Patents Examined by Mohammad Reza
  • Patent number: 10556836
    Abstract: Solvent systems for the formulation of alkyl thiophosphoric triamide urease inhibitors, that provide stable dispersion of alkyl thiophosphoric triamides for even distribution (in low or high concentrations) onto fertilizers containing urea in liquid or solid form.
    Type: Grant
    Filed: December 3, 2018
    Date of Patent: February 11, 2020
    Assignees: RHODIA OPERATIONS, ROSEN'S INC.
    Inventors: Leahann Iannotta, Rajesh Pazhianur, Krish Murthy Shanmuga, John A. Latting, T. Kent Woodall
  • Patent number: 10329178
    Abstract: A base product fluid is produced by adding anhydrous liquid ammonia and a first portion of sulfuric acid to water in a process line to form a mixed fluid. The mixed fluid may be cooled and a second portion of sulfuric acid may be added to the mixed fluid to form the base product fluid. The base product fluid may include a molecular compound that is a chelating compound. The molecular compound may have the formula: ((NH4)2SO4)a.(H2SO4)b.(H2O)c.(NH4HSO4)x. In the formula, a may be between 1 and 5, b may be between 1 and 5, c may be between 1 and 5, and x may be between 1 and 10.
    Type: Grant
    Filed: March 1, 2018
    Date of Patent: June 25, 2019
    Assignee: EARTH SCIENCE LABORATORIES
    Inventors: David Nicholas, Reid Henry Bowman, Freddie L. Singleton
  • Patent number: 10240113
    Abstract: The invention relates to dyed particles of a bleach material that comprise a coating. The invention also relates to the use of the dyed particles in detergent compositions.
    Type: Grant
    Filed: July 12, 2017
    Date of Patent: March 26, 2019
    Assignee: RECKITT BENCKISER FINISH B.V.
    Inventors: Kai Heppert, Jorg Pflug, Claudia Schmaelzle
  • Patent number: 10153068
    Abstract: A composition including: (a) from 30 to 70% by weight of a mixture of benzyltoluene and dibenzyltoluene, and (b) from 70 to 30% by weight of at least one compound chosen from the C4-C8 aromatic compounds enclosing two benzene rings condensed or bonded to each other by a bond or by a spacer group other than —CH2-, the oligomers of same and the mixtures of same, excluding phenylxylylethane. Also, the use of this composition, with or without phenylxylylethane, depending on the case, as a dielectric and/or heat-transfer fluid, in particular in use conditions at very low temperatures, such as temperatures lower than ?40° C., or indeed lower than ?60° C. Also, mixtures of these compositions with mineral oils and/or natural or synthetic esters. Finally, devices, in particular electrical devices, incorporating this composition.
    Type: Grant
    Filed: July 18, 2014
    Date of Patent: December 11, 2018
    Assignee: ARKEMA FRANCE
    Inventor: Jeremie Walker
  • Patent number: 10131995
    Abstract: This disclosure relates to a preparation method of a low-pH controlled-release intelligent corrosion inhibitor. The low-pH controlled-release intelligent corrosion inhibitor comprises a hydrogel with low pH responsiveness and a corrosion inhibiting substance having the capacity of corrosion inhibition. That is, a corrosion inhibiting substance is wrapped in a low-pH sensitive hydrogel. The swelling degree of the pH sensitive hydrogel may be changed according to the amounts of monomers and crosslinking agents so as to control the releasing speed of the corrosion inhibiting substance. By the soaking experiment and the measurements of electrochemical polarization curves and alternating impedance spectra, the sensitive and long-lasting features of the low-pH controlled-release intelligent corrosion inhibitor are indicated.
    Type: Grant
    Filed: January 15, 2016
    Date of Patent: November 20, 2018
    Assignee: UNIVERSITY OF SCIENCE AND TECHNOLOGY BEIJING
    Inventors: Xiaogang Li, Chaofang Dong, Xuequn Cheng, Cuiwei Du, Kui Xiao
  • Patent number: 10093564
    Abstract: A base product fluid is produced by adding anhydrous liquid ammonia and a first portion of sulfuric acid to water in a process line to form a mixed fluid. The mixed fluid may be cooled and a second portion of sulfuric acid may be added to the mixed fluid to form the base product fluid. The base product fluid may include a molecular compound that is a chelating compound. The molecular compound may have the formula: ((NH4)2SO4)a.(H2SO4)b.(H2O)c.(NH4HSO4)x. In the formula, a may be between 1 and 5, b may be between 1 and 5, c may be between 0 and 5, and x may be between 1 and 20.
    Type: Grant
    Filed: December 22, 2016
    Date of Patent: October 9, 2018
    Assignee: Earth Science Laboratories
    Inventors: David Nicholas, Reid Henry Bowman, Freddie L. Singleton
  • Patent number: 8245045
    Abstract: The present description refers in particular to example computer-implemented methods, example computer program products, and example computer systems for automatically generating or verifying a digital signature for a message. The message may be representable in a hierarchical tree structure. An example computer-implemented method may comprise: selecting, from a message MT, a sub-message M to be signed, the sub-message M comprising at least one element; generating a well-formed context CMt for the sub-message M, wherein the well-formed context CMt defines a derivation path to the element in the message MT at a time t, the element being marked [M] in the well-formed context CMt; generating a message digest ?M from the sub-message M and a context digest ?C from the well-formed context CMt; and generating a signature S by applying a secret key SA of a user A to the message digest ?M and to the context digest ?C.
    Type: Grant
    Filed: September 28, 2009
    Date of Patent: August 14, 2012
    Assignee: SAP AG
    Inventors: Azzedine Benameur, Smriti Kumar Sinha, Paul El Khoury
  • Patent number: 8239673
    Abstract: A device (200, 2200) for improved security includes a processor (200) and a secure writeable memory (2245) coupled to said processor (200) and including code (2240) to download a loadable security kernel to the processor (200), authenticate the loadable security kernel, and transfer the kernel so that the kernel begins at a predetermined address inside the secure writeable memory (2245) only if the authentication is successful. A process (2400) of manufacturing a target communication device (2310) having a memory space having a secure writable portion (2245) of the memory space, the manufacturing process (2400) using a host machine (2330). The manufacturing process (2400) includes downloading (2540) the loadable security kernel from the host machine (2330) to the memory space at the target (2310). The loadable security kernel has a flashing entry point.
    Type: Grant
    Filed: April 7, 2005
    Date of Patent: August 7, 2012
    Assignee: Texas Instruments Incorporated
    Inventors: Narendar Shankar, Erdal Paksoy, Steven C. Goss
  • Patent number: 8225394
    Abstract: The present disclosure is directed to a method and system for detecting malware using a secure operating system mode. In accordance with a particular embodiment of the present disclosure a file is received. The file is stored in a secure directory. At least one operation is prevented on the file. A secure operating system mode is started to detect whether the file comprises malware.
    Type: Grant
    Filed: April 13, 2007
    Date of Patent: July 17, 2012
    Assignee: CA, Inc.
    Inventor: Paul A. Gassoway
  • Patent number: 8213614
    Abstract: A system for generating and printing travel documents for a customer associated with a journey having one or more parts, the system comprising: a travel documentation distribution module capable of generating travel documentation for the customer and capable of passing the documents for storage on a customer device at the request of the customer; and a printer located in the vicinity of a starting point of one of the parts of the journey which is capable of responding to a short range communication from the customer device to print the travel documents for said part of the journey for the customer.
    Type: Grant
    Filed: September 23, 2009
    Date of Patent: July 3, 2012
    Assignee: Amadeus S.A.S.
    Inventors: Aziz Kezzou, Jean-Michel Sauvage, Edouard Hubin
  • Patent number: 8214903
    Abstract: A method and system for analyzing scripts. A script is processed, which executes text blocks of code derived from the script and copied to an output file in a sequential order. The script is the first text block that is copied to the output file. Executing the text blocks includes interpreting each text block to generate and execute a corresponding interpreted block of code. Processing the script results in the text blocks being sequenced in the output file in the sequential order. The text blocks include an original text block of code that includes text that may be directly inferred from text appearing in the script. The blocks of code include a new text block of code, which includes text that may not be directly inferred from text appearing in the script. The new text block is generated from executing the original text block.
    Type: Grant
    Filed: October 2, 2009
    Date of Patent: July 3, 2012
    Assignee: International Business Machines Corporation
    Inventor: Robert George Freeman
  • Patent number: 8205089
    Abstract: A trusted rendering system for use in a system for controlling the distribution and use of digital works. A trusted rendering system facilitates the protection of rendered digital works which have been rendered on a system which controls the distribution and use of digital works through the use of dynamically generated watermark information that is embedded in the rendered output. The watermark data typically provides information relating to the owner of the digital work, the rights associated with the rendered copy of the digital work and when and where the digital work was rendered. This information will typically aid in deterring or preventing unauthorized copying of the rendered work to be made. The system for controlling distribution and use of digital works provides for attaching persistent usage rights to a digital work. Digital works are transferred between repositories which are used to request and grant access to digital works.
    Type: Grant
    Filed: August 6, 2009
    Date of Patent: June 19, 2012
    Assignee: ContentGuard Holdings, Inc.
    Inventors: Mark J. Stefik, Glen W. Petrie, Steve A. Okamoto, Nicholas H. Briggs
  • Patent number: 8205076
    Abstract: This specification describes technologies relating to imparting real-time priority-based network communications in an encrypted session. In general, aspects of the subject matter described can be embodied in methods that include establishing, based on cryptographic information in a reserved, random-data portion of a handshake communication, a session, receiving parameter values relating to a sub media stream, included in a header of a network communication, storing the parameter values, obtaining state information and a data payload included in a second network communication, identifying, from the state information, a purpose of the second network communication, and whether a header of the second network communication includes one or more new values corresponding to one or more of the parameters, updating one or more of the stored values based on the one or more new values, and processing the data payload based on the identified purpose and the stored parameter values.
    Type: Grant
    Filed: November 24, 2011
    Date of Patent: June 19, 2012
    Assignee: Adobe Systems Incorporated
    Inventors: Pritham Shetty, Asa Whillock, Edward Chan, Srinivas Manapragada, Matthew Kaufman, Michael Thornburgh
  • Patent number: 8196209
    Abstract: A method for controlling access to content by an Acquisition Point to Presentation Points in clusters in a domain. The AP receives from a PP an access content request comprising the PPs cluster identity and the PP's priority. The AP verifies if access is granted to a PP in the cluster and, if so, grants access to the requesting PP. If not, the AP verifies if access is granted to PPs in a maximum number of clusters. If not, the AP grants access. If the maximum is reached, the AP verifies if the requesting PP's priority is higher than the priority of every PP in another cluster. If not, access is denied; if so, the AP grants access to the requesting PP and denies access to the PPs in the cluster with the lowest priority values. An Acquisition Point is also claimed.
    Type: Grant
    Filed: January 27, 2006
    Date of Patent: June 5, 2012
    Assignee: Thomson Licensing
    Inventors: Sylvain Lelievre, Alain Durand, Oliver Courtay, Jean-Louis Diascorn
  • Patent number: 8194858
    Abstract: The present invention provides a method for a data encryption device to perform network communications, the method comprising obtaining an indexed array of encryption keys, wherein the indexed array of encryption keys is shared with a data decryption device; obtaining a message to be encrypted; using a first random or pseudorandom number to determine an index; obtaining a first key from the array of encryption keys, wherein the first key corresponds to the index; selecting a second key from the plurality of encryption keys; encrypting the message using the first key and a second random or pseudorandom number; encrypting the index using the second key and a third random or pseudorandom number; transmitting the encrypted message and the encrypted index to the data decryption device.
    Type: Grant
    Filed: November 25, 2009
    Date of Patent: June 5, 2012
    Assignee: Physical Optics Corporation
    Inventors: Leonid Bukshpun, Thomas Forrester, Tomasz Jannson, Andrew Kostrzewski, Alexander Milovanov, Ranjit Pradhan
  • Patent number: 8191164
    Abstract: A method of managing access rights in a smart card, to subordinating execution of a command (Cmd1, Cmdk) such as reading or writing to an event (Evt1?, Evtk?) being valid, such as authentication by verifying a code. The state of validation events is stored in a register, and the access rights are stored in a command list (List_Cmd) made up of couples (Cpl1, Cplk), each associating a command with an event. On receiving a request to execute a command, a search is made in the command list (List_Cmd) for the couple (Cpl1, Cplk) that includes the requested command, and execution is refused if the search is unsuccessful. If the search is successful, then it is determined from the register (referred to as the card security state register) whether the event associated with the command is or is not valid, in order to authorize or refuse execution thereof. The invention is for use in any smart card application that involves access rights.
    Type: Grant
    Filed: October 29, 2008
    Date of Patent: May 29, 2012
    Assignee: Morpho
    Inventors: Cyrille Pepin, Guillaume Roudiere
  • Patent number: 8191134
    Abstract: According to one embodiment of the invention, a plurality of IPsec packets belonging to a single IPsec tunnel are received. Different ones of the plurality of IPseck packets are distributed to different ones of a plurality of processing cores of a network element. At least some of those IPsec packets are processed in parallel and without taking a lock on a Security Association (SA) data structure storing a SA associated with the plurality of IPsec packets. The SA is atomically accessed and atomically updated.
    Type: Grant
    Filed: September 29, 2008
    Date of Patent: May 29, 2012
    Assignee: SonicWALL, Inc.
    Inventor: Aravind Thangavelu
  • Patent number: 8191128
    Abstract: To allow a user to access a public data network from a region of service operated by a visited access provider, the visited provider is supplied with an identity of a credit provider. The user is redirected to the credit provider, resulting in establishment of a temporary connection with the credit provider. During this temporary connection, the user supplies original user credentials and, in return, receives substitute user credentials if the original user credentials are valid. The substitute user credentials are supplied to the visited provider, which proceeds to have the user authenticated by the credit provider on the basis of the substitute user credentials. In this way, the visited provider authenticates the user with the credit provider before allowing the user to access the public data network, but a secure exchange of the original user credentials between the user and the credit provider prevents unauthorized access to this information by the visited provider.
    Type: Grant
    Filed: November 26, 2004
    Date of Patent: May 29, 2012
    Assignee: BCE Inc.
    Inventors: Nicolas Nedkov, Spencer Wong, Brian Norman Smith
  • Patent number: 8185957
    Abstract: A method for an impaired user to control a peripheral device including receiving key-value pair input from the user, determining whether the received input is valid and executing a job generated from the valid received key-value pair input.
    Type: Grant
    Filed: October 30, 2006
    Date of Patent: May 22, 2012
    Assignee: Lexmark International, Inc.
    Inventors: Mohamed Nooman Ahmed, Amanda Kay Bridges, Stuart Willard Daniel, William James Gardner Flowers, Charles Edward Grieshaber, Dennis Herbert Hasselbring, Michael Earl Lhamon, Chad Eugene McQuillen, Michael Ray Timperman
  • Patent number: 8185745
    Abstract: A scalable method and apparatus that detects frequent and dispersed invariants is disclosed. More particularly, the application discloses a system that can simultaneously track frequency rates and dispersion criteria of unknown invariants. In other words, the application discloses an invariant detection system implemented in hardware (and/or software) that allows detection of invariants (e.g., byte sequences) that are highly prevalent (e.g., repeating with a high frequency) and dispersed (e.g., originating from many sources and destined to many destinations).
    Type: Grant
    Filed: November 30, 2010
    Date of Patent: May 22, 2012
    Assignee: Cisco Technology, Inc.
    Inventors: Sumeet Singh, John David Huber, Flavio Giovanni Bonomi