Gillon
Bronwyn Hilary Gillon, Calgary CA
Patent application number | Description | Published |
---|---|---|
20160060425 | RECYCLABLE, GREASE RESISTANT PACKAGING - Grease resistant packaging is prepared from a high density polyethylene (HDPE) composition that contains a nucleating agent. Outstanding results are observed when the nucleated HDPE composition is included in an internal layer of a multilayer packaging structure. The use of HDPE that is prepared with a chromium or titanium (especially titanium) containing catalyst is preferred. The packaging may be in the form of a monolayer film, a multilayer film, a sheet or a molded part. | 03-03-2016 |
Bronwyn Hilary Gillon, Burnaby CA
Patent application number | Description | Published |
---|---|---|
20150070743 | SWITCHING MATERIALS, AND COMPOSITIONS AND METHODS FOR MAKING SAME - A switching material comprising one or more than one polymers and an electrolyte comprising a salt and a solvent portion comprising one or more solvents; and one or more compounds having electrochromic and photochromic properties dispersed homogeneously through the switching material; and wherein the switching material is transitionable from a light state to a dark state on exposure to UV light and from a dark state to a light state with application of an electric voltage. | 03-12-2015 |
James David Gillon, Kannapolis, NC US
Patent application number | Description | Published |
---|---|---|
20090218164 | DOUBLE THROAT PULSATION DAMPENER FOR A COMPRESSOR - A method of attenuating fluid dynamic pulsations that propagate through a flow of fluid at a convective velocity of the fluid, the pulsations having an organized vortical structure includes directing the flow to a pulsation dampener inlet having a first area and transitioning the organized vortical structure to a small-scale turbulent structure by squeezing the vorticies by passing the flow of fluid through a passage having a second area that is smaller than the first area, then rapidly expanding the flow of fluid by passing it into a chamber having a third area measured at an inlet of the chamber that is substantially larger than the second area. The method also includes discharging the flow of fluid from the chamber. The flow of fluid includes substantially attenuated fluid dynamic pulsations and acoustic pulsations that travel through the flow of fluid at the speed of sound. | 09-03-2009 |
James T. Gillon, Round Rock, TX US
Patent application number | Description | Published |
---|---|---|
20140344886 | Sensor Aware Security Policies with Embedded Controller Hardened Enforcement - An information handling system (IHS) performs security policy enforcement using security policy data maintained in an embedded controller, which operates within a privileged environment. The security policy data identifies security policies established for the IHS. The EC is directly connected to a number of sensors from which the EC receives sensor data and to at least one integrated functional device. The EC determines whether the received sensor data fulfills any trigger condition of a security policy. If the received sensor data does not fulfill any trigger condition of a security policy described by the security policy data, the EC continues to monitor sensors for updated sensor data. However, if the received sensor data fulfills any trigger condition of the security policy, the EC performs a security measure that involves enabling, disabling, or resetting one or more of the at least one integrated functional devices that can be disabled. | 11-20-2014 |
20140344921 | Apparatus and Method for Enabling Fingerprint-Based Secure Access to a User-Authenticated Operational State of an Information Handling System - A computer-implemented method provides power to a fingerprint reader while the remaining components of the information handling system are held in a low power, non-operating state. Placement of a finger across the fingerprint reader is detected with the information handling system in the non-operating state. A fingerprint is read and a corresponding fingerprint image is generated. The fingerprint image is buffered and an embedded controller is triggered to start an authentication device having a secure storage. The fingerprint image is compared to a fingerprint template contained in the secure storage. In response to the fingerprint image matching the fingerprint template, the authentication device signals the embedded controller to activate a user authenticated wake-up cycle to provide power to the other components of the information handling system such that the information handling system activates an operating system and enters a fully powered and user authenticated, operational state. | 11-20-2014 |
20150222669 | SENSOR AWARE SECURITY POLICIES WITH EMBEDDED CONTROLLER HARDENED ENFORCEMENT - An information handling system (IHS) performs security policy enforcement using security policy data maintained in an embedded controller, which operates within a privileged environment. The security policy data identifies security policies established for the IHS. The EC is directly connected to a number of sensors from which the EC receives sensor data and to at least one integrated functional device. The EC determines whether the received sensor data fulfills any trigger condition of a security policy. If the received sensor data does not fulfill any trigger condition of a security policy described by the security policy data, the EC continues to monitor sensors for updated sensor data. However, if the received sensor data fulfills any trigger condition of the security policy, the EC performs a security measure that involves enabling, disabling, or resetting one or more of the at least one integrated functional devices that can be disabled. | 08-06-2015 |
20160036767 | UEFI AND OPERATING SYSTEM DRIVER METHODS FOR UPDATING MAC ADDRESS IN LAN-BASED NIC - An information handling system (IHS) unambiguously addresses networked devices connected by a local area network (LAN) based network interface controller (NIC) by detecting a device descriptor of LAN-based NIC, determining that the device descriptor indicates a capability for assigning a reserve media access control (MAC) address to the networked device, writing the reserve MAC address in the LAN-based NIC of the networked device, and associating the reserve MAC address with the networked device in an inventory data structure for the IHS. | 02-04-2016 |
20160085951 | APPARATUS AND METHOD FOR ENABLING FINGERPRINT-BASED SECURE ACCESS TO A USER-AUTHENTICATED OPERATIONAL STATE OF AN INFORMATION HANDLING SYSTEM - A computer-implemented method provides power to a fingerprint reader while the remaining components of the information handling system are held in a low power, non-operating state. Placement of a finger across the fingerprint reader is detected with the information handling system in the non-operating state. A fingerprint is read and a corresponding fingerprint image is generated. The fingerprint image is buffered and an embedded controller is triggered to start an authentication device having a secure storage. The fingerprint image is compared to a fingerprint template contained in the secure storage. In response to the fingerprint image matching the fingerprint template, the authentication device signals the embedded controller to activate a user authenticated wake-up cycle to provide power to the other components of the information handling system such that the information handling system activates an operating system and enters a fully powered and user authenticated, operational state. | 03-24-2016 |
Jean-Yves Gillon, Collonge Sous Saleve FR
Patent application number | Description | Published |
---|---|---|
20080227833 | OXA- AND THIADIAZOLES AND THEIR USE AS METALLOPROTEINASE INHIBITORS - Compounds formula (IA) or (IB), wherein W represents HO(C═O)—, HONH(C═O)— or H(C═O)N(OH)—; X represents —O— or —S—; and R | 09-18-2008 |
20100035943 | Oxa-and thiadiazoles and their use as metalloproteinase inhibitors - Compounds formula (IA) or (IB), wherein W represents HO(C═O)—, HONH(C═O)— or H(C═O)N(OH)—; X represents —O— or —S—; and R | 02-11-2010 |
20110086893 | OXA- AND THIADIAZOLES AND THEIR USE AS METALLOPROTEINASE INHIBITORS - Compounds formula (IA) or (IB), wherein W represents HO(C═O)—, HONH(C═O)— or H(C═O)N(OH)—; X represents —O— or —S—; and R | 04-14-2011 |
Pascale Gillon, Olivet FR
Patent application number | Description | Published |
---|---|---|
20090301610 | Process for depositing a thin film of metal alloy on a substrate and metal alloy in thin-film form - The present invention relates to a process for depositing a thin film of a metal alloy on a substrate, said film comprising at least four components and said alloy being either: an amorphous alloy containing 50 at % of the elements Ti and Zr, or a high-entropy alloy, the elements of which are chosen from the group consisting of Al, Co, Cr, Cu, Fe, Ni, Si, Mn, Mo, V, Zr and Ti; by simultaneous magnetron sputtering of at least two targets. The present invention also relates to a metal alloy in the form of a thin film comprising at least four components, which can be deposited on a substrate by implementing the process. | 12-10-2009 |
Véronique Gillon, Essey-Les-Nancy FR
Patent application number | Description | Published |
---|---|---|
20100273717 | Use of an Extract from the Vigna Aconitifolia Plant in a Cosmetic and/or Dermopharmaceutical Composition - An active composition for treating skin having a protein-containing extract from a | 10-28-2010 |
20120129784 | Oligopeptides And Cosmetic Compositions Containing The Oligopeptides - Oligopeptides according to formula (I) and/or (II), R | 05-24-2012 |
Véronique Gillon, Essey-Les-Nancy FR
Patent application number | Description | Published |
---|---|---|
20090075906 | OLIGOPEPTIDES AND COMPOSITIONS CONTAINING THE OLIGOPEPTIDES - Oligopeptides according to formula (I) and/or (II), R | 03-19-2009 |
20090110651 | Cosmetic Composition Comprising A Combination of a Sugar Fatty Acid Ester with a Plant Extract of Waltheria Indica or Pisum Sativum for Skin Whitening - The invention is directed to a skin-whitening active comprising at least one sugar fatty acid ester and at least one plant extract selected from the group consisting of extracts of | 04-30-2009 |
20100273717 | Use of an Extract from the Vigna Aconitifolia Plant in a Cosmetic and/or Dermopharmaceutical Composition - An active composition for treating skin having a protein-containing extract from a | 10-28-2010 |
William M. Gillon, Daly City, CA US
Patent application number | Description | Published |
---|---|---|
20090147953 | System and method for conditional access key encryption - A system for processing multimedia channels is described comprising: transmitting decryption keys for decrypting the multimedia channels, the keys encrypted in both a first encryption format and a second encryption format; the keys encrypted in the first encryption format being decryptable by a first type of multimedia receiver; and the keys encrypted in the second encryption format being decryptable by a second type of multimedia receiver. | 06-11-2009 |
William M. Gillon, San Mateo, CA US
Patent application number | Description | Published |
---|---|---|
20150244761 | COMMUNICATING CONTROL INFORMATION WITHIN A REAL-TIME STREAM - Providing control information is disclosed. A real-time streaming communication channel is established with a communication party using a real-time streaming protocol. It is determined that control information is to be provided to the communication party. The control information is encapsulated using the real-time streaming protocol. The encapsulated control information is marked as including control information content. Streaming content is provided to the communication party via the real-time streaming communication channel using the real-time streaming protocol. The marked encapsulated control information is provided via the real-time streaming communication channel. | 08-27-2015 |
20150339912 | Security Monitoring and Control - Systems, methods, and software for monitoring and controlling a security system for a structure are provided herein. An exemplary method may include receiving sensor data from at least one first peripheral, the sensor data associated with at least one of activity inside and activity outside of a structure; determining a critical event based in part on the sensor data; creating an alert based in part on the critical event; getting user preferences associated with at least one of a user and a base unit; determining a response based in part on the alert and user preferences; and activating at least one of a second peripheral and a service based in part on the response. | 11-26-2015 |