Susan S.
Susan S. Alfini, Champlin, MN US
Patent application number | Description | Published |
---|---|---|
20120004519 | Motion Cancellation of Optical Input Signals for Physiological Pulse Measurement - A pulse rate sensor that includes an accelerometer for measuring periodic motion and a piezo sensor for detecting erratic motion is capable of more accurately determining pulse rate by accounting for these types of motion. The pulse rate sensor in accordance with the present invention diminishes pulse rate signal degradation due to erratic motion through a combination of algorithms that control signal boosting, waveform refinement and signal noise suppression. | 01-05-2012 |
Susan S. Daymude, Valencia, CA US
Patent application number | Description | Published |
---|---|---|
20100176762 | Vertical Charging Apparatus - An apparatus for storing and charging a plurality of devices. The apparatus includes a plurality of holders and a power source. The holders may be vertically aligned. The power source can be connected to a standard outlet or, for portability, a battery pack or solar panel. The apparatus also includes a support member coupled to the power source to support the holders. For each holder within the plurality of holders, a universal outlet capable of charging an electronic device may be provided. Each universal outlet can be coupled with a connector providing the appropriate power to the electrical device placed on the holder. Otherwise, the apparatus may maintain connectors within the power source and routed through wire molded slots to each holder to provide the appropriate power to the electrical device placed on the holder. | 07-15-2010 |
Susan S. Flemma, Charlotte, NC US
Susan S. Hanis, Raleigh, NC US
Patent application number | Description | Published |
---|---|---|
20090132482 | SYSTEM AND METHOD FOR PROVIDING USER-TAILORED VIEWS - A method and computer program product include defining one or more filter criteria based upon, at least in part, an organizational structure. A body of content is filtered based upon, at least in part, the defined filter criteria. At least a portion of the filtered body of content is provided. | 05-21-2009 |
Susan S. Hanis, Research Triangle Park, NC US
Patent application number | Description | Published |
---|---|---|
20120311554 | METHOD AND SYSTEM FOR LOADING PROGRAM MODULES - Loading program modules with hierarchical relationship can include receiving a request for loading the program modules from a client, the request including root module information in the program modules to be loaded and, according to the root module information in the request, obtaining a root module to be loaded and child modules of the root module to be loaded using a central processing unit. The root module and the child modules of the root module can be sent to the client. | 12-06-2012 |
Susan S. Owicki, Palo Alto, CA US
Patent application number | Description | Published |
---|---|---|
20080215891 | Systems and Methods for Watermarking Software and Other Media - Systems and methods are disclosed for embedding information in software and/or other electronic content such that the information is difficult for an unauthorized party to detect, remove, insert, forge, and/or corrupt. The embedded information can be used to protect electronic content by identifying the content's source, thus enabling unauthorized copies or derivatives to be reliably traced, and thus facilitating effective legal recourse by the content owner. Systems and methods are also disclosed for protecting, detecting, removing, and decoding information embedded in electronic content, and for using the embedded information to protect software or other media from unauthorized analysis, attack, and/or modification. | 09-04-2008 |
20080301452 | Systems and Methods for Watermarking Software and Other Media - Systems and methods are disclosed for embedding information in software and/or other electronic content such that the information is difficult for an unauthorized party to detect, remove, insert, forge, and/or corrupt. The embedded information can be used to protect electronic content by identifying the content's source, thus enabling unauthorized copies or derivatives to be reliably traced, and thus facilitating effective legal recourse by the content owner. Systems and methods are also disclosed for protecting, detecting, removing, and decoding information embedded in electronic content, and for using the embedded information to protect software or other media from unauthorized analysis, attack, and/or modification. | 12-04-2008 |
20090178022 | SYSTEMS AND METHODS FOR WATERMARKING SOFTWARE AND OTHER MEDIA - Systems and methods are disclosed for embedding information in software and/or other electronic content such that the information is difficult for an unauthorized party to detect, remove, insert, forge, and/or corrupt. The embedded information can be used to protect electronic content by identifying the content's source, thus enabling unauthorized copies or derivatives to be reliably traced, and thus facilitating effective legal recourse by the content owner. Systems and methods are also disclosed for protecting, detecting, removing, and decoding information embedded in electronic content, and for using the embedded information to protect software or other media from unauthorized analysis, attack, and/or modification. | 07-09-2009 |
20100268958 | Systems and Methods for Watermarking Software and Other Media - Systems and methods are disclosed for embedding information in software and/or other electronic content such that the information is difficult for an unauthorized party to detect, remove, insert, forge, and/or corrupt. The embedded information can be used to protect electronic content by identifying the content's source, thus enabling unauthorized copies or derivatives to be reliably traced, and thus facilitating effective legal recourse by the content owner. Systems and methods are also disclosed for protecting, detecting, removing, and decoding information embedded in electronic content, and for using the embedded information to protect software or other media from unauthorized analysis, attack, and/or modification. | 10-21-2010 |
20110035733 | Software Self-Defense Systems and Methods - Systems and methods are disclosed for protecting a computer program from unauthorized analysis and modification. Obfuscation transformations can be applied to the computer program's local structure, control graph, and/or data structure to render the program more difficult to understand and/or modify. Tamper-resistance mechanisms can be incorporated into the computer program to detect attempts to tamper with the program's operation. Once an attempt to tamper with the computer program is detected, the computer program reports it to an external agent, ceases normal operation, and/or reverses any modifications made by the attempted tampering. The computer program can also be watermarked to facilitate identification of its owner. The obfuscation, tamper-resistance, and watermarking transformations can be applied to the computer program's source code, object code, or executable image. | 02-10-2011 |
20130191644 | SYSTEMS AND METHODS FOR WATERMARKING SOFTWARE AND OTHER MEDIA - Systems and methods are disclosed for embedding information in software and/or other electronic content such that the information is difficult for an unauthorized party to detect, remove, insert, forge, and/or corrupt. The embedded information can be used to protect electronic content by identifying the content's source, thus enabling unauthorized copies or derivatives to be reliably traced, and thus facilitating effective legal recourse by the content owner. Systems and methods are also disclosed for protecting, detecting, removing, and decoding information embedded in electronic content, and for using the embedded information to protect software or other media from unauthorized analysis, attack, and/or modification. | 07-25-2013 |
20130232343 | SOFTWARE SELF-DEFENSE SYSTEMS AND METHODS - Systems and methods are disclosed for protecting a computer program from unauthorized analysis and modification. Obfuscation transformations can be applied to the computer program's local structure, control graph, and/or data structure to render the program more difficult to understand and/or modify. Tamper-resistance mechanisms can be incorporated into the computer program to detect attempts to tamper with the program's operation. Once an attempt to tamper with the computer program is detected, the computer program reports it to an external agent, ceases normal operation, and/or reverses any modifications made by the attempted tampering. The computer program can also be watermarked to facilitate identification of its owner. The obfuscation, tamper-resistance, and watermarking transformations can be applied to the computer program's source code, object code, or executable image. | 09-05-2013 |
20150200782 | SYSTEMS AND METHODS FOR WATERMARKING SOFTWARE AND OTHER MEDIA - Systems and methods are disclosed for embedding information in software and/or other electronic content such that the information is difficult for an unauthorized party to detect, remove, insert, forge, and/or corrupt. The embedded information can be used to protect electronic content by identifying the content's source, thus enabling unauthorized copies or derivatives to be reliably traced, and thus facilitating effective legal recourse by the content owner. Systems and methods are also disclosed for protecting, detecting, removing, and decoding information embedded in electronic content, and for using the embedded information to protect software or other media from unauthorized analysis, attack, and/or modification. | 07-16-2015 |
Susan S. Pawlikowski, Tatamy, PA US
Patent application number | Description | Published |
---|---|---|
20150265064 | Furniture Covers - A convertible furniture cover is provided for covering a furniture seat cushion. The cover fits cushions of a box-style piece of furniture and can be converted by extending an extendable pocket to cover the cushion of a T-style piece of furniture. A furniture cover is also provided for covering both a box-style and a T-style piece of furniture wherein the cover comprises a loop for holding the cover against the front face of an arm of a piece of furniture. | 09-24-2015 |
Susan S. Polachek, Barrington, IL US
Patent application number | Description | Published |
---|---|---|
20150079326 | Security Sticker and Method for Banking Cards - The present invention relates to banking card stickers that provide protection of information displayed on banking cards, by allowing the user to apply an adhesive backed, tamper evident and opaque sticker over all but the last four numbers of the user's card on the front and back of the card, the card code number on either the front or rear of the card, and the card's signature block. Each strip is adhesive backed and opaque. Different embodiments of the security stickers are provided for the user to choose for different kinds of banking cards. An adhesive sticker kit for banking cards may have at least two adhesive stickers covering the front and back of the bank account numbers displayed on the banking cards, at least one sticker of different size covering the security code of the banking cards, another sticker covering the signature block, and at least one sticker displays account information protection advisory statements. The security sticker substrate has a top layer that will crack if someone attempts to remove the sticker from the card, thereby alerting the cardholder that someone has tampered with the banking card. The cardholder may then notify the bank service provider that the card has been compromised. | 03-19-2015 |
Susan S. Sorini-Wong, Laramie, WY US
Patent application number | Description | Published |
---|---|---|
20100064698 | Temperature Control Transport System - Embodiments of the inventive technology may involve the use of layered, insulated PCM assemblage that itself comprises: modular insulating foam material | 03-18-2010 |
Susan S. Taylor, Del Mar, CA US
Patent application number | Description | Published |
---|---|---|
20090061442 | Screening assay to identify non-ATP-competitors targeting protein kinase A - Methods for screening compounds for their activity as a protein kinase A modulators are provided. The methods are based on fluorescence polarization of peptide probes to identify drug candidates that act by activating or inhibiting the catalytic function of PKA. In certain embodiments, the methods are adapted for high throughput screening. | 03-05-2009 |
Susan S. Wigdal, Belleville, WI US
Patent application number | Description | Published |
---|---|---|
20110111397 | CONNEXIN ALLELE DETECTION ASSAYS - The present invention provides compositions and methods for the detection and characterization of mutations associated with non-syndromic hearing impairment. More particularly, the present invention provides compositions, methods and kits for using invasive cleavage structure assays (e.g. the INVADER assay) to screen nucleic acid samples, e.g., from patients, for the presence of any one of a collection of mutations in the Connexin 26, or gap junction beta 2, gene associated with non-syndromic hearing loss. | 05-12-2011 |
Susan S. Yonemura, Fort Collins, CO US
Patent application number | Description | Published |
---|---|---|
20120264852 | POLYMERIC MATERIALS INCLUDING A GLYCOSAMINOGLYCAN NETWORKED WITH A POLYOLEFIN-CONTAINING POLYMER - The present invention relates to polymeric materials including a glycosaminoglycan networked with a polyolefin-containing polymer. The present invention also relates to hydrogels containing the polymeric materials. The present invention further relates to methods of synthesizing the polymeric materials and hydrogels of the present invention. | 10-18-2012 |
20150031800 | POLYMERIC MATERIALS INCLUDING A GLYCOSAMINOGLYCAN NETWORKED WITH A POLYOLEFIN-CONTAINING POLYMER - The present invention relates to polymeric materials including a glycosaminoglycan networked with a polyolefin-containing polymer. The present invention also relates to hydrogels containing the polymeric materials. The present invention further relates to methods of synthesizing the polymeric materials and hydrogels of the present invention. | 01-29-2015 |