Patent application number | Description | Published |
20110094150 | COAL ENHANCEMENT PROCESS - The present process produces a clean burning coal from low grade coal and has a higher heating value per unit mass, as compared to the feed stock coal. The clean coal may be used in coal-fired power plants, industrial boilers, and homes since it produces fewer or none of the emissions commonly associated with coal burning devices. The process treats coal prior to its combustion and removes about 90 percent of the pollutants. These pollutants are removed within 6 to 18 minutes, many of which may be recycled into products such as roofing tar, chemical feed stocks, and light hydrocarbons that can be used as gaseous fuels. The final product is suitable for use in homes where coal is used for cooking and heating, and significantly improves the health of those who have previously been exposed to toxic fumes from burning uncleaned coal in their homes. The process is fueled by its own by-products, recycles heat, and reduces coal weight to save energy in transporting it to the user. | 04-28-2011 |
20140047764 | COAL ENHANCEMENT PROCESS - The present process produces a clean burning coal from low grade coal and has a higher heating value per unit mass, as compared to the feed stock coal. The clean coal may be used in coal-fired power plants, industrial boilers, and homes since it produces fewer or none of the emissions commonly associated with coal burning devices. The process treats coal prior to its combustion and removes about 90 percent of the pollutants. These pollutants are removed within 6 to 18 minutes, many of which may be recycled into products such as roofing tar, chemical feed stocks, and light hydrocarbons that can be used as gaseous fuels. The final product is suitable for use in homes where coal is used for cooking and heating, and significantly improves the health of those who have previously been exposed to toxic fumes from burning uncleaned coal in their homes. The process is fueled by its own by-products, recycles heat, and reduces coal weight to save energy in transporting it to the user. | 02-20-2014 |
20140250777 | COAL ENHANCEMENT PROCESS - The present process produces a clean burning coal from low grade coal and has a higher heating value per unit mass, as compared to the feed stock coal. The clean coal may be used in coal-fired power plants, industrial boilers, and homes since it produces fewer or none of the emissions commonly associated with coal burning devices. The process treats coal prior to its combustion and removes about 90 percent of the pollutants. These pollutants are removed within 6 to 18 minutes, many of which may be recycled into products such as roofing tar, chemical feed stocks, and light hydrocarbons that can be used as gaseous fuels. The final product is suitable for use in homes where coal is used for cooking and heating, and significantly improves the health of those who have previously been exposed to toxic fumes from burning uncleaned coal in their homes. The process is fueled by its own by-products, recycles heat, and reduces coal weight to save energy in transporting it to the user. | 09-11-2014 |
Patent application number | Description | Published |
20090165772 | High efficiency combustion stove - The invention is a stove that is portable, has a double walled external structure for the passage of air used in combustion of the fuel, which air also maintains the external surface at a cool enough temperature that it can be touched, and which air flow prevents the waste of heat laterally to the ambient air from a hot outer surface. This increases cooking efficiency, because almost all heat that reaches the air flow between the two walls is drawn right into the combustion chamber in the form of preheated air by reason of the chimney effect. Thus almost no heat can escape the outside wall except by reaching the cooking pot bottom and pot sides after passing out the cover vents as exhaust. The stove is preferably powered with coal, and uses about half as much coal as a conventional coal fired stove resulting from cooking efficiency. | 07-02-2009 |
20110099893 | Treatment of coal - Process for treating coal to enhance its rank, wherein the temperature of the material is gradually increased in a controlled set of atmospheres, to allow for the reduction of surface and inherent moisture and the controlled reduction of volatile matter while maintaining the coal's natural structural integrity. The process reduces the time, capitalization, and production costs required to produce coal of enhanced rank, thus substantially increasing the cost effectiveness and production rate over prior processes. | 05-05-2011 |
20120060819 | High Efficiency Combustion Stove - The invention is a stove system that is portable, has a double walled external structure for the passage of air used in combustion of the fuel, which air also maintains the external surface at a cool enough temperature that it can be touched, and which air flow prevents the waste of heat laterally to the ambient air from a hot outer surface. This increases cooking efficiency, because almost all heat that reaches the air flow between the two walls is drawn right into the combustion chamber in the form of preheated air by reason of the chimney effect. Thus almost no heat can escape the outside wall except by reaching the cooking pot bottom and pot sides after passing out the cover vents as exhaust. An internal heat concentrator ring improves the overall efficiency of the burner. The stove is preferably powered with coal, and uses about half as much coal as a conventional coal fired stove resulting from cooking efficiency. Provision is made for generation of electrical energy from the excess stove heat. Additionally, special thermally designed cook pots add to the stove system to decrease food cooking time while reducing the fuel required. | 03-15-2012 |
Patent application number | Description | Published |
20120260101 | ENCRYPTION OF MEMORY DEVICE WITH WEAR LEVELING - Methods, systems, and apparatus, including computer programs encoded on a computer storage medium, for encryption of a memory device with wear leveling. In one aspect, a method includes accessing an address map of the memory device, the address map referencing first memory locations and second memory locations of the memory device, wherein the first memory locations store data that are to be encrypted by a full disk encryption operation on the memory device; designating the second memory locations as being encrypted without performing an encryption operation on the second memory locations; and encrypting only the data stored in the first memory locations of the memory device so that the data of the first memory locations and the second memory locations are designated as being disk encrypted. | 10-11-2012 |
20120290822 | System and Method for Shared Data Storage - Systems and methods for sharing data storage on an electronic device are disclosed. A system may include a memory and a processor, an operating system executing on the electronic device, a preboot application executing on the electronic device, and a virtual drive. The operating system may be configured to mount the virtual drive and the preboot application may also be configured to mount the virtual drive. | 11-15-2012 |
20130124644 | REPUTATION SERVICES FOR A SOCIAL MEDIA IDENTITY - Reputation services can determine a “reputation” to associate with a Social Media Identity. For example, a social media identity may develop a trustworthy or an untrustworthy reputation. An untrustworthy reputation can be attained if a user (i.e., identity) posts content similar to email spam messages or links to inappropriate content. Inappropriate content can include illegal copies of material (e.g., violation of copyright) or malicious content among other types. Reputation can be used to inform other users of the potential “quality” of that identity's posts or to filter posts from a particular identity so as not to “bother” other users. An identity's reputation could also be calculated across a plurality of Social Media sites when identifying information from each site can be related to a real world entity. Individual users could set their own filtering options to enhance and refine their own experience on Social Media sites. | 05-16-2013 |
20130271272 | SYSTEM, METHOD, AND COMPUTER PROGRAM PRODUCT FOR A PRE-DEACTIVATION GRACE PERIOD - A system, method, and computer program product are provided for a pre-deactivation grace period. In operation, a deactivation request is detected for a deactivation event. Further, the commencement of the deactivation event is delayed for a predetermined time period, in response to the deactivation request. Additionally, the deactivation event is commenced, after the predetermined time period. | 10-17-2013 |
20140108590 | EFFICIENT SHARED IMAGE DEPLOYMENT - Technologies for distribution of a shared image include determining results of a first hash operation applied to a plurality of elements of an image of a software installation, determining results of the first hash operation applied to the plurality of contents of a client, comparing results of the first hash operation applied to the plurality of elements of the image with the results of the first hash operation applied to the plurality of contents of the client, determining that one or more of the plurality of elements of the image are unavailable on the client based on the comparison of the results of the first hash operation applied to the plurality of elements of the image with the results of the first hash operation applied to the plurality of contents of the client, and causing the transmission of the elements to the client. | 04-17-2014 |
20140181216 | Just-In-Time, Email Embedded URL Reputation Determination - A system allows just-in-time checking of information about an email in which a hyperlink is embedded. Upon receipt of the email containing the hyperlink, the resource locator of the hyperlink is modified to allow checking the reputation of the email upon traversal of the hyperlink. At traversal of the hyperlink, the current reputation of the resource locator and the current reputation of the email are both determined, and one or more actions are performed responsive to the determination. | 06-26-2014 |
20140181998 | AUTOMATIC SANITIZATION OF DATA ON A MOBILE DEVICE IN A NETWORK ENVIRONMENT - A method is provided in one example embodiment and includes establishing a network connection to a central security system in a central network, receiving a message from the central security system, activating a grace window based on the message, and determining whether the grace window has expired. The method further includes deleting, when the grace window expires, one or more objects from the mobile device based on a sanitization policy. In specific embodiments, the network connection is terminated before the grace window expires, and the grace window expires unless the mobile device establishes another network connection with the central security system. In further embodiments, the method includes receiving the sanitization policy from the central security system. The sanitization policy identifies the one or more objects to be deleted from the mobile device when the grace window expires. | 06-26-2014 |
20140189859 | HERD BASED SCAN AVOIDANCE SYSTEM IN A NETWORK ENVIRONMENT - A method in one example embodiment includes generating a signature for an object in a compute node in a network, searching a memory element for the signature, and responsive to determining the memory element does not contain the signature, scanning the object. The method also includes updating the memory element with a scan result, and synchronizing the memory element of the compute node with one or more memory elements of one or more other compute nodes in the network. In specific embodiments, the scan result includes the signature of the object and a threat level of the object. In further embodiments, the synchronizing includes sending the scan result to one or more other compute nodes in the network. In more specific embodiments, the scan result is sent with one or more other scan results after a predetermined interval of time from a previous synchronization. | 07-03-2014 |
20140281492 | Prevention of Forgery of Web Requests to a Server - Technologies for prevention of forgery of a network communication request to a server include a system for security of a network communication request. The system includes a communication module configured to receive the network communication request from a client. The network communication request may have a content parameter. The communication module may be configured to generate a string of content parameters comprising the content parameters and a hash of the content parameter, and communicate portions of a result of the network communication request to the client incorporating the encrypted string of content parameters. Furthermore, the communication module may receive a subsequent request from the client. The subsequent request may be associated with the network communication request. As a result of authenticating the subsequent request, the communication module may complete the network communication request. | 09-18-2014 |
20140283003 | Self-Configuring Local Area Network Security - Technologies for providing electronic security to a first network are disclosed. The system may include a user equipment, a gateway device configured to mediate communication between a first network and a second network for the user equipment, and an electronic security device communicatively coupled to the gateway device. The electronic security device may include a gateway interface module configured to assume an identity associated with the gateway device, a network interface module configured to present the identity to the second network, and a traffic inspection module configured to monitor traffic without substantially affecting a topology of the first network, wherein the electronic security device is configured to identify undesirable traffic; and implement a security policy. | 09-18-2014 |
20140317676 | UTILIZING A SOCIAL GRAPH FOR NETWORK ACCESS AND ADMISSION CONTROL - Technologies for providing access control for a network are disclosed. The method may include receiving a request from a user to access a network, receiving a plurality of data associated with the user, the plurality of data comprising a plurality of social data associated with the user's relationship to a social circle, identifying an electronic security policy based at least on the plurality of social data, and authenticating the user to the network if the electronic security policy permits authentication based at least on the plurality of social data. | 10-23-2014 |
20150180997 | HERD BASED SCAN AVOIDANCE SYSTEM IN A NETWORK ENVIRONMENT - A method in one example embodiment includes generating a signature for an object in a compute node in a network, searching a memory element for the signature, and responsive to determining the memory element does not contain the signature, scanning the object. The method also includes updating the memory element with a scan result, and synchronizing the memory element of the compute node with one or more memory elements of one or more other compute nodes in the network. In specific embodiments, the scan result includes the signature of the object and a threat level of the object. In further embodiments, the synchronizing includes sending the scan result to one or more other compute nodes in the network. In more specific embodiments, the scan result is sent with one or more other scan results after a predetermined interval of time from a previous synchronization. | 06-25-2015 |
20150381662 | SOCIAL-GRAPH AWARE POLICY SUGGESTION ENGINE - Systems, devices and methods are disclosed to assist in configuring devices and policies to protect a regional network (e.g., home network) and its users. Users on the network are monitored to determine appropriate configuration settings and preferences by utilizing a combination of internally configured information and externally gathered information for each user. For example, externally gathered information may include information obtained about a user from one or more social media Internet sites. Automatically obtained information may be used to provide or augment policy information such that a user's preference relative to internet content (e.g., content blocking software configuration) may be achieved without requiring an administrator to individually prepare each users security profile and configuration. | 12-31-2015 |