Nye
Benjamin John Sapwell Nye, Stevenage, Hertfordshire GB
Patent application number | Description | Published |
---|---|---|
20160001897 | CONTROLLING A PROPELLANT DISTRIBUTION IN A SPACECRAFT PROPELLANT TANK - A system for controlling a distribution of propellant in a propellant tank assembly for a spacecraft comprises a body for containing the propellant, a plurality of thermal tomography elements, including a plurality of temperature-control elements and a plurality of temperature sensors, disposed around the body for detecting the distribution of the propellant inside the body; and a tomography element control module arranged to control the plurality of temperature-control elements to redistribute the propellant inside the propellant tank body by heating and/or cooling the propellant. In an embodiment, the propellant tank body includes a propellant management device inside the body and the tomography elements are disposed in proximity to the propellant management device. Tomography data can be obtained from the plurality of tomography elements, and a distribution of propellant within the propellant tank body can be determined based on the obtained tomography data. | 01-07-2016 |
John Charles Nye, Mississauga CA
Patent application number | Description | Published |
---|---|---|
20100189535 | COUPLER DEVICE TO CONNECT BUCKET OR TOOL TO BOOM ARM - A coupler device for releasably connecting a boom arm to a tool such as a bucket including a coupling frame adapted for connection to the boom and having wedge members on opposite sides thereof, these members being provided to engage in channels formed by connecting members on the tool. A fluid actuated holding mechanism is provided to secure the wedge members in the channels, this mechanism including a holder pivotably mounted on the frame and a fluid actuator connected to the holder at one end and to the frame at an opposite end. The coupler device includes a locking pin mechanism for locking the wedge members in the channels, this mechanism including at least one locking pin movably mounted in the frame for movement between a locked position and an unlocked position and, optionally, a linear fluid actuator mounted on the frame and having a hydraulic cylinder. | 07-29-2010 |
20110297773 | CONCRETE PULVERIZER - A concrete pulverizer adapted for mounting on an arm of an excavator including a lower jaw having a first pivot pin mechanism and a crushing surface. The crushing surface on this jaw is formed with concrete waste apertures. An upper jaw has a rear end section connectible to an end of the arm and has crushing teeth mounted on a lower side. This jaw is pivotably connected to the lower jaw by the pivot pin mechanism. The upper jaw is pivotably connected to a hydraulic cylinder actuator on the arm and can be pivoted between an upper position and a crushing closed position. There is a power mechanism for pivoting the lower jaw between a horizontal scooping position and a dumping position and this mechanism can hold the lower jaw in a crushing position while the upper jaw is being pivoted by the hydraulic cylinder actuator. | 12-08-2011 |
Mark Nye, Mississauga CA
Patent application number | Description | Published |
---|---|---|
20100189535 | COUPLER DEVICE TO CONNECT BUCKET OR TOOL TO BOOM ARM - A coupler device for releasably connecting a boom arm to a tool such as a bucket including a coupling frame adapted for connection to the boom and having wedge members on opposite sides thereof, these members being provided to engage in channels formed by connecting members on the tool. A fluid actuated holding mechanism is provided to secure the wedge members in the channels, this mechanism including a holder pivotably mounted on the frame and a fluid actuator connected to the holder at one end and to the frame at an opposite end. The coupler device includes a locking pin mechanism for locking the wedge members in the channels, this mechanism including at least one locking pin movably mounted in the frame for movement between a locked position and an unlocked position and, optionally, a linear fluid actuator mounted on the frame and having a hydraulic cylinder. | 07-29-2010 |
20110297773 | CONCRETE PULVERIZER - A concrete pulverizer adapted for mounting on an arm of an excavator including a lower jaw having a first pivot pin mechanism and a crushing surface. The crushing surface on this jaw is formed with concrete waste apertures. An upper jaw has a rear end section connectible to an end of the arm and has crushing teeth mounted on a lower side. This jaw is pivotably connected to the lower jaw by the pivot pin mechanism. The upper jaw is pivotably connected to a hydraulic cylinder actuator on the arm and can be pivoted between an upper position and a crushing closed position. There is a power mechanism for pivoting the lower jaw between a horizontal scooping position and a dumping position and this mechanism can hold the lower jaw in a crushing position while the upper jaw is being pivoted by the hydraulic cylinder actuator. | 12-08-2011 |
Paul William Nye, Christchurch NZ
Patent application number | Description | Published |
---|---|---|
20140332269 | DELIVERY METHOD AND SYSTEM - A method for delivery of drilling fluid to a seafloor drilling assembly, the method comprising the steps of filling at least one container with drilling fluid; lowering the container through a body of water to adjacent a seafloor drilling assembly; connecting the container to the seafloor drilling assembly to deliver drilling fluid to the seafloor drilling assembly. | 11-13-2014 |
Philip Nye, Bournemouth GB
Patent application number | Description | Published |
---|---|---|
20130249433 | LIGHTING CONTROLLER - A lighting controller provides a user interface module and a lighting controller engine. The user interface module allows a user to specify settings for one or more lighting fixtures using descriptive, absolute or relative values, which the lighting controller engine translates into fixture-dependent values before sending them to the lighting fixtures. The user interface module also provides context-based displays and context-based controls. | 09-26-2013 |
Philip A. Nye, Southport AU
Patent application number | Description | Published |
---|---|---|
20160080354 | RECOVERY FROM ROLLING SECURITY TOKEN LOSS - An aspect of recovery from rolling security token loss includes storing, in a memory device accessible by a server computer, a token pair (B) transmitted to a client device. The token pair (B) includes an access token (a | 03-17-2016 |
20160080383 | RECOVERY FROM ROLLING SECURITY TOKEN LOSS - An aspect of recovery from rolling security token loss includes storing, in a memory device accessible by a server computer, a token pair (B) transmitted to a client device. The token pair (B) includes an access token (a2) and a refresh token (r2) and is generated as part of a refresh operation. An aspect also includes storing, in the memory device, a refresh token (r1) that was generated by the server computer before generation of the token pair B. The refresh token (r1) and the refresh token (r2) are each tagged as a valid refresh token. An aspect further includes receiving, at the server computer, a request to access a network resource that includes the access token (a2), invalidating the refresh token (r1), and providing the client device with access to the network resource. | 03-17-2016 |
Philip A. J. Nye, Southport AU
Patent application number | Description | Published |
---|---|---|
20140380475 | USER CENTRIC FRAUD DETECTION - A computer detects fraudulent access to user accounts of a network application. The computer receives user account usage profile information for a plurality of user accounts. Rules are determined, based in part on the user account profile information, that define account usage patterns across two or more user accounts that identify fraudulent user account usage. The computer receives user account usage event information for a plurality of user accounts. Based on the determined rules, the computer identifies fraudulent user account usage patterns in the user account usage event information and transmits a security alert to the user accounts associated with the identified fraudulent user account usage pattern. | 12-25-2014 |
20140380478 | USER CENTRIC FRAUD DETECTION - A computer detects fraudulent access to user accounts of a network application. The computer receives user account usage profile information for a plurality of user accounts. Rules are determined, based in part on the user account profile information, that define account usage patterns across two or more user accounts that identify fraudulent user account usage. The computer receives user account usage event information for a plurality of user accounts. Based on the determined rules, the computer identifies fraudulent user account usage patterns in the user account usage event information and transmits a security alert to the user accounts associated with the identified fraudulent user account usage pattern. | 12-25-2014 |
20160034685 | Sending a Password to a Terminal - A mechanism is provided for sending a password to a terminal. A password send request is received. The status of each of a plurality of terminals coupled to the information processing device via a network is acquired. On the basis of the acquired statuses, at least one item is selected from a group comprising the terminal serving as a destination for the password, the communication method with the terminal, or the method for inputting the password in the terminal. The password is then sent to the selected terminal via a network. | 02-04-2016 |
20160036955 | Authenticating a Second Terminal Based on Information Sensed by a First Terminal - A mechanism is provided for authenticating a second terminal based on information sensed by a first terminal. Responsive to receiving an authentication request, a first output request is sent to a second terminal instructing the second terminal to generate information able to be sensed by a sensor in a first terminal. An authentication of the authentication request is performed based on a condition that the sensor in the first terminal has sensed the information generated by the second terminal. | 02-04-2016 |
Philip A. J. Nye, Labrador AU
Patent application number | Description | Published |
---|---|---|
20100011438 | Role-Based Privilege Management - In one embodiment, a computer implemented method for role-based privilege management is provided. The computer implemented method receives a transformation request from a requester to form a received request, and identifies a target environment of the received request. The computer implemented method determines whether the target environment matches a predefined environment in a set of role-based privileges and, responsive to a determination that the target environment matches a predefined environment in the set of role-based privileges, maps the parameterized privileges from the set of role-based privileges to the target environment and performs the request. | 01-14-2010 |
Timothy G. Nye, Guelph CA
Patent application number | Description | Published |
---|---|---|
20090070290 | Method and Apparatus for Providing Geographically Authenticated Electronic Documents - A method and apparatus for providing geographically authenticated electronic documents is disclosed. Authentication for attributes for an electronic document stored on a computer network are defined, the attributes comprise at least one attribute describing a geographic location associated with the electronic document. Authenticated attributes (e.g., geographic location) of electronic documents (e.g., Web pages) allow for more accurate geographic searching and filtering. An authenticated digital certificate is created and associated with an electronic document. The authenticated digital certificate can be stored within the electronic document, such as can be done with HTML tags on a Web page. The digital certificate can also be stored as a separate file associated with the electronic document, as a separate signed digital certificate and as a database record. | 03-12-2009 |
20100082590 | Systems and Methods for Enhancing Web-Based Searching - A system for enhancing web-based searching is provided. Categorizing and clustering techniques are used to optimize searching. Businesses are classified using a control group of predetermined categories. The predetermined categories may be SIC codes or headings that are used to describe business activities. The website addresses for a business listed in the control group is determined, and the content of the business's website is extracted. The extracted content is associated with the predetermined category that the business is classified under. The extracted content is used to further enhance the overall classification scheme. The system may compare and match the extracted content with content of other business' websites, which are similarly categorized. If a relevant keyword match is identified in several of the websites, the keyword may be used to update the classification scheme. A new category or sub-category can be created based on this keyword. Furthermore, when a search is performed, the search results are organized by these categories, and using various processes, the most common results are kept and the less relevant results are discarded. | 04-01-2010 |
20110035401 | Method for Providing an Attribute Bounded Network of Computers - An attribute bounded network of computers is created. Computers in the distributed computer network are identified by specific attributes (e.g., a geographically bounded region) and a server is used to distribute processing assignments (e.g., addresses of electronic documents to be indexed) based upon the identified attributes. A peer-to-peer computer network is also provided based upon geographically bounded regions, the peer-to-peer computer network can be used to share electronic documents. A virtual community can be created within a peer-to-peer computer network by identifying peer computer connections based upon associated attributes (e.g., a geographically bounded region). The attribute bounded network of computers provides indexes having fresher data by allowing spidering of electronic documents more often than can be done by a central server indexing site. | 02-10-2011 |