Patents Assigned to LLC
-
Publication number: 20250099874Abstract: A water-based demulsifier includes two or more demulsifying resins, a surfactant, a hydrophilic linker, and a base solvent, which is water. In various embodiments, the two or more demulsifying resins include acid-catalyzed alkoxylated alkylphenol resins, base-catalyzed alkoxylated alkylphenol resins, polyol resins, and diepoxide resins. In one aspect, a method of using a water-based demulsifier with a desalter includes the steps of providing the water-based demulsifier and applying it at the desalter, where the water-based demulsifier includes an acid-catalyzed alkoxylated alkylphenol resin, a base-catalyzed alkoxylated alkylphenol resin, a surfactant, a hydrophilic linker, and a base solvent. In yet another aspect, a water-based demulsifier includes two or more demulsifying resins, a surfactant, a hydrophilic linker, and water as a base solvent, where the hydrophilic linker includes a C3-C18 branched linker, which may be a branched alkyl alcohol, a branched glycol, or a branched alkyl glycerin.Type: ApplicationFiled: September 26, 2023Publication date: March 27, 2025Applicant: Baker Hughes Oilfield Operations LLCInventors: Jiangzhong Yang, Enirco Nadres, Bradley G. Harrell, Joseph J. Arensdorf, Lirio Quintero
-
Publication number: 20250105723Abstract: This specification presents a boost topology operating in discontinuous mode wherein the energy contained in the parasitic oscillations is harvested and used to obtain zero voltage switching in any operating conditions. This boost topology is further used in power factor correction application wherein the operation frequency can be maintained in a very narrow range of operation.Type: ApplicationFiled: December 9, 2024Publication date: March 27, 2025Applicant: Rompower Technology Holdings, LLCInventor: Ionel Jitaru
-
Publication number: 20250100958Abstract: A fluoropropene composition comprising Z-1,3,3,3-tetrafluoropropene, E-1,3,3,3-tetrafluoropropene, 2,3,3,3-tetrafluoropropene, and optionally 1,1,1,3,3-pentafluoropropane wherein the 2,3,3,3-tetrafluoropropene being present in an amount of 0.001 to 1.0%. A method of producing the fluoropropene, methods for using the fluoropropene and the composition formed are also disclosed.Type: ApplicationFiled: December 10, 2024Publication date: March 27, 2025Applicant: THE CHEMOURS COMPANY FC, LLCInventors: SHENG PENG, MARIO JOSEPH NAPPA
-
Publication number: 20250101827Abstract: A compression relief tool includes a tool body, an actuator, and a tool sleeve. The tool body is configured to couple to a wellhead. The actuator is coupled to the tool body and is configured to be coupled to the wellhead. The actuator is further configured to impart a preload force on an intermediate casing via the tool body. The tool sleeve is movable relative to the tool body. The tool sleeve is configured to engage a retaining ring coupled to the intermediate casing. The tool sleeve is movable to retrieve the retaining ring from the intermediate casing. The actuator is configured to release the preload force on the intermediate casing after the tool sleeve retrieves the retaining ring.Type: ApplicationFiled: September 27, 2024Publication date: March 27, 2025Applicant: VAULT PRESSURE CONTROL, LLCInventors: Andrew Browne Helvenston, Khang Van Nguyen, Bryan Staton
-
Publication number: 20250103711Abstract: Methods and systems are described herein for improvements for cybersecurity of telecommunication devices. For example, cybersecurity for telecommunication devices may be improved by analyzing activity log data of telecommunication devices for a candidate event (e.g., the uploading of malware) and disabling one or more services of a telecommunication device. By doing so, cybersecurity for telecommunication devices may be improved by detecting a possible malware intrusion attempt and disabling one or more services of the telecommunication devices. For example, activity log data of telecommunication devices may be obtained. A candidate event indicating malware may be detected in the activity log data. A number of proximate telecommunication devices satisfying a proximity threshold condition may be determined. The number of proximate telecommunication devices that satisfy a density threshold condition may be determined.Type: ApplicationFiled: December 9, 2024Publication date: March 27, 2025Applicant: Capital One Services, LLCInventors: Jeff PHARR, Son MAYS, Michael LITTLEJOHN
-
Publication number: 20250099693Abstract: A capsule for a heat-not-burn (HNB) aerosol-generating device may include a first frame, a second frame, a first heater, a second heater, and/or an aerosol-forming substrate. The first frame has a first interior face and a first exterior face. In addition, the first frame defines a first opening. The first heater may be secured to the first frame so as to cover the first opening. The second frame is connected to the first frame. The second frame has a second interior face and a second exterior face. Furthermore, the second frame defines a second opening. The second heater may be secured to the second frame so as to cover the second opening. The aerosol-forming substrate may be between the first heater and the second heater.Type: ApplicationFiled: December 6, 2024Publication date: March 27, 2025Applicant: Altria Client Services LLCInventors: Gregory GRISCIK, Thien NGUYEN, Carl KITE, David ALVAREZ, Terrance BACHE, Zack BLACKMON, Patrick GOOD, Raymond LAU, Eric HAWES, Cristian POPA, James YORKSHADES, Adam PARROTT
-
Publication number: 20250103726Abstract: A current software tool is identified. The current software tool is used to manage and/or create a current corresponding software. For example, the current software tool may be a compiler and the current corresponding software may be a binary executable. A current mapping is generated between code provided to the current software tool and the current corresponding software using a first Artificial Intelligence (AI) algorithm. A comparison between the current mapping and a learned mapping is made to determine if the current software tool is manipulating the current corresponding software in an abnormal way. The learned mapping is based on historical code input into historical software tools and corresponding historical code output from the historical software tools. In response to determining that the current software tool is manipulating the current corresponding software in an abnormal way, the current software tool is identified as being compromised or likely compromised.Type: ApplicationFiled: September 27, 2023Publication date: March 27, 2025Applicant: MICRO FOCUS LLCInventors: Neeraj Kumar Vijay, Michael F. Angelo, Douglas Max Grover
-
Publication number: 20250106945Abstract: A cartridge for an e-vaping device includes a housing extending along a longitudinal axis of the cartridge, and an outlet-end insert coupled to the outlet end of the housing. The housing at least partially encloses a pre-vapor formulation reservoir and a vapor generator of the cartridge and further channels light via internal reflection through an interior of the housing. The outlet-end insert includes an outlet in flow communication with the vapor generator, directs the vapor generated by the vapor generator out of the cartridge through the outlet, and further emits the light channeled through the interior of the housing. One or more properties of the light are controllable.Type: ApplicationFiled: December 10, 2024Publication date: March 27, 2025Applicant: Altria Client Services LLCInventors: Christopher S. TUCKER, Phillip DIANA, Nam TRAN, Matthew CAPARRELLI
-
Publication number: 20250106027Abstract: A method includes receiving, at a broker processor and from a prover processor, a user request, a user token, and a user cryptographic zero-knowledge proof associated with a user characteristic. The method also includes receiving, at the broker processor, from a service processor, and based on the user request, a requirements specification and the user token. The method also includes generating, via the broker processor, a broker cryptographic zero-knowledge proof based on the requirements specification and the user cryptographic zero-knowledge proof. The method also includes transmitting, via the broker processor and to the service processor, the broker cryptographic zero-knowledge proof to cause the service processor to fulfill the user request.Type: ApplicationFiled: October 3, 2024Publication date: March 27, 2025Applicant: Khosla Ventures LLCInventors: Ricardo BAEZA-YATES, Juan GARAY, Sebastián Pablo ACUÑA KELLER, Andrés Felipe VILLAVICENCIO THEODOLUZ, Sebastián Andrés GÁLVEZ ORTIZ
-
Publication number: 20250100224Abstract: A method for removing excess powder from a part for a vehicle during an additive manufacturing process, comprises defining parameters for a part, defining parameters for a removal tool comprising a plurality of links to create a chain-like structure, simultaneously creating the part and the removal tool via additive manufacturing, wherein the part defines an interior passageway and the removal tool is created within the interior passageway and, upon completion of the creation of the part and the removal tool, the removal tool is surrounded by excess powder in the interior passageway, and wherein each link of the plurality of links are created with a gap between adjacent links of the plurality of links, and removing the removal tool from the interior passageway, forcing at least some of the excess powder out of the interior passageway.Type: ApplicationFiled: September 26, 2023Publication date: March 27, 2025Applicant: GM Global Technology Operations LLCInventors: Adam McFarland, Adam John Campbell, Steven Lewis Corzyk, Patrick J. Eding, Dale Miller
-
Publication number: 20250103800Abstract: A technique determines whether a target item is adequately supported by a source item, and therefore likely free of hallucinations. The technique operates by progressively expanding a scope of source content to be considered when determining whether an individual target part of the target item has support in the source item. For instance, the technique initially determines whether any individual source part in the source item supports the target part. If this stage fails to identify support, the technique next considers whether a larger portion of the source item supports the particular target item. In some implementations, the technique selects a scope of analysis at a particular stage by choosing a group of source parts that most closely match the target part under consideration. The technique concatenates those source parts in the same order in which they appear in the source item.Type: ApplicationFiled: September 27, 2023Publication date: March 27, 2025Applicant: Microsoft Technology Licensing, LLCInventors: Ahmed Elgohary GHONEIM, Pengcheng HE
-
Publication number: 20250104147Abstract: Auctioning mechanisms adapted to improve the integrity of dark order block trading are provided.Type: ApplicationFiled: December 9, 2024Publication date: March 27, 2025Applicant: NYSE Holdings LLCInventors: Alicia Suminski, Anais Fabienne Christiane Dony
-
Publication number: 20250098784Abstract: An exemplary smoking topography circuit of an electronic aerosol smoking article, includes at least one sensor configured to measure user interaction with the smoking article, a processor, and memory. The processor is configured to detect a smoking event based an output of the at least one sensor, collect data associated with the smoking event, and arrange the data in a pattern that associates the smoking event to shifts in battery voltage. The memory is configured to store the data pattern in a structured multi-byte format.Type: ApplicationFiled: December 6, 2024Publication date: March 27, 2025Applicant: Altria Client Services LLCInventors: Barry S. SMITH, Douglas A. BURTON
-
Publication number: 20250102262Abstract: A crossbow includes a center rail defining a projectile axis, a draw string coupled with the first cam and the second cam, the draw string configured to move between a released configuration and a drawn configuration, and a string carrier slidably coupled with the center rail. The string carrier is selectively engages the draw string and moves between a forward position and a retracted position. The crossbow includes a trigger assembly having a trigger and a trigger pawl operatively coupled to the trigger. During operation of the crossbow when the string carrier is in the retracted position, the trigger pawl is in an operating position and is operatively engaged with the string carrier. During operation of the crossbow when the string carrier is not in the retracted position, the trigger pawl is in the operating position and is operatively disengaged from the string carrier.Type: ApplicationFiled: December 6, 2024Publication date: March 27, 2025Applicant: Ravin Crossbows, LLCInventor: Craig Yehle
-
Publication number: 20250102473Abstract: An ultrasonic testing apparatus structured to perform an ultrasonic inspection on a workpiece. The ultrasonic testing apparatus comprises an ultrasonic testing probe structured to generate an ultrasonic output directed toward the workpiece and to receive an ultrasonic input from the workpiece that is responsive to the output; a couplant delivery system comprising a couplant supply, the couplant delivery system further comprising an actuator which, when operated, is structured to apply from the couplant supply an amount of a couplant to at least one of the workpiece and the ultrasonic testing probe; and a control apparatus electrically connected with the ultrasonic testing probe and with the couplant delivery system, the control apparatus being structured to receive the ultrasonic input and being further structured to operate the actuator. A couplant delivery system that is operable with an ultrasonic testing apparatus that is structured to perform an ultrasonic inspection on a workpiece.Type: ApplicationFiled: December 9, 2024Publication date: March 27, 2025Applicant: Westinghouse Electric Company LLCInventors: Jacques L. BRIGNAC, George R. ROWLAND, Glenn G. HART, JR., Bruce A.P. FARVER
-
Publication number: 20250098578Abstract: A protective plate assembly for use with an agricultural vehicle. The protective plate assembly includes a first plate that is composed of a conductive material and that is configured to protect a component of the agricultural vehicle from being struck by a foreign object; a second plate that is composed of a conductive material and that is configured to protect the component of the agricultural vehicle from being struck by the foreign object; and an insulator that is positioned between the first and second plates.Type: ApplicationFiled: September 27, 2023Publication date: March 27, 2025Applicant: CNH Industrial America LLCInventor: Stephen Todderud
-
Publication number: 20250104070Abstract: A digital transaction is secured by leveraging tamper-resistant hardware associated with at least one of the devices involved in the transaction. The mechanism that controls the transaction between a sending device and a receiving device, such as the application or an application plugin, is configured to allocate a high degree of trust to at least one of the devices with tamper-resistant hardware. This way, any confirmations and representations from the device with the tamper-resistant hardware can be trusted and locally relied upon. The tamper-resistant device is configured with rules to prevent certain actions, such as double spending and overspending, among other rules. Thus, so long as the receiving device can verify that the sending device is configured with tamper-resistant hardware, the receiving device can trust that the sending device is acting within the confines of its prescribed rules and that the money will transfer.Type: ApplicationFiled: December 7, 2024Publication date: March 27, 2025Applicant: ExtoLabs, LLCInventors: Timothy Dorcey, Orang Dialameh
-
Publication number: 20250099697Abstract: An electrically heated aerosol-generating device is configured for use with a consumable cartridge including a storage portion containing an aerosol-forming substrate and having a fluid permeable internal surface surrounding an open-ended passage extending through the cartridge. The device includes a housing having a cavity for receiving the cartridge and a heater assembly positioned in the cavity. The heater assembly includes an electrically conductive hollow shaft portion connected to the housing and an electric heater positioned along the hollow shaft portion and having at least one heating element for heating the aerosol-forming substrate. The hollow shaft portion defines an airflow passage forming part of an airflow pathway through the device and is arranged to extend into the open-ended passage of the cartridge. The hollow shaft portion comprises a plurality of apertures, and the heating element is one or more narrow regions of the hollow shaft portion between adjacent apertures.Type: ApplicationFiled: December 9, 2024Publication date: March 27, 2025Applicant: Altria Client Services LLCInventors: Rui Nuno BATISTA, Laurent MANCA
-
Publication number: 20250099636Abstract: A method of sterilizing an Intracervical Insemination (ICI) fertility kit, for use in performing self-insemination, via ethylene oxide. Each sterile kit comprises: one to three sets of individually wrapped sterile, disposable, syringes and optionally semen collection jars; printed instructions; and a QR code. The collection jar comprises a snap-on lid, and an inner surface with seamless edges to prevent semen residue. The syringes and optionally the jars are sealed in plastic wraps permeable to air and gas, and impermeable to pathogens; and sterilized via ethylene oxide. Fresh or frozen, unwashed or washed, semen is deposited into the jar, pulled into the syringe, and administered cervically during a user's maximum monthly level of luteinizing hormone. The syringe distal end is designed to push all semen out of the syringe then plug the end closed, while preventing semen residue from collecting within the syringe. Large circular syringe handles facilitate stable handling.Type: ApplicationFiled: December 6, 2024Publication date: March 27, 2025Applicant: PherDal-dba of Next Level Bioinformatics LLCInventors: Jennifer Westphal, Ryan Westphal
-
Publication number: 20250106609Abstract: A feedback based public safety method is provided. The method is implemented by a computing device and comprising receiving, from an external device of an individual, identification data of the individual associated with the external device, accessing from one or more databases, by the computing device of the user, ratings data specific to the individual, the ratings data is based on historical interactions of the individual, comparing the ratings data with one or more of a plurality of threshold values, determining, based on the comparing, whether the ratings data satisfies one or more of the plurality of threshold values, and initiating one or more of a plurality of actions sets responsive to the ratings data satisfying the one or more of the plurality of threshold values.Type: ApplicationFiled: December 11, 2024Publication date: March 27, 2025Applicant: GS3 Innovation LLCInventor: Georgio Sabino, III