Lambert, WA
Abigail Rose Lambert, Kenmore, WA US
Patent application number | Description | Published |
---|---|---|
20140148361 | Generation and Expression of Engineered I-ONUI Endonuclease and Its Homologues and Uses Thereof - The present disclosure provides compositions and methods for producing and expressing variant or engineered I-OnuI endonucleases, variant or engineered I-OnuI homologues, and hybrids of two I-OnuI or I-OnuI homologue domains that have a target site altered from the wild-type. A method for selecting a variant or engineered I-OnuI endonuclease, I-OnuI endonuclease homologue, and a hybrid of two I-OnuI or I-OnuI homologue domains that have a target site altered from the wild-type and directed to a site within a gene of interest is also provided. In addition, the present disclosure provides the crystal structure of the I-OnuI and I-LtrI endonucleases; the specificity profiles for both endonuclease for DNA binding and cleavage; the identity of amino acid residue positions in the I-OnuI and I-LtrI protein scaffold that determine DNA recognition specificity; methods for determining amino acid substitutions at those positions that alter DNA cleavage specificity; methods for the complete redesign of the DNA cleavage specificity of I-OnuI and its homologues for recognition and cleavage of a human gene of interest; and the relationship of the amino acid sequence, structure and specificity of I-OnuI to a collection of identifiable I-OnuI endonuclease homologues. | 05-29-2014 |
Brian Lambert, East Wenatchee, WA US
Patent application number | Description | Published |
---|---|---|
20160037868 | Self-Aligning, Quick Connect and Disconnect Buckle System - A self-aligning buckle connecting system that includes two end connectors each having outward facing transverse surface with one or more magnetic elements. Each magnetic element is arranged or oriented on each transverse surface to produce opposite oriented magnetic fields on opposite sides of the transverse surface's center axis. The magnetic element of the opposite transverse surface is arranged in the same manner but with its magnetic fields in the opposite directions so the transverse surfaces attract when the end connectors are in close proximity. In one embodiment, the magnetic element is a single bar magnet located on or adjacent to the transverse surface with its magnetic poles oriented in opposite directions. In another embodiment, the magnetic elements are two sets of smaller magnets perpendicularly mounted on each half of the transverse surface with their magnetic poles in each set of magnets in opposite directions. | 02-11-2016 |
Brian A. Lambert, Wenatchee, WA US
Patent application number | Description | Published |
---|---|---|
20160073741 | Three Point Slide Connector System - A three point connector system that includes a male and female slide connectors that selectively engage when pressed together. Each slide connector includes a flat body with a hole or slot formed near its distal end in which a strap or cord may attach. The male slide connector includes at least two elastic arms that fit into an end opening formed on the proximal end of the female slide connector. Attached or formed on the top surfaces of the male and female slide connectors are two perpendicularly aligned arc members each with a center opening. The arc members are complimentary in shape and extend upward from the proximal end of the flat body. Each arc member includes an outer flat surface. When the male and female slide connectors are connected together, the two arc members are parallel and adjacent to form a fully assembled, enclosed D-ring. A suitable clip attached to a third strap member may attached around the enclosed eyelet that holds the two arc members together and prevents disconnection of the male and female slide connectors. | 03-17-2016 |
Brian A. Lambert, East Wenatchee, WA US
Patent application number | Description | Published |
---|---|---|
20130213320 | Animal Collar - An animal collar includes neck strap with magnetic elements located on the neck strap's two opposite ends. The magnetic elements are configured to self align during installation and hold an encircling neck strap around an animal's neck. In one embodiment, the magnetic elements are one or more pairs of magnets attached to the opposite ends of the neck strap. The poles of each magnet pair are aligned so that the magnets in each pair attract. The neck strap also includes two perpendicularly and transversely aligned closed eyelets mounted on the opposite ends. When the opposite ends are placed side-by-side, the magnetic elements are aligned and forced together and the two eyelets are side by side and parallel. A leash clip can then be attached to the two eyelets to hold them together when walking. When the leash clip is disconnected, the magnetic elements are configured to separate when a light force is exerted on the neck strap. An optional connector is provided that holds the two eyelets together when the leash clip is not used. | 08-22-2013 |
Brian M. Lambert, Redmond, WA US
Patent application number | Description | Published |
---|---|---|
20110289514 | SHARING AND SYNCHRONIZATION OF OBJECTS - Sharing of objects may be implemented in a way that allows programs to use shared objects in much the same way that they would use local objects. In one example, a program creates an object and sets properties through normal instructions that would be used to create a local object. The program then registers the object with a shared object model, which may be maintained by a shared object server. For each machine on which the object may be used, a shared object runtime monitors for changes to the objects, and notifies the server of these changes. The server updates the object, and notifies other machines of changes to the state of the object. The shared object runtimes on those machines receive notification of the changes, and update the local copies. | 11-24-2011 |
20110320407 | SHARED DATA COLLECTIONS - A data sharing mechanism may allow programs to share access to data collections. The mechanisms that implement the sharing may allow programs written in any language to read and write a shared collection. The mechanisms may make the shared nature of the collection relatively transparent to the program and to the programmer, by allowing a program to operate on the data more or less as if it were purely local data. The sharing of collections may be managed by a shared object runtime on each machine on which a collection is used, and by a shared object server. The shared object server maintains the true state of the collection, and deterministically resolves collections when programs operate on the same collection without knowledge of each other's operations. The mechanisms by which collections are shared may be implemented so as to be agnostic as to the kind of data in the collection. | 12-29-2011 |
Ed Lambert, Seattle, WA US
Patent application number | Description | Published |
---|---|---|
20100146051 | Managing Differences in User Devices When Sharing Content on Mobile Devices - Sharing content among users of mobile devices is facilitated and controlled by a system and method that employs a content sharing application to receive and process requests to share content amongst users of devices such as mobile devices and personal computers. Recipients receive share content messages from the content sharing application. The messages may contain links to shared content. The content sharing application is associated with an application program interface made available to content providers so that they can create user-selectable share content links or options displayed on display descriptions associated with the content. The content sharing application performs device capability checks so that selected recipients do not receive share content messages that contain links to content that is not compatible with their devices. In this way, users can select to share both device-dependent and device-independent content, even if the content provider does not always perform device compatibility checks. | 06-10-2010 |
20130172028 | Methods for Providing Additional Information for a Mobile-Originated Short Message Service - Methods for appending additional device, location, and/or presence information to a mobile-originated short message are taught herein. One such method for appending additional device information includes receiving a MO short message at a message center. The MO short message includes a content request. Message center sends a query to a subscriber directory for device information corresponding to the device of the requesting subscriber. The subscriber directory searches for the device information and generates a response to be sent to the message center, the response including the device information. The subscriber directory sends the response to the message center, which appends the device information to the MO short message. The message center then sends the short message to the destination, for example, a content provider. Methods for appending location and/or presence information are also taught. | 07-04-2013 |
20150163648 | Methods for Providing Additional Information for Mobile-Originated Short Message Service - Methods for appending additional device, location, and/or presence information to a mobile-originated short message arc taught herein. One such method for appending additional device information includes receiving a MO short message at a message center. The MO short message includes a content request. Message center sends a query to a subscriber directory for device information corresponding to the device of the requesting subscriber. The subscriber directory searches for the device information and generates a response to be sent to the message center, the response including the device information. The subscriber directory sends the response to the message center, which appends the device information to the MO short message, The message center then sends the short message to the destination, for example, a content provider. Methods for appending location and/or presence information are also taught. | 06-11-2015 |
Edward Lambert, Mercer Island, WA US
Patent application number | Description | Published |
---|---|---|
20130007898 | DIGITAL MEDIA ASSET IDENTIFICATION SYSTEM & METHOD - The present invention provides a system and method for identifying and transferring digital media assets within a system through the use of identification data. The identification data is applied to each transferred copy and includes data specific to the customer and digital media asset. To facilitate transfers and ease of use the digital media assets can be made DRM-free. | 01-03-2013 |
Edward M. Lambert, Mercer Island, WA US
Patent application number | Description | Published |
---|---|---|
20080215632 | Digital Media Asset Identification System and Method - The present invention provides a system and method for identifying and transferring digital media assets within a system through the use of identification data. The identification data is applied to each transferred copy and includes data specific to the customer and digital media asset. To facilitate transfers and ease of use the digital media assets can be made DRM-free. | 09-04-2008 |
20080215633 | Digital Media Asset Conversion System and Method - The present invention provides a system and method for identifying and converting digital media assets within a system through the use of identification data. A client device is examined to detect media assets lacking such identification data; the identification data is then applied to each detected asset with data specific to the customer and digital media asset. To facilitate transfers and ease of use the digital media assets can be made DRM-free. | 09-04-2008 |
20110302064 | System & Method for Introducing Digital Assets Into An Electronic Distribution System - Digital media assets are introduced within an electronic network distribution system. A computer coupled to the electronic network distribution system includes one or more software routines that receive/store the digital assets; process administration information including an asset identifier and a rights-holder identifier; and interact with a digital asset management system to generate a modified version of the digital assets based on the administration information and tracking history information. The digital asset is configured so that a tracking history can be maintained for each transfer of separate instantiations of the digital asset. | 12-08-2011 |
20110302065 | Method of Providing a Digital Asset for Distribution - Digital assets are provided for distribution within an electronic network. The digital asset includes digital content that is associated with a digital rights holder. A serial number is provided for (embedded within) the asset; this number uniquely identifies a first introduction of digital asset for distribution within the electronic network. The asset is then posted in a number of locations so that it can be distributed to users. A transaction database is updated to reflect occurrences of different instantiations of the asset. | 12-08-2011 |
20110302086 | System & Method for Unique Digital Asset Identification and Transaction Management - Digital assets are tracked through the use of digital serial numbers. Systems equipped with the present invention can uniquely identify copies of assets within it. Assets that originate within the system can be uniquely identified even outside the system. The transaction history can be traced by looking up the transaction history associated with an assets' serial number. The serial number applied to an asset is unique to each transaction and can be applied at the time a copy is made. Database entries are created that link each unique serial number to aspects of the transaction. Each serial number can reference details about a particular transaction such as parties involved, date and time of copy, ownership, terms of use, and payment terms. | 12-08-2011 |
20110302303 | System & Method for Managing Transfers of Digital Assets Over a Network - Digital media assets are managed within an electronic network distribution system. A management computing system coupled to the network prepares a digital asset for transfer over the network in accordance with a set of distribution rules. A modified version of the digital asset includes a unique identification number associated with a first instantiation of the digital asset. The management computing system tracks transfers of the digital asset based on separate instantiations of the asset created for each transfer occurring over the network. | 12-08-2011 |
20110302636 | Method of Providing a Digital Asset for Distribution - Digital assets are distributed within an electronic network. An index of digital assets available for distribution over the electronic network is provided, where each digital asset has a first serial number associated with a first transfer within the network. The index can include a list of one or more locations for the digital assets, terms of use, etc. A second serial number is provided for the digital asset in response to a request for a second transfer of a digital asset. The second serial number can be embedded within the asset and transferred from a host server to a client device in response to a confirmation of acceptance of the terms of use. | 12-08-2011 |
20110302661 | System & Method for Distributing Digital Assets Across a Network - Digital media assets are distributed through the use of identification data. A rights-holder server is adapted to introduce a digital asset which is associated with a set of distribution rules. The digital assets are stored on host servers and a management server tracks transfers of the digital asset over the network. | 12-08-2011 |
20140137270 | DIGITAL MEDIA ASSET IDENTIFICATION SYSTEM & METHOD - The present invention provides a system and method for identifying and transferring digital media assets within a system through the use of identification data. The identification data is applied to each transferred copy and includes data specific to the customer and digital media asset. To facilitate transfers and ease of use the digital media assets can be made DRM-free. | 05-15-2014 |
Eric Lambert, Otis Orchards, WA US
Patent application number | Description | Published |
---|---|---|
20140055282 | Automated Reconfiguration of Utility Meters - Techniques for reconfiguring utility meters from a mobile mode to a network mode are discussed. A utility meter may be configured for operation in a mobile mode environment, wherein it transmits data using radio frequency (RF) transmissions, such as by “bubbling-up” a “standard consumption message” at intervals. However, a switchover from mobile mode to network mode may be scheduled. The switchover may involve a plurality of endpoints (i.e., metering devices together with associated mobile mode and network mode functionality) transitioning from mobile mode functionality to network mode functionality. In one example, processors on an endpoint using a first “image” including executable software providing mobile mode functions may reboot to use a second image providing fixed network mode functions (e.g., mesh or star network operability). Following the transition, the endpoints may discover adjacent or nearby endpoints, and a fixed network having network mode functionality may be configured. | 02-27-2014 |
John Lambert, Redmond, WA US
Patent application number | Description | Published |
---|---|---|
20110154505 | UNOBTRUSIVE ASSURANCE OF AUTHENTIC USER INTENT - Computer-executable instructions that are directed to the performance of consequential actions and automatically elevate to execute at a higher privilege level to do so can perform such consequential actions only after user notification. Doing so can enable monitoring processes to avoid presenting duplicative user notification upon detection of such auto-elevation. In addition, prior to presenting user notification, input from the execution environment can be ignored and access to DLLs for performing consequential actions can be avoided. A static analyzer can identify non-conforming computer-executable instructions. A wrapper can be utilized to provide compliance by otherwise unknown or non-conforming computer-executable instructions. | 06-23-2011 |
John Lambert, Seattle, WA US
Patent application number | Description | Published |
---|---|---|
20130067583 | ANALYZING ACCESS CONTROL CONFIGURATIONS - A facility is described for analyzing access control configurations. In various embodiments, the facility comprises an operating system having resources and identifications of principals, the principals having access control privileges relating to the resources, the access control privileges described by access control metadata; an access control scanner component that receives the access control metadata, determines relationships between principals and resources, and emits access control relations information; and an access control inference engine that receives the emitted access control relations information and an access control policy model, analyzes the received information and model, and emits a vulnerability report. In various embodiments, the facility generates an information flow based on access control relations, an access control mechanism model, and an access control policy model; determines, based on the generated information flow, whether privilege escalation is possible; and when privilege escalation is possible, indicates in a vulnerability report that privilege escalation is possible. | 03-14-2013 |
20150143525 | ANALYZING ACCESS CONTROL CONFIGURATIONS - A facility is described for analyzing access control configurations. In various embodiments, the facility comprises an operating system having resources and identifications of principals, the principals having access control privileges relating to the resources, the access control privileges described by access control metadata; an access control scanner component that receives the access control metadata, determines relationships between the principals and the resources, and emits access control relations information; and an access control inference engine that receives the emitted access control relations information and an access control policy model, analyzes the received information and model, and emits a vulnerability report. In various embodiments, the facility generates an information flow based on access control relations, an access control mechanism model, and an access control policy model; determines, based on the generated information flow, whether privilege escalation is possible; and when privilege escalation is possible, indicates in a vulnerability report that the privilege escalation is possible. | 05-21-2015 |
John J. Lambert, Redmond, WA US
Patent application number | Description | Published |
---|---|---|
20090320136 | IDENTIFYING EXPLOITATION OF VULNERABILITIES USING ERROR REPORT - A tool and method examine error report information from a computer to determine not only whether a virus or other malware may be present on the computer but also may determine what vulnerability a particular exploit was attempting to use to subvert security mechanism to install the virus. A system monitor may collect both error reports and information about the error report, such as geographic location, hardware configuration, and software/operating system version information to build a profile of the spread of an attack and to be able to issue notifications related to increased data collection for errors, including crashes related to suspected services under attack. | 12-24-2009 |
20110252476 | EARLY DETECTION OF POTENTIAL MALWARE - Evidence of attempted malware attacks may be used to identify the location and nature of future attacks. A failed attack may cause a program to crash. Crash data may be sent to an analyzer for analysis. The analysis may reveal information such as the identity of the program that is being exploited, the specific way in which the program is being exploited, and the identity or location of the source of the attack. This information may be used to identify potential sources of attack and to identify the same type of attack from other sources. When the source and/or nature of an attempted attack is known, remedial action may be taken. Filters may warn users who are attempting to visit sites from which attacks have been attempted, and the makers of programs that are being exploited can be notified so that those program makers can release updates. | 10-13-2011 |
20140237607 | IDENTIFYING EXPLOITATION OF VULNERABILITIES USING ERROR REPORTS - A tool and method examine error report information from a computer to determine not only whether a virus or other malware may be present on the computer but also may determine what vulnerability a particular exploit was attempting to use to subvert security mechanism to install the virus. A system monitor may collect both error reports and information about the error report, such as geographic location, hardware configuration, and software/operating system version information to build a profile of the spread of an attack and to be able to issue notifications related to increased data collection for errors, including crashes related to suspected services under attack. | 08-21-2014 |
John Joseph Lambert, Redmond, WA US
Patent application number | Description | Published |
---|---|---|
20100306847 | IDENTIFYING SECURITY PROPERTIES OF SYSTEMS FROM APPLICATION CRASH TRAFFIC - Most machines in an organization's computer network connect to the Internet and create web traffic logs which allow analysis of HTTP traffic in a simple, centralized way. The web traffic logs may contain error reports and error reports contain significant information that can be used to detect network security. By reviewing the error reports, significant information about a network and its security can be found as common sources of network security weakness may be watched for in the error reports. | 12-02-2010 |
20110191848 | PREVENTING MALICIOUS JUST-IN-TIME SPRAYING ATTACKS - A method disclosed herein includes acts of receiving code at a Just-in-Time compiler executing in an application on a computing device and compiling the code to generate machine code and causing the machine code to be placed on at least one page that is accessible by at least one processor on the computing device, wherein the Just-in-Time compiler compiles the code utilizing at least one technique for preventing a Just-in-Time spraying attack. | 08-04-2011 |
20110314544 | EVALUATING SHELL CODE FINDINGS - Concepts and technologies are described herein for evaluating shellcode findings. In accordance with the concepts and technologies disclosed herein, shellcode findings can be evaluated to determine if the shellcode findings are legitimate, or if the shellcode findings are false positive shellcode findings. Legitimate shellcode findings can be determined based not simply upon patterns associated with the suspected shellcode itself, but also based upon a pattern of bit-level entropy in the memory around the suspected shellcode. Mathematical models of the memory can be generated and analyzed to determine if the shellcode finding is legitimate. | 12-22-2011 |
John Robert Lambert, Bothell, WA US
Patent application number | Description | Published |
---|---|---|
20100153930 | CUSTOMIZABLE DYNAMIC LANGUAGE EXPRESSION INTERPRETER - Embodiments described herein are directed to allowing a user to extend the functionality of a software code interpretation system. In one embodiment, a computer system receives user-defined conversion rules from a user for converting dynamic language code to continuation-based abstract memory representations. The computer system identifies portions of software code that are to be converted from dynamic language abstract memory representations into continuation-based abstract memory representations, where the identified code portions include undefined, extensible input primitives. The computer system also generates a dynamic, extensible set of output primitives interpretable by a continuation-based code interpretation system using the received conversion rules and converts the identified code portions including the undefined, extensible input primitives from dynamic language abstract memory representations into continuation-based abstract memory representations using the generated set of output primitives. | 06-17-2010 |
Kal K. Lambert, Seattle, WA US
Patent application number | Description | Published |
---|---|---|
20130339216 | Biophysical Geoengineering Compositions and Methods - Described here are compositions, methods and apparatus for biological and physical geoengineering. A vertical spar buoy or spar buoy network is provided. The buoys or array of buoys are designed to resist wave motion while supporting an analytical platform at a depth such that particulate flux of fixed carbon is indicative of sequestration in the ocean's depths for one hundred years or more. Sedimentary deadfall through the 100-Year Horizon is measured to validate the flux of fixed carbon. Issuance of validated carbon sequestration certificates and monetization and trading of those certificates are described. Also provided are compositions and methods for increasing bioactive surface area and nutrient levels so as to promote carbon sequestration. Regeneration of carbon dioxide in the mesopelagic water column is reduced by providing complex habitat in the photic zone, thus ensuring higher complexity of trophic levels and sedimentary deadfall having larger particulate size. | 12-19-2013 |
Kevin Lambert, Kirkland, WA US
Patent application number | Description | Published |
---|---|---|
20140106837 | CROWDSOURCING TO IDENTIFY GUARANTEED SOLVABLE SCENARIOS - A method is disclosed for using crowdsourcing to identify known-solvable data states which have been identified by users as leading to a solution to a scenario with defined constraints. In one example where the scenario is a computer card game, a number of users may be provided with an initial data state in the form of the cards being in a particular order. Where a user successfully completes the card game to a desired solution state, the initial data state of the cards may be stored as a known-solvable data state. | 04-17-2014 |
Mathew A. Lambert, Olympia, WA US
Patent application number | Description | Published |
---|---|---|
20090240894 | METHOD AND APARATUS FOR THE SYNCHRONIZATION OF DISTRIBUTED CACHES - A method and apparatus for the synchronization of distributed caches. More particularly, the present invention to cache memory systems and more particularly to a hierarchical caching protocol suitable for use with distributed caches, including use within a caching input/output (I/O) hub. | 09-24-2009 |
Scott Lambert, Bellevue, WA US
Patent application number | Description | Published |
---|---|---|
20100287613 | SANITIZATION OF PACKETS - Methods, systems, and computer-readable media are disclosed for packet sanitization. A particular method intercepts a packet of a packet stream, where the packet stream is transmitted in accordance with a particular protocol. The packet is analyzed based on a specification associated with the particular protocol. Based on the analysis, a data value of a field of the packet is replaced with a sanitized data value to create a sanitized packet. The sanitized packet may be injected into the packet stream or may optionally be forwarded to a signature module that checks the sanitized packet for malicious content. When malicious content is found, the sanitized packet may be dropped, the sanitized packet may be logged, the sanitized packet may be redirected, or a notification regarding the sanitized packet may be sent to an administrator. | 11-11-2010 |
20120011493 | BINARY CODE CHANGE VULNERABILITY PRIORITIZATION - A human-readable list of patch differences ranked by weight helps vulnerability analysts allocate their time. From binary code, identified source functions and recognized sink functions are used when assigning relative weights to changes caused by a patch. Source functions are identified using an export table, import table, and remote procedure call interface. Sink functions are recognized using blacklisted functions, patch-targeted functions, memory functions, string functions, and functions called with mismatched parameters. A change prioritizer assigns weights based on an architectural graph and a set of prioritization rules that specify what kind of change is made by a patch, and what kind of function is changed. Weight assignments may be additive. Rules may assign certain kinds of change a higher priority for subsequent scrutiny by an analyst. | 01-12-2012 |
Timothy John Lambert, Port Townsed, WA US
Patent application number | Description | Published |
---|---|---|
20120030914 | Aesthetic beaded necklace clasp - The necklace clasp fastener for a string of beads consists of a male bead member, and a female bead member, that do not have any visible loop or eyelets for assembling and holding a string of beads together when the male and female bead members are snapped together. The resulting bead configured clasp is almost undetectable from the outside of the beaded necklace which creates an unbroken, unified string of beads for a much more aesthetic and beautiful piece of jewelry. The improved clasp of the invention provides a safety feature to guard against breakage. The two parts are designed to snap together with enough force to hold the necklace on the wearer under normal wear and use. If, however, the necklace catches on to something, the clasp will release easily from the wearer instead of breaking the necklace, and releasing the beads all over the place. | 02-09-2012 |