Abstract: A bridge plug includes a splayable assembly. The splayable assembly includes an upper annulus with upper extensions, a lower annulus with lower extensions opposing the upper annulus along an axis extending through the upper annulus and the lower annulus, and a linkage connecting the lower annulus to the upper annulus. The linkage has an upper link pivotably connected to a lower link, the upper link pivotably connected between circumferentially adjacent upper extensions and the lower link pivotably connected between circumferentially adjacent lower extensions. The elastic barrier sleeve extends circumferentially about the splayable assembly such that movement of the lower annulus towards the upper annulus expands the elastic barrier sleeve to form a barrier within a wellbore. Bridge plug arrangements and methods of emplacing bridge plugs in wellbores are also described.
Type:
Grant
Filed:
September 19, 2018
Date of Patent:
April 4, 2023
Assignee:
Halliburton Energy Services, Inc.
Inventors:
Jack Gammill Clemens, Anthony Phan, Mark Holly
Abstract: A method for forming a sleeve for wrapping around and insulating a joint of a downhole tubing string is provided. The method includes the steps of providing a mold, applying insulation around the mold, winding an interfacing material around the insulation; and applying a polymer onto the interfacing material to bind to the interfacing material to form the sleeve.
Abstract: The method includes providing a body with an upper mounting surface and a lower end, an interior surface of the body defining a cavity, the cavity including a first inlet and a first outlet in the upper mounting surface and the lower end, respectively, the interior surface including a frustoconical inner surface with a first tapered end that is connected to the first outlet. The method further includes first inserting an adjustable member within the cavity, the adjustable member defining a bore with a second inlet and a second outlet, the adjustable member including a frustoconical external surface with a second tapered end that coaxially aligns with the first tapered end, and first connecting a funnel with a projecting land to the body.
Abstract: In some embodiments, securing device commands includes a first electronic device receiving a command authorization request message from a second electronic device, including a device command to be performed by the second electronic device, a command argument, and a first message authentication code (MAC) generated by applying a hash function to the device command, the command argument and a first counter value. The first electronic device generates a second MAC by applying the hash function to the device command, the command argument and a second counter value synchronized with the first counter value. The first electronic device compares the first MAC and the second MAC to authenticate the device command and transmit a command approval message or a command denial message. The command approval message causes the second electronic device to perform the device command and the command denial message causes the second electronic device to reject the device command.
Abstract: Aspects of the present disclosure are directed to an automated remediation system that can receive service level objective (SLO) alerts or notifications and, based on the type, take automated remedial actions. The automated remediation system can perform automated responses to various SLO alerts such as latency alerts, error budget alerts, burn rate alerts, etc. The automated remediation system can utilize a mapping to select which automated response to perform; can measure the effectiveness of the automated response using a metric defined for the alert type; and, until the issue is resolved or no further actions are mapped to the alert type, can repeat the initial automated response or can take secondary automated responses. The automated remediation system can also report the alert and the remedial actions taken.
Type:
Grant
Filed:
January 28, 2022
Date of Patent:
April 4, 2023
Assignee:
United Services Automobile Association (USAA)
Inventors:
Christopher Thomas Wilkinson, Robert L. Johnson
Abstract: A formation sampling tool including a plurality of ferrofluidic seals for sealing the formation sampling tool against a wellbore wall of a wellbore, each adjacent pair of the plurality of ferrofluidic seals defining a formation fluid inflow section through which formation fluid enters the formation sampling tool via fluid inflow lines, wherein a first ferrofluidic seal of the plurality of ferrofluidic seals is distal a drill bit, and wherein a last ferrofluidic seal of the plurality of ferrofluidic seals is proximate the drill bit; a formation fluid sampling line, wherein the formation fluid sampling line is in fluid communication with the one or more fluid inflow lines; one or more sensors in fluid communication with the one or more fluid inflow lines and/or the formation fluid sampling line; and a pump configured to pump formation fluid into the formation sampling tool via each of the formation fluid inflow sections.
Type:
Grant
Filed:
October 19, 2021
Date of Patent:
April 4, 2023
Assignee:
Halliburton Energy Services, Inc.
Inventors:
Christopher Michael Jones, Darren George Gascooke, Mehdi Ali Pour Kallehbasti, Anthony Herman Van Zuilekom
Abstract: Provided is a system, method, and computer program product for conducting secure transactions with at least two appliances. The method includes monitoring audio data with a first appliance including a processor, a speaker, and a microphone; detecting, with the first appliance, an audible request to initiate a transaction from a user from the audio data; communicating, with the first appliance, a transaction request to at least one remote server in response to detecting the audible request to initiate the transaction; detecting, with the first appliance, a credential message received by the first appliance directly from a second appliance via an audio transmission, the credential message corresponding to the transaction request and including a limited use key provided to the second appliance from the at least one remote server or another remote server; and in response to detecting the credential message, initiating, with the first appliance, the transaction based on the limited use key.
Abstract: System and methods of controlling fluid flow during reservoir stimulation treatments are provided. A flow distribution of treatment fluid injected into formation entry points along a wellbore path is monitored during a current stage of a multistage stimulation treatment. Upon determining that the monitored flow distribution meets a threshold, a remainder of the current stage is partitioned into a plurality of treatment cycles and at least one diversion phase for diverting the fluid to be injected away from one or more formation entry points between consecutive treatment cycles. A portion of the fluid to be injected into the formation entry points is allocated to each of the treatment cycles of the partitioned stage. The treatment cycles are performed for the remainder of the current stage using the treatment fluid allocated to each treatment cycle, wherein the flow distribution is adjusted so as not to meet the threshold.
Abstract: Embodiments of the invention are directed assessing reliability between two computing devices. A distributed database may maintain reliability associations between pairs of computing devices. Each reliability association may indicate a particular device has determined (e.g., locally) that another device is reliable. In order to determine an amount of reliability between a first computing device and a second computing device, an ordered combination of the reliability associations may be determined utilizing the distributed database. The ordered combination of reliability associations may identify a reliability path between the first computing device and the second computing device. An amount of reliability may be determined based on the reliability path. An interaction between the devices may be allowed or restricted based at least in part on the amount of reliability between the computing devices.
Abstract: A system and method for reconstructing information about vehicular accidents is disclosed. The system comprises an onboard computing system in a vehicle with an accident reconstruction system. Using sensed information from vehicle sensors and an animation engine, the system can generate animated videos depicting the accident. The system can also take action in response to information it learns from the animated video and/or an underlying 3D model of the accident used to generate the video.
Type:
Grant
Filed:
July 14, 2020
Date of Patent:
April 4, 2023
Assignee:
United Services Automobile Association (USAA)
Inventors:
Nolan Serrao, Ruthie D. Lyle, Bharat Prasad, Ravi Durairaj
Abstract: Embodiments of the present disclosure relate to systems and methods for capturing information. In addition, embodiments of the present disclosure relate to solutions for capturing information using a web browser extension. Embodiments of the present disclosure further relate to securely transmitting captured information to a server for association with an application or form being completed by an individual.
Type:
Grant
Filed:
October 22, 2021
Date of Patent:
April 4, 2023
Assignee:
Capital One Services, LLC
Inventors:
Abdelkader M'Hamed Benkreira, Michael Mossoba, Joshua Edwards
Abstract: A downhole drilling tool comprises an earth-boring drill bit including a bit body and a shank coupled to the bit body. The drill bit includes a motion puck positioned in a cavity of the shank, wherein the motion puck includes a motion sensor to detect movement indicating a force applied to the earth-boring drill bit during a drilling operation. The drill bit includes a strain puck positioned in the cavity of the shank, wherein the strain puck includes a strain gauge to measure the force applied to the earth-boring drill bit during the drilling operation. The drill bit includes a plurality of blades disposed on exterior portions of the bit body, each blade having respective cutting elements disposed thereon.
Abstract: Provided is a computer-implemented method for authenticating an identification document. The method includes determining, with at least one processor, whether image data associated with the identification document has at least one predetermined indicia. In response to determining that the image data has the at least one predetermined indicia, the method includes determining whether the at least one predetermined indicia corresponds to at least one invalidation mark on the identification document, and, in response to determining that the at least one predetermined indicia corresponds to the at least one invalidation mark, determining, that the identification document is invalid. In response to determining that the identification document is invalid, the method includes preventing or causing the prevention of at least one action from being performed. A system and computer program product for authenticating identification documents are also disclosed.
Abstract: A device, that is part of a network of nodes that has access to a blockchain, may receive, from a user device associated with an entity, a request for campaign information for a campaign. The request may include data identifying campaign parameters. The device may interact with smart contracts associated with the blockchain to identify individuals to target for the campaign. The smart contracts may be configured to receive the campaign parameters as input and to output an indication of whether campaign preferences are compatible with the campaign parameters. The device may generate the campaign information to include information identifying the individuals targeted for the campaign and information identifying particular campaign preferences found to be compatible with particular campaign parameters. The device may provide the campaign information to the user device to permit the user device to use the campaign information to target the individuals for the campaign.
Type:
Grant
Filed:
September 10, 2020
Date of Patent:
April 4, 2023
Assignee:
Capital One Services, LLC
Inventors:
Adam Vukich, Abdelkadar M'Hamed Benkreira, Joshua Edwards, William Carroll, Mykhaylo Bulgakov
Abstract: Methods and systems for approving transactions are disclosed. An image of a financial object can be received. Account information for the party associated with the financial object can be determined based on an analysis of the image of the financial object. At least one proposed transaction can be generated. The at least one proposed transaction can be transmitted to the mobile device. An approval for the at least one proposed transaction can be received.
Type:
Grant
Filed:
October 18, 2021
Date of Patent:
April 4, 2023
Assignee:
Capital One Services, LLC
Inventors:
Michael Mossoba, Joshua Edwards, Abdelkader M'Hamed Benkreira
Abstract: Disclosed are adeno-associated virus (AAV) vectors comprising a nucleotide sequence encoding RP2 or RPGR-ORF15 and related pharmaceutical compositions. Also disclosed are methods of treating or preventing X-linked retinitis pigmentosa, increasing photoreceptor number in a retina of a mammal, and increasing visual acuity of a mammal using the vectors and pharmaceutical compositions.
Type:
Grant
Filed:
April 21, 2020
Date of Patent:
April 4, 2023
Assignee:
The United States of America,as represented by the Secretary, Department of Health and Human Services
Inventors:
Zhijian Wu, Anand Swaroop, Suja Hiriyanna, Tiansen Li
Abstract: Disclosed are methods and systems for securely providing identity attributes. A server computer may receive, from a relying entity, a request for identity attributes associated with a target entity, wherein the request for identity attributes includes a session identifier associated with the target entity and an identifier of the relying entity. The server computer may validate the request based on the session identifier. The server computer may identify, based on the identifier of the relying entity, a package defining types of identity attributes for the relying entity and a data access token associated with the package. Based on validating the request, the server computer may transmit, to a digital identity provider, a request for a set of identity attributes corresponding to the package, the request comprising the data access token. The server computer may receive, from the digital identity provider, the set of identity attributes.