Kean, US
Abran James Kean, Highlands Ranch, CO US
Patent application number | Description | Published |
---|---|---|
20140026881 | Outdoor Pizza Oven - A pizza oven may include an upper portion, a lower portion, and cooking surface apparatus located between the upper portion and the lower portion. The pizza oven may be configured to provide a consistent and an even cooking environment in an enclosed region defined by the upper portion. | 01-30-2014 |
Adam C. Kean, Palo Alto, CA US
Patent application number | Description | Published |
---|---|---|
20110262953 | Phosphate Limited Inducible Promoter and A Bacillus Expression System - An evolvable production strain of | 10-27-2011 |
Brian Kean, Cincinnati, OH US
Patent application number | Description | Published |
---|---|---|
20090059812 | ADAPTIVE METHOD AND APPARATUS FOR ADJUSTING NETWORK TRAFFIC VOLUME REPORTING - An adaptive method and apparatus for accurate network traffic volume limit reporting including receiving a network traffic volume limit for each subscriber based on the subscriber's level of service and reporting the network traffic volume on a more frequent basis for subscribers who are approaching their network volume limit. | 03-05-2009 |
20090285108 | Method and Apparatus for Providing QoS for MP Subscribers - A method for providing Quality of Service (QoS) for a Multilink Protocol (MP) subscriber at the subscriber level is described. In one embodiment of the invention, a network element fragments a packet destined for a subscriber into multiple fragments and adds any necessary encapsulations (e.g., MP protocol encapsulation, Point-to-Point protocol encapsulation, layer 2 encapsulations). The network element links the fragments together to form a MP batch packet. The network element sends the MP batch packet to a single egress queue associated with the subscriber. The fragments are distributively transmitted across the links associated with the subscriber. Other methods and apparatuses are also described herein. | 11-19-2009 |
20110032814 | Session Resilience Prioritization Queuing Mechanism to Minimize and Eliminate Packet Loss - A method for managing a plurality of subscriber sessions tied to mobile devices in a router, each subscriber session of the plurality of subscriber sessions assigned to a line card in the router, the line card implementing a data plane entity and a control card implementing a control plane entity, the method comprising: redistributing each subscriber session in the plurality of subscriber sessions assigned to a failed line card in the router to minimize packets lost and maximize subscriber session retention, redistributing including classifying each subscriber session in the plurality of subscriber sessions into a plurality of priority queues, in response to detection of the failed line card, transferring each subscriber session in the plurality of subscriber sessions assigned to the failed line card to one of a plurality of operating line cards in priority queue order. | 02-10-2011 |
20110113145 | Stateless Transmission Control Protocol Rendezvous Solution For Border Gateway Function - A method and apparatus for brokering a transmission control protocol (TCP) session between two clients that are each situated behind a firewall that blocks incoming TCP session requests is described. Each of the two clients transmits a TCP session request to the other client in order to establish a TCP session between these clients. This brokering allows the two clients to establish the TCP session between the two clients. | 05-12-2011 |
20120224477 | PRUNED FORWARDING SET FOR SCALABLE TUNNELING APPLICATIONS IN DISTRIBUTED USER PLANE - A method and system for reducing congestion and latency in a communication system by creating a pruned forwarding set for scalable tunneling applications. The communication system provides a communication link between a mobile communication device and a network, such as the Internet. The method entails using information included within a data packet to determine a corresponding tunnel peer address, which is then resolved onto a set of paths. Each path includes respective adjacency information. A determination of whether to prune each respective path is made by using the respective adjacency information. The pruned set of paths is used to identify available paths for the communication link. By pruning in this manner, the line card being used as the home slot for a given session may also be used as the egress slot, thereby reducing congestion and latency in the communication system. | 09-06-2012 |
20130148498 | INTELLIGENT TRAFFIC QUOTA MANAGEMENT IN SPLIT-ARCHITECTURE NETWORKS - A set of forwarding elements act as a gateway to a data network for a subscriber end station. A controller network element includes a control plane operable to communicate with the forwarding elements, which are operable to communicate with the subscriber end station. The controller network element includes a quota management module, which determines a quota amount to be assigned to the forwarding elements for a traffic flow. The quota management module assigns portions of the quota amount to the forwarding elements. The quota management module determines to change the distribution of an unconsumed quota amount amongst the forwarding elements for the traffic flow, determine the unconsumed quota amount, and determine and assign portions of the unconsumed quota amount to the forwarding elements. | 06-13-2013 |
20130148668 | INTELLIGENT TRAFFIC QUOTA MANAGEMENT - A network element acts as a gateway to a data network for a subscriber end station. The network element includes control plane operable to communicate with a first network processing unit (NPU) and a second NPU, which are operable to communicate with the subscriber end station. The control plane includes a quota management module, which determines a quota amount to be assigned to the first NPU and the second NPU. The quota management module assigns a portion of the quota amount to the first NPU and another portion of the quota amount to the second NPU. The quota management module may determine to change the distribution of an unconsumed quota amount between the first NPU and the second NPU, determine the unconsumed quota amount, and assign a portion of the unconsumed quota amount to the first NPU and another portion of the unconsumed quota amount to the second NPU. | 06-13-2013 |
20130235868 | OPTIMIZING TRAFFIC LOAD IN A COMMUNICATIONS NETWORK - Each application executing on an application server uses an extended version of the Berkeley Packet Filter (BPF) language to define an application-specific rule set. The application server also includes a Just-In-Time compiler to compile the BPF rule set. The compiled rule set is downloaded to a Packet Forwarding Entity (PFE) in the network, and used to control how the PFE steers data packets generated by the application through a communications network. | 09-12-2013 |
20130242997 | POLICY CONTROL ENFORCEMENT AT A PACKET GATEWAY - A packet gateway (PGW) receives a plurality of IP packet fragments from a network. The IP packet fragments comprise a head fragment and one or more trailing fragments, and are associated with a first IP packet. As the fragments are received, a controller at the PGW classifies the fragments. The controller applies a same selected service treatment to the head fragment and to each of the trailing fragments based on the classification of the head fragment. The PGW then sends each treated packet fragment to an end user device. | 09-19-2013 |
20130279494 | MEDIA PLANE OPTIMIZATION FOR VOICE OVER LTE - Methods and apparatus are disclosed for defining an optimized media path. In one exemplary method, a proxy session controller registers, for a plurality of realms, a plurality of Border Gateway Functions (BGFs) residing on a plurality of network nodes, with the registration including registering a preferred BGF colocated with a data network gateway on a single network node for a selected set of the realms. A request message is received from a user terminal, and if a realm associated with the request message is included in the selected set of realms, the controller assigns the preferred BGF to the user terminal to provide an optimized media path that includes the user terminal, the preferred BGF, and the data network gateway. | 10-24-2013 |
20140119374 | DOWNLINK SERVICE PATH DETERMINATION FOR MULTIPLE SUBSCRIPTION BASED SERVICES IN PROVIDER EDGE NETWORK - A method performed in a network element of a provider edge network to determine a downlink service path for a downlink packet. The method includes preserving an indication of the downlink service path while processing an uplink packet that has been transmitted from a subscriber end station toward a provider end station. The method also includes receiving the downlink packet at a line card of the network element. The downlink packet has been transmitted from the provider end station toward the subscriber end station. The method further includes determining, at the line card, the downlink service path for the downlink packet by using the indication of the downlink service path that was preserved while processing the uplink packet. The downlink service path is operable to identify a plurality of services and an order in which the plurality of services are to be performed on the downlink packet. | 05-01-2014 |
Brian Kean, Missouri Valley, IA US
Patent application number | Description | Published |
---|---|---|
20090101720 | MANUFACTURING SYSTEM TO PRODUCE CONTACTLESS DEVICES WITH SWITCHES - A contactless device comprises circuitry storing information, a switch having a first position and a second position, and a fusible link. When the fusible link is intact, wireless reading and writing of the information is enabled regardless of the position of the switch. When the fusible link has been parted, wireless reading of the information is enabled when the switch is in the first position, and wireless reading of the information is disabled when the switch is in the second position. The contactless device may be placed in a non-responsive state, and transformed to a responsive state by parting a second fusible link, or by transmitting an authenticating code to the device. The contactless device may be a card, or some other kind of device. | 04-23-2009 |
20090179744 | RADIO-FREQUENCY-DEVICE PERSONALIZATION - Radio-frequency devices that have internal radio-frequency chips are personalized. A radio-frequency device is inserted into a package. An identifier is read electromagnetically from the radio-frequency chip with a radio-frequency transceiver while the radio-frequency device is within the package. Personalization information is written electromagnetically onto the radio-frequency chip while the radio-frequency device is within the package. An association between the personalization information and the identifier is recorded on a storage device. | 07-16-2009 |
20090200371 | ONETIME PASSWORDS FOR SMART CHIP CARDS - A financial transaction card is provided according to various embodiments described herein. The financial transaction card includes a card body with at least a front surface and a back surface. The financial transaction card may also include a near field communications transponder and/or a magnetic stripe, as well as a digital display configured to display alphanumeric characters on the front surface of the card body. The financial transaction card may also include a processor that is communicatively coupled with the near field communications transponder or magnetic stripe and the digital display. The processor may be configured to calculate one-time passwords and communicate the one-time passwords to both the near filed communications transponder or magnetic stripe and the digital display. | 08-13-2009 |
20120300932 | Systems and Methods for Encrypting Mobile Device Communications - Embodiments of the invention can provide systems and methods for encrypting mobile device communications. According to one example embodiment of the invention, a method for encrypting mobile device communications is provided. The method can include generating, by a first application stored on a first memory of a mobile device, a message to be communicated to an intended recipient; providing, by the first application to an authentication application stored on a second memory of the mobile device, the message; encrypting, by the authentication application, the message; providing, by the authentication application to the first application, the encrypted message; and directing, by the first application, communication of the message to the intended recipient. | 11-29-2012 |
20120300938 | Systems and Methods for Authenticating Mobile Devices - Embodiments of the invention provide systems and methods for authenticating mobile devices. Device identifying information may be received for a mobile device. A base level key may also be communicated to the mobile device. The base level key may be utilized by the mobile device to derive unique transaction specific keys to encrypt subsequent communications output by the mobile device. A communication encrypted with a unique transaction specific key may be received from the mobile device. Based at least in part upon the device identifying information and the base level key, a derived key may be generated, and the derived key may be utilized to decrypt the received communication and authenticate the mobile device. In certain embodiments, the above operations may be performed by one or more computers associated with a service provider. | 11-29-2012 |
20120303503 | Systems and Methods for Tokenizing Financial Information - Embodiments of the invention can provide systems and methods for tokenizing financial information associated with mobile device transactions. According to one example embodiment of the invention, a method for providing tokens to devices can be provided. The method can include receiving, from a device, a request for a token to represent financial information; identifying, in response to the request, token information associated with the token; providing at least a portion of the token information to the device; and providing the token to a third party entity, wherein the third party entity utilizes the received token to evaluate a second token subsequently received from one of the device or a user of the device. | 11-29-2012 |
20120303961 | Systems and Methods for Authenticating Mobile Devices - Embodiments of the invention provide systems and methods for authenticating mobile devices. A registration request and identifying information for a mobile device or a secure element associated with the mobile device may be received. Based upon the received identifying information and a base level key, a rotated key for the mobile device may be determined. The determined rotated key may then be provided to the mobile device, and the rotated key may be utilized for subsequent authentication of the mobile device. | 11-29-2012 |
20120304254 | Systems and Methods for Identifying Devices by a Trusted Service Manager - Embodiments of the invention provide systems and methods for identifying devices by a trusted service manager. According to one example embodiment of the invention, a method for identifying communications is provided. The method can include receiving, by a service provider from a device, a message comprising card production life cycle (CPLC) information associated with a secure element incorporated into the device; and evaluating, by the service provider, the received CPLC information in order to identify the secure element. | 11-29-2012 |
20140237551 | SYSTEMS AND METHODS FOR IDENTIFYING DEVICES BY A TRUSTED SERVICE MANAGER - Embodiments of the disclosure provide systems and methods for identifying devices by a trusted service manager. According to one example embodiments of the disclosure, a method for identifying communications is provided. The method can include receiving, by a service provider from a device, a message comprising card production life cycle (CPLC) information associated with a secure element incorporated into the device; and evaluating, by the service provider, the received CPLC information in order to identify the secure element. | 08-21-2014 |
20160063496 | Remote Secure Transactions - Embodiments of the disclosure can provide systems, methods, and apparatus for remote secure transactions. In one embodiment, a payment processing system can be provided, which can include a network interface communicating with a memory, the memory communicating with a processor for executing payments, and the processor, when executing a computer program, performing operations. The operations can include storing, by the processor and to a memory associated with the payment processing system, account information associated with the consumer mobile system, and receiving, by the processor and from a consumer mobile device, a request, wherein the request comprises an account identifier associated with the consumer mobile device. The operations can also include validating, by the processor and from a consumer mobile device, the consumer mobile device based at least in part on the account identifier, and sending, by the processor, payment processing data, based on the validation. | 03-03-2016 |
Brian R. Kean, Cincinnati, OH US
Patent application number | Description | Published |
---|---|---|
20110249682 | SCALABLE DISTRIBUTED USER PLANE PARTITIONED TWO-STAGE FORWARDING INFORMATION BASE LOOKUP FOR SUBSCRIBER INTERNET PROTOCOL HOST ROUTES - Communication sessions are each homed on one of a plurality of line cards in a network element. Packets received by the network element are processed on the home card before being transmitted to a subscriber device, such as a mobile phone or laptop computer. When a packet is received by the network element, it is not necessarily received by the line card that serves as a home card for the respective session. The packet is switched within the network element from the receiving line card, i.e., the trunk card, to the home card. The network element identifies the home card by performing a lookup in a table duplicated on all the line cards using the least significant bits of the IP address in the packet. Using these bits to organize the table limits the size of the table and balances load among the line cards. | 10-13-2011 |
Brian T. Kean, Missouri Valley, IA US
Patent application number | Description | Published |
---|---|---|
20100217674 | SYSTEMS, METHODS AND APPARATUS FOR SELECTING A PAYMENT ACCOUNT FOR A PAYMENT TRANSACTION - Systems and methods for selecting a payment account for a payment transaction are provided by certain embodiments of the invention. Data may be collected from a payment device utilized for the transaction, and a plurality of payment accounts may be associated with the payment device. A personal identification number associated with the payment device may be received. At least one of the plurality of payment accounts associated with the payment device may be selected based on a portion of the received personal identification number. The transaction may be facilitated utilizing at least one of the selected payment accounts. | 08-26-2010 |
Bryan W. Kean, Colorado Springs, CO US
Patent application number | Description | Published |
---|---|---|
20100140452 | Dual Mode Source Follower for Low and High Sensitivity Applications - In certain embodiments, a unit cell is provided. The unit cell may include a high sensitivity path and a low sensitivity path. The high sensitivity path may include a first transistor and a first switch. The first switch may couple an output node to the first transistor. The low sensitivity path may include a capacitor. A second switch may couple the high sensitivity path to the low sensitivity path. A third switch may couple the high sensitivity path and the low sensitivity path to a voltage node. | 06-10-2010 |
Bryan W. Kean, Fairfax, VA US
Patent application number | Description | Published |
---|---|---|
20130009711 | READ OUT INTEGRATED CIRCUIT - According to one embodiment, a circuit comprises a Capacitive Trans-Impedance Amplifier (CTIA) configured to receive a current pulse at an input and convert the current pulse to a voltage step. The voltage step is directed to a first signal path and a second signal path. When the voltage step exceeds a first threshold, the first signal path directs an enable pulse to the second signal path. The second signal path generates an output pulse when the voltage step exceeds a second threshold and the enable pulse is enabled. The second signal path comprises a first, a second, and a third amplifier to increase detection of the voltage step by the second signal path. | 01-10-2013 |
20140062602 | READ OUT INTEGRATED CIRCUIT - According to one embodiment, a circuit comprises a Capacitive Trans-Impedance Amplifier (CTIA) configured to receive a current pulse at an input and convert the current pulse to a voltage step. The voltage step is directed to a first signal path and a second signal path. When the voltage step exceeds a first threshold, the first signal path directs an enable pulse to the second signal path. The second signal path generates an output pulse when the voltage step exceeds a second threshold and the enable pulse is enabled. The second signal path comprises a first, a second, and a third amplifier to increase detection of the voltage step by the second signal path. | 03-06-2014 |
20150288907 | METHOD AND SYSTEM FOR MANAGING DEFECTS IN FOCAL PLANE ARRAYS USING REDUNDANT COMPONENTS - A focal plane array having: an imaging array section, comprising: an array of electromagnetic radiation detectors; and an address section providing outputs from selectively enabled detectors. The imaging array section comprises a plurality of circuit blocks, each one of the circuit blocks having a primary circuit and a redundant circuit. Test circuitry is for provided for supplying test signals to test each one of the primary circuits and determining whether a response from the test signals is proper or improper and for storing in the test circuitry in response to such determining select signals associated with each one of the tested circuit blocks. An array controller is provided for, during a subsequent normal operating mode, providing timing pulses to the address section wherein the address section selectively enables the detectors using either the primary or redundant circuits in the plurality of circuit blocks selectively in accordance with the stored select signals. | 10-08-2015 |
Charles Kean, Huntington, NY US
Patent application number | Description | Published |
---|---|---|
20110011037 | Device for manufacturing sandbags - An apparatus for constructing sandbags has a movable, floatable platform, and a length of casing disposed in a roll and supported on the platform. The casing has two longitudinal edges and can be unrolled from the roll. There is a hopper for receiving and dispensing a quantity of sand on top of the casing as the casing is unrolled from the roll. The hopper is supported by a crane mounted on the platform, and positioned above the length of casing. There is a device for bringing the longitudinal edges of the casing together after the sand has been deposited, and a stitching machine for stitching the edges of the casing together to form a tube of casing filled with sand. The stitching machine is mounted on the crane above the device for bringing the edges of the casing together. There is a conveyor for conveying the tube away from the stitching machine and off of the platform. | 01-20-2011 |
David Kean, Redmond, WA US
Patent application number | Description | Published |
---|---|---|
20140337824 | OUT-OF-BAND FRAMEWORK LIBRARIES WITHIN APPLICATIONS - An enhanced binder provides flexibility and certainty when selecting a version of a software library to load, and an enhanced loader prevents a library version vulnerable to a security flaw from being loaded. The binder can perform unification, implicit override, and/or redirection. Implicit override searches assembly-specific locations for an implicit_version, and override the previously chosen unification or other version with the implicit_version when the implicit_version is greater. The implicit_version gets updated with the individual assembly, whereas the unification_version gets updated with the framework. Redirection may override the implicit_version. Unlike redirection, an implicit_version does not recite an explicit range and is found outside application configuration files. The implicit_version is specified implicitly by the assembly without an XML declaration. Vulnerable libraries are not loaded, based on out-of-band metadata placed in response to a list of known out-of-band assemblies, an out-of-band-servicing attribute, or a custom servicing library. | 11-13-2014 |
David Kean, Kirkland, WA US
Patent application number | Description | Published |
---|---|---|
20120210300 | MECHANISM FOR COMPATIBILITY AND PRESERVING FRAMEWORK REFACTORING - The subject disclosure relates to enabling the evolution of a framework by providing public surface area factorings for both old and new public surface areas. The factoring can mitigate changes in the implementation of existing distributions of framework. The factoring can also mitigate breaking existing binaries. Further, the factoring can be provided while mitigating a degradation in the security guarantees of the linking model. The factorings can be applied for runtime and/or for a development toolkit. Thus, multiple, almost simultaneous, interoperable views of a framework implementation can be enabled at runtime and/or at design or build time. The views can represent different versions of the framework. | 08-16-2012 |
20140380275 | MECHANISM FOR COMPATIBILITY AND PRESERVING FRAMEWORK REFACTORING - The subject disclosure relates to enabling the evolution of a framework by providing public surface area factorings for both old and new public surface areas. The factoring can mitigate changes in the implementation of existing distributions of framework. The factoring can also mitigate breaking existing binaries. Further, the factoring can be provided while mitigating a degradation in the security guarantees of the linking model. The factorings can be applied for runtime and/or for a development toolkit. Thus, multiple, almost simultaneous, interoperable views of a framework implementation can be enabled at runtime and/or at design or build time. The views can represent different versions of the framework. | 12-25-2014 |
David M. Kean, Redmond, WA US
Patent application number | Description | Published |
---|---|---|
20110307520 | REFLECTION OVER OBJECTS - Different views on an object that has metadata. For instance, one code segment might have one view of the object and be able to view some of the metadata of that object, while another code segment might have a different view of the object and have a view on a different set of the metadata of that object. This may be done even though the code segments reside in the same application. Thus, each code segment may have a view of the metadata on the object that is most useful for that code segment to use the object without getting confused by metadata that is less or not relevant to the manner in which the code segment is to use the object. | 12-15-2011 |
20120240106 | OPTIONAL RETARGETING OF LIBRARY REFERENCES - Shared libraries and references within the shared libraries can be retargeted in accordance with optional transformation rules. The optional transformation rules can be applied differently for different binding contexts. For user-code scenarios, optional retargeting binding rules can be applied automatically by default without requiring any human intervention. Optional targeting that triggers automatic binding behaviors can be disabled based on heuristics. Alternatively, the user can specify in the code or in a configuration file if the source or target is to be loaded. Transformation rules can be disabled based on heuristics. A manual option permits a user to choose at runtime whether the transformation is to be applied, or not applied, in a late-bound fashion. | 09-20-2012 |
Denise Kean, Dallas, OR US
Patent application number | Description | Published |
---|---|---|
20090243214 | Therapy Games - The present invention includes at least one magnet attractant dry erase type board, a game board that may be rolled up for easy storage, and a unique game piece containing a hollow substantially transparent body with a top end and bottom end. The game piece may comprise a cap that attaches to the top end of the game piece body and a magnet that attaches to the bottom end of the game piece body. An image paper can be rolled up and placed inside the game piece body. This image paper may change the appearance of the game piece depending on the printing on the image paper. | 10-01-2009 |
James H. Kean, Boulder, CO US
Patent application number | Description | Published |
---|---|---|
20160115627 | PROCESS FOR RECOVERING SCRAP FIBER - The process for removing metal objects such as buttons, zippers and the like from fabric material to permit recovery of the fabric. The fabric is cut or chopped into strips and subsequently cut again to provide smaller pieces of fabric that may or may not contain a metal object secured thereto. The pieces of fabric are applied to a conveyor and exposed to a metal detector that triggers a plurality of pneumatic nozzles to direct a stream of high pressured air to the fabric pieces having metal attached thereto and deject those pieces from the conveyer while the fabric pieces without metal exit the conveyor having a different trajectory than the metal pieces and attached fabric material. | 04-28-2016 |
Jamie W. Kean, Macungie, PA US
Patent application number | Description | Published |
---|---|---|
20140027546 | PUMP AND SUBMERSIBLE SOLIDS PROCESSING ARRANGEMENT - A pump and submersible solids processing arrangement includes a pump, having a suction inlet and discharge, and a submersible solids processing arrangement positioned in fluid communication with the suction inlet of the pump and being structured to macerate larger solids and matter that is entrained in a fluid to thereby reduce the size of the solids prior to entry of the fluid and solids into the inlet of the pump, the arrangement further including macerating members the speed and arrangement of which are selectively determinable or adjustable, and the arrangement further comprising an agitator arrangement for directing solids into the submersible solids processing arrangement. | 01-30-2014 |
20140064917 | Hydraulic Motor-Driven Bearing Lubrication System For A Centrifugal Pump - A bearing lubrication system for a centrifugal pump includes a hydraulic recirculating pump that is structured to provide recirculation of a fluid to and from the motor that drives the impeller of the centrifugal pump, and a system of efferent and afferent conduits that are connected to both the motor and the bearing housing of the centrifugal pump to direct lubricating fluid to or from the bearings, and to or from the motor for recirculation to the hydraulic recirculating pump, thereby utilizing the lubricating fluid used to lubricate the drive motor as a means of lubricating and cooling the bearings that support the rotating shaft of the pump. | 03-06-2014 |
John Kean, Olathe, KS US
Patent application number | Description | Published |
---|---|---|
20140134585 | SYSTEMS AND METHODS FOR THE PREDICTIVE ASSESSMENT AND NEURODEVELOPMENT THERAPY FOR ORAL FEEDING - The present disclosure relates to a therapeutic system and methods of using the therapeutic system. In particular, the present disclosure relates to a system for improving an oral feeding ability of a patient including an assessment device to contact a patient and collect data related to an oral feeding ability of the patient, a computing device containing a processor to execute an assessment and therapy application, and the assessment and therapy application to receive the data related to the oral feeding ability, predict one or more areas of neurological muscle activity that need further development, and develop a neurological therapy treatment for improving the one or more areas of neurological muscle activity that need further development. | 05-15-2014 |
20140207024 | HANDHELD CORDLESS NON-NUTRITIVE SUCK ASSESSMENT DEVICE - A cordless handheld device detects and analyzes orofacial activity based on compressions or deflections of an associated pacifier and oral cavity pressure. The device can receive and analyze data that can be used to train an infant to feed. | 07-24-2014 |
John C. Kean, Falls Church, VA US
Patent application number | Description | Published |
---|---|---|
20100296563 | METHOD FOR DETERMINING AUDIO BROADCAST TRANSMISSION SIGNAL COVERAGE - Computer implemented methods and systems for the prediction of the reception of a desired in-band on-channel digital audio broadcast signal (IBOC DAB) are described. A method includes computing a first ratio of a weaker undesired adjacent broadcast signal to a stronger undesired adjacent broadcast signal; computing a second ratio of the desired IBOC DAB signal to the stronger undesired adjacent roadcast signal. The method also includes computing a minimum allowable reception ratio based on the second ratio and the slope and intercept of a line, wherein the slope and intercept of the line is based on both (i) a plurality of ratios of a weaker adjacent broadcast signal to a stronger adjacent broadcast signal and (ii) a plurality of ratios of a desired IBOC DAB signal to a stronger adjacent broadcast signal. Reception is predicted when the computed minimum allowable reception ratio is less than the first ratio. | 11-25-2010 |
20130336496 | METHOD FOR DETERMINING AUDIO BROADCAST TRANSMISSION SIGNAL COVERAGE - Computer implemented methods and systems for the prediction of the reception of a desired in-band on-channel digital audio broadcast signal (IBOC DAB) are described. A method includes computing a first ratio of a weaker undesired adjacent broadcast signal to a stronger undesired adjacent broadcast signal; computing a second ratio of the desired IBOC DAB signal to the stronger undesired adjacent broadcast signal. The method also includes computing a minimum allowable reception ratio based on the second ratio and the slope and intercept of a line, wherein the slope and intercept of the line is based on both (i) a plurality of ratios of a weaker adjacent broadcast signal to stronger adjacent broadcast signal and (ii) a plurality of ratios of a desired IBOC DAB signal to a stronger adjacent broadcast signal. Reception is predicted when the computed minimum allowable reception ratio is less than the first ratio. | 12-19-2013 |
Johnny Kean, Tustin, CA US
Patent application number | Description | Published |
---|---|---|
20100226139 | LED-BASED LIGHT ENGINE - An LED-based luminaire employs an LED module mounted to a housing. The LED module is advantageously configured to transmit heat generated by the LEDs across and/or through the module and to the housing for dispersal to the environment. LED modules can be configured with conductive or non-conductive cores, and may be configured to evacuate heat from one or both faces of the LED module. Further, multiple heat paths can be defined from components on an LED module to the housing and to the environment. | 09-09-2010 |
20130163248 | LED-BASED LIGHT ENGINE - An LED-based luminaire employs an LED module mounted to a housing. The LED module is advantageously configured to transmit heat generated by the LEDs across and/or through the module and to the housing for dispersal to the environment. LED modules can be configured with conductive or non-conductive cores, and may be configured to evacuate heat from one or both faces of the LED module. Further, multiple heat paths can be defined from components on an LED module to the housing and to the environment. | 06-27-2013 |
Karl Kean, Chicago, IL US
Patent application number | Description | Published |
---|---|---|
20120227858 | Apparatus for Separating the Connecting Ends of Twisted Wires - An apparatus and a method for readily untwisting the ends of a plurality of twisted wire conductors that are to be stripped and connected to the terminals of an electrical or electronic apparatus. The apparatus comprises a shank having an end, and an elongated-shaped slot located in an end of the shank. The elongated-shaped slot extends into the shank a predetermined distance, and the slot has an opening adapted to receive the twisted wire conductors. The elongated-shaped slot has two spaced-apart and substantially parallel walls that engage and grip the twisted wire conductors when the wires are inserted into the elongated-shaped slot and the shank is rotated in a direction opposite the direction of twist of the wire conductors. After inserting the ends of a plurality of twisted wire conductors into the elongated-shaped slot of the shank, the shank is rotated in the direction opposite the direction of twist of the wire conductors. The separated conductor wires are then removed from the elongated-shaped slot, the wire ends are further separated and striped of insulation, and the wires are then connected to the terminals of an electrical or electronic apparatus. | 09-13-2012 |
Kevin Kean, Woodinville, WA US
Patent application number | Description | Published |
---|---|---|
20090055751 | Management System for Local and Remote Services - A management system for a computer service may have a single set of interfaces through which a local or remote version of the service may be administered. The management system may include a discovery system that determines if a service is provided through a local or remote host and uses the appropriate routines or connections to perform each administrative task. The management system may include a single set of console interfaces, wizards or sequential interactive interfaces, dialog boxes, or other user interface mechanisms that may be used to control a local or remote version of a service. | 02-26-2009 |
Kevin T. Kean, Woodinville, WA US
Patent application number | Description | Published |
---|---|---|
20090292806 | Management of Remotely Hosted Services - A management system for remote services may use an administrative server within a local area network to manage the remote services for many manageable entities. The administrative server may connect to a clearinghouse server outside the local area network to obtain information about available remote services and to consolidate some operations for interfacing to the remote services. In some embodiments, the clearinghouse server may act as a proxy for many different remote services and may enable some functions to be aggregated across different remote services, such as billing, authentication, provisioning, and other functions. The administrative server may configure the managed entities to access the remote services as well as other functions. | 11-26-2009 |
Robert Thomas Kean, Minneapolis, MN US
Patent application number | Description | Published |
---|---|---|
20090176286 | Process for Fractionating Lignocellulosic Biomass into Liquid and Solid Products - The invention herein is an efficient, flexible biomass fractionation process comprising digesting a lignocellulosic-biomass material at about 120-220° C. and a pH of less than about 4, in an aqueous mixture containing an effective concentration of at least one solvent for lignin, and separating to recover a solid phase that contains a large fraction of the cellulose originally in the starting lignocellulosic material and a liquid phase that contains most of the lignin and hemicellulose originally in the starting lignocellulosic biomass. The process can produce a solid phase that contains at least 75% cellulose and less than 10% lignin. The cellulose-rich solid product can be converted very efficiently to glucose. The solid product can also be used in commercial pulp applications, such as papermaking or fluff pulp. Hemicellulose sugars and lignin can be used directly or converted to other products. | 07-09-2009 |
20110105695 | Method for making Plas stereocomplexes - PLA stereocomplexes are formed from poly-D-PLA and poly-L-PLA oligomers. The oligomers contain functional groups which allow them to react with each other or with an added curing agent to produce a high molecular weight block copolymer. Heat treatment of the resin permits the resin to develop crystallites having a melting temperature of 185° C. or more. | 05-05-2011 |
Thomas Kean, Seattle, WA US
Patent application number | Description | Published |
---|---|---|
20120028350 | BONE MARROW TARGETING PEPTIDES - A peptide for targeting bone marrow consists of about 5 to about 25 amino acids and includes an amino acid sequence that targets the peptide to bone marrow. | 02-02-2012 |
20150313945 | COMPOSITIONS AND METHODS OF TREATING INFLAMMATORY BOWEL DISEASE - A method of treating a lymphocyte mediated inflammation in a subject including administering a therapeutically effective amount of a cell delivery composition to the subject, the cell delivery composition of the application including an immunosuppressive cell and a plurality of targeting moieties that bind to endothelial cell adhesion molecules expressed by endothelial cells as a result of a lymphocyte mediated inflammatory response in the subject, the targeting moieties coated on and linked to the immunosuppressive cell and enhancing adherence of the immunosuppressive cell to an endothelial cell at a site of lymphocyte mediated inflammation when administered to the subject systemically, wherein the cell delivery composition, suppresses lymphocyte mediated inflammation in the subject. | 11-05-2015 |
Thomas A. Kean US
Patent application number | Description | Published |
---|---|---|
20080270805 | Method for Protecting Intellectual Property Cores on Field Programmable Gate Array - Techniques are used to protect intellectual property cores on field programmable gate arrays. An approach is to associate each field programmable gate array, or a limited number of field programmable gate arrays, with a secret key. Each field programmable gate array may only be properly configured or programmed by an appropriate encrypted bitstream (which includes one or more intellectual property cores). This encrypted bitstream has been encoded by or for the secret key associated with a particular FPGA. Other techniques are also presented in this application and include network-based, nonnetwork-based, software-based, layered, and other approaches. The techniques allow an intellectual property core vendor to charge a customer per-use or per-configuration of their intellectual property. This is because an encrypted bitstream is useable only in a limited number, possibly just one, of the integrated circuits. | 10-30-2008 |
Thomas J. Kean, Seattle, WA US
Patent application number | Description | Published |
---|---|---|
20120141564 | COMPOSITIONS AND METHODS OF TREATING INFLAMMATION - A method of treating a lymphocyte mediated inflammation in a subject including administering a therapeutically effective amount of a cell delivery composition to the subject, the cell delivery composition of the application including an immunosuppressive cell and a plurality of targeting moieties that bind to endothelial cell adhesion molecules expressed by endothelial cells as a result of a lymphocyte mediated inflammatory response in the subject, the targeting moieties coated on and linked to the immunosuppressive cell and enhancing adherence of the immunosuppressive cell to an endothelial cell at a site of lymphocyte mediated inflammation when administered to the subject systemically, wherein the cell delivery composition, suppresses lymphocyte mediated inflammation in the subject. | 06-07-2012 |
Tod M. Kean, Chandler, AZ US
Patent application number | Description | Published |
---|---|---|
20160115627 | PROCESS FOR RECOVERING SCRAP FIBER - The process for removing metal objects such as buttons, zippers and the like from fabric material to permit recovery of the fabric. The fabric is cut or chopped into strips and subsequently cut again to provide smaller pieces of fabric that may or may not contain a metal object secured thereto. The pieces of fabric are applied to a conveyor and exposed to a metal detector that triggers a plurality of pneumatic nozzles to direct a stream of high pressured air to the fabric pieces having metal attached thereto and deject those pieces from the conveyer while the fabric pieces without metal exit the conveyor having a different trajectory than the metal pieces and attached fabric material. | 04-28-2016 |
Tracy Kean, Kelseyville, CA US
Patent application number | Description | Published |
---|---|---|
20130039868 | Dentifrice Composition - A teeth whitening dentifrice that enhances the shades of teeth with only a short application on the teeth. The dentifrice disrupts the surface tension between the teeth and the stains to provide with the aid of commonly known mechanical brushing and rising methods. 1 to 3 shades of whiter teeth. The toothpaste combines a non-polar solvent, a polar solvent, and a surfactant. An emulsion creates electrostatic interactions with the polar solvent and a reverse micelle to create a hydrophobic compound, which combines with the non-polar solvent to create a non-polar environment on the teeth. The polar solvent's strong electrostatic interactions in reverse micelles accelerate the removal of soluble material. The non-polar environment bonds with insoluble materials, such as extrinsic stains, to disrupt the surface tension between the teeth and the stain. Bleaching agents, thickeners, polishing agents, and other enhancers are mixed to the toothpaste to provide additional functions and characteristics. | 02-14-2013 |
Victor A. Kean, Carroll, OH US
Patent application number | Description | Published |
---|---|---|
20140054363 | SYSTEM OF RECEIVING PRERECORDED MEDIA DISCS FROM USERS - A system of receiving prerecorded media discs from users is disclosed. The system may include a control system having a processor capable of accessing a library associating a native bar code with the content of a prerecorded media disc and receiving the identification of a native bar code of a media disc from an optical disc identification system. The system may also include a user interface system having a buy-back activator and being adapted to receive a media disc from a user, where the user interface is capable of communicating a buy-back price to the user. An optical disc identification system may include a disc holder, a light source, a sensor capable of capturing a digital image of the hub of a media disc including a native bar code, and an image processor capable of reading the native bar code from a digital image. | 02-27-2014 |