Processing

Please wait...

Settings

Settings

Offices all Languages en Stemming true Single Family Member false

Save query

A private query is only visible to you when you are logged-in and can not be used in RSS feeds

Query Tree

Refine Options

Offices
All
Specify the language of your search keywords
Stemming reduces inflected words to their stem or root form.
For example the words fishing, fished,fish, and fisher are reduced to the root word,fish,
so a search for fisher returns all the different variations
Returns only one member of a family of patents

Full Query

(FP:("1250 Aviation"))

Side-by-side view shortcuts

General
Go to Search input
CTRL + SHIFT +
Go to Results (selected record)
CTRL + SHIFT +
Go to Detail (selected tab)
CTRL + SHIFT +
Go to Next page
CTRL +
Go to Previous page
CTRL +
Results (First, do 'Go to Results')
Go to Next record / image
/
Go to Previous record / image
/
Scroll Up
Page Up
Scroll Down
Page Down
Scroll to Top
CTRL + Home
Scroll to Bottom
CTRL + End
Detail (First, do 'Go to Detail')
Go to Next tab
Go to Previous tab

Analysis

1.WO/2013/044192SECURING TRANSACTIONS AGAINST CYBERATTACKS
WO 28.03.2013
Int.Class G06Q 20/40
G PHYSICS
06
COMPUTING; CALCULATING; COUNTING
Q
DATA PROCESSING SYSTEMS OR METHODS, SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL, SUPERVISORY OR FORECASTING PURPOSES; SYSTEMS OR METHODS SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL, SUPERVISORY OR FORECASTING PURPOSES, NOT OTHERWISE PROVIDED FOR
20
Payment architectures, schemes or protocols
38
Payment protocols; Details thereof
40
Authorisation, e.g. identification of payer or payee, verification of customer or shop credentials; Review and approval of payers, e.g. check of credit lines or negative lists
Appl.No PCT/US2012/056786 Applicant BIOGY, INC. Inventor FISKE, Michael Stephen
Methods and systems are provided for performing a secure transaction. Users register biometric and/or other identifying information. A registration code and an encryption key are generated from the biometric information and/or information obtained from a unpredictable physical process and are stored in a secure area of a device and also transmitted to a service provider. A transaction passcode generator may be computed based on the stored registration code. In at least one embodiment, a unique transaction passcode depends upon the transaction information, so that on the next step of that transaction, only that unique transaction passcode will be valid. In an embodiment, the passcode includes the transaction information. In at least one embodiment, if the transaction information has been altered relative to the transaction information stored in the device's secure area, then the transaction passcode sent during this step will be invalid and transaction may be aborted.
2.WO/2015/023550NADO CRYPTOGRAPHY USING ONE-WAY FUNCTIONS
WO 19.02.2015
Int.Class H04L 9/06
H ELECTRICITY
04
ELECTRIC COMMUNICATION TECHNIQUE
L
TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
9
Arrangements for secret or secure communication
06
the encryption apparatus using shift registers or memories for blockwise coding, e.g. D.E.S. systems
Appl.No PCT/US2014/050462 Applicant FISKE SOFTWARE, LLC. Inventor FISKE, Michael Stephen
A symmetric cryptography for encrypting and decrypting information is provided, that can be implemented efficiently in hardware or in software. The symmetric cryptography uses a key generator, so that the cryptography is not dependent on a single, static cryptography key. The key generator is a value or collection of values from which the key is generated. The key generator substantially increases the computational complexity of differential cryptanalysis and other cryptographic attacks. In an embodiment, the key generator is updated with one- way functions exhibiting the avalanche effect, which generates an unpredictable sequence of keys used during the encryption or decryption process. In an embodiment, the key generator updating helps create a sequence of unpredictable permutations that diffuses the information across one or more blocks. In an embodiment, a distinct key generator helps create a sequence of unpredictable permutations that act as a series of substitution boxes.
3.WO/2006/091301PASSCODES
WO 31.08.2006
Int.Class H04K 1/00
H ELECTRICITY
04
ELECTRIC COMMUNICATION TECHNIQUE
K
SECRET COMMUNICATION; JAMMING OF COMMUNICATION
1
Secret communication
Appl.No PCT/US2006/002271 Applicant BIONOPOLY LLC Inventor FISKE, Michael
Protecting the security of an entity by using passcodes is disclosed. A passcode device 101 generates a passcode Pi. In an embodiment, the passcode Pi is generated in response to receipt of user information. The passcode Pi 1 is received by another system (e.g., administrator 102), which authenticates the passcode by at least generating a passcode Pui from a passcode generator Gui, and comparing the generated passcode Pui with the received passcode Pi. The passcode (Pui or Pi) is temporary. At a later use a different passcode is generated from a different passcode generator.
4.WO/2007/075785CONTINUOUS AND WATERTIGHT TREATMENT PROCESS OF SOLID WASTES
WO 05.07.2007
Int.Class C10L 3/08
C CHEMISTRY; METALLURGY
10
PETROLEUM, GAS OR COKE INDUSTRIES; TECHNICAL GASES CONTAINING CARBON MONOXIDE; FUELS; LUBRICANTS; PEAT
L
FUELS NOT OTHERWISE PROVIDED FOR; NATURAL GAS; SYNTHETIC NATURAL GAS OBTAINED BY PROCESSES NOT COVERED BY SUBCLASSES C10G OR C10K123; LIQUEFIED PETROLEUM GAS; USE OF ADDITIVES TO FUELS OR FIRES; FIRE-LIGHTERS
3
Gaseous fuels; Natural gas; Synthetic natural gas obtained by processes not covered by subclasses C10G, C10K108; Liquefied petroleum gas
06
Natural gas; Synthetic natural gas obtained by processes not covered by C10G, C10K3/02 or C10K3/04139
08
Production of synthetic natural gas
Appl.No PCT/US2006/048606 Applicant VRLJICAK, Ignacio Inventor VRLJICAK, Ignacio
A process and equipment for the treatment and final disposal of solid wastes of domestic origin is described. The process and equipment may be continuous and watertight and may include the reception of the wastes to later be ground and sifted in such a way that the thick material is re-injected into a grinding process. Material originating from a fluidizing sifter may be sent to a first stage of anaerobic digestion, material from the first stage may in-part e recycled back into the first stage and may in-part be sent to a second stage of anaerobic digestion, similarly, material from each stage is in-part recycled and is in-part sent to the second stage.
5.WO/2011/028239DIVER'S KNIFE AND CUTTING TOOL
WO 10.03.2011
Int.Class B26B 27/00
B PERFORMING OPERATIONS; TRANSPORTING
26
HAND CUTTING TOOLS; CUTTING; SEVERING
B
HAND-HELD CUTTING TOOLS NOT OTHERWISE PROVIDED FOR
27
Hand cutting tools not provided for in groups B26B1/-B26B25/98
Appl.No PCT/US2010/002293 Applicant MAYES, Laura Jane Inventor MAYES, Laura Jane
A diver's knife that includes a casing with a bottom portion, a top half and a bottom half, a handle slot disposed on bottom portion of casing to allow a user to grasp diver's knife, a single-sided cutting blade to cut a line with a cutting edge with a top end and a blade aperture, with the single-sided cutting blade being sandwiched between top half and bottom half of casing. The diver's knife also includes an slot disposed on a side of casing to receive a line to be cut by an exposed single-sided cutting blade with cutting edge and an fastener to secure top half of casing, single-sided cutting blade and bottom half of casing together to form diver's knife. The diver's knife can also be double-sided to cut the line from both sides.
6.WO/2014/201060COMPUTER SIMULATION OF ELECTROMAGNETIC FIELDS
WO 18.12.2014
Int.Class G06F 17/10
G PHYSICS
06
COMPUTING; CALCULATING; COUNTING
F
ELECTRIC DIGITAL DATA PROCESSING
17
Digital computing or data processing equipment or methods, specially adapted for specific functions
10
Complex mathematical operations
Appl.No PCT/US2014/041805 Applicant VOLD, Terje Inventor VOLD, Terje
A method and system is provided for solving for electromagnetic fields by approximating an electromagnetic function as a sum of basis functions multiplied by coefficients to be determined. The set of equations used to determine the coefficients results from taking derivatives of the action integral with respect to the coefficients (and/or other parameters) and setting the derivative equal to zero, thereby extremizing the action integral.
7.WO/2017/135993CATHETER ASSEMBLY WITH DISTINCT INFLATION AND DRUG DELIVERY CHANNELS AND OVERLAPPING BALLOON LAYERS
WO 10.08.2017
Int.Class A61M 25/04
A HUMAN NECESSITIES
61
MEDICAL OR VETERINARY SCIENCE; HYGIENE
M
DEVICES FOR INTRODUCING MEDIA INTO, OR ONTO, THE BODY; DEVICES FOR TRANSDUCING BODY MEDIA OR FOR TAKING MEDIA FROM THE BODY; DEVICES FOR PRODUCING OR ENDING SLEEP OR STUPOR
25
Catheters; Hollow probes
01
Introducing, guiding, advancing, emplacing or holding catheters
02
Holding devices, e.g. on the body
04
in the body, e.g. expansible
Appl.No PCT/US2016/043920 Applicant PATIENT SHIELD CONCEPTS, LLC Inventor WHITE, Lynn
A catheter is comprised of a shaft having a distal end and a proximal end, the distal end being the end an end of the catheter to be placed within the bladder, the proximal end being the end of the catheter to be coupled to the inputs outside of the body, the shaft having at least three discrete lumens, the at least three lumens including an inflation lumen, the inflation lumen in fluid communication with an inflation side hole in the shaft. The shaft has a drug delivery lumen, the drug delivery lumen in fluid communication with a drug fluid side hole in the shaft. The shaft has a bladder fluid lumen, the bladder fluid lumen in fluid communication with a bladder drainage aperture in the shaft. The drug delivery lumen, the inflation lumen, and the bladder fluid lumen are not in fluid communication.
8.WO/2016/044856NADO CRYPTOGRAPHY WITH KEY GENERATORS
WO 24.03.2016
Int.Class H04L 9/06
H ELECTRICITY
04
ELECTRIC COMMUNICATION TECHNIQUE
L
TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
9
Arrangements for secret or secure communication
06
the encryption apparatus using shift registers or memories for blockwise coding, e.g. D.E.S. systems
Appl.No PCT/US2015/052734 Applicant FISKE SOFTWARE LLC Inventor FISKE, Michael
A symmetric cryptography for encrypting and decrypting information is provided, that can be implemented efficiently in hardware or in software. The symmetric cryptography uses a key generator, so that the cryptography is not dependent on a single, static cryptography key. The key generator is a value or collection of values from which the key is generated. The key generator substantially increases the computational complexity of differential cryptanalysis and other cryptographic attacks. In an embodiment, the key generator is updated with one-way functions exhibiting the avalanche effect, which generates an unpredictable sequence of keys used during the encryption or decryption process. In an embodiment, a dynamic key is derived from a key generator with a one-way hash function. In an embodiment, a block cipher uses a different dynamic key to encrypt each block of plaintext, where each key is derived from a different key generator.
9.WO/2013/013104LOW-FORCE ROLLING TRIGGER
WO 24.01.2013
Int.Class F41A 19/10
[IPC code unknown for ERROR IPC Code incorrect: invalid subclass (B=>S)!]
Appl.No PCT/US2012/047494 Applicant ARDUINI, Douglas Inventor ARDUINI, Douglas
In an embodiment, a low-force, low-friction, short-travel, low-energy control rolling trigger utilizes a rolling element as a trigger-release mechanism in equipment, machines and tools such as for clutches, brakes, actuators, and projectile launchers. The rolling elements within the trigger mechanism reduce the friction, which in-turn reduces the force necessary to discharge trigger. In an embodiment, the trigger is part of a firearm and uses a mechanical trigger. In another embodiment, the trigger is activated by an electronic signal that activates a solenoid, which pulls the rolling element, and thereby releases the striker or in a trigger-release assembly.
10.WO/2007/078283DISTRIBUTED CONTENT EXCHANGE AND PRESENTATION SYSTEM
WO 12.07.2007
Int.Class G06Q 30/00
G PHYSICS
06
COMPUTING; CALCULATING; COUNTING
Q
DATA PROCESSING SYSTEMS OR METHODS, SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL, SUPERVISORY OR FORECASTING PURPOSES; SYSTEMS OR METHODS SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL, SUPERVISORY OR FORECASTING PURPOSES, NOT OTHERWISE PROVIDED FOR
30
Commerce, e.g. shopping or e-commerce
Appl.No PCT/US2005/047230 Applicant ASHBAUGH, Douglas Inventor ASHBAUGH, Douglas
An Internet-oriented advertising exchange controller presents website content in a plurality of frames as well as support search criteria and other flexible forms of inventory formatting and delivery. Applications include Internet protocol request coordination or relay, cooperative frame based or interstitial advertising, and support for a local search or dataless metasearch system. The controller operates in a cookieless environment, has logic to protect advertiser's investment from AutoSurf equivalent systems, and protects against other inappropriate stimuli including denial of service or IP blast attacks. As such, an advertiser's credits are affected only by human stimuli. Communication with and among exchange controllers for sharing or delivering information about inventory occurs by a number of protocols with optional encryption. The controller provides a foundation for a robust, advertiser protective, web based advertising and network search system with economic support by use of unstoppable framesets, and ultimately frame-based advertising and presentation methods.