Ward, GA
Charles Barry Ward, Alphareta, GA US
Patent application number | Description | Published |
---|---|---|
20090059463 | MULTI-VALUE CAPACITOR WITH SAFETY DISCONNECT MECHANISM - A multi-value capacitor with a safety disconnect mechanism has a capacitive element with six capacitive sections, a common wire, and six section wires enclosed in a cylindrical metal can with a metal lid that normally has a concave configuration. The wires are soldered to contacts extending through the concave metal lid. The safety disconnect mechanism includes an external insulator disk with terminals. The terminals in the insulator disk align with the contacts in the metal lid. The center common terminal of the insulator disk is fixedly riveted to the center common contact of the metal lid. Spring elements form the electrical connection between the section terminals of the insulator disk and the section contacts in the metal lid. If an overload condition occurs, pressure inside the sealed metal can causes the metal lid to spring from its concave configuration to a convex configuration, which causes the whole insulator disk to pop up and thereby simultaneously break the connection between all of the section contacts in the metal lid and the section terminals of the insulator disk. | 03-05-2009 |
Charles Barry Ward, Alpharetta, GA US
Patent application number | Description | Published |
---|---|---|
20090053073 | Condensate Pump - A condensate pump for an HVAC system includes a reservoir, a unitary top support plate, and a cover. A pump motor, an impeller pump, a float, and control electronics are mounted on the unitary top support plate. The transition from the cylindrical volute chamber to the tangential output port of the impeller pump has a swept diagonal surface that creates a gradual transition from the cylindrical volute chamber to the tangential output port. The gradual transition minimizes the pulsing. An intake profile with a concave surface extends from the center of the impeller and matches a complementary intake profile extending from the bottom of the reservoir. Vortex inhibiting vanes are molded into the bottom of the reservoir adjacent the central intake port of the impeller pump to break up any induced vortex within the reservoir. | 02-26-2009 |
20100037644 | Condensate Pump - A condensate pump for an HVAC system includes a reservoir, a solenoid pump assembly with a solenoid pump, and a solenoid pump electronic control module for limiting the amount of energy delivered to the solenoid pump during one half cycle from an AC current source. The solenoid pump is mounted in the solenoid pump assembly by means of shock absorbing material, and the solenoid pump assembly is mounted on a support member with shock absorbing material interposed between the solenoid pump assembly and the support member. | 02-18-2010 |
20100162822 | Heating and Air Conditioning Service Gauge - A service gauge for determining refrigerant pressure and the saturated vapor equivalent temperature, or other parameters, for a refrigerant in an HVAC system. In one embodiment, the service gauge employs a bourdon tube with at least one attached strain gauge to sense the refrigerant pressure and produce an electronic pressure signal. In another embodiment, a magnet and rotary position sensor produces an electronic signal proportional to the refrigerant pressure. The electronic pressure signal from the output of the strain gauge or the rotary position sensor is connected to a microprocessor, which calculates and displays the refrigerant pressure, the saturated vapor equivalent temperature for a variety of refrigerants, produces instantaneous and time lapsed representations of those parameters, and other parameters of the refrigerant. | 07-01-2010 |
20110061415 | Condensate Pump - A condensate pump for an HVAC system includes a reservoir for collecting condensate water, a pump motor connected to an impeller pump for pumping the condensate water out of the reservoir, and a floatless pump control module. The floatless pump's microcontroller detects the water level in the reservoir and, based on the water level in the reservoir, controls the operation of the pump motor, and if necessary, sounds an alarm and shuts down the HVAC system. The floatless pump microcontroller may employ an ultrasonic transducer or capacitance sensors to detect the level of condensate water in the reservoir. The microcontroller implements a variable water lift feature to pump the water using the lowest possible speed for the pump. The microcontroller implements a self-cleaning feature to pump stagnant water out of the reservoir and to pulse water in the drain line and the agitation of the water in the reservoir. The microcontroller implements an anti-clog feature to clear a clogged drain line when an overflow condition is detected. | 03-17-2011 |
20110085917 | Condensate Pump - A condensate pump for an HVAC system includes a reservoir for collecting condensate water, a pump motor connected to an impeller pump for pumping the condensate water out of the reservoir, and a floatless pump controller. The floatless pump controller detects the water level in the reservoir and, based on the water level in the reservoir, controls the operation of the pump motor, and if necessary, sounds an alarm and shuts down the HVAC system. The floatless pump controller may employ an ultrasonic transducer or capacitance sensors to detect the level of condensate water in the reservoir. | 04-14-2011 |
20110262285 | Condensate Pump - A condensate pump for an HVAC system includes a reservoir for collecting condensate water, a pump motor connected to an impeller pump for pumping the condensate water out of the reservoir, and a floatless pump controller. The floatless pump controller detects the water level in the reservoir and, based on the water level in the reservoir, controls the operation of the pump motor, and if necessary, sounds an alarm and shuts down the HVAC system. The floatless pump controller may employ an ultrasonic transducer or capacitance sensors to detect the level of condensate water in the reservoir. | 10-27-2011 |
Chris Ward, Atlanta, GA US
Patent application number | Description | Published |
---|---|---|
20150041457 | SYSTEMS AND METHODS FOR MICROWAVE JAMMING OF MOLECULAR RECOGNITION - Systems and methods include directing limited frequencies of microwave signals toward target molecules, driving a motion of the target molecules to impact molecular recognition. In one implementation, a microwave spectra associated with the rotational modes of a target molecule is obtained. From peaks in the spectra, a mode of molecular movement is identified and a microwave signal profile is generated for driving a motion of binding portions of the molecule associated with the identified mode. Microwave signals are generated based on the signal profile for output by antennas. For example, the microwave signals can be can be used to impede the binding of quorum sensing molecules by receptors of | 02-12-2015 |
Donald Tracy Ward, Johns Creek, GA US
Patent application number | Description | Published |
---|---|---|
20110221130 | Political and economic trivia board game - A trivia game and a method for two or more players playing a trivia game is provided. The method includes selecting one of a plurality of trivia cards and performing one of a plurality of predetermined tasks associated with the selected one of the plurality of trivia cards. The plurality of trivia cards includes two or more sets of trivia cards and each of the two or more sets of trivia cards includes trivia cards of only one of at least two types of trivia cards, one of the plurality of predetermined tasks being associated with each of the two or more sets of trivia cards. The one of the plurality of predetermined tasks associated with the one of the two or more sets of trivia cards of the selected one of the plurality of trivia cards is performed in accordance with the associated one of the at least two types of trivia cards. Performing the one of the plurality of predetermined tasks includes one or more players responding to a trivia question associated with the selected one of the plurality of trivia cards. | 09-15-2011 |
James Ward, Savannah, GA US
Patent application number | Description | Published |
---|---|---|
20150206438 | AIRCRAFT TOW OBSTACLE ALERTING AND INDICATION & METHOD FOR RECORDING AND NOTIFICATION OF PARKED AIRCRAFT DAMAGE - The disclosed embodiments relate to methods and systems for avoiding a collision between an aircraft and an obstacle when the aircraft is being moved on a ground surface via a ground vehicle. When a processor onboard the aircraft determines that the obstacle is located in proximity to the aircraft, the processor generates a warning generator signal, which causes an apparatus to communicate a warning signal that is perceptible to an operator of the ground vehicle to warn the operator of the obstacle. | 07-23-2015 |
James T. Ward, Savannah, GA US
Patent application number | Description | Published |
---|---|---|
20150206439 | GROUND VEHICLE WARNING TO INDICATE PRESENCE OF AN OBSTACLE NEAR AN AIRCRAFT - The disclosed embodiments relate to avoiding a collision between an aircraft and an obstacle when the aircraft is being moved on a ground surface via a ground vehicle. Sensors can be mounted in and/or on the aircraft. The sensors can detect obstacles located in proximity to the aircraft and can communicate information to a processor onboard the aircraft. When the processor determines that an obstacle is located in proximity to the aircraft, the processor generates a warning generator signal, which causes an apparatus to communicate a warning signal that is perceptible to an operator of the ground vehicle to warn the operator of the obstacle. | 07-23-2015 |
Jason Keith Ward, Atlanta, GA US
Patent application number | Description | Published |
---|---|---|
20120042780 | TREATMENT OF MOLECULAR SIEVE PARTICLES FOR MIXED MATRIX MEMBRANES - The present invention relates to a method for treating molecular sieve particles for use in a mixed matrix membrane useful in, for example, gas separations. Membranes employing treated molecular sieve particles may exhibit enhanced permeabilities and selectivities in regard to, for example, the separation of carbon dioxide and methane. | 02-23-2012 |
Jonathan O. Ward, Roswell, GA US
Patent application number | Description | Published |
---|---|---|
20080310614 | Methods, Systems, and Products for Billing Calls - Methods, systems, and products are disclosed for routing a communication. An identifier of an origination point of the communication is received. A destination point associated with a destination of the communication is determined. The origination point and the destination point are analyzed to determine whether the communication may be entirely routed within a local service provider's geographic area. | 12-18-2008 |
Jonathan O. Ward, Atlanta, GA US
Patent application number | Description | Published |
---|---|---|
20080280590 | SELECTIVE CALLING PARTY PAYS VIA A SECURE SERVICE FEATURE - Selective calling party pays via a secure service feature may be provided. A determination is conducted to decide if a called party's wireless communications service has entered a suspension state. Next, if the wireless communication service is in a suspension state, a determination is conducted to decide if a secure service feature has been purchased for the particular wireless communications service under suspension. Next, if the wireless communications service includes the secure service feature, a determination is conducted to decide if a caller calling the called party is permitted to communicate with the called party when the called party's communications service is under suspension. If a caller is determined to be an authorized caller, a communications path is provided for the caller and the called party. Billing associated with the communications is charged to the caller instead of the called party. | 11-13-2008 |
Joseph Ward, Atlanta, GA US
Patent application number | Description | Published |
---|---|---|
20120143650 | METHOD AND SYSTEM OF ASSESSING AND MANAGING RISK ASSOCIATED WITH COMPROMISED NETWORK ASSETS - A method of managing risk associated with at least one compromised network asset, comprising: performing processing associated with receiving evidence regarding the at least one compromised network asset; performing processing associated with assessing at least one risk associated with the at least one compromised network asset; and/or performing processing associated with prioritizing at least two compromised network assets in order to determine how to respond to the at least one risk. | 06-07-2012 |
20140068763 | DATA MINING TO IDENTIFY MALICIOUS ACTIVITY - Systems and methods may determine suspicious network traffic. A monitoring system comprising a processor in communication with a network may monitor network traffic to or from an asset associated with the network. The monitoring system may assess the network traffic to determine a source and/or destination for the network traffic anchor content of the network traffic. The monitoring system may determine whether the network traffic is suspicious network traffic based on the assessed source and/or destination and/or content. When the network traffic is determined to be suspicious network traffic, the monitoring system may capture metadata associated with the suspicious network traffic and store the metadata in a database in communication with the processor. When the network traffic is not determined to be suspicious network traffic, the monitoring system may disregard metadata associated with the network traffic. | 03-06-2014 |
20140068775 | HISTORICAL ANALYSIS TO IDENTIFY MALICIOUS ACTIVITY - Systems and methods may use historical analysis to identify malicious activity. A discovery/recovery system may comprise a processor in communication with a network and in communication with a database. The discovery/recovery system may gather filtered historical network data associated with an asset associated with the network. The discovery/recovery system may analyze the filtered historical network data to determine whether a subset of the filtered historical network data is associated with a malware infection of the asset. | 03-06-2014 |
20140075558 | AUTOMATION DISCOVERY TO IDENTIFY MALICIOUS ACTIVITY - Systems and methods may use automation discovery to identify malicious activity. An automation discovery system comprising a processor in communication with a network and in communication with a database may receive potentially automated network traffic data. The system may analyze the potentially automated network traffic data to determine whether the potentially automated network traffic data is likely to be automated. When the potentially automated network traffic data is not likely to be automated, the system may generate a low automation confidence score associated with the potentially automated network traffic data. When the potentially automated network traffic data is likely to be automated, the system may generate a high automation confidence score associated with the potentially automated network traffic data. | 03-13-2014 |
20140090058 | TRAFFIC SIMULATION TO IDENTIFY MALICIOUS ACTIVITY - Systems and methods may simulate traffic to identify malicious activity. A dynamic analysis system comprising a processor in communication with a network may receive a copy of a malware program and load the copy of the malware program into a simulated endpoint. The system may monitor simulated endpoint network traffic to or from the simulated endpoint, assess the simulated endpoint network traffic to determine a source and/or destination for the simulated endpoint network traffic and/or content of the simulated endpoint network traffic, and capture and store metadata associated with, the simulated endpoint network traffic. A comparison system may compare simulated network traffic metadata to observed network traffic metadata to determine whether the metadata are statistically similar. When the metadata are not statistically similar, the system may generate a low infection confidence score. When the metadata are statistically similar, the system may generate a high infection confidence score. | 03-27-2014 |
20140373148 | SYSTEMS AND METHODS FOR TRAFFIC CLASSIFICATION - Systems and methods of classifying network traffic may monitor network traffic. Monitored traffic may be compared with a control protocol template (CPT). When a similarity between the monitored traffic and the CPT exceeds a match threshold, the monitored traffic may be associated with the CPT. | 12-18-2014 |
Matthew Ward, Atlanta, GA US
Patent application number | Description | Published |
---|---|---|
20110252474 | SYSTEM AND METHOD FOR ENSURING SCANNING OF FILES WITHOUT CACHING THE FILES TO NETWORK DEVICE - A method and system for ensuring scanning of suspicious computer files without unnecessary caching of the files on a network device is provided. A network device receives a suspicious computer file and determines whether a target computer is protected by a malware protection program. If the network device determines that the target computer is protected by the malware protection program, the network device modifies the suspicious computer file to make the suspicious computer file unusable by the target computer and sends the modified suspicious computer file to the target computer. | 10-13-2011 |
20140337977 | AUTOMATED DEPLOYMENT OF PROTECTION AGENTS TO DEVICES CONNECTED TO A DISTRIBUTED COMPUTER NETWORK - Network traffic is monitored to detect attempted inter-network communications, including attempts by devices internal to the network to communicate with resources external to the network and attempts by devices external to the network to establish VPN sessions with resources internal to the network. Upon detecting an attempted inter-network communication, the device responsible for initiating such communication is identified. Then, it is determined whether the identified device is running a valid protection agent. If so, the attempted inter-network communication is permitted. If not, the attempted inter-network communication is blocked in compliance with a network security policy and the identified device is prompted to download and install a protection agent from a designated storage location, or to activate a previously installed protection device. The prompt may include a hyperlink for initiating download of the protection agent. | 11-13-2014 |
Robert O. Ward, Atlanta, GA US
Patent application number | Description | Published |
---|---|---|
20130140826 | SYSTEM AND METHODOLOGY FOR WIND COMPRESSION - A wind compressor system having one or more wind turbines and a plurality of wind compressors located proximate the one or more wind turbines. The wind compressors optimize the energy created by the wind turbines by redirecting and converging the wind from the wind compressor to the wind turbines. Each of the wind compressors comprises an obstruction having a size and shape adapted to converge the wind currents by means of a Venturi effect toward the one or more turbines thereby increasing the velocity and force of the wind hitting the wind turbine. A plurality of transporters coupled to the wind compressors. The transporters configured to move at least one wind compressors to a location that maximizes the force of the wind encountered by the turbine. | 06-06-2013 |
20140095336 | SYSTEM AND METHOD FOR PROVIDING VEHICLE VALUATION MANAGEMENT - The exemplary embodiments of the present invention provide a system and method for providing vehicle valuation management services on a computer system. The computer system includes a tangible storage medium readable by the instruction processing system and storing instructions for execution by the instruction processing system. The method comprises receiving a request from a client for a value quote of a vehicle, and determining the curb weight of the vehicle. The method further comprises determining estimated freight costs to obtain the vehicle, and sending the value quote of the vehicle to the client. | 04-03-2014 |
Theresa Ward, Atlanta, GA US
Patent application number | Description | Published |
---|---|---|
20140172697 | SYSTEMS AND METHODS FOR DETECTING FRAUD IN RETAIL RETURN TRANSACTIONS - This disclosure describes systems, methods, and computer-readable media related to detecting fraud in retail return transactions. In some embodiments, one or more parameters associated with a retail transaction may be received by at least one server comprising one or more computer processors. The server may evaluate the one or more risk factor conditions associated with the one or more parameters. The risk factor conditions may be indicative of a fraudulent return transaction. The server may generate one or more risk scores associated with the retail transaction based at least in part on the evaluating of the one or more risk factor conditions. | 06-19-2014 |
William Ward, Cumming, GA US
Patent application number | Description | Published |
---|---|---|
20150088619 | TECHNIQUES FOR PROCESSING CUSTOMERS AFFECTED BY INVOLUNARY DENIAL OF BOARDING - Techniques for processing customers affected by involuntary denial of boarding which facilitate electronic storage of completed forms. An example method includes displaying terms of a compensation award to a customer affected by involuntary denial of boarding by a computer, recording an electronic signature of the customer by the computer, and storing the terms and the electronic signature in a data store by the computer. The method may further include issuing the compensation award in accordance with the terms. | 03-26-2015 |
William J. Ward, Cumming, GA US
Patent application number | Description | Published |
---|---|---|
20150149311 | COMPACT POINT-OF-SALE SYSTEM - Various systems, methods, and apparatuses are described for facilitating a customer transaction via a point-of-sale terminal. One example system may comprise a point-of-sale terminal for facilitating a customer transaction. The system may further comprise a receipt printer for printing a receipt associated with the customer transaction. The printer may be built into the point-of-sale terminal. The point-of-sale terminal may be configured to be positioned on a substantially horizontal surface elevated above the ground. Similar and related methods, apparatuses, systems, and computer program products are also provided. | 05-28-2015 |