Patent application number | Description | Published |
20150265107 | AUTOMATIC HEATED FLUID DISPENSER - A dispenser includes a housing, an aperture, a receptacle, a heating element, and an actuator. When a reservoir is received within the receptacle, an outlet port of the reservoir is exposed through the aperture. The heating element heats fluid housed within the reservoir. The actuator provides a dispensing force that induces a flow of the heated fluid. In some embodiments, the heater is an inductive heater. In other embodiments, the heater is a resistive heater. The dispenser dispenses the fluid through the aperture. Another embodiment of a dispenser may include a housing, an aperture, a receptacle within the housing, an actuator configured to receive a fluid reservoir, and a power source. The power source provides power to the actuator. The power source includes an alternating current source. | 09-24-2015 |
20150273513 | INDUCTIVELY HEATABLE FLUID RESERVOIR - A fluid reservoir includes a reservoir body, a heating structure, a piston, and an outlet port. The reservoir body includes a cross section, and a translation axis. The cross section is uniform along the translation axis. When fluid is housed in the reservoir, the heating structure is thermally coupled to the fluid. The heating structure energizes the fluid housed in the reservoir. The piston translates along the translation axis. An available volume of the reservoir to house the fluid is defined by a distance between the piston and an end of the reservoir body. When the piston is translated along the translation axis toward the end, a volume of the fluid that has been energized by the heating structure flows from the reservoir and through the outlet port. The volume of energized fluid is linearly proportional to a length of the translation of the piston. | 10-01-2015 |
Patent application number | Description | Published |
20080282350 | Trusted Operating Environment for Malware Detection - Techniques and apparatuses for scanning a computing device for malware are described. In one implementation, a trusted operating environment, which includes a trusted operating system and a trusted antivirus tool, is embodied on a removable data storage medium. A computing device is then booted from the removable data storage medium using the trusted operating system. The trusted antivirus tool searches the computing device for malware definition updates (e.g., virus signature updates) and uses the trusted operating system to scan the computing device for malware. In another implementation, a computing device is booting from a trusted operating system on a removable device and a trusted antivirus tool on the removable device scans the computing device for malware. The removable device can update its own internal components (e.g., virus signatures and antivirus tool) by searching the computing device or a remote resource for updates and authenticating any updates that are located. | 11-13-2008 |
20080282351 | Trusted Operating Environment for Malware Detection - Techniques and apparatuses for scanning a computing device for malware are described. In one implementation, a trusted operating environment, which includes a trusted operating system and a trusted antivirus tool, is embodied on a removable data storage medium. A computing device is then booted from the removable data storage medium using the trusted operating system. The trusted antivirus tool searches the computing device for malware definition updates (e.g., virus signature updates) and uses the trusted operating system to scan the computing device for malware. In another implementation, a computing device is booting from a trusted operating system on a removable device and a trusted antivirus tool on the removable device scans the computing device for malware. The removable device can update its own internal components (e.g., virus signatures and antivirus tool) by searching the computing device or a remote resource for updates and authenticating any updates that are located. | 11-13-2008 |
20080303689 | Accessible Content Reputation Lookup - Implementations of accessible content reputation lookup are described. In one implementation, before a user activates a link in a document, such as a hyperlink on a webpage, the user can designate the link. For example, the user can float a cursor over the link or interact with an icon placed proximate to the link. By designating the link, the user can request reputation information associated with the link, including information as to whether or not content associated with the link, an application used to access the content, and/or source(s) on which the content resides, are known to be dangerous or risky. If the reputation information indicates that the link is safe to activate, the user can activate the link and access the content. Alternately, if the reputation information indicates that the link is unsafe to access, the user can choose to forego activation of the link. | 12-11-2008 |
20090217370 | SAFE FILE TRANSMISSION AND REPUTATION LOOKUP - Safe file transmission and reputation lookup. As a part of the safe file transmission and reputation lookup methodology, a data file that is to be made available to a data file receiver is accessed and it is determined whether the data file needs to be provided a protective file. The data file is wrapped in a protective file to create a non-executing package file. Access is provided to the non-executing package file where the associated data file is prevented from being executed until data file reputation information is received. | 08-27-2009 |
20100162357 | IMAGE-BASED HUMAN INTERACTIVE PROOFS - This document describes image-based human interactive proofs (HIPs). In some cases these proofs may be used when a browser at a client is used to access resources from a web server. Before access to the resources is enabled, the client can be challenged by the web server with an image-based puzzle. The image-based puzzle is configured to enable distinctions to be made between human input and non-human input. Input to answer the image-based puzzle can be formed via the client and communicated to the web server. The web server receives the input from the client and selectively enables client access to the resources based upon the input. In at least some embodiments, the web server can make use of a community database that stores client answers to image-based puzzles to assist in distinguishing between human input and non-human input. | 06-24-2010 |
20110078796 | Trusted Operating Environment For Malware Detection - Described herein are techniques and apparatuses for scanning a computing device for malware and/or viruses. In various embodiments, a trusted operating environment, which may include a trusted operating system and/or a trusted antivirus tool, may be utilized with respect to a computing device. More particularly, the trusted operating system may be used to boot the computing device. Moreover, the trusted antivirus tool may search the computing device for malware definition updates (e.g., virus signature updates) and use the trusted operating system to scan the computing device for malware. In other embodiments, the trusted antivirus tool may scan the computing device and remove any viruses detected by the trusted antivirus tool. The trusted operating system may then reboot the computing device into a clean environment once any detected viruses are removed. | 03-31-2011 |
20110145435 | Reputation Based Redirection Service - A reputation based redirection service is usable to build URL wrappers for un-trusted and unknown URLs. Such URL wrappers can be used to protect Web users by, for example, redirecting traffic to interstitial Web pages. Additionally, reputation decisions can be made by the service to further protect users from malicious URLs. | 06-16-2011 |
20110167328 | ACCESSIBLE CONTENT REPUTATION LOOKUP - Implementations of accessible content reputation lookup are described. In one implementation, before a user activates a link in a document, such as a hyperlink on a webpage, the user can designate the link. For example, the user can float a cursor over the link or interact with an icon placed proximate to the link. By designating the link, the user can request reputation information associated with the link, including information as to whether or not content associated with the link, an application used to access the content, and/or source(s) on which the content resides, are known to be dangerous or risky. If the reputation information indicates that the link is safe to activate, the user can activate the link and access the content. Alternately, if the reputation information indicates that the link is unsafe to access, the user can choose to forego activation of the link. | 07-07-2011 |
20110214186 | TRUSTED OPERATING ENVIRONMENT FOR MALWARE DETECTION - Described herein are techniques and apparatuses for scanning a computing device for malware and/or viruses. In various embodiments, a trusted operating environment, which may include a trusted operating system and/or a trusted antivirus tool, may be utilized with respect to a computing device. More particularly, the trusted operating system may be used to boot the computing device. Moreover, the trusted antivirus tool may search the computing device for malware definition updates (e.g., virus signature updates) and use the trusted operating system to scan the computing device for malware. In other embodiments, the trusted antivirus tool may scan the computing device and remove any viruses detected by the trusted antivirus tool. The trusted operating system may then reboot the computing device into a clean environment once any detected viruses are removed. | 09-01-2011 |
20120167213 | SAFE FILE TRANSMISSION AND REPUTATION LOOKUP - A method of safe file transmission and reputation lookup is provided. As a part of the safe file transmission and reputation lookup methodology, a data file that is to be made available to a data file receiver is accessed and it is determined whether the data file needs to be provided a protective file. The data file is wrapped in a protective file to create a non-executing package file. Access is provided to the non-executing package file where the associated data file is prevented from being executed until data file reputation information is received. | 06-28-2012 |
20140277661 | FULL COLOR THREE-DIMENSIONAL OBJECT FABRICATION - The subject disclosure is directed towards technology managing three-dimensional object fabrication in full color. In order to transform the object's model into an instruction set for a fabrication device, a fabrication manager computes color values corresponding to geometry within a later of the object's model. After determining an amount of each colored material to deposit, the fabrication manager generates coordinated instructions configured to deposit a combination of colored materials according to the geometry and efficiently transitioning between colored materials during object fabrication. | 09-18-2014 |
20140297014 | THREE-DIMENSIONAL OBJECT FABRICATION USING AN IMPLICIT SURFACE REPRESENTATION - The subject disclosure is directed towards three-dimensional object fabrication using an implicit surface representation as a model for surface geometries. A voxelized space for the implicit surface representation, of which each machine addressable unit includes indirect surface data, may be used to control components of an apparatus when that apparatus fabricates a three-dimensional object. Instructions generated using this representation may cause these components to move to surface positions and deposit source material. | 10-02-2014 |
20150128261 | SAFE FILE TRANSMISSION AND REPUTATION LOOKUP - A method of safe file transmission and reputation lookup is provided. As a part of the safe file transmission and reputation lookup methodology, a data file that is to be made available to a data file receiver is accessed and it is determined whether the data file needs to be provided a protective file. The data file is wrapped in a protective file to create a non-executing package file. Access is provided to the non-executing package file where the associated data file is prevented from being executed until data file reputation information is received. | 05-07-2015 |
20150317412 | FABRICATING THREE-DIMENSIONAL OBJECTS WITH EMBOSSING - The claimed subject matter includes techniques for designing three-dimensional (3D) objects for fabrication. An example method includes obtaining a three-dimensional (3D) mesh comprising polygons and obtaining a two-dimensional (2D) image. The method also includes receiving position information describing a location of the 2D image relative to the 3D mesh and modifying the 3D mesh based on the 2D image and the position information to generate an embossed 3D mesh that is embossed with the 2D image. | 11-05-2015 |