Patents by Inventor Luis Sanchez

Luis Sanchez has filed for patents to protect the following inventions. This listing includes patent applications that are pending as well as patents that have already been granted by the United States Patent and Trademark Office (USPTO).

  • Publication number: 20100216124
    Abstract: Methods and kits for diagnosing the risk of developing restenosis after revascularization by implantation of stents based on the detection of single-nucleotide polymorphisms (SNPs).
    Type: Application
    Filed: February 24, 2009
    Publication date: August 26, 2010
    Applicant: FINA BIOTECH, S.L.U.
    Inventors: Vicente Andres Garcia, Carlos Silvestre Roig, Patricia Fernandez Ferri, Pedro Luis Sanchez Fernandez, Francisco Fernandez Aviles, Felipe Javier Chaves Martinez
  • Patent number: 7777870
    Abstract: A system and method for distinguishing a first light source from other light sources utilizes an image receiver that can selectively engage and disengage a filter. The filter can be configured to block bands of light corresponding to the light being emitted by either the first source or the other sources. By alternately engaging and disengaging the filter from the image receiver, the first light source may be distinguished from other light sources.
    Type: Grant
    Filed: January 21, 2008
    Date of Patent: August 17, 2010
    Assignee: Evident Technologies, Inc.
    Inventors: James C. M. Hayes, Luis A. Sanchez, Eva Marie Sackal, Clinton T. Ballinger
  • Publication number: 20100205672
    Abstract: A system (126-129) detects transmission of potentially malicious packets. The system (126-129) receives packets and generates hash values corresponding to each of the packets. The system (126-129) may then compare the generated hash values to hash values corresponding to prior packets. The system (126-129) determines that one of the packets is a potentially malicious packet when the generated hash value corresponding to the one packet matches one of the hash values corresponding to one of the prior packets and the one prior packet was received within a predetermined amount of time of the one packet. The system (126-129) may also facilitate the tracing of the path taken by a potentially malicious packet. In this case, the system (126-129) may receive a message that identifies a potentially malicious packet, generate hash values from the potentially malicious packet, and determine whether one or more of the generated hash values match hash values corresponding to previously-received packets.
    Type: Application
    Filed: April 18, 2010
    Publication date: August 12, 2010
    Applicant: Azure Networks, LLC
    Inventors: Walter Clark Milliken, William Timothy Strayer, Stephen Douglas Milligan, Luis Sanchez, Craig Partridge
  • Publication number: 20100205670
    Abstract: A system and method for performing source path isolation in a network. The system comprises an intrusion detection system (IDS), a source path isolation server (SS1) and at least one router configured to operate as a source path isolation router (SR1) operating within an autonomous system. When IDS detects a malicious packet, a message is sent to SS1. SS1 in turn generates a query message (QM) containing at least a portion of the malicious packet. Then, QM is sent to participating routers located one hop away. SR1 uses the query message to determine if it has observed the malicious packet by comparing it with locally stored information about packets having passed through SR1. SR1 sends a reply to SS1, and SS1 uses the reply to identify the ingress point into the network of the malicious packet.
    Type: Application
    Filed: April 18, 2010
    Publication date: August 12, 2010
    Applicant: Azure Networks, LLC
    Inventors: Walter Clark Milliken, William Timothy Strayer, Stephen Douglas Milligan, Luis Sanchez, Craig Partridge
  • Publication number: 20100205671
    Abstract: A system (200) detects transmission of potentially malicious packets. The system (200) receives, or otherwise observes, packets and generates hash values based on variable-sized blocks of the packets. The system (200) then compares the generated hash values to hash values associated with prior packets. The system (200) determines that one of the received packets is a potentially malicious packet when one or more of the generated hash values associated with the received packet match one or more of the hash values associated with the prior packets.
    Type: Application
    Filed: April 18, 2010
    Publication date: August 12, 2010
    Applicant: Azure Networks, LLC
    Inventors: Walter Clark Milliken, William Timothy Strayer, Stephen Douglas Milligan, Luis Sanchez, Craig Partridge
  • Patent number: 7769485
    Abstract: Systems and methods for optimizing the process of segregating undesired mail using an incoming mail sorter are described and in certain examples, systems including those for using information feed-forward and/or feedback systems for making selective physical delivery decisions in the process of sorting and delivering incoming physical mail are described.
    Type: Grant
    Filed: September 29, 2007
    Date of Patent: August 3, 2010
    Assignee: Pitney Bowes Inc.
    Inventors: John P. Miller, Luis A. Sanchez, George M. MacDonald
  • Publication number: 20100109521
    Abstract: An EL device is presented which consists of a simple three active layer construction. A layer of a dielectric material, a traditional EL phosphor layer, and a quantum dot layer are present between an electrode and a transparent electrode. The EL device is operated efficiently by an AC source. Quantum dots which emit in the visible spectrum are used. The EL device is fully color tunable by altering the composition and thickness of the layers.
    Type: Application
    Filed: October 21, 2009
    Publication date: May 6, 2010
    Inventors: San Ming Yang, Luis A. Sanchez
  • Publication number: 20090322070
    Abstract: A printed indicium comprising a first section comprising a first ink having a first color under normal daylight; and a second section comprising a second different ink, wherein the second different ink comprises a photochromic or thermochromic ink which is not visible under normal daylight, the second section further comprising a third different ink which comprises a photochromic or thermochromic ink which is visible under normal daylight.
    Type: Application
    Filed: December 27, 2006
    Publication date: December 31, 2009
    Inventors: Jay Reichelsheimer, Luis A. Sanchez
  • Publication number: 20090313339
    Abstract: A system and method for performing source path isolation in a network. The system comprises an intrusion detection system (IDS), a source path isolation server (SS1) and at least one router configured to operate as a source path isolation router (SR1) operating within an autonomous system. When IDS detects a malicious packet, a message is sent to SS1. SS1 in turn generates a query message (QM) containing at least a portion of the malicious packet. Then, QM is sent to participating routers located one hop away. SR1 uses the query message to determine if it has observed the malicious packet by comparing it with locally stored information about packets having passed through SR1. SR1 sends a reply to SS1, and SS1 uses the reply to identify the ingress point into the network of the malicious packet.
    Type: Application
    Filed: October 10, 2008
    Publication date: December 17, 2009
    Inventors: Walter Clark Milliken, William Timothy Strayer, Stephen Douglas Milligan, Luis Sanchez, Craig Patridge
  • Publication number: 20090182867
    Abstract: A system and method for identifying target packets in a network. The invention identifies packets by computing a hash value over at least a portion of a packet passing through a network device such as a router. The hash value is used as an address, or index, into a memory. The hash value identifies a unique memory address and a flag is set at the respective memory location. When a target packet is detected elsewhere in a network, the network device receives a query message containing a hash value of the target packet. The network device compares the target packet to the hash values in memory. A match between the hash value in memory and the hash value in the query message indicates the target packet was observed by the network device. After a match is detected, the network device makes a reply available to the network.
    Type: Application
    Filed: October 10, 2008
    Publication date: July 16, 2009
    Inventors: Walter Clark Milliken, William Timothy Strayer, Stephen Douglas Milligan, Luis Sanchez, Craig Partridge
  • Publication number: 20090166438
    Abstract: Systems and methods for utilizing time-dependent dynamic barcodes in systems including a mail delivery system for manipulating delivery charges and/or sorting and delivery processing preferences are described.
    Type: Application
    Filed: December 31, 2007
    Publication date: July 2, 2009
    Applicant: Pitney Bowes Inc.
    Inventors: Luis A. Sanchez, Douglas B. Quine
  • Publication number: 20090172777
    Abstract: Systems and methods for tracking documents are described. In certain examples, systems and methods for authenticating and tracking physical documents through a multiple party work flow across a geographically dispersed area using digital pens and RFID tags are described.
    Type: Application
    Filed: December 31, 2007
    Publication date: July 2, 2009
    Applicant: Pitney Bowes Inc.
    Inventors: Gary G. Hansen, Arthur J. Parkos, Jean-Hiram Coffy, Luis A. Sanchez, Claude Zeller, Ronald Reichman
  • Publication number: 20090158435
    Abstract: A system (126-129) detects transmission of potentially malicious packets. The system (126-129) receives packets and generates hash values corresponding to each of the packets. The system (126-129) may then compare the generated hash values to hash values corresponding to prior packets. The system (126-129) determines that one of the packets is a potentially malicious packet when the generated hash value corresponding to the one packet matches one of the hash values corresponding to one of the prior packets and the one prior packet was received within a predetermined amount of time of the one packet. The system (126-129) may also facilitate the tracing of the path taken by a potentially malicious packet. In this case, the system (126-129) may receive a message that identifies a potentially malicious packet, generate hash values from the potentially malicious packet, and determine whether one or more of the generated hash values match hash values corresponding to previously-received packets.
    Type: Application
    Filed: October 10, 2008
    Publication date: June 18, 2009
    Inventors: Walter Clark Milliken, William Timothy Strayer, Stephen Douglas Milligan, Luis Sanchez, Craig Partridge
  • Publication number: 20090158046
    Abstract: A system (200) detects transmission of potentially malicious packets. The system (200) receives, or otherwise observes, packets and generates hash values based on variable-sized blocks of the packets. The system (200) then compares the generated hash values to hash values associated with prior packets. The system (200) determines that one of the received packets is a potentially malicious packet when one or more of the generated hash values associated with the received packet match one or more of the hash values associated with the prior packets.
    Type: Application
    Filed: October 10, 2008
    Publication date: June 18, 2009
    Inventors: Walter Clark Milliken, William Timothy Strayer, Stephen Douglas Milligan, Luis Sanchez, Craig Partridge
  • Patent number: 7533062
    Abstract: In accordance with an embodiment of the invention, a method for creating a self-authenticating document is disclosed. The method comprises: providing a base substrate forming the document; printing an authentication seal on the document, the authentication seal comprising a printed portion comprising an ink creating a bleed area on the document where the ink and the substrate interact; and obtaining unique bleed properties of the bleed area. The bleed properties are obtained by scanning the bleed area upon termination of bleeding or drying to provide a description of the ink and substrate interaction to generate an identifier code representing the unique bleed properties. The method further comprises generating a signature of the identifier code, encoding the identifier code in an information carrier, and associating the information carrier with the document or storing the signed identifier code in a remote verification seal code that is not printed on the document.
    Type: Grant
    Filed: May 27, 2005
    Date of Patent: May 12, 2009
    Assignee: Pitney Bowes Inc.
    Inventors: Luis A. Sanchez, Robert A. Cordery
  • Patent number: 7513358
    Abstract: A non-powered roller conveyor for conveying parts along a conveyor path includes a downwardly sloped conveyor support frame with a plurality of rollers rotatably mounted along the frame. The rollers comprise a length of prefabricated roller top conveyor chain mounted along a top surface of the conveyor frame. The conveyor chain includes a plurality of links connected together by pivotal connectors that permit sideways articulation of the links with respect to each other. Transverse rows of rollers are rotatably mounted on the links to permit products to roll along the conveyor. The rollers are easily replaceable when necessary. The conveyor follows a downwardly extending spiral path comprising a series of inclined straight sections interconnected by inclined bend sections. Both the straight and bend sections are inclined so that parts roll along the conveyor path under the influence of gravity.
    Type: Grant
    Filed: June 20, 2005
    Date of Patent: April 7, 2009
    Inventors: Luis Sanchez, Lawrence E. Forrester
  • Publication number: 20090084713
    Abstract: Systems and methods for optimizing the process of segregating undesired mail using an incoming mail sorter are described and in certain examples, systems including those for using information feed-forward and/or feedback systems for making selective physical delivery decisions in the process of sorting and delivering incoming physical mail are described.
    Type: Application
    Filed: September 29, 2007
    Publication date: April 2, 2009
    Inventors: John P. Miller, Luis A. Sanchez, George M. MacDonald
  • Patent number: 7470731
    Abstract: A water-based ink for use in an ink jet printer for printing machine-readable indicia on a substrate is disclosed. The ink jet ink comprises fluorescent nanoparticles having a diameter between about 30 nm and about 100 nm; and an aqueous liquid vehicle. The aqueous liquid vehicle comprises water and a water soluble vehicle in sufficient amounts to achieve an ink viscosity and surface tension effective for application of the ink jet ink to the substrate in a predetermined pattern by ink jet printing.
    Type: Grant
    Filed: June 24, 2005
    Date of Patent: December 30, 2008
    Assignee: Pitney Bowes Inc.
    Inventors: Luis A. Sanchez, Jay Reichelsheimer
  • Publication number: 20080277626
    Abstract: The present invention relates to inks and more particularly, to fluorescent ink formulations including quantum dots for various printing processes such as inkjet, flexographic, screen printing, thermal transfer, and pens. The inks include one or more populations of fluorescent quantum dots dispersed in polymeric material, having fluorescence emissions between about 450 nm and about 2500 nm; and a liquid or solid vehicle. The vehicle is present in a ratio to achieve an ink viscosity, surface tension effective, drying time and other printing parameters used for printing processes.
    Type: Application
    Filed: May 23, 2007
    Publication date: November 13, 2008
    Applicant: EVIDENT TECHNOLOGIES, INC.
    Inventors: San Ming YANG, Luis SANCHEZ, James HAYES
  • Patent number: D624609
    Type: Grant
    Filed: December 11, 2009
    Date of Patent: September 28, 2010
    Inventors: Joseph Eugene Stein, Luis Sanchez