A secure communication system enabling secure transport of information is disclosed. The system comprises a secure network with one or more packet processing units connected by links through an internal communication system. The secure network transports packets of information between credentialed and authenticated agents. Each packet is associated with a visa issued by a visa service. The visa specifies the procedures governing the processing of the packet by the packet processing units as it is transported along a compliant flow, between agents thorough the network, according to a set of policies specified in a network configuration. Packet processing units include docks and forwarders. Adaptors serving the agents communicate with the network through tie-ins to docks. The system also includes and admin service, accessible to one more admins, that facilitates configuration and management of the network.
H04L 9/32 - Arrangements for secret or secure communicationsNetwork security protocols including means for verifying the identity or authority of a user of the system
Embodiments of the invention concern zero-trust packet routing. Zero-trust packet routing (ZPR) is a way of implementing policy-enforcing networks with tight integration into identity and device management systems. Unlike conventional networks, which route traffic based only on the information inside of the packets, ZPR networks forward every packet based on the authenticated identity of the users and services that communicate through those packets, and global policies that govern their communications.
A network security system includes a barrier surrounding an enclosure. The enclosure contains a first network and a first networked device connected to the first network. The barrier prevents the first network from breaching the enclosure and permits a second network to penetrate a first portion of the barrier. A container located within the enclosure mounts to the first portion of the barrier, such that a second portion of the container superposes the first portion of the barrier. The container permits the first network and the second network to enter the container. The container prevents the second network from breaching the container and entering a third portion of the enclosure located outside the container. A firewall device located within the container controls network traffic between the first networked device and a second networked device connected to the second network.
A62C 3/16 - Fire prevention, containment or extinguishing specially adapted for particular objects or places in electrical installations, e.g. cableways
G07C 9/00 - Individual registration on entry or exit
A secure communication system enabling secure transport of information is disclosed. The system comprises a secure network with one or more packet processing units connected by links through an internal communication system. The secure network transports packets of information between credentialed and authenticated agents. Each packet is associated with a visa issued by a visa service. The visa specifies the procedures governing the processing of the packet by the packet processing units as it is transported along a compliant flow, between agents thorough the network, according to a set of policies specified in a network configuration. Packet processing units include docks and forwarders. Adaptors serving the agents communicate with the network through tie-ins to docks. The system also includes and admin service, accessible to one more admins, that facilitates configuration and management of the network.
H04L 9/34 - Bits, or blocks of bits, of the telegraphic message being interchanged in time
H04L 9/32 - Arrangements for secret or secure communicationsNetwork security protocols including means for verifying the identity or authority of a user of the system
H04L 41/00 - Arrangements for maintenance, administration or management of data switching networks, e.g. of packet switching networks
5.
COMMUNICATION BETWEEN AUTONOMOUS VEHICLE AND EXTERNAL OBSERVERS
At least one embodiment of this disclosure includes a method for an autonomous vehicle (e.g., a fully autonomous or semi-autonomous vehicle) to communicate with external observers. The method includes: receiving a task at the autonomous vehicle; collecting data that characterizes a surrounding environment of the autonomous vehicle from a sensor coupled to the autonomous vehicle; determining an intended course of action for the autonomous vehicle to undertake based on the task and the collected data; and conveying a human understandable output via an output device, the human understandable output expressly or implicitly indicating the intended course of action to an external observer.
B60Q 1/50 - Arrangement of optical signalling or lighting devices, the mounting or supporting thereof or circuits therefor the devices being primarily intended to indicate the vehicle, or parts thereof, or to give signals, to other traffic for indicating other intentions or conditions, e.g. request for waiting or overtaking
B60Q 1/26 - Arrangement of optical signalling or lighting devices, the mounting or supporting thereof or circuits therefor the devices being primarily intended to indicate the vehicle, or parts thereof, or to give signals, to other traffic
B60Q 5/00 - Arrangement or adaptation of acoustic signal devices
G05D 1/00 - Control of position, course, altitude or attitude of land, water, air or space vehicles, e.g. using automatic pilots
G06F 3/01 - Input arrangements or combined input and output arrangements for interaction between user and computer
Methods, devices, and system related to secure communication systems are disclosed. In one example aspect, a secure communication system enabling secure transport of information includes a secure network comprising one or more nodes communicatively coupled by an internal communication system and a set of policies. The secure network internally transports the information in the form of internal packets. Each of the internal packets is associated with a visa that references the policies. A node among said one or more nodes transmits an internal packet of said information only if allowed by said policies as referenced by said visa.
In a trust framework that enables secure communication, a configurer establishes an initial set of potential trusted relationships between a client and one or more anchors associated with one or more hosts. Once configured, the client can use a trusted relationship to securely communicate with a host without reliance on trusted third parties.
H04L 9/32 - Arrangements for secret or secure communicationsNetwork security protocols including means for verifying the identity or authority of a user of the system
A secure communication system enabling secure transport of information is disclosed. The system comprises a secure network with one or more packet processing units connected by links through an internal communication system. The secure network transports packets of information between credentialed and authenticated agents. Each packet is associated with a visa issued by a visa service. The visa specifies the procedures governing the processing of the packet by the packet processing units as it is transported along a compliant flow, between agents thorough the network, according to a set of policies specified in a network configuration. Packet processing units include docks and forwarders. Adaptors serving the agents communicate with the network through tie-ins to docks. The system also includes and admin service, accessible to one more admins, that facilitates configuration and management of the network.
H04L 9/32 - Arrangements for secret or secure communicationsNetwork security protocols including means for verifying the identity or authority of a user of the system
9.
Physically secured network access control devices and systems
A network security system includes a barrier surrounding an enclosure. The enclosure contains a first network and a first networked device connected to the first network. The barrier prevents the first network from breaching the enclosure and permits a second network to penetrate a first portion of the barrier. A container located within the enclosure mounts to the first portion of the barrier, such that a second portion of the container superposes the first portion of the barrier. The container permits the first network and the second network to enter the container. The container prevents the second network from breaching the container and entering a third portion of the enclosure located outside the container. A firewall device located within the container controls network traffic between the first networked device and a second networked device connected to the second network.
A62C 3/16 - Fire prevention, containment or extinguishing specially adapted for particular objects or places in electrical installations, e.g. cableways
G07C 9/00 - Individual registration on entry or exit
A secure communication system enabling secure transport of information is disclosed. The system comprises a secure network with one or more packet processing units connected by links through an internal communication system. The secure network transports packets of information between credentialed and authenticated agents. Each packet is associated with a visa issued by a visa service. The visa specifies the procedures governing the processing of the packet by the packet processing units as it is transported along a compliant flow, between agents thorough the network, according to a set of policies specified in a network configuration. Packet processing units include docks and forwarders. Adaptors serving the agents communicate with the network through tie-ins to docks. The system also includes and admin service, accessible to one more admins, that facilitates configuration and management of the network.
H04L 9/32 - Arrangements for secret or secure communicationsNetwork security protocols including means for verifying the identity or authority of a user of the system
A secure communication system enabling secure transport of information is disclosed. The system comprises a secure network with one or more packet processing units connected by links through an internal communication system. The secure network transports packets of information between credentialed and authenticated agents. Each packet is associated with a visa issued by a visa service. The visa specifies the procedures governing the processing of the packet by the packet processing units as it is transported along a compliant flow, between agents thorough the network, according to a set of policies specified in a network configuration. Packet processing units include docks and forwarders. Adaptors serving the agents communicate with the network through tie-ins to docks. The system also includes and admin service, accessible to one more admins, that facilitates configuration and management of the network.
42 - Scientific, technological and industrial services, research and design
Goods & Services
Business consulting and marketing services in the fields of business model development and new product and process development; consulting services in the field of business model development and business process development; marketing of intellectual property Invention, design, and development services, namely, the invention, design, and development of software and hardware prototypes, products, and services; technical consulting in connection with the foregoing; consulting services in the field of new product and engineering process development
Methods, devices, and system related to secure communication systems are disclosed. In one example aspect, a secure communication system enabling secure transport of information includes a secure network comprising one or more nodes communicatively coupled by an internal communication system and a set of policies. The secure network internally transports the information in the form of internal packets. Each of the internal packets is associated with a visa that references the policies. A node among said one or more nodes transmits an internal packet of said information only if allowed by said policies as referenced by said visa.
Secure network communications are described. In one aspect, a secure network can include a passbuilder that provides policy information related to performance characteristics of the secure network. A sender can receive the policy information and transmit packets to a receiver if the policy information is complied with by the potential packet transmission.
H04L 9/32 - Arrangements for secret or secure communicationsNetwork security protocols including means for verifying the identity or authority of a user of the system
A secure communication system enabling secure transport of information is disclosed. The system comprises a secure network with one or more packet processing units connected by links through an internal communication system. The secure network transports packets of information between credentialed and authenticated agents. Each packet is associated with a visa issued by a visa service. The visa specifies the procedures governing the processing of the packet by the packet processing units as it is transported along a compliant flow, between agents thorough the network, according to a set of policies specified in a network configuration. Packet processing units include docks and forwarders. Adaptors serving the agents communicate with the network through tie-ins to docks. The system also includes and admin service, accessible to one more admins, that facilitates configuration and management of the network.
H04L 9/32 - Arrangements for secret or secure communicationsNetwork security protocols including means for verifying the identity or authority of a user of the system
09 - Scientific and electric apparatus and instruments
42 - Scientific, technological and industrial services, research and design
Goods & Services
Providing data communications services via computer networks; providing access to global computer networks Pre-recorded software in hard form and downloadable computer software for computer network management; Pre-recorded software in hard form and downloadable computer operating programs; Pre-recorded software in hard form and downloadable computer operating systems; and Pre-recorded software in hard form and downloadable networking software for administration of computer networks Computer services, namely, management of information technology IT systems of others; computer system design; computer software development; computer software programming for others; computer software implementation; installation of computer software; maintenance of computer software, software as a service services featuring software for network management; and IT consulting services
09 - Scientific and electric apparatus and instruments
42 - Scientific, technological and industrial services, research and design
Goods & Services
Providing data communications services via computer networks; providing access to global computer networks Pre-recorded software in hard form and downloadable computer software for computer network management; Pre-recorded software in hard form and downloadable computer operating programs; Pre-recorded software in hard form and downloadable computer operating systems; and Pre-recorded software in hard form and downloadable networking software for administration of computer networks Computer services, namely, management of information technology IT systems of others; computer system design; computer software development; computer software programming for others; computer software implementation; installation of computer software; maintenance of computer software, software as a service services featuring software for network management; and IT consulting services
18.
Method and apparatus for communication system upgrade via phased adoption
A phased adoption procedure is disclosed for adopting a new communication system that provides potential adopters a high degree of confidence in the reliability of the proposed communication system prior to committed adoption.
Various embodiments relate to apparatuses and methods that can determine an amount of force on a tissue. An apparatus can include an optical fiber including a first end and a second end. An electronics module of the apparatus is coupled to the first end of the optical fiber. The electronics module can include a light emitter that can transmit light to the tissue over the optical fiber and a light sensor that can receive light over the optical fiber. The received light includes a component of the transmitted light reflected by the tissue. The electronics module can include a processor that can determine the amount of force on the tissue based on characteristic(s) of the reflected light. The apparatus can also include an end cap coupled to the second end of the optical fiber. The end cap can introduce the transmitted light into the tissue and receive the reflected light.
Disclosed are a method and apparatus for limiting the number of results returned by a data store in response to a query. Upon receiving an initial query, the data store returns a page of results that includes a subset of the data items within the data store satisfying the conditions of the query. The data store also provides a marker indicating the extent of the set of data items. If a subsequent query that requests additional results which satisfy the same query conditions and that includes the marker is received, the data store returns a page of results that includes a subset of data items that are disjoint from the initial subset, and provides an updated marker which indicates the extent of the union of the initial and subsequent subsets. If still further results are desired from the data store, an additional query containing the updated marker may be submitted.
A power distribution and communication system includes nodes connected by power lines and communication links. The system receives power from one or more power sources. Each node contains at least one power port, data port and load port. Associated with each power port and load port is a port monitor for measuring current flowing into or out of the port and the voltage difference between the port outlet and ground, which measurements are passed to a processing element. The processing element and monitor analyze measured values to detect fault conditions. Upon fault condition detection, the port is disabled by opening a switch, disconnecting the port from the system voltage. The processing element receives power directly from the power line, thus receiving power from a live power line even if the associated power port is disabled allowing the processing element to enable a disabled node following a failure.
H02H 3/08 - Emergency protective circuit arrangements for automatic disconnection directly responsive to an undesired change from normal electric working condition, with or without subsequent reconnection responsive to excess current
G01R 31/00 - Arrangements for testing electric propertiesArrangements for locating electric faultsArrangements for electrical testing characterised by what is being tested not provided for elsewhere
H02H 7/26 - Sectionalised protection of cable or line systems, e.g. for disconnecting a section on which a short-circuit, earth fault, or arc discharge has occurred
H02H 3/38 - Emergency protective circuit arrangements for automatic disconnection directly responsive to an undesired change from normal electric working condition, with or without subsequent reconnection responsive to both voltage and currentEmergency protective circuit arrangements for automatic disconnection directly responsive to an undesired change from normal electric working condition, with or without subsequent reconnection responsive to phase angle between voltage and current
22.
Use of light transmission through tissue to detect force
Various embodiments relate to apparatuses and methods of using light transmission thought compressed living tissue to detect force. Transmission of light through living tissue such as a finger is affected by how much the tissue is compressed, for example by the finger being pressing on a surface. Light is introduced into the tissue, passes through the tissue, and a sensor receives the light exiting the tissue. The compression of the tissue can be determined using various characteristics of the received light, such as the light intensity, as determined based at least partly on sensor readings.
A plan through a space having a near field and a far field is determined. Using a sensor device, measurements of the far field are obtained and stored in an electronic memory. A processor uses the measurements to determine the viability of each far field plan among a plurality of candidate far field plans. The processor also determines a flexibility score for each of the candidate far field plans and selects a composite plan comprising the viable far field plan having a highest flexibility score among the viable candidate far field plans.
B60W 30/00 - Purposes of road vehicle drive control systems not related to the control of a particular sub-unit, e.g. of systems using conjoint control of vehicle sub-units
G05D 1/02 - Control of position or course in two dimensions
24.
Communication between autonomous vehicle and external observers
At least one embodiment of this disclosure includes a method for an autonomous vehicle (e.g., a fully autonomous or semi-autonomous vehicle) to communicate with external observers. The method includes: receiving a task at the autonomous vehicle; collecting data that characterizes a surrounding environment of the autonomous vehicle from a sensor coupled to the autonomous vehicle; determining an intended course of action for the autonomous vehicle to undertake based on the task and the collected data; and conveying a human understandable output via an output device, the human understandable output expressly or implicitly indicating the intended course of action to an external observer.
B60Q 1/26 - Arrangement of optical signalling or lighting devices, the mounting or supporting thereof or circuits therefor the devices being primarily intended to indicate the vehicle, or parts thereof, or to give signals, to other traffic
B60Q 1/50 - Arrangement of optical signalling or lighting devices, the mounting or supporting thereof or circuits therefor the devices being primarily intended to indicate the vehicle, or parts thereof, or to give signals, to other traffic for indicating other intentions or conditions, e.g. request for waiting or overtaking
B60Q 5/00 - Arrangement or adaptation of acoustic signal devices
G05D 1/00 - Control of position, course, altitude or attitude of land, water, air or space vehicles, e.g. using automatic pilots
G06F 3/01 - Input arrangements or combined input and output arrangements for interaction between user and computer
n=(n+1)f=2, with n 2 f3; 4; 5: : : g, strengthening the listener's perception of the difference tone at f=2. The bell thus yields a strike tone at f=2 but has a characteristic dimension (e.g. height or diameter) equal to that of conventional bells with a strike tone at f, providing art eightfold savings in bell mass.
A power distribution and communication system includes nodes connected by power lines and communication links. The system receives power from one or more power sources. Each node contains at least one power port, data port and load port. Associated with each power port and load port is a port monitor for measuring current flowing into or out of the port and the voltage difference between the port outlet and ground, which measurements are passed to a processing element. The processing element and monitor analyze measured values to detect fault conditions. Upon fault condition detection, the port is disabled by opening a switch, disconnecting the port from the system voltage. The processing element receives power directly from the power line, thus receiving power from a live power line even if the associated power port is disabled allowing the processing element to enable a disabled node following a failure.
G01R 31/00 - Arrangements for testing electric propertiesArrangements for locating electric faultsArrangements for electrical testing characterised by what is being tested not provided for elsewhere
H02H 7/26 - Sectionalised protection of cable or line systems, e.g. for disconnecting a section on which a short-circuit, earth fault, or arc discharge has occurred
H02H 3/08 - Emergency protective circuit arrangements for automatic disconnection directly responsive to an undesired change from normal electric working condition, with or without subsequent reconnection responsive to excess current
H02H 3/38 - Emergency protective circuit arrangements for automatic disconnection directly responsive to an undesired change from normal electric working condition, with or without subsequent reconnection responsive to both voltage and currentEmergency protective circuit arrangements for automatic disconnection directly responsive to an undesired change from normal electric working condition, with or without subsequent reconnection responsive to phase angle between voltage and current
Secure network communications are described. In one aspect, a secure network can include a passbuilder that provides policy information related to performance characteristics of the secure network. A sender can receive the policy information and transmit packets to a receiver if the policy information is complied with by the potential packet transmission.
H04L 29/06 - Communication control; Communication processing characterised by a protocol
H04L 9/32 - Arrangements for secret or secure communicationsNetwork security protocols including means for verifying the identity or authority of a user of the system
Secure network communications are described. In one aspect, a secure network can include a passbuilder that provides policy information related to performance characteristics of the secure network. A sender can receive the policy information and transmit packets to a receiver if the policy information is complied with by the potential packet transmission.
H04L 29/06 - Communication control; Communication processing characterised by a protocol
H04L 9/32 - Arrangements for secret or secure communicationsNetwork security protocols including means for verifying the identity or authority of a user of the system
29.
Security information caching on authentication token
A method of operating a security token to authenticate a user in a multi-factor authentication system is disclosed. The method includes: monitoring user custody of the token, the token having an identifying characteristic representing a possession factor for use through possession factor authentication; during a period of continuous user custody of the token based on the monitoring, obtaining a knowledge factor from a user having the continuous user custody; caching the knowledge factor in a memory of the token; and in response to a second authentication request, retrieving the knowledge factor from the memory to demonstrate to an authentication system knowledge of the knowledge factor, during the period of continuous user custody.
A plan through a space having a near field and a far field is determined. Using a sensor device, measurements of the far field are obtained and stored in an electronic memory. A processor uses the measurements to determine the viability of each far field plan among a plurality of candidate far field plans. The processor also determines a flexibility score for each of the candidate far field plans and selects a composite plan comprising the viable far field plan having a highest flexibility score among the viable candidate far field plans.
B60W 30/00 - Purposes of road vehicle drive control systems not related to the control of a particular sub-unit, e.g. of systems using conjoint control of vehicle sub-units
G05D 1/02 - Control of position or course in two dimensions
31.
Use of light transmission through tissue to sense joint flexure
Various embodiments relate to apparatuses and methods of using light transmission thought living tissue, such as a finger, to detect the flexure of a joint. Light is introduced into the tissue at one point, passes through the tissue, and exits the tissue at a second point where a sensor receives the light as it exits the tissue. Transmission of light through living tissue such as a finger can be affected by movement of the finger. As the finger flexes and, for example, the joints of the finger change angle, the characteristics of the light exiting the tissue, such as the intensity of the light, can change. These changes in characteristics can be used as an indirect means of determining the flexure of the joint.
The present disclosure provides methods and mechanisms for measuring small masses attached to a substrate within a microcantilever. Specifically, the disclosure describes the measurement of small particles accumulated at a substrate that cannot be flowed through a microchannel within a microcantilever. A resonance measurement is acquired at a first time. A pair resonance measurements is then acquired at a second point in time—one with the test mass at a first position off or along the microcantilever, the second with the test mass at a second position along the microcantilever. Comparing the resonance frequencies determined for the two test mass positions allows for disambiguation of changes in the mass of the particles from changes in the resonant behavior of the microcantilever itself.
G16C 99/00 - Subject matter not provided for in other groups of this subclass
G01N 9/00 - Investigating density or specific gravity of materialsAnalysing materials by determining density or specific gravity
G01N 5/02 - Analysing materials by weighing, e.g. weighing small particles separated from a gas or liquid by absorbing or adsorbing components of a material and determining change of weight of the adsorbent, e.g. determining moisture content
G01N 29/30 - Arrangements for calibrating or comparing, e.g. with standard objects
A method of operating a security token to authenticate a user in a multi-factor authentication system is disclosed. The method includes: monitoring user custody of the token, the token having an identifying characteristic representing a possession factor for use through possession factor authentication; during a period of continuous user custody of the token based on the monitoring, obtaining a knowledge factor from a user having the continuous user custody; caching the knowledge factor in a memory of the token; and in response to a second authentication request, retrieving the knowledge factor from the memory to demonstrate to an authentication system knowledge of the knowledge factor, during the period of continuous user custody.
At least one embodiment of this disclosure includes a method for an autonomous vehicle (e.g., a fully autonomous or semi-autonomous vehicle) to communicate with external observers. The method includes: receiving a task at the autonomous vehicle; collecting data that characterizes a surrounding environment of the autonomous vehicle from a sensor coupled to the autonomous vehicle; determining an intended course of action for the autonomous vehicle to undertake based on the task and the collected data; and conveying a human understandable output via an output device, the human understandable output expressly or implicitly indicating the intended course of action to an external observer.
B60Q 1/26 - Arrangement of optical signalling or lighting devices, the mounting or supporting thereof or circuits therefor the devices being primarily intended to indicate the vehicle, or parts thereof, or to give signals, to other traffic
B60Q 1/50 - Arrangement of optical signalling or lighting devices, the mounting or supporting thereof or circuits therefor the devices being primarily intended to indicate the vehicle, or parts thereof, or to give signals, to other traffic for indicating other intentions or conditions, e.g. request for waiting or overtaking
B60Q 5/00 - Arrangement or adaptation of acoustic signal devices
G05D 1/00 - Control of position, course, altitude or attitude of land, water, air or space vehicles, e.g. using automatic pilots
G06F 3/01 - Input arrangements or combined input and output arrangements for interaction between user and computer
A modular drawer structure comprises a housing having an interior volume defined therein, and a drawer comprising one or more compartments, wherein the drawer is slidably movable with respect to the interior volume of the housing between a first closed position, wherein the compartments are enclosed within the interior volume, and a second open position, wherein the compartments are at least partially accessible. The drawer structure further comprises a mechanism for controllably locking the drawer in the first closed position, an access pad, e.g. such as but not limited to a keypad and/or a card swipe pad, for entry of a passcode, and a processor for unlocking the drawer when an entered passcode matches a stored passcode value. Some embodiments of the drawer structure include a stored time threshold, wherein if the drawer is unlocked for a time that meets or exceeds the stored time threshold, the drawer is relocked.
G07C 9/00 - Individual registration on entry or exit
G06F 19/00 - Digital computing or data processing equipment or methods, specially adapted for specific applications (specially adapted for specific functions G06F 17/00;data processing systems or methods specially adapted for administrative, commercial, financial, managerial, supervisory or forecasting purposes G06Q;healthcare informatics G16H)
A61G 12/00 - Accommodation for nursing, e.g. in hospitals, not covered by groups , e.g. trolleys for transport of medicaments or foodPrescription lists
A method of operating a security token to authenticate a user in a multi-factor authentication system is disclosed. The method includes: monitoring user custody of the token, the token having an identifying characteristic representing a possession factor for use through possession factor authentication; during a period of continuous user custody of the token based on the monitoring, obtaining a knowledge factor from a user having the continuous user custody; caching the knowledge factor in a memory of the token; and in response to a second authentication request, retrieving the knowledge factor from the memory to demonstrate to an authentication system knowledge of the knowledge factor, during the period of the continuous user custody.
A plan through a space having a near field and a far field is determined. Using a sensor device, measurements of the far field are obtained and stored in an electronic memory. A processor uses the measurements to determine the viability of each far field plan among a plurality of candidate far field plans. The processor also determines a flexibility score for each of the candidate far field plans and selects a composite plan comprising the viable far field plan having a highest flexibility score among the viable candidate far field plans.
G05D 1/02 - Control of position or course in two dimensions
B60W 30/00 - Purposes of road vehicle drive control systems not related to the control of a particular sub-unit, e.g. of systems using conjoint control of vehicle sub-units
42 - Scientific, technological and industrial services, research and design
Goods & Services
Business advisory services and marketing services in the fields of business model development and new product and process development; consulting services in the field of business model development; marketing of intellectual property Invention, design, and development services, namely, the invention, design, and development of software and hardware prototypes, products, and services; technical consulting in connection with the foregoing; consulting services in the field of new product and engineering process development
A portable telescope that takes advantage of an offset optical pathway between the objective tube and eyepiece tube that allows adjustment of the eyepiece height independent of the objective tube elevation. A user-friendly, motorized, interactive, self-calibrating portable telescope with an offset optical path.
G02B 23/02 - Telescopes, e.g. binocularsPeriscopesInstruments for viewing the inside of hollow bodiesViewfindersOptical aiming or sighting devices involving prisms or mirrors
G02B 23/16 - HousingsCapsMountingsSupports, e.g. with counterweight
G02B 23/04 - Telescopes, e.g. binocularsPeriscopesInstruments for viewing the inside of hollow bodiesViewfindersOptical aiming or sighting devices involving prisms or mirrors for the purpose of beam splitting or combining, e.g. fitted with eyepieces for more than one observer
Various embodiments relate to apparatuses and methods of using light transmission thought compressed living tissue to detect force. Transmission of light through living tissue such as a finger is affected by how much the tissue is compressed, for example by the finger being pressing on a surface. Light is introduced into the tissue, passes through the tissue, and a sensor receives the light exiting the tissue. The compression of the tissue can be determined using various characteristics of the received light, such as the light intensity, as determined based at least partly on sensor readings.
At least one embodiment of this disclosure includes a method for an autonomous vehicle (e.g., a fully autonomous or semi-autonomous vehicle) to communicate with external observers. The method includes: receiving a task at the autonomous vehicle; collecting data that characterizes a surrounding environment of the autonomous vehicle from a sensor coupled to the autonomous vehicle; determining an intended course of action for the autonomous vehicle to undertake based on the task and the collected data; and conveying a human understandable output via an output device, the human understandable output expressly or implicitly indicating the intended course of action to an external observer.
B60Q 1/26 - Arrangement of optical signalling or lighting devices, the mounting or supporting thereof or circuits therefor the devices being primarily intended to indicate the vehicle, or parts thereof, or to give signals, to other traffic
B60Q 1/50 - Arrangement of optical signalling or lighting devices, the mounting or supporting thereof or circuits therefor the devices being primarily intended to indicate the vehicle, or parts thereof, or to give signals, to other traffic for indicating other intentions or conditions, e.g. request for waiting or overtaking
42.
Method and apparatus for communication system upgrade via phased adoption
A phased adoption procedure is disclosed for adopting a new communication system that provides potential adopters a high degree of confidence in the reliability of the proposed communication system prior to committed adoption.
Disclosed are a method and apparatus for limiting the number of results returned by a store in response to a query. Upon receiving an initial query, the data store returns a page of results that includes a subset of the data items within the data store satisfying the conditions of the query. The data store also provides a marker indicating the extent of the set of data items. If a subsequent query that requests additional results which satisfy the same query conditions and that includes the marker is received, the data store returns a page of results that includes a subset of data items that are disjoint from the initial subset, and provides an updated marker which indicates the extent of the union of the initial and subsequent subsets. If still further results are desired from the data store, an additional query containing the updated marker may be submitted.
Various embodiments relate to apparatuses and methods of using light transmission thought living tissue, such as a finger, to detect the flexure of a joint. Light is introduced into the tissue at one point, passes through the tissue, and exits the tissue at a second point where a sensor receives the light as it exits the tissue. Transmission of light through living tissue such as a finger can be affected by movement of the finger. As the finger flexes and, for example, the joints of the finger change angle, the characteristics of the light exiting the tissue, such as the intensity of the light, can change. These changes in characteristics can be used as an indirect means of determining the flexure of the joint.
Various embodiments relate to apparatuses and methods of using light transmission thought compressed living tissue to detect force. Transmission of light through living tissue such as a finger is affected by how much the tissue is compressed, for example by the finger being pressing on a surface. Light is introduced into the tissue, passes through the tissue, and a sensor receives the light exiting the tissue. The compression of the tissue can be determined using various characteristics of the received light, such as the light intensity, as determined based at least partly on sensor readings.
The present disclosure provides methods and mechanisms for measuring small masses attached to a substrate within a microcantilever. Specifically, the disclosure describes the measurement of small particles accumulated at a substrate that cannot be flowed through a microchannel within a microcantilever. A resonance measurement is acquired at a first time. A pair resonance measurements is then acquired at a second point in time—one with the test mass at a first position off or along the microcantilever, the second with the test mass at a second position along the microcantilever. Comparing the resonance frequencies determined for the two test mass positions allows for disambiguation of changes in the mass of the particles from changes in the resonant behavior of the microcantilever itself.
G01N 5/02 - Analysing materials by weighing, e.g. weighing small particles separated from a gas or liquid by absorbing or adsorbing components of a material and determining change of weight of the adsorbent, e.g. determining moisture content
G01N 29/30 - Arrangements for calibrating or comparing, e.g. with standard objects
G06F 19/00 - Digital computing or data processing equipment or methods, specially adapted for specific applications (specially adapted for specific functions G06F 17/00;data processing systems or methods specially adapted for administrative, commercial, financial, managerial, supervisory or forecasting purposes G06Q;healthcare informatics G16H)
42 - Scientific, technological and industrial services, research and design
Goods & Services
Business advisory services and marketing services in the fields of business model development and new product and process development; consulting services in the field of business model development; marketing of intellectual property Invention, design, and development services, namely, the invention, design, and development of software and hardware prototypes, products, and services; technical consulting in connection with the foregoing; consulting services in the field of new product and engineering process development
42 - Scientific, technological and industrial services, research and design
Goods & Services
Business advisory services and marketing services in the fields of business model development and new product and process development; consulting services in the field of business model development; marketing of intellectual property Invention, design, and development services, namely, the invention, design, and development of software and hardware prototypes, products, and services; technical consulting in connection with the foregoing; consulting services in the field of new product and engineering process development
A plan through a space having a near field and a far field is determined. Using a sensor device, measurements of the far field are obtained and stored in an electronic memory. A processor uses the measurements to determine the viability of each far field plan among a plurality of candidate far field plans. The processor also determines a flexibility score for each of the candidate far field plans and selects a composite plan comprising the viable far field plan having a highest flexibility score among the viable candidate far field plans.
A method of operating a security token to authenticate a user in a multi-factor authentication system is disclosed. The method includes: monitoring user custody of the token, the token having an identifying characteristic representing a possession factor for use through possession factor authentication; during a period of continuous user custody of the token based on the monitoring, obtaining a knowledge factor from a user having the continuous user custody; caching the knowledge factor in a memory of the token; and in response to a second authentication request, retrieving the knowledge factor from the memory to demonstrate to an authentication system knowledge of the knowledge factor, during the period of the continuous user custody.
Embodiments of the invention provide a number of passive and active defense designs and methods that enable a wind turbine to escape high wind events. The disclosure includes descriptions of multiple designs and methods for lowering the elevated portion of a wind turbine. Other embodiments of the invention concern ways to connect the elevated portion of a wind turbine to the tower. Numerous counterweight systems are also disclosed which enable the lowering of the elevated portion of the wind turbine.
A plan through a space having a near field and a far field is determined. Using a sensor device, measurements of the far field are obtained and stored in an electronic memory. A processor uses the measurements to determine the viability of each far field plan among a plurality of candidate far field plans. The processor also determines a flexibility score for each of the candidate far field plans and selects a composite plan comprising the viable far field plan having a highest flexibility score among the viable candidate far field plans.
A power distribution and communication system includes nodes connected by power lines and communication links. The system receives power from one or more power sources. Each node contains at least one power port, data port and load port. Associated with each power port and load port is a port monitor for measuring current flowing into or out of the port and the voltage difference between the port outlet and ground, which measurements are passed to a processing element. The processing element and monitor analyze measured values to detect fault conditions. Upon fault condition detection, the port is disabled by opening a switch, disconnecting the port from the system voltage. The processing element receives power directly from the power line, thus receiving power from a live power line even if the associated power port is disabled allowing the processing element to enable a disabled node following a failure.
G01R 31/00 - Arrangements for testing electric propertiesArrangements for locating electric faultsArrangements for electrical testing characterised by what is being tested not provided for elsewhere
H02H 7/26 - Sectionalised protection of cable or line systems, e.g. for disconnecting a section on which a short-circuit, earth fault, or arc discharge has occurred
H02H 3/08 - Emergency protective circuit arrangements for automatic disconnection directly responsive to an undesired change from normal electric working condition, with or without subsequent reconnection responsive to excess current
H02H 3/38 - Emergency protective circuit arrangements for automatic disconnection directly responsive to an undesired change from normal electric working condition, with or without subsequent reconnection responsive to both voltage and currentEmergency protective circuit arrangements for automatic disconnection directly responsive to an undesired change from normal electric working condition, with or without subsequent reconnection responsive to phase angle between voltage and current
54.
Squeezable musical toy with looping and decaying score and variable capacitance stress sensor
An enhanced toy produces repeating, decaying notes in response to applied pressure. The tone of each note is determined, based on the location at which a user applies pressure. The initial amplitude of each note is proportional to the intensity, as measured by a stress sensor. The toy periodically repeats each note, attenuating the amplitude of each successive repetition by a decay factor. The toy may alter the notes associated with each of a plurality of locations. For example, if all currently repeating notes have decayed below a predetermined threshold, the currently available set of notes may be exchanged for a new set of notes, e.g. with different tones or timbres. The stress sensors may comprise flexible capacitors within the toy. As the user applies pressure, the geometry of one or more capacitors deform, altering the measured capacitance, through which the intensity of the applied pressure is determined.
A63H 3/28 - Arrangements of sound-producing means in dollsMeans in dolls for producing sounds
A63H 5/00 - Musical or noise-producing devices for additional toy effects other than acoustical
G10H 1/055 - Means for controlling the tone frequencies, e.g. attack or decayMeans for producing special musical effects, e.g. vibratos or glissandos by additional modulation during execution only by switches with variable impedance elements
G10H 1/26 - Selecting circuits for automatically producing a series of tones
A portable telescope that takes advantage of an offset optical pathway between the objective tube and eyepiece tube that allows adjustment of the eyepiece height independent of the objective tube elevation. A user-friendly, motorized, interactive, self-calibrating portable telescope with an offset optical path.
G02B 23/02 - Telescopes, e.g. binocularsPeriscopesInstruments for viewing the inside of hollow bodiesViewfindersOptical aiming or sighting devices involving prisms or mirrors
In a communications system, after parties form a dial up voice telephone connection, the parties respective communications devices automatically create or leverage machine readable features or content of the telephone connection to identify the parties to each other or to a rendezvous server, and thereafter the communications devices and/or the rendezvous server automatically establishes a data link between the parties.
A power distribution and communication system includes nodes connected by power lines and communication links. The system receives power from one or more power sources. Each node contains at least one power port, data port and load port. Associated with each power port and load port is a port monitor for measuring current flowing into or out of the port and the voltage difference between the port outlet and ground, which measurements are passed to a processing element. The processing element and monitor analyze measured values to detect fault conditions. Upon fault condition detection, the port is disabled by opening a switch, disconnecting the port from the system voltage. The processing element receives power directly from the power line, thus receiving power from a live power line even if the associated power port is disabled allowing the processing element to enable a disabled node following a failure.
G01R 31/00 - Arrangements for testing electric propertiesArrangements for locating electric faultsArrangements for electrical testing characterised by what is being tested not provided for elsewhere
58.
Data store with lock-free stateless paging capability
Disclosed are a method and apparatus for limiting the number of results returned by a data store in response to a query. Upon receiving an initial query, the data store returns a page of results that includes a subset of the data items within the data store satisfying the conditions of the query. The data store also provides a marker indicating the extent of the set of data items. If a subsequent query that requests additional results which satisfy the same query conditions and that includes the marker is received, the data store returns a page of results that includes a subset of data items that are disjoint from the initial subset, and provides an updated marker which indicates the extent of the union of the initial and subsequent subsets. If still further results are desired from the data store, an additional query containing the updated marker may be submitted.