server and reestablish state for file handles held by various clients using the resume key filter.06-14-2012
20120254396PROVIDING A WITNESS SERVICE - Described are embodiments directed at providing a witness service that sends notifications with a resource state to clients. Embodiments provide a protocol that includes various messages for registering and receiving notifications regarding the state of a resource. The protocol may include a message for requesting node information from a first node in a cluster. The node information identifies nodes in the cluster that provide a witness service, which monitors a resource. The protocol includes a message that is used to register with the witness service for notifications regarding a state, or state change, of a network or cluster resource. The protocol also includes messages for sending notifications with state information of the resource.10-04-2012
20130007518TRANSPARENT FAILOVER - Described are embodiments directed at persistent handles that are used to retain state across network failures and server failovers. Persistent handles are requested by a client after a session has been established with a file server. The request for the persistent handle includes a handle identifier generated by the client. The server uses the handle identifier to associate with state information. When there is a network failure or a server failover, and a reconnection to the client, the handle identifier is used to identify replayed requests that if replayed would create an inconsistent state on the server. The replayed requests are then appropriately handled.01-03-2013
20130066941CLUSTERED CLIENT FAILOVER - An application instance identifier is employed with various systems and methods in order to provide a requestor with continuous access to a resource when operating in a client clustered environment. A requestor residing on a first client in may attempt to access a resource. The first client sends a request to access the resource. The request may be associated with an application instance identifier that identifiers the requestor. At some point, the first client fails and the requestor is associated with a second client via a failover mechanism. The second client sends a second request to access the resource on behalf of the requestor. The second request is associated with the requestor's application instance identifier. The application instance identifier is used to identify the second request as belonging to the same requestor as the first request, thereby granting the second request to access the resource while avoiding a conflict situation.03-14-2013
20130067095SMB2 SCALEOUT - Systems and methods are disclosed for clients and servers operating in a scaled cluster environment. Efficiencies are introduced to the process of connecting a client to a clustered environment by providing the client with the ability to attempt a connection with multiple servers in parallel. Servers operating the in the clustered environment are also capable of providing persistent storage of file handles and other state information. Ownership of the state information and persistent handles may be transferred between servers, thereby providing clients with the opportunity to move from one server to another while maintaining access to resources in the clustered environment.03-14-2013
20130238809Secure Capability Negotiation between a Client and Server - Embodiments of the present disclosure provide for establishing an authenticated session between a client computing device and a remote computing device. In certain embodiments, a connection is established between the client computing device and the remote computing device. Once the connection is established, the client computing device sends a number of requests to the client computing device including a negotiate request, a setup request, and a validation request. In response to the requests, the client computing device receives a number of responses from the remote computing device including a negotiate response, setup response and a validation response. Once the responses have been received, a determination is made as to whether information contained in the validation response matches information contained in the negotiate response. If the information matches, an authenticated session is established between the remote computing device and the client computing device.09-12-2013
20130254272CLIENT-BASED CACHING OF REMOTE FILES - A lease system is described herein that allows clients to request a lease to a remote file, wherein the lease permits access to the file across multiple applications using multiple handles without extra round trips to a server. When multiple applications on the same client (or multiple components of the same application) request access to the same file, the client specifies the same lease identifier to the server for each open request or may handle the request from the cache based on the existing lease. Because the server identifies the client's cache at the client level rather than the individual file request level, the client receives fewer break notifications and is able to cache remote files in more circumstances. Thus, by providing the ability to cache data in more circumstances common with modern applications, the lease system reduces bandwidth, improves server scalability, and provides faster access to data.09-26-2013
20130254492ACCESS REQUESTS WITH CACHE INTENTIONS - A lease system is described herein that allows clients to request a lease to a remote file, wherein the lease permits access to the file across multiple applications using multiple handles without extra round trips to a server. When multiple applications on the same client (or multiple components of the same application) request access to the same file, the client specifies the same lease identifier to the server for each open request or may handle the request from the cache based on the existing lease. Because the server identifies the client's cache at the client level rather than the individual file request level, the client receives fewer break notifications and is able to cache remote files in more circumstances. Thus, by providing the ability to cache data in more circumstances common with modern applications, the lease system reduces bandwidth, improves server scalability, and provides faster access to data.09-26-2013
20130304821PROVIDING A WITNESS SERVICE - Described are embodiments directed at providing a witness service that sends notifications with a resource state to clients. Embodiments provide a protocol that includes various messages for registering and receiving notifications regarding the state of a resource. The protocol may include a message for requesting node information from a first node in a cluster. The node information identifies nodes in the cluster that provide a witness service, which monitors a resource. The protocol includes a message that is used to register with the witness service for notifications regarding a state, or state change, of a network or cluster resource. The protocol also includes messages for sending notifications with state information of the resource.11-14-2013
20140040332DIRECTORY LEASING - Described are embodiments for allowing clients that access a distributed file system to locally cache directory metadata. The client may request a read lease which allows the client to cache the directory metadata locally and service requests received from the same application which originally requested the directory metadata using the cache. In addition, the client may also request a handle lease which allows a client to delay the closing of a directory handle and allow the handle to be reused to service subsequent directory metadata requests from the same or a different application. A client may also request a write lease which allows an application on the client to modify the directory metadata, such as by creating or deleting new files in the directory, or changing their attributes, and cache those changes.02-06-2014
20140244688ACCESS REQUESTS WITH CACHE INTENTIONS - A lease system is described herein that allows clients to request a lease to a remote file, wherein the lease permits access to the file across multiple applications using multiple handles without extra round trips to a server. When multiple applications on the same client (or multiple components of the same application) request access to the same file, the client specifies the same lease identifier to the server for each open request or may handle the request from the cache based on the existing lease. Because the server identifies the client's cache at the client level rather than the individual file request level, the client receives fewer break notifications and is able to cache remote files in more circumstances. Thus, by providing the ability to cache data in more circumstances common with modern applications, the lease system reduces bandwidth, improves server scalability, and provides faster access to data.08-28-2014
20140372521TRANSPARENT FAILOVER - Described are embodiments directed at persistent handles that are used to retain state across network failures and server failovers. Persistent handles are requested by a client after a session has been established with a file server. The request for the persistent handle includes a handle identifier generated by the client. The server uses the handle identifier to associate with state information. When there is a network failure or a server failover, and a reconnection to the client, the handle identifier is used to identify replayed requests that if replayed would create an inconsistent state on the server. The replayed requests are then appropriately handled.12-18-2014
20150101028SECURE CAPABILITY NEGOTIATION BETWEEN A CLIENT AND SERVER - Embodiments of the present disclosure provide for establishing an authenticated session between a client computing device and a remote computing device. In certain embodiments, a connection is established between the client computing device and the remote computing device. Once the connection is established, the client computing device sends a number of requests to the client computing device including a negotiate request, a setup request, and a validation request. In response to the requests, the client computing device receives a number of responses from the remote computing device including a negotiate response, setup response and a validation response. Once the responses have been received, a determination is made as to whether information contained in the validation response matches information contained in the negotiate response. If the information matches, an authenticated session is established between the remote computing device and the client computing device.04-09-2015
20150106516PROVIDING A WITNESS SERVICE - Described are embodiments directed at providing a witness service that sends notifications with a resource state to clients. Embodiments provide a protocol that includes various messages for registering and receiving notifications regarding the state of a resource. The protocol may include a message for requesting node information from a first node in a cluster. The node information identifies nodes in the cluster that provide a witness service, which monitors a resource. The protocol includes a message that is used to register with the witness service for notifications regarding a state, or state change, of a network or cluster resource. The protocol also includes messages for sending notifications with state information of the resource.04-16-2015
20150149505DIRECTORY LEASING - Described are embodiments for allowing clients that access a distributed file system to locally cache directory metadata. The client may request a read lease which allows the client to cache the directory metadata locally and service requests received from the same application which originally requested the directory metadata using the cache. In addition, the client may also request a handle lease which allows a client to delay the closing of a directory handle and allow the handle to be reused to service subsequent directory metadata requests from the same or a different application. A client may also request a write lease which allows an application on the client to modify the directory metadata, such as by creating or deleting new files in the directory, or changing their attributes, and cache those changes.05-28-2015
20150229735EFFICIENT FILE MANAGEMENT THROUGH GRANULAR OPPORTUNISTIC LOCKING - Improved methods and systems for granular opportunistic locking mechanisms (oplocks) are provided for increasing file caching efficiency. Oplocks can be specified with a combination of three possible granular caching intentions: read, write, and/or handle. An oplock can be specified with an identifier that indicates a client/specific caller to avoid breaking the original oplock due to an incompatibility from other requests of the same client. An atomic oplock flag is added to create operations that allow callers to request an atomic open with an oplock with a given file.08-13-2015
20150256640ACCESS REQUESTS WITH CACHE INTENTIONS - A lease system is described herein that allows clients to request a lease to a remote file, wherein the lease permits access to the file across multiple applications using multiple handles without extra round trips to a server. When multiple applications on the same client (or multiple components of the same application) request access to the same file, the client specifies the same lease identifier to the server for each open request or may handle the request from the cache based on the existing lease. Because the server identifies the client's cache at the client level rather than the individual file request level, the client receives fewer break notifications and is able to cache remote files in more circumstances. Thus, by providing the ability to cache data in more circumstances common with modern applications, the lease system reduces bandwidth, improves server scalability, and provides faster access to data.09-10-2015

Patent applications by Mathew George, Bellevue, WA US

Michael M. George, Mercer Island, WA US

Patent application numberDescriptionPublished
20080228592SERVICES FOR GENERATION OF ELECTRONIC MARKETPLACE LISTINGS USING PERSONAL PURCHASE HISTORIES OR OTHER INDICIA OF PRODUCT OWNERSHIP - An electronic marketplace system provides various features for assisting users in listing products for sale, locating the listings for a product, and performing related actions. A user wishing to sell a product can browse to an existing description of the product in an electronic catalog and then select an option to create a corresponding listing. If the user previously purchased the product via the system, the user may alternatively select the product from a personal purchase history. The system may also proactively send product-specific listing requests to those who have purchased or otherwise indicated ownership of specific products.09-18-2008
20080243644MARKETPLACE SYSTEM IN WHICH USERS GENERATE USER-TO-USER PREORDER LISTINGS VIA A DEFINITIVE PRODUCT CATALOG - An electronic marketplace system provides various features for assisting users in listing products for sale, locating the listings for a product, and performing related actions. A user wishing to sell a product can browse to an existing description of the product in an electronic catalog and then select an option to create a corresponding listing. The pending listings for a product are preferably displayed or summarized on the product's detail page in the catalog. When no such listings exist, an option to preorder the product from an unspecified seller may be provided, and information regarding the resulting preorders may be displayed on the associated product detail pages to entice potential sellers. In one embodiment, the electronic catalog also serves as a retail sales catalog of a merchant.10-02-2008
20120116979Enabling Communication Between, and Production of Content By, Rights Holders and Content Producers - A content exchange service facilitates communication between, and production of content by, holders of rights in content titles and producers of content. The content exchange service receives content profiles from various rights holders and surfaces the content profiles to producers for purposes of soliciting auditions to produce the content subject of the content profiles in an alternative form. The rights holder can review the auditions submitted by producers and establish communication with the producer of the audition the rights holder liked via the content exchange service. The content exchange service can then facilitate negotiation of an agreement between the rights holder and the producer for production of the content in an alternative form. Following finalization of the agreement, the producer may submit a complete production of the content in the alternative form to the content exchange service, which in turn presents the complete production to the rights holder for approval.05-10-2012
20130198084UTILIZING PHRASE TOKENS IN TRANSACTIONS - A system and method for facilitating transactions utilizing phrase tokens are provided. Individual entities can be associated with unambiguous transaction phrase tokens, such as multiple word phrases. The transaction phrase tokens are associated with transaction accounts by a service provider such that the entities can complete a transaction without having to exchange transaction account information. In a transaction, a transaction phrase token is offered to an accepting party, which tenders the offered transaction phrase token to the service provider. The service provider processes the offered transaction phrase token according to configuration information specified for the transaction phrase token. The service provider can automatically process the transaction request or request additional information.08-01-2013
20130204789UTILIZING PHRASE TOKENS IN TRANSACTIONS - A system and method for facilitating transactions utilizing phrase tokens are provided. Individual entities can be associated with unambiguous transaction phrase tokens, such as multiple word phrases. The transaction phrase tokens are associated with transaction accounts by a service provider such that the entities can complete a transaction without having to exchange transaction account information. In a transaction, a transaction phrase token is offered to an accepting party, which tenders the offered transaction phrase token to the service provider. The service provider processes the offered transaction phrase token according to configuration information specified for the transaction phrase token. The service provider can automatically process the transaction request or request additional information.08-08-2013
20130204790UTILIZING PHRASE TOKENS IN TRANSACTIONS - A system and method for facilitating transactions utilizing phrase tokens are provided. Individual entities can be associated with unambiguous transaction phrase tokens, such as multiple word phrases. The transaction phrase tokens are associated with transaction accounts by a service provider such that the entities can complete a transaction without having to exchange transaction account information. In a transaction, a transaction phrase token is offered to an accepting party, which tenders the offered transaction phrase token to the service provider. The service provider processes the offered transaction phrase token according to configuration information specified for the transaction phrase token. The service provider can automatically process the transaction request or request additional information.08-08-2013
20140100930REDEMPTION RECORDATION AND VERIFICATION - The collection of voucher redemption information may reduce instances of redemption error or redemption fraud, which benefits both consumers and merchants. The collection of voucher redemption information may involve a service receiving a selection of a voucher for redemption from an application on an electronic device, in which the voucher was previously acquired by a consumer through a deal offered by a merchant. The service may subsequently direct the application to acquire a credential to complete the redemption of the voucher. In various instances, the credential may be a merchant confirmation credential of the merchant or a consumer redemption credential of the consumer. The service may receive the credential from the application on the electronic device, and store a record of the voucher redemption for the voucher in a voucher redemption database, in which the record includes the credential.04-10-2014
20140278877Facilitating Purchase of Excess Items - Disclosed are various embodiments for facilitating the purchase of excess items. In one embodiment, customer information and inventory data are retrieved from a merchant client. A determination is made on whether excess items exist. A list of target purchasers is generated based on data associated with a user account, and offers are generated and sent by electronic communication to the list of target purchasers.09-18-2014
20140351085USING THEME-BASED ITEM GROUPINGS TO FACILITATE ITEM SELECTION - Techniques are described that allow customers and other users of an electronic marketplace to create groups of related items within the electronic marketplace, such as for customers of a Web store to create boutiques within the Web store that each reflect a specified theme. Such themed boutiques within a Web store can include various items that are available via the Web store and that each relate to the specified theme for the boutique. When other customers of the Web store are interested in items that relate to the specified theme for one of the boutiques, information regarding that boutique and/or items in that boutique can then be provided to those other customers. This abstract is provided to comply with rules requiring an abstract, and it is submitted with the intention that it will not be used to interpret or limit the scope or meaning of the claims.11-27-2014

Patent applications by Michael M. George, Mercer Island, WA US

Michael Martin George, Mercer Island, WA US

Patent application numberDescriptionPublished
20150262402OBJECT CUSTOMIZATION AND ACCESSORIZATION IN VIDEO CONTENT - A real-time video exploration (RVE) system that allows users to pause, step into, move through, and explore 2D or 3D modeled worlds of scenes in a video. The RVE system may allow users to select and manipulate objects within a scene, and to modify an object by adding or removing accessories from the object or otherwise customizing the object according to the user's preferences or desires. The RVE system may also provide an interface or interfaces via which the user can obtain additional information for the object, customize the object, be given a price or price(s) for the object as customized, and purchase the object as specified if desired.09-17-2015
20150262423REAL-TIME EXPLORATION OF VIDEO CONTENT - A real-time video exploration (RVE) system that allows users to pause, step into, and explore 2D or 3D modeled worlds of scenes in a video. The system may leverage network-based computation resources to render and stream new video content from the models to clients with low latency. A user may pause a video, step into a scene, and interactively change viewing positions and angles in the model to move through or explore the scene. The user may resume playback of the recorded video when done exploring the scene. Thus, rather than just viewing a pre-rendered scene in a movie from a pre-determined perspective, a user may step into and explore the scene from different angles, and may wander around the scene at will within the scope of the model to discover parts of the scene that are not visible in the original video.09-17-2015
20150264416REAL-TIME RENDERING OF TARGETED VIDEO CONTENT - A real-time video targeting (RVT) system may leverage network-based computation resources and services, available 2D or 3D model data, and available viewer information to dynamically personalize content of, or add personalized content to, video for particular viewers or viewer groups. When playing back pre-recorded video to viewers, at least some objects or other content in at least some of the scenes of the video may be replaced with objects or content targeted at particular viewers or groups according to profiles or preferences of the viewers or groups. Since the video is being rendered and streamed to different viewers or groups in real-time by the network-based computation resources and services, any given scene of a video may be modified and viewed in many different ways by different viewers or groups based on the particular viewers' or groups' profiles.09-17-2015
20150264425OBJECT DISCOVERY AND EXPLORATION IN VIDEO CONTENT - A real-time video exploration (RVE) system that allows users to pause, step into, move through, and explore 2D or 3D modeled worlds of scenes in a video. The RVE system may allow users to discover, select, explore, and manipulate objects within the modeled worlds used to generate video content. The RVE system may implement methods that allow users to view and explore in more detail the features, components, and/or accessories of selected objects that are being manipulated and explored. The RVE system may also implement methods that allow users to interact with interfaces of selected objects or interfaces of components of selected objects.09-17-2015
20150264441GENERATING NEW VIDEO CONTENT FROM PRE-RECORDED VIDEO - A real-time video exploration (RVE) system that allows users to pause a pre-recorded video (e.g., a movie) and change viewing positions and angles of one or more scenes. The RVE system may also allow users to select, manipulate, and modify objects within one or more scenes. The RVE system may render new video of the scenes and stream the new video to the user's client device. Using the RVE system, a user may create modified versions of one or more scenes to replace original scenes in a video to thus create a modified version of the video. The RVE system may allow the user to record the modified version of the video, and may allow the user to share the modified version of the video with other viewers.09-17-2015

Nancy Jane George, Seattle, WA US

Patent application numberDescriptionPublished
20150260592Method and Apparatus for Measuring a Preload of a Fastener - A method and apparatus for measuring a preload of a fastener. The method, which may be practiced at least in part by the apparatus, includes establishing an initial value associated with an absence of the preload of the fastener and providing an adapter and a transducer rotatably coupled to the adapter. The transducer may be positioned in contact with the fastener. The transducer is caused to direct an incident ultrasonic wave to the fastener and to receive a reflected ultrasonic wave from the fastener. Data associated with the incident ultrasonic wave and the reflected sonic wave is used to generate a modified value associated with the preload of the fastener, and the preload of the fastener is calculated based on a difference between the initial value and the modified value.09-17-2015

Nikhil J. George, Redmond, WA US

Patent application numberDescriptionPublished
20110245623Medical Diagnosis Using Community Information - A computer includes one or more processors; and logic coupled to the one or more processors and comprising one or more stored sequences of instructions which, when executed by one or more processors, cause the one or more processors to perform: collecting first patient data, associated with at least one attribute, from a patient by one or more biometric sensors based on a first protocol; evaluating the first patient data based at least on a portion, of aggregate medical information, associated with the at least one attribute; based on the evaluating, determining a second protocol for collecting additional patient data; collecting the additional patient data by the one or more biometric sensors based on the second protocol.10-06-2011
20110245632Medical Diagnosis Using Biometric Sensor Protocols Based on Medical Examination Attributes and Monitored Data - A method comprises obtaining, by a computer, patient information associated with a patient and operator information associated with one or more biometric sensors; determining, by the computer, a protocol for obtaining patient data from the patient based on the patient information and the operator information; obtaining, by the one or more biometric sensors, the patient data from the patient based on the protocol.10-06-2011
20110246217Sampling Patient Data - In an embodiment, a computer includes one or more processors; a computer readable storage medium comprising a sequence of instructions, which when executed by the one or more processors, cause: transmitting, to a second computer over a network, a first subset of patient data; receiving, from the second computer, a command for additional data, wherein the command is based on the first subset of the patient data; identifying a second subset of the patient data based on the command; transmitting, to the second computer, the second subset of the patient data; wherein the first subset of the patient data and the second subset of the patient data were collected by one or more biometric sensors within a same medical examination session.10-06-2011
20110246876PRECISE MEASUREMENT ON A MOBILE COMPUTING DEVICE - In an embodiment, precise measurement on a mobile computing device is facilitated with a computer comprising one or more processors; a computer readable storage medium comprising a sequence of instructions, which when executed by the one or more processors, cause the one or more processors to perform displaying, in a touch-sensitive computer display unit: an image of an object; over the image, a first reticle at a first position and a second reticle at a second position that is spaced apart from the first position; a measurement value representing a linear distance between the first reticle and the second reticle with reference to the object; one or more fine positioning icons each associated with a different direction; obtaining a selection of one of the first reticle and the second reticle as a selected reticle; obtaining user input selecting one of the fine positioning icons; in response to the user input, re-displaying the selected reticle in a new position in a particular direction associated with the selected one of the fine positioning icons.10-06-2011

Panagiotis George, Lake Tapps, WA US

Patent application numberDescriptionPublished
20090130376UNIDIRECTIONAL FIBER MATERIAL AND FABRICATION METHOD - A unidirectional fiber material. An illustrative embodiment of the unidirectional fiber material includes a plurality of unidirectional reinforcing fibers, an unbound section provided along the reinforcing fibers and generally free from fill-binding material, a first bound section having a fill-binding material provided along the reinforcing fibers on a first side of the unbound section and a second bound section having a fill-binding material provided along the reinforcing fibers on a second side of the unbound section. A method of fabricating a unidirectional fiber material is also disclosed.05-21-2009
20090136734UNIDIRECTIONAL RESIN INFUSED PANELS FOR MATERIAL CHARACTERIZATION TESTING - A unidirectional resin infused panel. An illustrative embodiment of the unidirectional resin infused panel includes a plurality of laminated plies of a unidirectional fiber material each comprising a plurality of unidirectional reinforcing fibers. An unbound section is provided along the reinforcing fibers and generally free from fill-binding material. A first bound section having a fill-binding material is provided along the reinforcing fibers on a first side of the unbound section. A second bound section having a fill-binding material is provided along the reinforcing fibers on a second side of the unbound section. A cured resin is infused in the plurality of laminated plies of a unidirectional fiber material.05-28-2009

Panagiotis E. George, Lake Tapps, WA US

Patent application numberDescriptionPublished
20100006739Composite Mandrel For Autoclave Curing Applications - A composite mandrel includes a generally elongated mandrel body comprising a resilient mandrel core and an elastomeric mandrel outer layer disposed outside the mandrel core. A method for fabricating a contoured stiffened composite panel is also disclosed.01-14-2010
20100140476Method for Classifying Resins Types in Carbon Fiber Reinforced Plastic Materials Using IR Spectroscopy - In one embodiment, a method of classifying a polymer containing surface is provided including collecting one or more spectra of infrared energy reflected from the surface over a spectrum of wavelengths; performing multivariate processing at one or more wavelengths; comparing results of the multivariate processing with one or more predetermined material classification models derived from model material infrared energy spectra collected from one or more model material surfaces, the one or more model material surfaces each having a known polymer material composition; and, sorting the polymer containing surface into the proper class based on a similarity of the results of the multivariate processing at one or more wavelengths with the predetermined material classification models.06-10-2010
20140083155Compliant Layer for Matched Tool Molding of Uneven Composite Preforms - A method for consolidating a preform made of composite material. The preform and a compliant metal alloy sheet are placed between less compliant matched confronting forming/molding surfaces with the preform being sandwiched between the metal alloy sheet and a matched confronting surface. The matched confronting surfaces and compliant metal alloy sheet are heated until the preform reaches at least its consolidation temperature. During heating, force is applied so that the matched confronting surfaces exert sufficient compressive force on the preform and metal alloy sheet to cause the composite material to consolidate at the consolidation temperature. The metal alloy sheet has a tensile yield point in a range of 25-300 psi at the consolidation temperature at a strain rate of about 1% to 10% strain per minute.03-27-2014

Panagiotis Emanuel George, Lake Tapps, WA US

Patent application numberDescriptionPublished
20130118691Methods and Systems for Recycling of Laminated Materials - In an embodiment of the disclosure, there is provided a method and system for recycling a cured composite laminate material into a delaminated recyclate that maintains a fiber volume fraction and a lamina level fiber alignment substantially the same as the cured composite laminate material. The method provides a cured composite laminate material having a fiber volume fraction and a lamina level fiber alignment. The cured composite laminate material undergoes solvent soak preconditioning, liquid solvent removal, pre-heating, and rapid heating with phase change delamination of the cured composite laminate material to obtain the delaminated recyclate that maintains a fiber volume fraction and a lamina level fiber alignment substantially the same as the cured composite laminate material.05-16-2013
20140308519RECYCLING OF BROAD GOODS WITH THERMOPLASTIC STABILIZER MATERIALS - A method is disclosed for recycling broad goods material into a flaked feed material. The broad goods material includes reinforcement fibers and thermoplastic material. The recycling method includes applying heat and pressure to impregnate the reinforcement fibers at a filament level with the thermoplastic material to form an impregnated fiber material. The method also includes cooling the impregnated fiber material, and cutting the cooled impregnated fiber material into flakes to produce the flaked feed material.10-16-2014

Ron George, Kirkland, WA US

Patent application numberDescriptionPublished
20100241955ORGANIZATION AND MANIPULATION OF CONTENT ITEMS ON A TOUCH-SENSITIVE DISPLAY - Embodiments related to the manipulation of content items on a touch sensitive display are disclosed. One disclosed embodiment comprises a method for operating a graphical user interface on a computing device comprising a touch-sensitive display. The method comprises displaying a content container on the touch-sensitive display, the content container being configured to arrange one or more content items in the content container as a grouped set of content items and to allow a user to selectively move content items into and out of the content container. The method further comprises displaying an ungrouped set of content items on the touch-sensitive display outside of the content container, receiving a user input via a user interface associated with the content container, and in response to the user input, highlighting a content item in the ungrouped set of content items to form a highlighted ungrouped content item.09-23-2010

Sam George, Redmond, WA US

Patent application numberDescriptionPublished
20080210475Ink Editing Architecture - A system and process for capturing and rendering ink is described. An ink canvas object may contain none, one, or more objects or elements and may specify the z-order of the objects or elements. The ink canvas object may host a variety of objects or elements and, therefore, provide ink functionality to the objects or elements, even though the objects or elements themselves may not have ink functionality. The ink canvas object is attached to an ink editor that has an associated modifiable ink editor behavior, whereby ink specific behaviors are collected in the ink edit behavior.09-04-2008

Sam George, Kenmore, WA US

Patent application numberDescriptionPublished
20090328124ADAPTIVE VIDEO SWITCHING FOR VARIABLE NETWORK CONDITIONS - A method for video playback switching in response to changing network conditions. The method includes accessing a server to retrieve respective index files for a low bit rate version and a high bit rate version of the video file, and instantiating a low bit rate media player and a high bit rate media. Playback of the video file is begun by the high bit rate media player streaming the high bit rate version from the server. Upon an indication of impeded network conditions, a transition point is selected, wherein the transition point indicates where downloading of the high bit rate version stops and where downloading of the low bit rate version begins. The low bit rate media player is then positioned to begin playback at the transition point. Playback of the video file is then switched to the low bit rate player upon encountering the transition point.12-31-2009
20100146379ISOLATING APPLICATIONS HOSTED BY PLUG-IN CODE - Described is a technology in which one application running in a browser can host another application (e.g., an advertisement) in an isolated manner that prevents the hosted application from accessing browser data, or data of any other hosted application (including the host). The host and/or hosted application may be a browser plug-in (e.g., Microsoft® Silverlight™) application. The host application privately instantiates a hidden plug-in, with that hidden plug-in's access to browser data disabled, and loads the hosted application in the hidden plug-in. A XAML tag element may be used to identify the hosted application, along with a rendering area for the hosted application. Content from the hosted application is composited with content from the host application when rendering. The host application may provide keywords to the hosted application, such as for selecting relevant advertisements, and/or may allow the hosted application to open a browser window to display associated website content.06-10-2010
20130117792ADAPTIVE VIDEO SWITCHING FOR VARIABLE NETWORK CONDITIONS - A method for video playback switching in response to changing network conditions. The method includes accessing a server to retrieve respective index files for a low bit rate version and a high bit rate version of the video file, and instantiating a low bit rate media player and a high bit rate media. Playback of the video file is begun by the high bit rate media player streaming the high bit rate version from the server. Upon an indication of impeded network conditions, a transition point is selected, wherein the transition point indicates where downloading of the high bit rate version stops and where downloading of the low bit rate version begins. The low bit rate media player is then positioned to begin playback at the transition point. Playback of the video file is then switched to the low bit rate player upon encountering the transition point.05-09-2013

Patent applications by Sam George, Kenmore, WA US

Sam J. George, Duvall, WA US

Patent application numberDescriptionPublished
20080229186Persisting digital ink annotations as image metadata - Techniques are described for storing data about a displayed image. Image data corresponding to the displayed image is received. One or more ink annotations associated with the displayed image are received. The image data is stored to a first portion of the image file. A representation of the ink annotations are stored in a second portion of the image file.09-18-2008
20080229192Interactive image tagging - Techniques are described for performing automatic generation of one or more tags associated with an image file. One or more ink annotations for a displayed image are received. Handwriting recognition processing of the one or more ink annotations is performed. A string is generated and the string includes one or more recognized words used to form the one or more tags associated with the image file. The handwriting recognition processing and generating the string are performed in response to receiving the ink annotations.09-18-2008

Patent applications by Sam J. George, Duvall, WA US

Sam J. George, Kenmore, WA US

Patent application numberDescriptionPublished
20090282475Media Streams from Containers Processed by Hosted Code - Described is a technology by which code, such as an untrusted web application hosted in a browser, provides content through an interface for playback by an application environment, such as an application environment running in a browser plug-in. Content may be in the form of elementary video, audio and/or script streams. The content is in a container that is unpackaged by the application code, whereby the content may be packaged in any format that the application understands, and/or or come from any source from which the application can download the container. An application environment component such as a platform-level media element receives information from an application that informs the application environment that the application is to provide media stream data for playback. The application environment requests media stream data (e.g., samples) from the application, receives them as processed by the application, and provides the requested media stream data for playback.11-12-2009
20090300597APPLICATION LOADING - Extensions or additional software programs that are requested by a computer application running on an application platform are handled in an efficient manner by, among other things, regulating and tracking extensions that are downloaded. This allows the size of the application platform upon which the application is running to remain relatively small so as to mitigate strain on resources when the platform is initially deployed over a network (e.g., the Internet), thus making it easier and more likely for a user to install the application platform (and/or updates thereto). Requested extensions are subsequently added to and/or removed from the (already deployed) application platform based on, among other things, download metrics.12-03-2009
20090328066UNTRUSTED COMPONENT HOSTING - In a computing environment, one may wish to have interoperability between trusted and untrusted controls/plug-ins allowing for richer expression of content and control within a platform. This can be accomplished by allowing an untrusted plug-in to communicate with a trusted plug-in, while having the trusted plug-in exercise control over the platform. This allows for the creation of a layered secure approach of communication with a platform, thus allowing for increased application richness in untrusted third party applications.12-31-2009
20100235820HOSTED APPLICATION PLATFORM WITH EXTENSIBLE MEDIA FORMAT - A media interaction system is described herein that allows hosted applications to consume and/or produce rich media content independent of the format of the media content, while still maintaining the security of the host. The media interaction system accepts raw, uncompressed media data from a hosted application, and allows the hosted application to provide its own codec through a sandboxed API that restricts the actions the codec can perform to a set of trusted actions. Then, the application provides the uncompressed data to the system for playback. Thus, the media interaction system provides rich media content in any format that the application developer supports, and maintains the security of the user's computer system.09-16-2010
20110122070TOUCH INPUT FOR HOSTED APPLICATIONS - A multi-touch plug-in system is described herein that exposes multi-touch data for web application developers to consume in a platform independent way. The multi-touch plug-in system receives platform-specific touch data from an operating system or touch hardware, interprets the platform-specific touch data to convert the platform-specific touch data to generic touch data, and provides the generic touch data to a hosted application running within a plug-in sandbox. Often, sandboxed environments only allow identified, trusted plug-ins to execute. By managing multi-touch data within a trusted plug-in, the plug-in can ensure that hosted applications are properly restricted to well-defined behavior, while still allowing rich features such as multi-touch interaction. Thus, the multi-touch plug-in system brings rich multi-touch interaction to a web browsing environment.05-26-2011
20110161485MANAGING MULTIPLE DYNAMIC MEDIA STREAMS - A coordinated adaptive streaming system provides a level of intelligence between adaptive streaming heuristics applied to multiple multi-bitrate streams playing on a client computer at the same time. The system receives a media event that includes multiple multi-bitrate streams and plays two or more of the streams. Each stream registers with the coordinated adaptive streaming system so that the system is aware of each of the streams. The system receives a priority indication from each stream that indicates the priority of the stream relative to other streams associated with the media event. The system uses the received priority indications to make adaptive streaming decisions. Thus, the coordinated adaptive streaming system provides playback that more closely aligns with a user's priorities and provides a higher quality experience to a user viewing multiple concurrent media streams.06-30-2011
20110307623SMOOTH STREAMING CLIENT COMPONENT - A streaming abstraction system is described herein that provides application developers a client software development kit (SDK) on top of which to build smooth streaming solutions. The system reduces development time considerably and abstracts platform specific intricacies and protocol handling on the client. In addition, the streaming abstraction system makes it possible to monetize streaming content with advanced features like advertising and analytics and provides advanced capabilities like multiple camera angles, diagnostics, and error handling. In some embodiments, the streaming abstraction system provides an intermediate layer that operates between an application and an underlying client media platform. The intermediate layer manages smooth streaming protocol handling as well as interactions with the platform-specific runtime.12-15-2011
20140337433Media Streams from Containers Processed by Hosted Code - Described is a technology by which code, such as an untrusted web application hosted in a browser, provides content through an interface for playback by an application environment, such as an application environment running in a browser plug-in. Content may be in the form of elementary video, audio and/or script streams. The content is in a container that is unpackaged by the application code, whereby the content may be packaged in any format that the application understands, and/or or come from any source from which the application can download the container. An application environment component such as a platform-level media element receives information from an application that informs the application environment that the application is to provide media stream data for playback. The application environment requests media stream data (e.g., samples) from the application, receives them as processed by the application, and provides the requested media stream data for playback.11-13-2014

Patent applications by Sam J. George, Kenmore, WA US

Sarah Danger George, Vashon, WA US

Patent application numberDescriptionPublished
20130140309BEVERAGE CONTAINER CLOSURE WITH VENTING - A beverage container closure or lid adapted for closing an open end of a beverage container. The lid is couplable to the beverage container and includes a selectively openable stopper that when closed, creates a fluid-tight seal between the beverage container and the environment. The stopper may be opened by pressing a button disposed on a side of the beverage container closure. The stopper is subsequently automatically closed when the button is released. Thus, the user may open and close the beverage container closure using a single hand without the need to remove the beverage container closure from the beverage container. The beverage container closure includes an actuating lever configured to press the button when a user applies a force to the lever. By utilizing the mechanical advantage provided by the lever, a user is able to selectively open and close the stopper using a relatively low amount of force.06-06-2013
20150150395BEVERAGE CONTAINER CLOSURE WITH VENTING - A beverage container closure or lid adapted for closing an open end of a beverage container. The lid is couplable to the beverage container and includes a selectively openable stopper that when closed, creates a fluid-tight seal between the beverage container and the environment. The stopper may be opened by pressing a button disposed on a side of the beverage container closure. The stopper is subsequently automatically closed when the button is released. Thus, the user may open and close the beverage container closure using a single hand without the need to remove the beverage container closure from the beverage container. The beverage container closure includes an actuating lever configured to press the button when a user applies a force to the lever. By utilizing the mechanical advantage provided by the lever, a user is able to selectively open and close the stopper using a relatively low amount of force.06-04-2015

Sarah Danger George, Seattle, WA US

Patent application numberDescriptionPublished
20100155358TWIST LID - A lid including a positionable stopper nested inside an upper body that is nested inside a lower body. A user applies a rotational force to the upper body, which rotates about an axis of rotation relative to the lower body to translate the rotational movement of the upper body into linear movement of the stopper along the axis of rotation. The stopper is configured to move axially along the axis of rotation relative to the upper body toward and away from the vessel based upon the direction in which the upper body is rotated. When the stopper is farthest from the vessel along the axis of rotation, the stopper abuts the upper body and seals the liquid inside the vessel. When the stopper is sufficiently near the vessel, an opening is defined between the stopper and the upper body through which the contents of the vessel may exit.06-24-2010
20100302897TUMBLER WITH STIRRING ASSEMBLY - A container having a removable lid, a hollow interior for storing contents, and a stirring assembly. The stirring assembly includes a rotatable wheel mounted to an outside portion of the removable lid and a shaft extending into the hollow interior of the container. The rotatable wheel is manually rotatable about a first axis of rotation. The shaft is rotatable by the wheel. When the wheel is rotated about the first axis of rotation, the wheel rotates the shaft about a second axis of rotation. At least one paddle extends outwardly from the shaft into the hollow interior of the container and stirs or agitates the contents of the container when the rotation of the shaft about the second axis of rotation rotates the at least one paddle inside the hollow interior of the container.12-02-2010
20100314399TWIST TUMBLER - A container having an inner liner configured to store a liquid. A non-rotatable outer sleeve is non-rotatably coupled about the inner liner. At least one rotatable outer sleeve is disposed about the inner liner and configured to rotate relative to both the inner liner and the non-rotatable outer sleeve. The non-rotatable and rotatable outer sleeves each include a graphic viewable from outside the container. These graphics combine to form a composite graphic viewable from outside the container. The composite graphic may be modified by rotating the rotatable outer sleeve about the inner liner relative to the non-rotatable outer sleeve. The container includes a removable base cap upon which the rotatable outer sleeve is stacked. The base cap is removably coupled to a bottom portion of the inner liner by a locking assembly.12-16-2010

Shannon George, Spokane, WA US

Patent application numberDescriptionPublished
20080305550Targets for Detection of Ischemia - The subject application comprises methods for determining the occurrence of an ischemic event in a subject by determining an ischemia score based on the amount of at least two ischemia modified albumin markers. The ischemia modified albumin markers include complexes of fatty acids bound to albumin, albumin molecules with open Cys34 sites, albumin molecules that are products of oxidation at Cys34, albumin molecules with altered conformation or altered divalent metal binding due to the conformational change or oxidation at Cys34, and albumin molecules that have been oxidized at the N-terminus. Also included in the invention are ligands to each of the foregoing ischemia modified albumin markers. Further included are methods of determining the occurrence of an ischemic event by determining the amount of fatty acid that is complexed to albumin in a patient sample. In another embodiment, an ischemic event is determined by quantitating the relative amounts of reduced and oxidized forms of albumin Cys34. In an additional embodiment, an ischemic event is determined by observing whether a shift in albumin conformation has occurred which would reflect oxidized Cys34. Further, the invention comprises a method of determining an ischemic event by determining the amount of metal ion bound to the albumin metal ion binding sites.12-11-2008

Thaddeus George, Seattle, WA US

Patent application numberDescriptionPublished
20090003681BLOOD AND CELL ANALYSIS USING AN IMAGING FLOW CYTOMETER - Multimodal/multispectral images of a population of cells are simultaneously collected. Photometric and/or morphometric features identifiable in the images are used to separate the population of cells into a plurality of subpopulations. Where the population of cells includes diseased cells and healthy cells, the images can be separated into a healthy subpopulation, and a diseased subpopulation. Where the population of cells does not include diseased cells, one or more ratios of different cell types in patients not having a disease condition can be compared to the corresponding ratios in patients having the disease condition, enabling the disease condition to be detected. For example, blood cells can be separated into different types based on their images, and an increase in the number of lymphocytes, a phenomenon associated with chronic lymphocytic leukemia, can readily be detected.01-01-2009
20090190822BLOOD AND CELL ANALYSIS USING AN IMAGING FLOW CYTOMETER - Multimodal/multispectral images of a population of cells are simultaneously collected. Photometric and/or morphometric features identifiable in the images are used to separate the population of cells into a plurality of subpopulations. Where the population of cells includes diseased cells and healthy cells, the images can be separated into a healthy subpopulation, and a diseased subpopulation. Where the population of cells does not include diseased cells, one or more ratios of different cell types in patients not having a disease condition can be compared to the corresponding ratios in patients having the disease condition, enabling the disease condition to be detected. For example, blood cells can be separated into different types based on their images, and an increase in the number of lymphocytes, a phenomenon associated with chronic lymphocytic leukemia, can readily be detected.07-30-2009
20100021039BLOOD AND CELL ANALYSIS USING AN IMAGING FLOW CYTOMETER - Multimodal/multispectral images of a population of cells are simultaneously collected. Photometric and/or morphometric features identifiable in the images are used to separate the population of cells into a plurality of subpopulations. Where the population of cells includes diseased cells and healthy cells, the images can be separated into a healthy subpopulation, and a diseased subpopulation. Where the population of cells does not include diseased cells, one or more ratios of different cell types in patients not having a disease condition can be compared to the corresponding ratios in patients having the disease condition, enabling the disease condition to be detected. For example, blood cells can be separated into different types based on their images, and an increase in the number of lymphocytes, a phenomenon associated with chronic lymphocytic leukemia, can readily be detected.01-28-2010
20100232675BLOOD AND CELL ANALYSIS USING AN IMAGING FLOW CYTOMETER - Multimodal or multispectral images of cells comprising a population of cells are simultaneously collected. Photometric and/or morphometric image features identifiable in the images are used to identify differences between first and second populations of cells. The differences can include changes in a relative percentage of different cell types in each population, or a change in a first type of cell present in the first population of cells and the same type of cell in the second population of cells. The changes may be indicative of a disease state, indicative of a relative effectiveness of a therapy, or indicative of a health of the person from whom the cells populations were obtained.09-16-2010

Patent applications by Thaddeus George, Seattle, WA US

Thaddeus C. George, Seattle, WA US

Patent application numberDescriptionPublished
20080240539Method For Imaging And Differential Analysis Of Cells - Provided are methods for determining and analyzing photometric and morphogenic features of small objects, such as cells to, for example, identify different cell states. In particularly, methods are provided for identifying apoptotic cells, and for distinguishing between cells undergoing apoptosis versus necrosis.10-02-2008
20090202130Image based quantitation of molecular translocation - The use of an imaging system, cell compartment markers, and molecular markers in methods for correlating the movement of molecules within a cell to a particular compartment are provided, including measuring and correlating molecule movement in adherent and non-adherent cells.08-13-2009
20110280467METHOD FOR IMAGING AND DIFFERENTIAL ANALYSIS OF CELLS - Provided are methods for determining and analyzing photometric and morphogenic features of small objects, such as cells to, for example, identify different cell states. In particularly, methods are provided for identifying apoptotic cells, and for distinguishing between cells undergoing apoptosis versus necrosis.11-17-2011
20120100532METHOD FOR IMAGING AND DIFFERENTIAL ANALYSIS OF CELLS - Provided are methods for determining and analyzing photometric and morphometric features of small objects, such as cells to, for example, identify different cell states. In particularly, methods are provided for identifying apoptotic cells, and for distinguishing between cells undergoing apoptosis versus necrosis.04-26-2012
20120244550IMAGE-BASED QUANTITATION OF MOLECULAR TRANSLOCATION - The use of an imaging system, cell compartment markers, and molecular markers in methods for correlating the movement of molecules within a cell to a particular compartment are provided, including measuring and correlating molecule movement in adherent and non-adherent cells.09-27-2012
20120328177Method for Imaging and Differential Analysis of Cells - Provided are methods for determining and analyzing photometric and morphometric features of small objects, such as cells to, for example, identify different cell states. In particularly, methods are provided for identifying apoptotic cells, and for distinguishing between cells undergoing apoptosis versus necrosis.12-27-2012
20130201317BLOOD AND CELL ANALYSIS USING AN IMAGING FLOW CYTOMETER - Multimodal or multispectral images of cells comprising a population of cells are simultaneously collected. Photometric and/or morphometric image features identifiable in the images are used to identify differences between first and second populations of cells. The differences can include changes in a relative percentage of different cell types in each population, or a change in a first type of cell present in the first population of cells and the same type of cell in the second population of cells. The changes may be indicative of a disease state, indicative of a relative effectiveness of a therapy, or indicative of a health of the person from whom the cells populations were obtained.08-08-2013
20130202183METHOD FOR IMAGING AND DIFFERENTIAL ANALYSIS OF CELLS - Provided are methods for determining and analyzing photometric and morphometric features of small objects, such as cells to, for example, identify different cell states. In particularly, methods are provided for identifying apoptotic cells, and for distinguishing between cells undergoing apoptosis versus necrosis.08-08-2013
20130251234METHOD FOR IMAGING AND DIFFERENTIAL ANALYSIS OF CELLS - Provided are methods for determining and analyzing photometric and morphometric features of small objects, such as cells to, for example, identify different cell states. In particularly, methods are provided for identifying apoptotic cells, and for distinguishing between cells undergoing apoptosis versus necrosis.09-26-2013

Patent applications by Thaddeus C. George, Seattle, WA US

Timothy A. George, Renton, WA US

Patent application numberDescriptionPublished
20110146046METHOD AND APPARATUS FOR REMOVING AND REPLACING COMPONENTS OF AN AIRPLANE - Systems and methods are provided for shoring an airplane in order to facilitate the replacement of one or more airplane parts, such as an airplane's upper skin panels, lower skin panels, and/or window assemblies.06-23-2011
Website © 2015 Advameg, Inc.