Patents - stay tuned to the technology

Inventors list

Assignees list

Classification tree browser

Top 100 Inventors

Top 100 Assignees


Probert

Anthony Probert, Cambridge GB

Patent application numberDescriptionPublished
20150112601Processing Seismic Data by Nonlinear Stacking - Seismic data processing using one or more non-linear stacking enabling detection of weak signals relative to noise levels. The non-linear stacking includes a double phase, a double phase-weighted, a real phasor, a squared real phasor, a phase and an N-th root stack. Microseismic signals as recorded by one or more seismic detectors and transformed by transforming the signal to enhance detection of arrivals. The transforms enable the generation of an image, or map, representative of the likelihood that there was a source of seismic energy occurring at a given point in time at a particular point in space, which may be used, for example, in monitoring operations such as hydraulic fracturing, fluid production, water flooding, steam flooding, gas flooding, and formation compaction.04-23-2015
20150177400DETECTING AND CORRECTING CHANGES IN SIGNAL POLARITY FOR SEISMIC DATA PROCESSING - Utilizing the phase component of a moment tensor for a seismic data signal, isolated from the amplitude component, by automatically detecting polarity changes that occur over a focal mechanism of the seismic event, and correcting for such polarity reversals. Transforming seismic (including microseismic) signals as recorded by one or more seismic detectors to enhance detection of arrivals. The transforms enable the generation of an image, or map, representative of the likelihood that there was a source of seismic energy occurring at a given point in time at a particular point in time.06-25-2015
20150316669PROCESSING MICROSEISMIC DATA - A method of processing microseismic data obtained by a plurality of receivers. The method includes identifying a plurality of subsets of the microseismic data, wherein each subset of the microseismic data corresponds, respectively, to a microseismic event occurring underground at a known source location. The method also includes, for each combination of source location and receiver: determining a travel-time adjustment based on a spatial relationship between the source location and the receiver; and applying the travel-time adjustment to a waveform in a subset of the microseismic data that corresponds to the combination of source location and receiver. The method also includes combining the adjusted subsets of microseismic data to form composite microseismic data. The composite microseismic data may have a higher signal to noise ratio compared with the individual subsets of microseismic data, and as such, may be useful in determining a model that describes one or more properties relating to the propagation of elastic waves from at least one source location to a plurality of receivers, e.g. a static model or total travel-time model.11-05-2015

Brad Probert, Farmington Hills, MI US

Patent application numberDescriptionPublished
20130109534CONTROLLING GEARSHIFTING TO RPEVENT POWERTRAIN HUNTING05-02-2013

Brad W. Probert, Farmington Hills, MI US

Patent application numberDescriptionPublished
20110082003Control of Parallel Reaction Brakes in a Transmission - A method for controlling brakes of an automatic transmission including a first brake arranged in parallel with an overrunning brake between a planet pinion carrier and a housing, includes using the overrunning brake to provide brake torque equal to or less than a reference brake torque under positive torque conditions, increasing a torque capacity of the first brake when brake torque is greater than the reference brake torque, and fully engaging the first brake.04-07-2011
20140067229CONTROL OF VEHICLE DRIVELINE TORQUE - A method for controlling a vehicle driveline includes determining, for current vehicle operating conditions, an initial engine output torque, at which the driveline meets predetermined structural criteria, establishing a factor that varies with torque converter slip, determining an engine torque limit by multiplying the factor corresponding to a current torque converter slip by the initial engine output torque, and limiting torque produced by an engine connected to the driveline to the engine torque limit.03-06-2014

Christopher Probert, Bristol GB

Patent application numberDescriptionPublished
20120309048DIAGNOSTIC APPARATUS - A diagnostic apparatus (12-06-2012

Colin Edward Probert, Stafford GB

Patent application numberDescriptionPublished
20150179029METHOD AND SYSTEM FOR PATTERNING ELEMENTS HAVING TWO STATES - A patterning system includes transportable nodes, each having a unique identifier, and including an element having first and second states and a transceiver for receiving a element command signal. A transmitter sends a query command to the transportable nodes to validate the identifier against the database and activate validated transportable nodes to receive the signal. A controller sends the signal to activated transportable nodes to bring the plurality of nodes into one of their states to form a pattern. The controller can send pattern data to the transportable nodes, where each acts as a discrete part of an image array comprised of the transportable nodes, with each brought into one of its states in response to respective pattern data to create a pattern Methods include receiving identifying information from the transportable nodes, verifying if they are registered for a venue, and transmitting an element command signal to registered transportable nodes to create a pattern at the venue.06-25-2015

Dave Probert, Woodinville, WA US

Patent application numberDescriptionPublished
20100083261INTELLIGENT CONTEXT MIGRATION FOR USER MODE SCHEDULING - Embodiments for performing directed switches between user mode schedulable (UMS) thread and primary threads are disclosed. In accordance with one embodiment, a primary thread user portion is switched to a UMS thread user portion so that the UMS thread user portion is executed in user mode via the primary thread user portion. The primary thread is then transferred into kernel mode via an implicit switch. A kernel portion of the UMS thread is then executed in kernel mode using the context information of a primary thread kernel portion.04-01-2010
20100083275TRANSPARENT USER MODE SCHEDULING ON TRADITIONAL THREADING SYSTEMS - Embodiments for performing cooperative user mode scheduling between user mode schedulable (UMS) threads and primary threads are disclosed. In accordance with one embodiment, an asynchronous procedure call (APC) is received on a kernel portion of a user mode schedulable (UMS) thread. The status of the UMS thread as it is being processed in a multi-processor environment is determined. Based on the determined status, the APC is processed on the UMS thread.04-01-2010
20130268938TRANSPARENT USER MODE SCHEDULING ON TRADITIONAL THREADING SYSTEMS - Embodiments for performing cooperative user mode scheduling between user mode schedulable (UMS) threads and primary threads are disclosed. In accordance with one embodiment, an asynchronous procedure call (APC) is received on a kernel portion of a user mode schedulable (UMS) thread. The status of the UMS thread as it is being processed in a multi-processor environment is determined. Based on the determined status, the APC is processed on the UMS thread.10-10-2013

David Probert, Woodinville, WA US

Patent application numberDescriptionPublished
20110247001Resource Management In Computing Scenarios - This patent application pertains to urgency-based resource management in computing scenarios. One implementation can identify processes competing for resources on a system. The implementation can evaluate an urgency of individual competing processes. The implementation can also objectively allocate the resources among the competing processes in a manner that reduces a total of the urgencies of the competing processes.10-06-2011

David B. Probert, Woodinville, WA US

Patent application numberDescriptionPublished
20130061249DECOUPLING BACKGROUND WORK AND FOREGROUND WORK - Systems, methods, and apparatus for separately loading and managing foreground work and background work of an application. In some embodiments, a method is provided for use by an operating system executing on at least one computer. The operating system may identify at least one foreground component and at least one background component of an application, and may load the at least one foreground component for execution separately from the at least one background component. For example, the operating system may execute the at least one foreground component without executing the at least one background component. In some further embodiments, the operating system may use a specification associated with the application to identify at least one piece of computer executable code implementing the at least one background component.03-07-2013
20130061251EVENT AGGREGATION FOR BACKGROUND WORK EXECUTION - Systems, methods, and apparatus for separately managing foreground work and background work. In some embodiments, an operating system may identify at least one foreground component and at least one background component of a same application or different applications, and may manage the execution of the components differently. For example, the operating system may receive a request that at least one background component of an application be executed in response to at least one event. In response to detecting an occurrence of the at least one event, the operating system may determine whether at least one first condition set by the application is satisfied and whether at least one second condition set by the operating system is satisfied, and may execute the at least one background component when it is determined that the at least one first and second conditions are satisfied following the occurrence of the at least one event.03-07-2013
20130067494Resuming Applications and/or Exempting Applications from Suspension - Only a particular number of applications on a computing device are active at any given time, with applications that are not active being suspended. A policy is applied to determine when an application is to be suspended. However, an operating system component can have a particular application be exempted from being suspended (e.g., due to an operation being performed by the application). Additionally, an operating system component can have an application that has been suspended resumed (e.g., due to a desire of another application to communicate with the suspended application).03-14-2013
20140040917Resuming Applications and/or Exempting Applications from Suspension - Only a particular number of applications on a computing device are active at any given time, with applications that are not active being suspended. A policy is applied to determine when an application is to be suspended. However, an operating system component can have a particular application be exempted from being suspended (e.g., due to an operation being performed by the application). Additionally, an operating system component can have an application that has been suspended resumed (e.g., due to a desire of another application to communicate with the suspended application).02-06-2014
20150301835DECOUPLING BACKGROUND WORK AND FOREGROUND WORK - Systems, methods, and apparatus for separately loading and managing foreground work and background work of an application. In some embodiments, a method is provided for use by an operating system executing on at least one computer. The operating system may identify at least one foreground component and at least one background component of an application, and may load the at least one foreground component for execution separately from the at least one background component. For example, the operating system may execute the at least one foreground component without executing the at least one background component. In some further embodiments, the operating system may use a specification associated with the application to identify at least one piece of computer executable code implementing the at least one background component.10-22-2015
20160085601TRANSPARENT USER MODE SCHEDULING ON TRADITIONAL THREADING SYSTEMS - Embodiments for performing cooperative user mode scheduling between user mode schedulable (UMS) threads and primary threads are disclosed. In accordance with one embodiment, privileged hardware states are transferred from a kernel portion of a UMS thread to a kernel portion of a primary thread.03-24-2016
20160092678Protecting Application Secrets from Operating System Attacks - Various embodiments provide techniques and devices for protecting application secrets from operating system attacks. In some examples, applications execute with an isolated user mode of a secure execution environment, while relying on an operating system executing within a separate execution environment for resource management and system services. A proxy kernel can control access by the operating system to data associated with the secure execution environment. Further, the proxy kernel can act as a transparent interface between isolated user mode applications and the operating system during the provision of resource management and system services.03-31-2016

Patent applications by David B. Probert, Woodinville, WA US

Graeme David Probert, Louth Park AU

Patent application numberDescriptionPublished
20130203845Synergistic, Non-Equilibrium Aldehyde Biocides - A disinfectant solution comprising: an aldehyde; a polyol; one or more acetal derivatives formed by reaction of said aldehyde with said polyol; one or more surfactants selected from the general classes anionic, cationic, or non-ionic; one or more pH buffering agents selected from the group consisting of monosodium phosphate, disodium phosphate, trisodium phosphate, sodium tetraborate, sodium bicarbonate, sodium citrate, phosphoric acid, boric acid and citric acid. The invention also relates to a process of producing the disinfectant solution, and a method of disinfecting and/or sterilizing heat sensitive medical devices comprising treating the medical devices with the disinfectant solution of the invention.08-08-2013

John Carl Probert, Madison, WI US

Patent application numberDescriptionPublished
20090183737PULSE WIDTH MODULATED MEDICAL GAS CONCENTRATION CONTROL - A specified concentration of oxygen in a medical gas delivered to a patient by a gas delivery system can be achieved through the use of pulse width modulation control of the flows of one or more component medical gases. The flow of component medical gases can be controlled to improve the resolution and concentration range of medical gas delivered at low flow rates. A first flow of a first medical gas is provided and a second flow of a second medical gas is introduced to achieve a desired average medical gas concentration. When the second flow of the second medical gas is introduced, the first flow of the first medical gas is reduced to maintain a desired total medical gas flow rate.07-23-2009

Lesley Probert, Athens GR

Patent application numberDescriptionPublished
20110243981THERAPEUTIC MYELIN SHEATH DERIVED ANTAGONIST PEPTIDE CONJUGATES - A first aspect of the invention relates to a conjugate comprising: (i) mannan; and (ii) at least one epitope comprising a peptide fragment of a protein selected from myelin basic protein (MBP), myelin oligodentrocyte glycoprotein (MOG) and proteolipid protein (PLP), said peptide fragment being in linear or cyclic form; wherein said epitope is linked to mannan via a [(LyS-GIy)n] bridge, where n is an integer from 1 to 10. Further aspects of the invention relate to pharmaceutical compositions comprising said conjugates, and their use in the preparation of a medicament for treating an immune disorder.10-06-2011
20150239951Methods of Treating Neurological Diseases - The present disclosure is directed to a method of treating neurological disorder comprising peripheral administration to a patient in need thereof a DN-TNF polypeptide that inhibits the activity of soluble TNF- but not transmembrane TNF-α.08-27-2015

Lesley Probert, Kifisia GR

Patent application numberDescriptionPublished
20160095935CONJUGATES COMPRISING MANNAN AND MYELIN BASIC PROTEIN (MBP) - A first aspect of the invention relates to a conjugate including mannan and at least one epitope comprising a peptide fragment of a protein selected from myelin basic protein (MBP), myelin oligodentrocyte glycoprotein (MOG) and proteolipid protein (PLP), said peptide fragment being in linear or cyclic form; and wherein said epitope is linked to mannan via a [(Lys-Gly)04-07-2016

Neal Probert, Farmington Hills, MI US

Patent application numberDescriptionPublished
20140145861VEHICLE INTERSECTION WARNING SYSTEM AND METHOD - A vehicle intersection warning method is provided. The method comprises exchanging host vehicle information and remote vehicle information between a host vehicle and a remote vehicle, determining a presence of a road intersection based on at least one of the host vehicle information and the remote vehicle information. determining, by operation of a processor, whether a possibility of contact between the host vehicle and the remote vehicle exists proximate the intersection based on the exchanged host vehicle information and remote vehicle information, and evaluating an operating condition of a brake of the host vehicle while the possibility of contact exists to determine a type of warning to provide to the host vehicle.05-29-2014
20140148998VEHICLE INTERSECTION MONITORING SYSTEM AND METHOD - A vehicle intersection monitoring method includes exchanging host vehicle information and remote vehicle information between a host vehicle and a remote vehicle, identifying a road intersection based on at least one of the host vehicle information and the remote vehicle information, and selecting an intersection scenario from a plurality of intersection scenarios based on the host vehicle information and the remote vehicle information. The method further includes monitoring, by operation of a processor, a location relationship between the host vehicle and the remote vehicle according to an algorithm that is determined based on the selected intersection scenario, to determine whether a possibility of contact between the host vehicle and the remote vehicle exists proximate to the intersection, and performing a threat mitigation operation while the possibility of contact exists.05-29-2014
20140148999VEHICLE INTERSECTION MONITORING SYSTEM AND METHOD - A vehicle intersection monitoring method includes exchanging host and remote vehicle information including information pertaining to host and remote vehicle locations and headings, respectively, and determining whether the host and remote vehicles are travelling on converging paths based on the host vehicle and/or remote vehicle information. The method further includes determining a possibility of the host and remote vehicles contacting each other at a contact location based on host and remote vehicle travel times from the host vehicle and remote vehicle locations, respectively, to the contact location that is determined based on the host and remove vehicle information, determining a threshold value based on a current moving state of the host vehicle while the possibility of the host and remote vehicles contacting each other exists, and evaluating whether to perform a threat mitigation operation based on a condition of the host vehicle in relation to the threshold value.05-29-2014
20140149031VEHICLE INTERSECTION MONITORING SYSTEM AND METHOD - A vehicle intersection monitoring method includes exchanging host vehicle information and remote vehicle information between a host vehicle and a remote vehicle, with the host vehicle information including information pertaining to a host vehicle location, a host vehicle heading and a host vehicle intended next maneuver and the remote vehicle information including information pertaining to a remote vehicle location, a remote vehicle heading and a remote vehicle intended next maneuver. The method further includes identifying a road intersection relating to the host vehicle heading and the remote vehicle heading, selecting an intersection scenario from a plurality of intersection scenarios based on the host vehicle information and the remote vehicle information, and monitoring, by operation of a processor, a location relationship between the host vehicle and the remote vehicle according to an algorithm that is determined based on the selected intersection scenario.05-29-2014
20140200782VEHICLE TURN MONITORING SYSTEM AND METHOD - A vehicle turn monitoring method comprises determining an intent for a host vehicle to execute a left turn before the host vehicle begins to execute the left turn, monitoring a location relationship between the host vehicle and a remote vehicle before the host vehicle begins to execute the left turn, and evaluating a travelling condition of the host vehicle before the host vehicle begins to execute the left turn. The method further includes determining, by operation of a processor, whether to perform a threat mitigation operation before the host vehicle begins to execute the left turn based on the location relationship and the travelling condition.07-17-2014
20150032362VEHICLE COLLISION MONITORING METHOD - A vehicle collision monitoring method comprises preparing a host vehicle message including information pertaining to a host vehicle including a host vehicle location and a host vehicle heading, receiving a remote vehicle message including information pertaining to a remote vehicle including a remote vehicle location and a remote vehicle heading, and evaluating, using a controller, whether the host vehicle heading and the remote vehicle heading are converging paths. The evaluating includes segregating an area surrounding the host vehicle location into a plurality of sectors, determining which of the sectors is a remote vehicle sector including the remote vehicle location, and determining whether the host vehicle heading and the remote vehicle heading are converging paths based on the host vehicle location, the host vehicle heading, the remote vehicle location, the remote vehicle heading and a characteristic relating to the sector that includes the remote vehicle location.01-29-2015
20150123778VEHICLE CONTACT AVOIDANCE SYSTEM - A vehicle contact avoidance system includes a detection system, a warning system, and a controller. The detection system is configured to detect a remote obstacle in proximity to a host vehicle equipped with the vehicle contact avoidance system, including information related to at least one of a speed, a direction and a distance of the remote obstacle relative to the host vehicle. The warning system is configured to emit a warning sound to notify a driver of the host vehicle of imminent contact between the host vehicle and the remote obstacle. The controller is programmed to determine whether contact between the host vehicle and the remote obstacle is imminent based of the information supplied to the controller by the detection system, and programmed to cause the warning system to emit the warning sound. The warning sound includes a non-speech portion and a speech portion.05-07-2015
20150254977VEHICLE CONTACT WARNING METHOD AND SYSTEM - A vehicle contact warning method and system are provided in a host vehicle. A communication device of the host vehicle receives a remote vehicle message including information pertaining to a remote vehicle including a remote vehicle location and a remote vehicle trajectory. A controller of the host vehicle prepares a host vehicle location and a host vehicle trajectory. The controller determines a possibility of contact between the host vehicle and the remote vehicle at a contact location at a contact time based on a host vehicle travel time from the host vehicle location to the contact location based on the host vehicle information and a remote vehicle travel time from the remote vehicle location to the contact location based on the remote vehicle information. The controller automatically operates an external warning device to the host vehicle, the remote vehicle, or both, upon determining the possibility of contact exists between the host vehicle and the remote vehicle.09-10-2015
20150254982ON-BOARD VEHICLE CONTROL SYSTEM AND METHOD FOR DETERMINING WHETHER A VALUE IS WITHIN AN AREA OF INTEREST FOR EXTRANEOUS WARNING SUPPRESSION - An on-board vehicle control system and method employ a storage device that stores information representing a plurality of boundary points of a boundary circumscribing an area of interest in which the boundary points are defined by two prescribed parameters, and a controller that obtains at least one condition point defined by current values of the prescribed parameters, determines a first boundary point of the boundary points that is closest to the condition point, and generates geometric data representing a geometric relationship between the first boundary point, the condition point and a second boundary point of the boundary points. The controller performs further calculations taking into account the geometric data to generate coordinate condition data, and determines whether a warning condition exists by determining whether the condition point lies within the area of interest based on a comparison between coordinates of the condition point and the coordinate condition data.09-10-2015
20150256534ON-BOARD VEHICLE COMMUNICATION SYSTEM AND METHOD - An on-board vehicle communication system and method employ a storage device, a communication device and a controller. The storage device is configured to store a plurality of security certificates. The communication device is configured to receive external information that is external to a host vehicle equipped with the on-board vehicle communication system. The controller is configured to determine whether to begin a security certificate replenishment process to attempt to receive additional security certificates from at least one source that is external of the host vehicle based on the received external information, upon an amount of security certificates stored in the storage device decreasing below a first prescribed threshold.09-10-2015
20150360601VEHICLE HEADLIGHT CONTROL SYSTEM AND METHOD - A vehicle headlight control system includes a headlight, a positioning system, a receiver, and a controller. The positioning system is configured to generate host vehicle information including a host vehicle location and a host vehicle trajectory. The receiver is configured to receive remote vehicle information including a remote vehicle location and a remote vehicle trajectory. The controller is configured to calculate a remote vehicle distance from the host vehicle location based on the remote vehicle information and the host vehicle information, determine whether the remote vehicle distance is less than a predetermined distance, and automatically operate the headlight in a first setting while the remote vehicle distance is determined to be less than the predetermined distance.12-17-2015
20160027304ON-BOARD VEHICLE CONTROL SYSTEM AND METHOD FOR DETERMINING WHETHER A VALUE IS WITHIN AN AREA OF INTEREST FOR EXTRANEOUS WARNING SUPPRESSION - A condition monitoring system and method employ a storage device that stores information representing a plurality of boundary points of a boundary circumscribing an area of interest in which the boundary points are defined by two prescribed parameters, and a controller that obtains at least one condition point defined by current values of the prescribed parameters, determines a first boundary point of the boundary points that is closest to the condition point, and generates geometric data representing a geometric relationship between the first boundary point, the condition point and a second boundary point of the boundary points. The controller performs further calculations taking into account the geometric data to generate coordinate condition data, and determines whether the condition point lies within the area of interest based on a comparison between coordinates of the condition point and the coordinate condition data.01-28-2016
20160096519METHOD AND SYSTEM OF MONITORING PASSENGER BUSES - A method of monitoring passenger buses includes generating host vehicle information with a navigation unit, the host vehicle information including a host vehicle location and a host vehicle heading, receiving passenger bus information with a receiver, the passenger bus information including an passenger bus status, a passenger bus location and a passenger bus heading, determining with a controller a distance between the host vehicle location and the passenger bus location, determining with the controller whether the distance between host vehicle location and the passenger bus location is decreasing, and performing a mitigation operation, when the distance between host vehicle location and the passenger bus location is decreasing, and the distance between host vehicle location and the passenger bus location is a threshold distance or less.04-07-2016
20160098926METHOD AND SYSTEM OF MONITORING EMERGENCY VEHICLES - A method of monitoring emergency vehicles includes generating host vehicle information with a navigation unit, the host vehicle information including a host vehicle location and a host vehicle heading, receiving emergency vehicle information with a receiver, the emergency vehicle information including an emergency vehicle emergency status, an emergency vehicle location and an emergency vehicle heading, determining with a controller a distance between the host vehicle location and the emergency vehicle location, determining with the controller whether the distance between host vehicle and the emergency vehicle is decreasing, and performing a mitigation operation, when the distance between host vehicle and the emergency vehicle is decreasing, and the distance between host vehicle and the emergency vehicle is a threshold distance or less.04-07-2016

Patent applications by Neal Probert, Farmington Hills, MI US

Norman Probert, Worcester GB

Patent application numberDescriptionPublished
20100002347STREET FURNITURE SAFETY DEVICE - The invention provides an animal asphyxiation device comprising a housing (01-07-2010

Stephen Probert, Flagstaff, AZ US

Patent application numberDescriptionPublished
20090065136FOAMING METHODS FOR MAKING CELLULAR THERMOPLASTIC MATERIALS - Methods for reducing the density of thermoplastic materials and the articles made therefrom having similar or improved mechanical properties to the solid or noncellular material. Also disclosed are improvements to foaming methods and the cellular structures of the foams made therefrom, and methods for altering the impact strength of solid or noncellular thermoplastic materials and the shaping of the materials into useful articles.03-12-2009
20120090764FOAMING METHODS FOR MAKING CELLULAR THERMOPLASTIC MATERIALS - Methods for reducing the density of thermoplastic materials and the articles made therefrom having similar or improved mechanical properties to the solid or noncellular material. Also disclosed are improvements to foaming methods and the cellular structures of the foams made therefrom, and methods for altering the impact strength of solid or noncellular thermoplastic materials and the shaping of the materials into useful articles.04-19-2012

Stephen Michael Probert, Flagstaff, AZ US

Patent application numberDescriptionPublished
20110003133METHOD FOR MAKING SHAPEABLE MICROCELLULAR POLY LACTIC ACID ARTICLES - A method for making a shapeable article from poly(lactic acid) includes treating solid poly(lactic acid) that results in the solid poly(lactic acid) having a crystallinity of at least 20% by weight based on the weight of the solid poly(lactic acid) and a gas concentration of 6% to 16% by weight based on the weight of the solid poly(lactic acid); and heating the solid poly(lactic acid) having said minimum crystallinity and gas concentration to produce a cellular poly(lactic acid) article that is shapeable. The shapeable cellular poly(lactic acid) article is advantageous in that the article can be further shaped by heat and/or pressure (or vacuum), such as via thermoforming, into a variety of useful products.01-06-2011
20150093564METHOD FOR MAKING SHAPEABLE MICROCELLULAR POLY LACTIC ACID ARTICLES - A method for making a shapeable article from poly(lactic acid) includes treating solid poly(lactic acid) that results in the solid poly(lactic acid) having a crystallinity of at least 20% by weight based on the weight of the solid poly(lactic acid) and a gas concentration of 6% to 16% by weight based on the weight of the solid poly(lactic acid); and heating the solid poly(lactic acid) having said minimum crystallinity and gas concentration to produce a cellular poly(lactic acid) article that is shapeable. The shapeable cellular poly(lactic acid) article is advantageous in that the article can be further shaped by heat and/or pressure (or vacuum), such as via thermoforming, into a variety of useful products.04-02-2015

Thomas H. Probert, Holden, MA US

Patent application numberDescriptionPublished
20140108803STEGANOGRAPHIC MESSAGING SYSTEM USING CODE INVARIANTS - A steganographic method to prevent the execution of malicious code and mitigate software piracy. The method uses invariant portions of machine instructions to create an executable watermark within unmodified code. This watermark can be verified at any stage of the software lifecycle, including dynamically and continuously during execution, to detect foreign code by verifying the integrity of the watermark prior to execution. In addition, the watermark may serve as a steganographic covert channel concealing additional information. Code invariants are not altered by binding operations such as loading and linking on different machines, and thus may be employed to consistently and repeatedly identify an unmodified instantiation of a particular program. The use of opcodes and register references as invariants avoids trivial register substitution as a means of program differentiation that eludes detection. The split key structure of the resulting cipher implies that knowledge of only the code (first key) or the cipher table (second key) alone is insufficient to derive the message.04-17-2014
20140337639STEGANOGRAPHIC EMBEDDING OF EXECUTABLE CODE - A method for digital immunity includes identifying a call graph of an executable entity, and mapping nodes of the call graph to a cipher table of obscured information, such that each node based on invariants in the executable entity. A cipher table maintains associations between the invariants and the obscured information. Construction of an obscured information item, such as a executable set of instructions or a program, involves extracting, from the cipher table, ordered portions of the obscured information, in which the ordered portions have a sequence based on the ordering of the invariants, and ensuring that the obscured information matches a predetermined ordering corresponding to acceptable operation, such as by execution of the instructions represented by the obscured information, or steganographic target program (to distinguish from the executable entity being evaluated). The unmodified nature of the executable entity is assured by successful execution of the steganographic target program.11-13-2014
20160094349STEGANOGRAPHIC EMBEDDING OF EXECUTABLE CODE - A method for digital immunity includes identifying a call graph of an executable entity, and mapping nodes of the call graph to a cipher table of obscured information, such that each node based on invariants in the executable entity. A cipher table maintains associations between the invariants and the obscured information. Construction of an obscured information item, such as a executable set of instructions or a program, involves extracting, from the cipher table, ordered portions of the obscured information, in which the ordered portions have a sequence based on the ordering of the invariants, and ensuring that the obscured information matches a predetermined ordering corresponding to acceptable operation, such as by execution of the instructions represented by the obscured information, or steganographic target program (to distinguish from the executable entity being evaluated). The unmodified nature of the executable entity is assured by successful execution of the steganographic target program.03-31-2016
Website © 2016 Advameg, Inc.