Patent application number | Description | Published |
20140232106 | SUMP WALL PENETRATION FITTING - A penetration fitting includes a first fitting half having an inner surface and an outer surface opposite the inner surface, the first fitting half defining an arcuate channel, and a second fitting half having an inner surface and an outer surface opposite the inner surface, the second fitting half defining an arcuate channel, wherein the first and second fitting halves are adapted to abut one another with the inner surfaces of the first and second fitting halves together defining an inner end, the outer surfaces of the first and second fitting halves defining an outer end, and the arcuate channels of the first and second fitting halves cooperating to define a tapered opening configured to accept the at least one pipe segment, the opening having a larger diameter at the inner end and a smaller diameter at the outer end. | 08-21-2014 |
20140265157 | SUMP WALL PENETRATION FITTING FOR FLEXIBLE PIPING - A penetration fitting configured to form a seal around a flexible pipe penetrating through an aperture in a sump wall is provided. In one embodiment, the penetration fitting includes first and second fitting halves defining first and second arcuate channels having a wider end and a narrower end, wherein the first and second fitting halves are configured to abut one another with the arcuate channels of the first and second fitting halves together defining a tapered opening, the tapered opening having a smaller diameter at an inner end and a larger diameter at an outer end with the inner end configured to be sealed to the sump wall around the aperture, an elastically deformable sealing ring configured to be received in the tapered opening, the sealing ring defining an opening configured to accept the flexible pipe, and a compression plate configured to retain the sealing ring in the tapered opening. | 09-18-2014 |
Patent application number | Description | Published |
20150018335 | CARBAMATE COMPOUNDS AND OF MAKING AND USING SAME - This disclosure provides compounds and compositions which may be modulators of MAGL and/or ABHD6 and their use as medicinal agents, processes for their preparation, and pharmaceutical compositions that include disclosed compounds as at least one active agent. The disclosure also provides for method of treating a patient in need thereof, where the patient is suffering from indications such as pain, solid tumor cancer and/or obesity comprising administering a disclosed compound or composition. | 01-15-2015 |
20150080364 | CARBAMATE COMPOUNDS AND OF MAKING AND USING SAME - Provided herein are carbamate compounds which may be useful in the treatment of for example, pain, solid tumors and/or obesity. | 03-19-2015 |
20150148330 | CARBAMATE COMPOUNDS AND OF MAKING AND USING SAME - This disclosure provides compounds and compositions which may be modulators of MAGL and/or ABHD6 and their use as medicinal agents, processes for their preparation, and pharmaceutical compositions that include disclosed compounds as at least one active agent. The disclosure also provides for method of treating a patient in need thereof, where the patient is suffering from indications such as pain, solid tumor cancer and/or obesity comprising administering a disclosed compound or composition. | 05-28-2015 |
Patent application number | Description | Published |
20140181925 | Privacy Enhanced Key Management For A Web Service Provider Using A Converged Security Engine - In an embodiment, a security engine of a processor includes an identity provider logic to generate a first key pair of a key pairing associating system user and a service provider that provides a web service and having a second system coupled to the system via a network, to perform a secure communication with the second system to enable the second system to verify that the identity provider logic is executing in a trusted execution environment, and responsive to the verification, to send a first key of the first key pair to the second system. This key may enable the second system to verify an assertion communicated by the identity provider logic that the user has been authenticated to the system according to a multi-factor authentication. Other embodiments are described and claimed. | 06-26-2014 |
20140282945 | TECHNOLOGIES FOR SECURE STORAGE AND USE OF BIOMETRIC AUTHENTICATION INFORMATION - Generally, this disclosure describes technologies for securely storing and using biometric authentication information, such as biometric reference templates. In some embodiments, the technologies include a client device that stores one or more biometric reference templates in a memory thereof. The client device may transfer such templates to an authentication device. The transfer may be conditioned on verification that the authentication device includes a suitable protected environment for the templates and will execute an acceptable temporary storage policy. The technologies may also include an authentication device that is configured to temporarily store biometric reference templates received from a client device in a protected environment thereof. Upon completion of biometric authentication or the occurrence of a termination event, the authentication devices may delete the biometric reference templates from the protected environment. | 09-18-2014 |
20140366111 | CONTINUOUS AUTHENTICATION CONFIDENCE MODULE - Generally, this disclosure describes a continuous authentication confidence module. A system may include user device including processor circuitry configured to determine presence data; a confidence factor including at least one of a sensor configured to capture sensor input and a system monitoring module configured to monitor activity of the user device; memory configured to store a confidence score and an operating system; and a continuous authentication confidence module configured to determine the confidence score in response to an initial authentication of a specific user, update the confidence score based, at least in part, an expectation of user presence and/or selected presence data, and notify the operating system that the authentication is no longer valid if the updated confidence score is within a tolerance of a session close threshold; the initial authentication configured to open a session, the confidence score configured to indicate a current strength of authentication during the session. | 12-11-2014 |
20150143118 | END-TO-END SECURE COMMUNICATION SYSTEM - The present disclosure is directed to an end-to-end secure communication system wherein, in addition to encrypting transmissions between clients, communication-related operations occurring within each client may also be secured. Each client may comprise a secure processing environment to process encrypted communication information received from other clients and locally-captured media information for transmission to other clients. The secure processing environment may include resources to decrypt received encrypted communication information and to process the communication information into media information for presentation by the client. The secure processing environment may also operate in reverse to provide locally recorded audio, image, video, etc. to other clients. Encryption protocols may be employed at various stages of information processing in the client to help ensure that information being transferred between the processing resources cannot be read, copied, altered, etc. In one example implementation, a server may manage interaction between clients, provision encryption keys, etc. | 05-21-2015 |
20150222633 | TECHNOLOGIES FOR SUPPORTING MULTIPLE DIGITAL RIGHTS MANAGEMENT PROTOCOLS ON A CLIENT DEVICE - Technologies for supporting and implementing multiple digital rights management protocols on a client device are described. In some embodiments, the technologies include a client device having an architectural enclave which may function to identify one of a plurality of digital rights management protocols for protecting digital information to be received from a content provider or a sensor. The architectural enclave select a preexisting secure information processing environment (SIPE) to process said digital information, if a preexisting SIPE supporting the DRM protocol is present on the client. If a preexisting SIPE supporting the DRM protocol is not present on the client, the architectural enclave may general a new SIPE that supports the DRM protocol on the client. Transmission of the digital information may then be directed to the selected preexisting SIPE or the new SIPE, as appropriate. | 08-06-2015 |
20150235024 | METHODS AND APPARATUS TO FACILITATE SECURE SCREEN INPUT - Methods, apparatus, systems and articles of manufacture are disclosed to facilitate secure screen input. An example disclosed system includes a user interface (UI) manager to generate a UI comprising a quantity of ordinal entry points, each one of the quantity of ordinal entry points comprising a repeating selectable pattern, an ordinal sequence generator to generate an initial randomized combination of the quantity of ordinal entry points, the randomized combination stored in a trusted execution environment, and an offset calculator to calculate a password entry value by comparing an offset value and direction value retrieved from the UI with the initial randomized combination of the quantity of ordinal entry points. | 08-20-2015 |