Patents by Inventor Peter Wilkes
Peter Wilkes has filed for patents to protect the following inventions. This listing includes patent applications that are pending as well as patents that have already been granted by the United States Patent and Trademark Office (USPTO).
-
Publication number: 20200389121Abstract: A roof pan with raised ridges along lateral edges, where the raised ridges of one pan cooperate raised ridges of another pan to prevent water movement. A formed edge that is offset from the roof surface when the pan is installed on the roof allows a flashing to slide under the formed edge when the roof pan is installed on the roof surface.Type: ApplicationFiled: June 1, 2020Publication date: December 10, 2020Inventors: Erich Kai Stephan, Glenn Harris, Nicholas Wenzel, Peter Wilke
-
Publication number: 20200389122Abstract: A multi-rail system for mounting solar modules to a surface, such as a roof, uses two rails to support a first row of solar modules, and a single rail to support each subsequent row of solar modules. Splices connect edges of solar modules between rows, providing support along one edge of the solar modules for the subsequent rows.Type: ApplicationFiled: June 1, 2020Publication date: December 10, 2020Inventors: Erich Kai Stephan, Glenn Harris, Nicholas Wenzel, Peter Wilke
-
Publication number: 20200313608Abstract: A mount for use over a roof flashing on a composition roof. The mount includes a central aperture for a fastener, a top surface with a horizontal platform extending laterally from the top surface, and a conical inner surface to cooperate with a conical protrusion on the roof flashing.Type: ApplicationFiled: March 13, 2020Publication date: October 1, 2020Inventors: Erich Kai Stephan, Glenn Harris, Nick Wenzel, Peter Wilke
-
Publication number: 20200270010Abstract: A method for packaging solar mounting attachments by forming a package box having a first end and a second end, sealing the first end of the package box, placing attachment brackets into compartments defined by dividers in the package box, placing a container of fasteners onto at least one of the attachment brackets, and placing flashings onto at least one other attachment bracket. The flashings, the container of fasteners, and attachment brackets may be removed from the package box from the second end in the order of flashings, the container of fasteners, and attachment brackets.Type: ApplicationFiled: February 25, 2020Publication date: August 27, 2020Inventors: Erich Kai Stephan, Glenn Harris, Peter Wilke, Nick Wenzel
-
Publication number: 20190217391Abstract: According to one or more embodiments presently described, metal-containing particles may be formed by a method including forming a molten material from a solid supply material, introducing the molten material into a reaction zone of a Barton reactor, and contacting the molten material with a processing gas in the reaction zone to form solid metal-containing particles comprising solid metallic particles and solid metal oxide particles. The Barton reactor may include a reaction vessel which may include a top cover and sidewalls defining the reaction zone, an agitator, a processing gas inlet, and a product outlet. The molten material may be introduced to the reaction zone in a laminar flow or as atomized molten particles. Less than 99% of the particles may include metal oxide.Type: ApplicationFiled: December 21, 2018Publication date: July 18, 2019Applicant: Hammond Group, Inc.Inventors: Terrence Hyde Murphy, William Peter Wilke, IV, Philip Michael Kowalski
-
Publication number: 20190217392Abstract: According to one or more embodiments presently described, metal-containing particles may be made by a method that includes introducing a molten material into a reaction zone of a reactor system, passing a process gas into the reaction zone in a direction substantially tangential to a sidewall of the reaction zone, and contacting the process gas with the molten material in the reaction zone to form metal-containing particles. The molten material may be introduced into an upper portion of the reaction zone The reaction zone may include a substantially circular cross-section, and the molten metal may be introduced into the reaction zone in a laminar flow or as atomized particles.Type: ApplicationFiled: December 21, 2018Publication date: July 18, 2019Applicant: Hammond Group, Inc.Inventors: Terrence Hyde Murphy, William Peter Wilke, IV, Philip Michael Kowalski
-
Publication number: 20190217393Abstract: According to one or more embodiments presently described, a method for processing metal-containing materials may include passing a feed stream through a first conduit of a multi-conduit reactor, the feed stream including metal-containing material in a molten phase; passing a fluid stream through a second conduit of the multi-conduit reactor; and contacting the feed stream with the fluid stream in a mixing zone downstream of the first conduit and second conduit, thereby causing a chemical or physical change in the one or more materials of the feed stream to form a product stream comprising metal-containing particles.Type: ApplicationFiled: December 21, 2018Publication date: July 18, 2019Applicant: Hammond Group, Inc.Inventors: Terrence Hyde Murphy, William Peter Wilke, IV, Philip Michael Kowalski
-
Publication number: 20190217390Abstract: According to one or more embodiments presently described, a mixture of lead oxide and lead metal particles may be formed by a method that includes forming a molten metal lead material from a solid lead metal supply material, introducing the molten metal lead material into a reaction zone of a reactor, and contacting the molten metal lead material with an oxidizing gas in the reaction zone to oxidize a portion of the molten metal lead material and form at least solid lead oxide particles and solid lead metal particles. The molten metal lead material may be introduced to the reaction zone in a laminar flow or as atomized molten particles. The weight ratio of formed solid lead oxide particles to solid lead metal particles may be less than 99:1.Type: ApplicationFiled: December 21, 2018Publication date: July 18, 2019Applicant: Hammond Group, Inc.Inventors: Terrence Hyde Murphy, William Peter Wilke, IV, Philip Michael Kowalski
-
Publication number: 20180115274Abstract: A tile replacement mounting system includes a base flashing between an attachment bracket and an installation surface. The attachment bracket is attached to the installation surface with a fastener. A post is connected to the attachment bracket, and an extender arm is connected to the post. A mounting clamp assembly is connected to the extender arm and is used to connect to a solar panel.Type: ApplicationFiled: October 25, 2017Publication date: April 26, 2018Inventors: Erich Kai Stephan, Glenn Harris, Peter Wilke
-
Patent number: 9825764Abstract: Systems and methods for enhanced security of media are provided. Media security may be enhanced by improving the setup of encryption and/or decryption, by improving the performance of encryption and/or decryption, or by improving both. The calls related to enhanced security of media from an application in an emulated environment to a security module in the operating system hosting the emulated environment may be combined to reduce the overhead of accessing a security module. An application handling secure shell (SSH) communications may execute multiple calls to a cryptographic module in the host operating system. Because many calls to the cryptographic module during SSH communications follow patterns, two or more related calls may be combined into a single combined call to the cryptographic module. For example, a call to generate a server-to-client key and a call to generate a client-to-server key may be combined into a single call.Type: GrantFiled: February 26, 2014Date of Patent: November 21, 2017Assignee: Unisys CorporationInventors: Kevin Clayton, Peter Wilkes, Yuko Onishi, Raymond Campbell
-
Patent number: 9819493Abstract: Systems and methods for enhanced security of media are provided. Media security may be enhanced by improving the setup of encryption and/or decryption, by improving the performance of encryption and/or decryption, or by improving both. The calls related to enhanced security of media from an application in an emulated environment to a security module in the operating system hosting the emulated environment may be combined to reduce the overhead of accessing a security module. An application handling secure shell (SSH) communications may execute multiple calls to a cryptographic module in the host operating system. Because many calls to the cryptographic module during SSH communications follow patterns, two or more related calls may be combined into a single combined call to the cryptographic module. For example, a call to generate a server-to-client key and a call to generate a client-to-server key may be combined into a single call.Type: GrantFiled: February 26, 2014Date of Patent: November 14, 2017Assignee: Unisys CorporationInventors: Kevin Clayton, Peter Wilkes, Yuko Onishi, Raymond Campbell
-
Patent number: 9519757Abstract: Systems and methods for enhanced security of media are provided. Media security may be enhanced by improving the setup of encryption and/or decryption, by improving the performance of encryption and/or decryption, or by improving both. The calls related to enhanced security of media from an application in an emulated environment to a security module in the operating system hosting the emulated environment may be combined to reduce the overhead of accessing a security module. An application handling secure shell (SSH) communications may execute multiple calls to a cryptographic module in the host operating system. Because many calls to the cryptographic module during SSH communications follow patterns, two or more related calls may be combined into a single combined call to the cryptographic module. For example, a call to generate a server-to-client key and a call to generate a client-to-server key may be combined into a single call.Type: GrantFiled: February 26, 2014Date of Patent: December 13, 2016Assignee: Unisys CorporationInventors: Kevin Clayton, Peter Wilkes, Yuko Onishi, Raymond Campbell
-
Patent number: 9336696Abstract: Systems and methods for enhanced security of media are provided. Media security may be enhanced by improving the setup of encryption and/or decryption, by improving the performance of encryption and/or decryption, or by improving both. The calls related to enhanced security of media from an application in an emulated environment to a security module in the operating system hosting the emulated environment may be combined to reduce the overhead of accessing a security module. An application handling secure shell (SSH) communications may execute multiple calls to a cryptographic module in the host operating system. Because many calls to the cryptographic module during SSH communications follow patterns, two or more related calls may be combined into a single combined call to the cryptographic module. For example, a call to generate a server-to-client key and a call to generate a client-to-server key may be combined into a single call.Type: GrantFiled: February 26, 2014Date of Patent: May 10, 2016Assignee: Unisys CorporationInventors: Kevin Clayton, Peter Wilkes
-
Patent number: 9317703Abstract: Systems and methods for enhanced security of media are provided. Media security may be enhanced by improving the setup of encryption and/or decryption, by improving the performance of encryption and/or decryption, or by improving both. The calls related to enhanced security of media from an application in an emulated environment to a security module in the operating system hosting the emulated environment may be combined to reduce the overhead of accessing a security module. An application handling secure shell (SSH) communications may execute multiple calls to a cryptographic module in the host operating system. Because many calls to the cryptographic module during SSH communications follow patterns, two or more related calls may be combined into a single combined call to the cryptographic module. For example, a call to generate a server-to-client key and a call to generate a client-to-server key may be combined into a single call.Type: GrantFiled: February 26, 2014Date of Patent: April 19, 2016Assignee: Unisys CorporationInventors: Kevin Clayton, Peter Wilkes
-
Publication number: 20150244530Abstract: Systems and methods for enhanced security of media are provided. Media security may be enhanced by improving the setup of encryption and/or decryption, by improving the performance of encryption and/or decryption, or by improving both. The calls related to enhanced security of media from an application in an emulated environment to a security module in the operating system hosting the emulated environment may be combined to reduce the overhead of accessing a security module. An application handling secure shell (SSH) communications may execute multiple calls to a cryptographic module in the host operating system. Because many calls to the cryptographic module during SSH communications follow patterns, two or more related calls may be combined into a single combined call to the cryptographic module. For example, a call to generate a server-to-client key and a call to generate a client-to-server key may be combined into a single call.Type: ApplicationFiled: February 26, 2014Publication date: August 27, 2015Applicant: Unisys CorporationInventors: Kevin Clayton, Peter Wilkes, Yuko Onishi, Raymond Campbell
-
Publication number: 20150244529Abstract: Systems and methods for enhanced security of media are provided. Media security may be enhanced by improving the setup of encryption and/or decryption, by improving the performance of encryption and/or decryption, or by improving both. The calls related to enhanced security of media from an application in an emulated environment to a security module in the operating system hosting the emulated environment may be combined to reduce the overhead of accessing a security module. An application handling secure shell (SSH) communications may execute multiple calls to a cryptographic module in the host operating system. Because many calls to the cryptographic module during SSH communications follow patterns, two or more related calls may be combined into a single combined call to the cryptographic module. For example, a call to generate a server-to-client key and a call to generate a client-to-server key may be combined into a single call.Type: ApplicationFiled: February 26, 2014Publication date: August 27, 2015Applicant: Unisys CorporationInventors: Kevin Clayton, Peter Wilkes, Yuko Onishi, Raymond Campbell
-
Publication number: 20150244527Abstract: Systems and methods for enhanced security of media are provided. Media security may be enhanced by improving the setup of encryption and/or decryption, by improving the performance of encryption and/or decryption, or by improving both. The calls related to enhanced security of media from an application in an emulated environment to a security module in the operating system hosting the emulated environment may be combined to reduce the overhead of accessing a security module. An application handling secure shell (SSH) communications may execute multiple calls to a cryptographic module in the host operating system. Because many calls to the cryptographic module during SSH communications follow patterns, two or more related calls may be combined into a single combined call to the cryptographic module. For example, a call to generate a server-to-client key and a call to generate a client-to-server key may be combined into a single call.Type: ApplicationFiled: February 26, 2014Publication date: August 27, 2015Applicant: Unisys CorporationInventors: Kevin Clayton, Peter Wilkes
-
Publication number: 20150244528Abstract: Systems and methods for enhanced security of media are provided. Media security may be enhanced by improving the setup of encryption and/or decryption, by improving the performance of encryption and/or decryption, or by improving both. The calls related to enhanced security of media from an application in an emulated environment to a security module in the operating system hosting the emulated environment may be combined to reduce the overhead of accessing a security module. An application handling secure shell (SSH) communications may execute multiple calls to a cryptographic module in the host operating system. Because many calls to the cryptographic module during SSH communications follow patterns, two or more related calls may be combined into a single combined call to the cryptographic module. For example, a call to generate a server-to-client key and a call to generate a client-to-server key may be combined into a single call.Type: ApplicationFiled: February 26, 2014Publication date: August 27, 2015Applicant: Unisys CorporationInventors: Kevin Clayton, Peter Wilkes, Yuko Onishi, Raymond Campbell
-
Patent number: D846162Type: GrantFiled: September 1, 2017Date of Patent: April 16, 2019Assignee: PEGASUS SOLAR, INC.Inventors: Erich Kai Stephan, Peter Wilke
-
Patent number: D856548Type: GrantFiled: September 1, 2017Date of Patent: August 13, 2019Assignee: PEGASUS SOLAR INC.Inventors: Erich Kai Stephan, Peter Wilke