Weeden
Darryll Duane Weeden, Gainesville, TX US
Patent application number | Description | Published |
---|---|---|
20090249758 | Sidewinder Fence Mower - A mower for cutting grass and which is attached to a vehicle may include a mounting frame member for connecting to the vehicle, a rotatable mowing member to rotate behind a vertical obstacle, a swingarm member to connect to the mounting frame member and the rotatable mowing member. The mower may include a biasing member to bias the rotatable mower member, and the biasing member may include a spring to bias the rotatable mower member. The mower may include a hitch connecting member to connect to the frame member, and mower may include a long arm member to connect to the rotatable mower member. The long arm member may be connected to a movable arm member to move the rotatable mower member, and the long arm member may be connected to a traverse arm member. The rotatable mower member may include a round shaft member to allow the rotatable mower member to move in and out and under the fence and around the obstacle, and the rotatable mower member may include a hydraulic mower. The rotatable mower member may include a blade, and the rotatable mower member may include a blade mounting plate member to mount the blade. | 10-08-2009 |
Kevin S. Weeden, New Hamburg CA
Patent application number | Description | Published |
---|---|---|
20110202186 | SYSTEM AND METHOD FOR COOLING AND PROMOTING PHYSICAL ACTIVITY OF POULTRY - A sprinkler controller in a poultry house having a processor, a data storage device operatively connected to the processor, the data storage device having instructions for programming the processor, and an input/output module operatively connected to the processor. The input/output module is configured to communicate with at least one valve for controlling a flow of fluid between a fluid source and at least one sprinkler nozzle. The at least one valve has an open position permitting the flow of fluid, and a closed position inhibiting the flow of fluid, and the position of the valve being determined by the processor. The processor is programmed to set the valve in the open position at a start of an activity promotion interval, and to set the valve in the closed position at the end of the activity promotion interval. The duration of the activity promotion interval is selected such that a sufficient amount of fluid is dispersed through the sprinkler nozzle to promote physical activity in the poultry. The start of the activity promotion interval is predetermined based on a frequency of operation parameter indicative of a number of activity promotion intervals in a time period, and a value for the frequency of operation parameter being selected to promote growth of the poultry. | 08-18-2011 |
Lance F. Weeden, Charlotte, NC US
Patent application number | Description | Published |
---|---|---|
20090033497 | THEFT DETERRENT DEVICE - A theft deterrent device includes a carrier having a pivotally mounted pin and an alarm tag for receiving the pin to secure the carrier and alarm tag together when secured on an item of merchandise by an adhesive pad on the carrier. Spaced electrical contacts within the alarm tag receive the pin therebetween to provide an electrical path between the contacts to close a first electrical circuit which turns the device on. A flexibly mounted projection on the carrier depresses a plunger switch to arm the device when the carrier is attached to an item of merchandise. The security device is configured to sound an onboard alarm in response to prying of the carrier from the alarm tag or cutting of the pin of the carrier, or if an EAS tag receives a wireless signal from a security gate. Security gate alarms also sound if the tag moves through the gate or within a predetermined distance thereof. The carrier can remain on the purchased merchandise for subsequent disposal after removal of the alarm tag from the carrier by the use of a magnetic key to unlock a spring biased ball detent locking mechanism which engages the pin to lock the carrier to the alarm tag. | 02-05-2009 |
20110234405 | THEFT DETERRENT DEVICE - A theft deterrent device includes a carrier having a pivotally mounted pin and an alarm tag for receiving the pin to secure the carrier and alarm tag together when secured on an item of merchandise by an adhesive pad on the carrier. Spaced electrical contacts within the alarm tag receive the pin therebetween to provide an electrical path between the contacts to close a first electrical circuit which turns the device on. A flexibly mounted projection on the carrier depresses a plunger switch to arm the device when the carrier is attached to an item of merchandise. The security device is configured to sound an onboard alarm in response to prying of the carrier from the alarm tag or cutting of the pin of the carrier, or if an EAS tag receives a wireless signal from a security gate. Security gate alarms also sound if the tag moves through the gate or within a predetermined distance thereof. The carrier can remain on the purchased merchandise for subsequent disposal after removal of the alarm tag from the carrier by the use of a magnetic key to unlock a spring biased ball detent locking mechanism which engages the pin to lock the carrier to the alarm tag. | 09-29-2011 |
20120098665 | THEFT DETERRENT DEVICE - A theft deterrent device includes a carrier having a pivotally mounted pin and an alarm tag for receiving the pin to secure the carrier and alarm tag together when secured on an item of merchandise by an adhesive pad on the carrier. Spaced electrical contacts within the alarm tag receive the pin therebetween to complete an electrical path to close an electrical circuit which turns the device on. The security device is configured to sound an onboard alarm in response to prying of the carrier from the alarm tag or cutting of the pin of the carrier, or if an EAS tag receives a wireless signal from a security gate. The carrier remains on the purchased merchandise for subsequent disposal after removal of the alarm tag from the carrier by the use of a magnetic key to unlock a locking mechanism which engages the pin. | 04-26-2012 |
Robert George Weeden, Palgrave CA
Patent application number | Description | Published |
---|---|---|
20120302131 | POLLEN BEE NEST - This invention discloses a bee nest for protecting bees from the environment. The bee nest has desiccating and insulating properties, as well as properties that repulse and deter varrora destructor mites. The bee nest comprises a housing having a first open end and a second open end. The first open end is covered by a first end plate which has ventilation means for the housing. A second end plate encloses the second end. Within the housing, there are a plurality of elongate conduits or tubes. Surrounding the plurality of elongate conduits is filler medium, such as crushed volcanic rock filler. Optionally essential oils to deter mites are distributed on the rock filler. | 11-29-2012 |
Shane B. Weeden, Paradise Point AU
Patent application number | Description | Published |
---|---|---|
20150150110 | IDENTIFYING AND DESTROYING POTENTIALLY MISAPPROPRIATED ACCESS TOKENS - A computer receives a request for protected user data with an access token presented by a client as authorization for the client to access the protected user data in a delegated environment. The computer parses the request to create a device fingerprint identifying the device submitting the request for the client. The computer compares the device fingerprint of the request to a previously stored device fingerprint of an authorized device associated with the access token. The computer automatically determines whether to identify the access token as potentially misappropriated based on the comparison of the device fingerprint of the request to the previously stored device fingerprint. | 05-28-2015 |
Shane Bradley Weeden, Paradise Point AU
Patent application number | Description | Published |
---|---|---|
20090293108 | Method and System for User Management of Authentication Tokens - A computer implemented method, a computer program product, and a data processing system manage a set of federated log-in authentications at secure web sites. A client logs into a security context using a first alias from a list of existing federated single sign-on authentication aliases associated with an account. Responsive to logging into the security context, the client can receive the list of existing federated single sign-on authentication aliases. The client can then manage the list of authentication aliases. | 11-26-2009 |
20120246312 | Transforming HTTP Requests Into Web Services Trust Messages For Security Processing - An approach is provided where an HTTP request is received and a Request for Security Token (RST) is created. Parameters are selected from the request and mappings are retrieved corresponding to the parameters. Context attributes are created in the RST corresponding to the parameters. A context attribute type value is set based on an HTTP section where the parameter is located within the HTTP request. The RST is sent to a security token service for processing. In another approach, a Request Security Token Response (RSTR) is received and an HTTP response is created. RSTR parameters are selected and parameter mappings are retrieved corresponding to the selected RSTR parameters from a mapping table with a TYPE value being identified based on the retrieved parameter mapping. Context attributes are added to the HTTP response based on the identified TYPE values. The HTTP response is transmitted to a remote computer system. | 09-27-2012 |
20130318569 | Propagating Delegated Authorized Credentials Through Legacy Systems - An approach is provided to access resources at legacy systems. In this approach, a resource request destined to a legacy system is receiving from a requestor with the resource request including an access token and being on behalf of a resource owner. A validation process is performed on the access token. If the access token is valid, the approach identifies the resource owner and one or more legacy access tokens used to access the legacy system. Another request is formed with the new request including the legacy access tokens. The new request is transmitted to the legacy system and a response is received back from the legacy system. The response received from the legacy system is transmitted back to the requestor. | 11-28-2013 |
20140020077 | Unsecured asset detection via correlated authentication anomalies - A method, apparatus and computer program product for detecting that a computing device may not be secure based on inconsistent identity associations identified during Federated Single Sign-On (F-SSO). A detection proxy detects when a user with a particular session is accessing an identity provider (IdP) that is associated with an account that is not the current user's account. When a user performs a login to an F-SSO-enabled IdP, the proxy performs an F-SSO, and the results are compared with known aliases for that particular federation partner. If an anomaly is detected (e.g., the in-line device sees that a user logs into a web site as someone else), a workflow is initiated to perform a given action, such as blocking access, issuing an alert, or the like. | 01-16-2014 |
20140020078 | Confidence-based authentication discovery for an outbound proxy - A confidence-based authentication discovery scheme is implemented at a proxy. The scheme assumes that some level of unauthenticated browsing is allowed prior to enforcing authentication at the proxy. Once a known and trusted set of identity providers has been accessed and the user is required to authenticate at the proxy (e.g., as a result of policy), the proxy initiates Federated Single Sign-On (F-SSO) to one or more (or, preferably, all) known sites accessed by the browser. This F-SSO operation is performed seamlessly, preferably without the user's knowledge (after the user allows an initial trust decision between the proxy acting as a service provider and the external identity provider). The proxy collates the results and, based on the trust it has with those sites, produces a confidence score. That score is then used as input into policy around whether or not a user should be permitted to access a particular site. | 01-16-2014 |
20140157351 | Mobile device security policy based on authorized scopes - A technique to enforce mobile device security policy is based on a “risk profile” of the individual device, where the risk profile is fine-grained and based on the types of applications installed on the device, the services they are accessing, and the operation(s) the user granted the device authorization to perform. Thus, the approach takes into account not only the actual applications installed on the device (and those actively in use), but also the services those applications are accessing, and the scope of operations the user has granted the device authorization to perform. By combining this information to create the risk profile, a suitable security policy, including one that does not unnecessarily degrade device usability, may then be applied. | 06-05-2014 |
20140337914 | Policy-based automated consent - A technique for intelligent automated consent is described by which a client may be automatically authorized to access a resource owner's protected information (e.g., a profile) based on the owner's previous authorization decisions and/or other client classifications. Using this approach to granting consent, the resource owner is not required to intervene during the authorization step for each client that is requesting access. Clients may be categorized, and authorization given to individual clients based on the category to which they belong and/or the scope of the access request. The technique may be implemented with user-centric identity protocols, as well as with delegated authorization protocols. The technique provides for policy-based consent grants. | 11-13-2014 |
Steven H. Weeden, Fort Worth, TX US
Patent application number | Description | Published |
---|---|---|
20130066437 | REVISION HIP IMPLANTS AND PROSTHESIS SYSTEMS - Revision hip implants and prosthesis systems include femoral heads, cups, screws, bridges, and segmental prostheses for revision surgeries. | 03-14-2013 |
20140094927 | Joint Prosthesis with Polymeric Articulation Interface - A hip arthroplasty prosthesis for treating a patient condition includes a stem portion configured to penetrate into the bone of a femur of the patient, and includes a head portion formed of a polymeric material and being fixedly attached to the stem portion. The head portion may include a spherical portion with a diameter sized to match the diameter of an acetabulum of an adult patient in a manner permitting the acetabulum to interface with and articulate relative the head portion over a distributed portion of the head portion. | 04-03-2014 |
Timothy E. Weeden, Sturbridge, MA US
Patent application number | Description | Published |
---|---|---|
20090297444 | PEPTIDE ANALOGS OF ALPHA-MELANOCYTE STIMULATING HORMONE - Provided herein are stable peptide analogs of the native alpha-melanocyte stimulating hormone (α-MSH) having selectivity for the melanocortin 1 receptor (MC1R). Also provided herein are pharmaceutical preparations of the α-MSH peptide analogs, as well as methods of using these analogs in the treatment of medical and veterinary conditions involving MC1R. | 12-03-2009 |
20130303452 | PEPTIDE ANALOGS OF ALPHA-MELANOCYTE STIMULATING HORMONE - Provided herein are stable peptide analogs of the native alpha-melanocyte stimulating hormone (α-MSH) having selectivity for the melanocortin 1 receptor (MC1R). Also provided herein are pharmaceutical preparations of the α-MSH peptide analogs, as well as methods of using these analogs in the treatment of medical and veterinary conditions involving MC1R. | 11-14-2013 |
Todd M. Weeden, Strongsville, OH US
Patent application number | Description | Published |
---|---|---|
20120027558 | TIRE STORAGE SYSTEM - A tire storage system includes two spaced apart arrays of tire storage locations. An array of transfer locations is disposed between the two arrays of storage locations. Tires are loaded on and removed from carriages when the carriages are at transfer locations. The carriages are movable from the transfer locations to the storage locations along a path which extends along central axes of tires disposed on the carriages. The carriages may be suspended above a floor. Upper and lower arrays of storage and transfer locations may be provided. | 02-02-2012 |
Van J. Weeden, Boston, MA US
Patent application number | Description | Published |
---|---|---|
20130004049 | SYSTEMS AND METHODS FOR IMPROVED TRACTOGRAPHIC PROCESSING - A coordinate system particular to a subject's tissue, such as a subject's brain, is provided. Furthermore, a system and method for multi-dimensional, interrelated tractography is provided. Images of the subject are acquired that include diffusion information and tracts and/or vectors potentially associated with tracts are determined therefrom. With respect to the coordinate system, this information is used along with an basis that the tracts and/or vectors generally conform to a substantially orthogonal grid, such that white matter tissue fibers are arranged as one of substantially parallel or substantially orthogonal to other fibers. This coordinate system may be provided to a user along with reconstructed images, or may be used to process images. Similarly, in multi-dimensional, interrelated tractography, a new predictive ability and new metrics are provided along with an improved ability to reconstructed or process images. | 01-03-2013 |