Joye
Christopher Ronald Edward Joye, Bellevue Hill AU
Patent application number | Description | Published |
---|---|---|
20110178906 | DATA PROCESSING SYSTEM AND METHOD INCORPORATING VALUATION METHOD TOGGLE - A data processing system and method are disclosed which finds particular application to equity finance mortgages. An Overall System | 07-21-2011 |
Christopher Ronald Edward Joye, New South Wales AU
Patent application number | Description | Published |
---|---|---|
20110054949 | METHOD, SYSTEM & APPARATUS FOR GENERATING DIGITALLY ENCODED ELECTRIC SIGNALS REPRESENTING A CALCULATION - A method, apparatus and system for computing mortgage insurance premiums for shared equity mortgages are disclosed. Such shared equity mortgages rank behind a conventional interest bearing first mortgage and both mortgages are secured over the same property. Details of the mortgages and property are stored in the data store of a computer system. The future sale price at predetermined future dates for each property is estimated in order to calculate each possible future loss in the event that the shared equity mortgage is terminated at each future date. This information and an estimated probability of termination at each future dates are used to calculate an appropriate insurance premium. | 03-03-2011 |
Colin D. Joye, Springfield, MA US
Patent application number | Description | Published |
---|---|---|
20140033905 | ELECTRIC MUSICAL INSTRUMENT - According to some embodiments, a stringed musical instrument is provided. The stringed musical instrument comprises a neck portion, a body portion coupled to the neck portion, and a strap anchor system attached to the body portion comprising a strap arm and strap arm wheel. | 02-06-2014 |
Colin D. Joye, Alexandria, VA US
Patent application number | Description | Published |
---|---|---|
20120255863 | Microfabrication of Tunnels - A system and method to form beam tunnels in interaction circuits. Forms, such as fibers or sheets can be located and secured above a substrate at a desired size and desired shape to form the final shape of the beam tunnels. Fiber holders can be utilized to position the forms above the substrate. A photoresist can then be applied over the substrate embedding the forms. A single exposure LIGA process can be performed on the photoresist, including the steps of ultraviolet photolithography, molding, and electroforming. After the process, the forms can be removed to leave the beam tunnels in the interaction circuits. | 10-11-2012 |
Darrell Andrew Joye, Pawleys Island, SC US
Patent application number | Description | Published |
---|---|---|
20150306782 | Chainsaw-type Brush Cutting Assembly - A brush cutting assembly, horizontally oriented and designed to operate in close proximity to the soil surface for clearing brush and other light vegetation, in the form of a plurality of cutting elements pivotally interconnected with one another forming a cutting span propelled by a motor-driven sprocket and wrapped around the peripheral edge of a relatively thin, generally flat member having a marginal edge portion that engages cutting elements along the cutting span which enters the kerf produced by the chainsaw chain during the operation. Said assembly can be applied to substantially any type of tool which uses a drive member commonly used for clearing weeds and light brush, connected by way of a shaft and an arbor. The preferred embodiment being a hand-held type gasoline powered vegetation trimmer. | 10-29-2015 |
James Joye, Saratoga, CA US
Patent application number | Description | Published |
---|---|---|
20100318075 | CRYOTHERAPY METHOD FOR DETECTING AND TREATING VULNERABLE PLAQUE - Methods, apparatus, and kits detect and/or treat vulnerable plaque of a blood vessel. A temperature differential can be sensed along a lumen surface with temperature sensors on a balloon filled with warm gas. Treatment methods include controlled and safe cryogenic cooling of vulnerable plaque to inhibit release of retained fluid within the vulnerable plaque so as to inhibit acute coronary syndrome and to help maintain patency of a body lumen. | 12-16-2010 |
James Joye, Los Gatos, CA US
Patent application number | Description | Published |
---|---|---|
20100106148 | Cryosurgical Fluid Supply - Improved systems, devices, and methods for delivering cryogenic cooling fluid to cryosurgical probes such as cryosurgical endovascular balloon catheters take advantage of the transients during the initiation and termination of cryogenic fluid flow to moderate the treatment temperatures of tissues engaged by the probe. A flow limiting element along a cryogenic fluid path intermittently interrupts the flow of cooling fluid, often cycling both the fluid flow and treatment temperature. This can maintain the tissue treatment temperature within a predetermined range which is above the treatment temperature provided by a steady flow of cryogenic fluid. In another aspect, room temperature single-use cooling fluid cartridges are filled with a sufficient quantity of cryosurgical fluid to effect a desired endovascular cryosurgical treatment. | 04-29-2010 |
20130103019 | Cryosurgical Fluid Supply - Improved systems, devices, and methods for delivering cryogenic cooling fluid to cryosurgical probes such as cryosurgical endovascular balloon catheters take advantage of the transients during the initiation and termination of cryogenic fluid flow to moderate the treatment temperatures of tissues engaged by the probe. A flow limiting element along a cryogenic fluid path intermittently interrupts the flow of cooling fluid, often cycling both the fluid flow and treatment temperature. This can maintain the tissue treatment temperature within a predetermined range which is above the treatment temperature provided by a steady flow of cryogenic fluid. In another aspect, room temperature single-use cooling fluid cartridges are filled with a sufficient quantity of cryosurgical fluid to effect a desired endovascular cryosurgical treatment. | 04-25-2013 |
James Joye, Monte Sereno, CA US
Patent application number | Description | Published |
---|---|---|
20110125141 | Cryotherapy Methods for Treating Vessel Dissections and Side Branch Occlusion - The present invention provides cryotherapy treatment of dissections in a blood vessel of a patient. The present invention further provides cryotherapy treatment of side branch occlusion in a bifurcated blood vessel. One method for treating potential or existing dissections in a blood vessel comprises cooling the blood vessel to a temperature and for a time sufficient to remodel the blood vessel such that dissections of the blood vessel are reduced. Another method for treating side branch occlusion in a bifurcated blood vessel, the bifurcated blood vessel having a side branch and a main branch, the main branch having plaque disposed thereon, comprises cooling an inner surface of the main branch to a temperature and for a time sufficient to inhibit plaque shift from the main branch into the side branch. | 05-26-2011 |
James D. Joye, Saratoga, CA US
Patent application number | Description | Published |
---|---|---|
20140142677 | METHODS AND SYSTEMS FOR BYPASSING OCCLUSIONS IN A FEMORAL ARTERY - A system for deploying a stent-graft from the femoral artery into the femoral vein and back into the femoral artery in order to bypass a femoral occlusion comprises a penetration catheter and a guidewire capture and stabilization catheter. The penetration catheter may be advanced contralaterally to a location above the occlusion and the capture and stabilization catheter may be introduced upwardly through the femoral vein. The penetration tool on the penetration catheter is used in multiple steps to deploy guidewires which are then used to deploy the stent-graft in the desired location. | 05-22-2014 |
Jim Joye, Saratoga, CA US
Patent application number | Description | Published |
---|---|---|
20150081007 | SYSTEMS AND METHODS FOR DEPLOYING A LUMINAL PROSTHESIS OVER A CARINA - A system for deploying a prosthesis over a Carina between an ipsilateral lumen and a contralateral lumen includes a guidewire, a guidewire capture catheter, a self-expanding tubular prosthesis, and a delivery catheter. The guidewire is first placed in the ipsilateral lumen. The guidewire capture catheter is then advanced from the contralateral lumen to a position at or above the ipsilateral lumen. The guidewire is typically advanced through an occlusion, which may be a total occlusion, and captured by a capture element on the guidewire capture catheter. The guidewire capture catheter pulls the guidewire out through the contralateral side, and the guidewire is used to advance a delivery catheter from the ipsilateral side. The delivery catheter delivers a first segment of the tubular prosthesis in the ipsilateral lumen and a second segment of the prosthesis in the contralateral lumen. | 03-19-2015 |
Kevin Joye, West Chester, PA US
Patent application number | Description | Published |
---|---|---|
20140067082 | BIORESORBABLE CERAMIC COMPOSITION FOR FORMING A THREE DIMENSIONAL SCAFFOLD - The present disclosure is directed to a bioresorbable ceramic composition having a plurality of biocompatible ceramic granules, each of the granules having a coating of a plurality of calcium containing particles, where at least a portion of the particles are bound to at least a portion of an outer surface of each of the granules, and further where the composition is flowable in a dry state. The present disclosure is also directed to a three dimensional scaffold for bone repair that includes the bioresorbable composition, which upon implantation to a locus of repair defines an interconnected pore network between outer walls of the coated granules of the composition. Finally, the present disclosure is directed to methods of forming both the bioresorbable ceramic composition and the three-dimensional ceramic scaffold. | 03-06-2014 |
Marc Joye US
Patent application number | Description | Published |
---|---|---|
20160020898 | PRIVACY-PRESERVING RIDGE REGRESSION - A hybrid approach to privacy-preserving ridge regression is presented that uses both homomorphic encryption and Yao garbled circuits. Users in the system submit their data encrypted under a linearly homomorphic encryption. The linear homomorphism is used to carry out the first phase of the algorithm that requires only linear operations. The output of this phase generates encrypted data, in a form that is independent of the number of users n. In a second phase, a Yao garbled circuit that first implements homomorphic decryption and then does the rest of the regression algorithm (as shown, an optimized realization can avoid decryption in the garbled circuit) is evaluated. For this step a Yao garbled circuit approach is much faster than current fully homomorphic encryption schemes. Thus the best of both worlds is obtained by using linear homomorphisms to handle a large data set and using garbled circuits for the heavy non-linear part of the computation. | 01-21-2016 |
Marc Joye, Fougeres FR
Patent application number | Description | Published |
---|---|---|
20120159189 | MODULAR EXPONENTIATION RESISTANT AGAINST SKIPPING ATTACKS - An exponentiation method resistant against skipping attacks. A main idea of the present invention is to evaluate, in parallel with the exponentiation such as y=g | 06-21-2012 |
20120290634 | MODULAR EXPONENTIATION METHOD AND DEVICE RESISTANT AGAINST SIDE-CHANNEL ATTACKS - A modular exponentiation comprising iterative modular multiplications steps and taking as input a first modulus N, a secret exponent d and a base x. During at least one modular multiplication step aiming at computing a result c from two values a, b and the first modulus N so that c=a·b mod N, a processor takes as input the two values a, b and the first modulus N from which are obtained two operands a′, b′ and a second modulus N′ using operations with at most linear complexity—at least one of the two operands a′, b′ is different from the two values a, b, and the two operands a′, b′ are different when a is equal to b—so that the modular multiplication c=a·b mod N from a side-channel viewpoint behaves like a modular squaring except for when a′ equals b′. | 11-15-2012 |
20120321075 | FAULT-RESISTANT EXPONENTIATIONI ALGORITHM - A method for performing a m-ary right-to-left exponentiation using a base x, a secret exponent d and a modulus N, wherein m is a power of 2. A device having a processor and m+1 registers R[ | 12-20-2012 |
20130195267 | PUBLIC KEY ENCRYPTION SYSTEM BASED ON THE QUADRATIC RESIDUOSITY ASSUMPTION - A public-key encryption system. Encryption of a k-bit plaintext m is performed by picking a random generating ciphertext and outputting the ciphertext. N is a non-prime integer (preferably the product of two primes p and q), y is an element in multiplicative group of integers modulo N, and k is an integer larger than 1, Decryption of ciphertext c using private key is performed by recovering such that holds and outputting plaintext m, wherein denotes the 2k-th power residue symbol modulo p, which is defined. Also provided are an encryption device and a decryption device. The encryption scheme provides better bandwidth than the Goldwasser-Micali encryption scheme. | 08-01-2013 |
20130318624 | METHOD AND DEVICE FOR CONTROLLING DISTRIBUTION OF LICENSES - A method for controlling distribution of licenses, a license being for an excerpt of a content item, the content item comprising a set of continuous units, each excerpt comprising a subset of the set of continuous units, A device receives an identifier of a receiver of a license, and the license or a request to generate the license, the license or the request to generate the license comprising a content identifier and at least one indicator of the units covered by the license; retrieves stored information regarding licenses previously delivered to the receiver; compares a limit value for the content item with the stored information combined with information from the license or the request to generate the license; and allows the receiver access to the license only if the limit value is not exceeded by the stored information combined with information from the license or the request to generate the license Also provided is the device. | 11-28-2013 |
20140140504 | SYSTEM, DEVICES AND METHODS FOR COLLABORATIVE EXECUTION OF A SOFTWARE APPLICATION COMPRISING AT LEAST ONE ENCRYPTED INSTRUCTION - Collaborative execution by a first device and a second device of a software application comprising at least one encrypted instruction. The first device obtains a first encrypted instruction; generates a session key; encrypts the first encrypted instruction; encrypts the session key using a symmetric algorithm and a first key; and transfers the encrypted first encrypted instruction and the encrypted session key to the second device. The second device decrypts the encrypted session key using the first key; decrypts the encrypted first encrypted instruction to obtain the first encrypted instruction; decrypts the first encrypted instruction using a third key to obtain an instruction; encrypts the instruction using the symmetric encryption algorithm and the session key to obtain a second encrypted instruction; and transfers the second encrypted instruction to the first device. The first device decrypts the second encrypted instruction using the session key to obtain the instruction; and executes the instruction. | 05-22-2014 |
20140237253 | CRYPTOGRAPHIC DEVICES AND METHODS FOR GENERATING AND VERIFYING COMMITMENTS FROM LINEARLY HOMOMORPHIC SIGNATURES - A processor of a device generates a cryptographic commitment by receiving a vector {right arrow over (m)}, a public verification key of a homomorphic signature scheme, and a tag; choosing a signature σ in the signature space; generating a commitment c by running the verification algorithm of the homomorphic signature scheme; and outputting the commitment c as intermediate values resulting from the verification algorithm. | 08-21-2014 |
20140237254 | CRYPTOGRAPHIC DEVICES AND METHODS FOR GENERATING AND VERIFYING LINEARLY HOMOMORPHIC STRUCTURE-PRESERVING SIGNATURES - Generation of linearly homomorphic structure-preserving signature σ on a vector (M | 08-21-2014 |
20140270155 | METHOD AND A DEVICE FOR FAULT-RESISTANT EXPONENTIATION IN CRYPTOGRAPHIC SYSTEMS - A processor in a device performs fault-resistant exponentiation using an input x and a secret exponent d to obtain a result S, by using an a priori selected integer r and a chosen random element a ε {0, . . . , r−1} to form an extended base {circumflex over (x)} is formed such that | 09-18-2014 |
20140270156 | CRYPTOGRAPHIC DEVICES AND METHODS FOR ENCODING-FREE ENCRYPTION ON ELLIPTIC CURVES - Encoding-free encryption on elliptic curves is obtained by a device having a processor choosing an integer r∈ | 09-18-2014 |
20140321642 | GROUP ENCRYPTION METHODS AND DEVICES - The present invention improves on prior art group encryption schemes by encrypting an alias of a recipient's public key instead of the public key itself. A Group Manager publishes the encryption of the alias,the corresponding public key and a corresponding certificate on a public database DB. The alias is a resulting value of a suitably chosen function ƒ on the public key, and can be viewed as a hash of the public key. This can allow a significant decrease in the size and cost of the resulting construction as the alias can be made smaller than the public key. In particular, there is no need to apply the second encryption scheme as many times as there are group dements in the recipient's public key. | 10-30-2014 |
20150067340 | CRYPTOGRAPHIC GROUP SIGNATURE METHODS AND DEVICES - To generate a group signature on a message, a processor generates a two-level signature on an identity of the group member at the first level and the message at the second level; generates a commitment to the identity of the group member, commitments to each group element and a proof that the identity and the group elements satisfy a predetermined equation; encodes the identity of the group member in the group signature in a bit-wise manner using an identity-based encryption scheme where the message serves as the identity of the identity-based encryption scheme to produce a ciphertext; generates a first proof that the ciphertext encrypts the identity of the group member; generates a second proof that the encoded identity is an identity of a group member in a certificate signed by a group manager and that the certificate was used to generate the signature on the message at the second level; and outputs the group signature comprising the two-level signature, the commitments, the encoded identity of the group member and the proofs | 03-05-2015 |
20150154422 | METHOD FOR DETERMINING A STATISTIC VALUE ON DATA BASED ON ENCRYPTED DATA - In one embodiment, it is proposed a method for determining a statistic value, for a given time period t, on a set of n≧2 of plaintext data {x | 06-04-2015 |
20150229480 | SIGNING METHOD DELIVERING A PARTIAL SIGNATURE ASSOCIATED WITH A MESSAGE, THRESHOLD SIGNING METHOD, SIGNATURE VERIFICATION METHOD, AND CORRESPONDING COMPUTER PROGRAM AND ELECTRONIC DEVICES - In one embodiment, it is proposed a signing method delivering a partial signature associated with a message, said partial signature being used in a threshold signing method, the signing method being executed on an electronic device. Such signing method is remarkable in that it comprises signing a hash of said message with a one-time linearly homomorphic structure preserving signature method with a partial secret key, said partial secret key being obtained from an output of a secret sharing scheme, and said signing delivering said partial signature associated with said message. | 08-13-2015 |
20150256340 | METHOD OF CRYPOTOGRAPHIC PROCESSING OF DATA ON ELLIPTIC CURVES, CORRESPONDING ELECTRONIC DEVICE AND COMPUTER PROGRAM PRODUCT - In one embodiment, it is proposed a method of cryptographic processing of data, the method being executed by an electronic device, and comprising obtaining at least two points belonging to a same elliptic curve defined on an algebraic structure being a finite ring, each point being represented by at least two coordinates. The method is remarkable in that it comprises: | 09-10-2015 |
20150270966 | AGGREGATOR-OBLIVIOUS ENCRYPTION OF TIME-SERIES DATA - A processor of a device of user i in an aggregator-oblivious encryption system with n users encrypts a message {right arrow over (x | 09-24-2015 |
20150295710 | PAILLIER-BASED BLIND DECRYPTION METHODS AND DEVICES - Paillier-based blind decryption. A user device obtains a first Paillier Paillier ciphertext c for a message m, generates a blinded Paillier ciphertext c | 10-15-2015 |
20150363588 | APPARATUS AND METHOD FOR PASSWORD AUTHENTICATION - A user inputs a password at a user device whose processor receives the password, retrieves a stored derived value resulting from a derivation function, preferably a cryptographic one-way function, applied to a reference password, scrambles the received password using a function taking the derived value as a variable to obtain a scrambled password, and sends the scrambled password to an authentication server. In case the stored derived value cannot be retrieved, the processor uses the derivation function to generate a derived value from the received password. In case the password is received during generation of a new password, the processor generates and stores a derived value from the new password. In an embodiment, the apparatus comprises the authentication server. | 12-17-2015 |
20150363593 | APPARATUSES AND METHODS FOR PASSWORD AUTHENTICATION - A user inputs a password entry at a computer, which processes the entry using a function to obtain a plurality of sub-entries that are sent to a server. Each sub-entry is generated by padding the password entry to obtain a fix-length password entry from which are generated a number of strings in which different combinations of k characters are missing and then passed through a one-way function. The server receives the sub-entries and compares each sub-entry with stored password verifiers for the user to determine if they match. If at least one sub-entry matches a password verifier, the user is authenticated and a notification is sent to the user via the computer. If no sub-entry matches a password verifier, then the user is not authorized. Up to k typing errors can be accepted in the password entry. | 12-17-2015 |
20150381349 | PRIVACY-PRESERVING RIDGE REGRESSION USING MASKS - A method and system for privacy-preserving ridge regression using masks is provided. The method includes the steps of requesting a garbled circuit from a crypto service provider, collecting data from multiple users that has been formatted and encrypted using homomorphic encryption, summing the data that has been formatted and encrypted using homomorphic encryption, applying prepared masks to the summed data, receiving garbled inputs corresponding to prepared mask from the crypto service provider using oblivious transfer, and evaluating the garbled circuit from the crypto service provider using the garbled inputs and masked data. | 12-31-2015 |
20160036584 | PRIVACY-PRESERVING RIDGE REGRESSION USING PARTIALLY HOMOMORPHIC ENCRYPTION AND MASKS - A method and system for privacy-preserving ridge regression using partially homomorphic encryption and masks is provided. The method includes the steps of requesting a garbled circuit from a crypto service provider, collecting data from multiple users that has been formatted and encrypted using partially homomorphic encryption, summing the data that has been formatted and encrypted using partially homomorphic encryption, applying a prepared masks to the summed data, receiving garbled inputs corresponding to prepared mask from the crypto service provider using oblivious transfer, and evaluating the garbled circuit from the crypto service provider using the garbled inputs and masked data. | 02-04-2016 |
Marc Joye, Palo Alto, CA US
Patent application number | Description | Published |
---|---|---|
20150063564 | METHOD FOR CIPHERING AND DECIPHERING, CORRESPONDING ELECTRONIC DEVICE AND COMPUTER PROGRAM PRODUCT - In one embodiment, it is proposed a method for ciphering a plaintext M belonging to a group | 03-05-2015 |
20150100785 | METHOD FOR CIPHERING A MESSAGE VIA A KEYED HOMOMORPHIC ENCRYPTION FUNCTION, CORRESPONDING ELECTRONIC DEVICE AND COMPUTER PROGRAM PRODUCT - In one embodiment, it is proposed a method for ciphering a message by a sender device at destination to a receiver device, said method comprising using a keyed homomorphic encryption function associated with a public key of said receiver device. Such method is remarkable in that it comprises: | 04-09-2015 |
20150100794 | METHOD FOR SIGNING A SET OF BINARY ELEMENTS, AND UPDATING SUCH SIGNATURE, CORRESPONDING ELECTRONIC DEVICES AND COMPUTER PROGRAM PRODUCTS - In one embodiment, it is proposed a method for signing a set of binary element comprising n elements, where n is an integer, by an electronic device. Such method is remarkable in that it outputs a signature associated to the set, that can be derived by the use of the public key when one or several new elements are added to the set. | 04-09-2015 |
20160004874 | A METHOD AND SYSTEM FOR PRIVACY PRESERVING MATRIX FACTORIZATION - A method includes: receiving a set of records from a source, wherein each record in the set of records includes a set of tokens and a set of items, and wherein each record is kept secret from parties other than the source, receiving at least one separate item, and evaluating the set of records and the at least one separate item by using a garbled circuit based on matrix factorization, wherein the output of the garbled circuit includes an item profile for each at least one separate item. An apparatus includes: a processor that communicates with at least one input/output interface, and at least one memory in signal communication with the processor, wherein the processor is configured to perform the method. | 01-07-2016 |
Marc Joye, Fougeres BE
Patent application number | Description | Published |
---|---|---|
20150381350 | THRESHOLD CRYPTOSYSTEM, CORRESPONDING ELECTRONIC DEVICES AND COMPUTER PROGRAM PRODUCTS - In one embodiment, it is proposed a method for encrypting a plaintext M ∈ | 12-31-2015 |
Michael Joye, Carlsbad, CA US
Patent application number | Description | Published |
---|---|---|
20120034796 | Systems, Apparatus, and Related Methods for Weather-Proofed Wire Splicings - Disclosed are systems, apparatus and related methods for making weather, fire, or water-proofed wire-to-wire electrical connections. | 02-09-2012 |
20150047871 | SYSTEMS, APPARATUS, AND RELATED METHODS FOR WEATHER-PROOFED WIRE SPLICINGS - Disclosed are systems, apparatus and related methods for making weather, fire, or water-proofed wire-to-wire electrical connections. | 02-19-2015 |
Neil Francis Joye, Waalre NL
Patent application number | Description | Published |
---|---|---|
20150341085 | WIRELESS INDUCTIVE POWER TRANSFER - A power transmitter ( | 11-26-2015 |
Neil Francis Joye, Eindhoven NL
Patent application number | Description | Published |
---|---|---|
20140336623 | DATA COMMUNICATION WITH INTERVENTIONAL INSTRUMENTS - The invention relates to a data communication system ( | 11-13-2014 |
Olivier Joye, Clermont-Ferrand Cedex 9 FR
Patent application number | Description | Published |
---|---|---|
20130115499 | Battery Unit for an Electric or Hybrid Vehicle - The accumulator assembly comprises a plurality of electrical energy accumulator elements | 05-09-2013 |
20130171486 | Accumulator Assembly for a Battery of an Electric or Hybrid Vehicle, Provided with a Deformable Connector Support - The accumulator assembly comprises a plurality of electrical energy accumulator elements | 07-04-2013 |
20130192913 | Battery Box for Electric or Hybrid Vehicle and Method for Mounting Said Box on the Vehicle - Vehicle battery box ( | 08-01-2013 |
20130202947 | Accumulator Assembly for a Battery of an Electric or Hybrid Vehicle, Provided with a Connecting Strut - An accumulator assembly comprising a plurality of electrical energy accumulator elements ( | 08-08-2013 |
20130229742 | Connection Device Comprising a Control Unit, Battery Case Comprising Such a Connection Device and Method for Controlling such a Battery Case - A device for connection | 09-05-2013 |
Stephane Joye, Boulogne-Billancourt FR
Patent application number | Description | Published |
---|---|---|
20120255272 | METHOD AND DEVICE FOR PROTECTING THE END OF AN ANCHORED CABLE - To protect the end of a cable composed of a set of tendons individually held in an anchorage system, the device comprises a skirt extending from the front of the anchorage system and placed around the set of tendons, and several sleeves. The tendons have respective end portions which extend beyond the front of the anchorage system and which are individually received in the sleeves, said sleeves being sealed off beyond the end portions of the tendons. A connection between the skirt and the sleeves encloses a chamber delimited by the front of the anchorage system, the skirt, and the sleeves, the connection comprising an active stuffing box kind of system. The volume of this chamber is filled in with a filling product. | 10-11-2012 |
20130174530 | STRAND, STRUCTURAL CABLE AND METHOD FOR MANUFACTURING THE STRAND | 07-11-2013 |
20130255170 | DEVICE FOR DIVERTING A STRUCTURAL CABLE, SUCH AS A GUY LINE, AND CONSTRUCTION COMPRISING SAME - The structural cable has several stretched tendons ( | 10-03-2013 |
20140021649 | METHOD OF PROTECTING THE END OF A MULTI-TENDON CABLE - The method is for protecting the end of a cable made of a plurality of parallel tendons ( | 01-23-2014 |
Stéphane Joye, Boulogne-Billancourt FR
Patent application number | Description | Published |
---|---|---|
20130174530 | STRAND, STRUCTURAL CABLE AND METHOD FOR MANUFACTURING THE STRAND | 07-11-2013 |
Stéphanie Joye, Boulogne-Billancourt FR
Patent application number | Description | Published |
---|---|---|
20140026372 | ANCHORING DEVICE FOR A MULTI-TENDON CABLE - The anchoring device for a cable made of plurality of tendons comprises an anchor block having a front side, a rear side and channels extending between the front and rear sides, each tendon of the cable being received in a respective channel with a blocking member. It also comprises a first protective material with which at least some of the channels of the anchor block are filled, a chamber containing portions of the plurality of tendons of the cable, located on at least one of the front and rear sides of the anchor block, and a second protective material, different from the first protective material, with which the chamber is filled. | 01-30-2014 |