al METHOD FOR VERIFYING THE FUNCTIONALITIES OF A SOFTWARE INTENDED TO BE INTEGRATED INTO A CRYPTOGRAPHIC COMPONENT, SYSTEM By www.freepatentsonline.com Published On :: Thu, 22 Jun 2017 08:00:00 EDT The method for validating the status of a memory of a simulator of a cryptographic component able to save data generated by a cryptographic function, includes a step carried out in the simulator including a first execution of a first cryptographic function generating: a first status of the first memory, and a first result of the first command; a step carried out in a test bench including a second execution of a second simplified cryptographic function, with the first and the second functions carrying out the same operations generating: a second status of the memory, and a second result of the second command; a step of validating including comparisons: of the first status and of the second status and of the first result and of the second result. Full Article
al AUTOMATIC GENERATION OF VALIDATORS TO VALIDATE DEPLOYMENT CODE USED FOR CONFIGURING SERVERS By www.freepatentsonline.com Published On :: Thu, 22 Jun 2017 08:00:00 EDT A validation system is configured to automatically generate validators for one or more target systems. The validation system includes: a memory storing a computer process, a network interface configured to interface with the one or more target systems over a computer network, and a processor executing the computer process. The computer process is configured to parse the deployment code to identify components in deployment code, generate validator code for each identified component, and use the network interface to transmit the validator codes to the one or more target systems. Full Article
al ANALYZING DEPLOYMENT PIPELINES USED TO UPDATE PRODUCTION COMPUTING SERVICES USING A LIVE PIPELINE TEMPLATE PROCESS By www.freepatentsonline.com Published On :: Thu, 22 Jun 2017 08:00:00 EDT Techniques are presented for managing a deployment pipeline using an inheritable and extensible source code template—generally referred to as a live pipeline template (LPT). As described, live pipeline templates may be used to manage deployment pipelines which, in turn, are used to launch, maintain, and update the services and systems used to host and provide computing services. Full Article
al SYSTEM AND METHOD FOR VALIDATING SOFTWARE DEVELOPMENT REQUIREMENTS By www.freepatentsonline.com Published On :: Thu, 29 Jun 2017 08:00:00 EDT System and method for validating software development requirements are disclosed. The method comprises accessing a software development requirement, extracting a plurality of tokens from the software development requirement, tagging each of the plurality of tokens to a corresponding part of speech, and deriving a pattern based on the plurality of tokens and the plurality of corresponding parts of speech. The method further comprises determining at least one of a context and a business domain of the software development requirement and identifying pre-defined rules for the plurality of tokens and pre-defined patterns for the pattern. In response to a positive identification, the software development requirement are validated by analyzing the plurality of tokens against the pre-defined rules and by analyzing the pattern against the pre-defined patterns. In response to a negative identification, a learning process is initiated based on intelligence gathered from a manual validation of the software development requirement. Full Article
al System and Method for Dynamically Composing an Integrated Open Source Stack By www.freepatentsonline.com Published On :: Thu, 29 Jun 2017 08:00:00 EDT System and method for dynamically composing an integrated open source stack are disclosed. In one embodiment, the method comprises generating a stack specification. The method further comprises extracting a list of products from an open source product repository based on the stack specification and determining a product strength value for each product present in the list of product. The method further comprises generating one or more stack options comprising at least one of the products based on the product strength value and determining a stack strength value for each of the one or more stack options based on the product strength value and the user requirements. The method further comprises selecting a stack from the one or more stack options as the integrated open source stack and composing the integrated open source stack based on at least one of product metadata, adaptor metadata, or product scripts. Full Article
al Technologies for native code invocation using binary analysis By www.freepatentsonline.com Published On :: Thu, 29 Jun 2017 08:00:00 EDT Technologies for native code invocation using binary analysis are described. A computing device for invoking native code from managed code using binary analysis receives a call from a thread executing a managed code segment to execute a native code segment. The computing device performs a binary analysis of the native code segment and generates, from the binary analysis, a complexity indicator that indicates a level of complexity of the native code segment by comparing the native code segment to at least one predefined complexity rule. Additionally, the computing device stores a status of the thread based on the complexity indicator and executes the native code segment. Other embodiments are described and claimed. Full Article
al APPLICATION PROGRAM UNINSTALLATION METHOD AND APPARATUS By www.freepatentsonline.com Published On :: Thu, 29 Jun 2017 08:00:00 EDT Embodiments of the present application provide an application program uninstallation method and apparatus. The method comprises: receiving an uninstallation instruction for a target application program (S101); deleting a specific directory in a local device to which the target application program corresponds, according to the received uninstallation instruction (S102); extracting an identifier of the target application program (S103); searching a local pre-set directory residual database to determine whether there exist any directory data that correspond to the identifier (S104), the directory data comprising at least a directory path; if such directory data exist, deleting a directory in the local device to which the directory path found corresponds, according to the search result (S105). By applying the embodiments of the present application, when the specific directory corresponding to the uninstalled application program is deleted, other directories, other than the specific directory, to which the uninstalled application program corresponds are also deleted, so that after the uninstall of the application program is completed, file residue is avoided, and the occupation of the device storage space is reduced. Full Article
al SYSTEM AND METHOD FOR CREATING AN INTEGRATED DIGITAL PLATFORM By www.freepatentsonline.com Published On :: Thu, 29 Jun 2017 08:00:00 EDT The embodiments herein disclose a method and a system for creating a singular platform to harness a plurality of technical capabilities in order to deliver multiple digital services such as end user device management, analytics, enterprise mobility, digital identity management, smart device management and so on by orchestrating certain service related support capabilities. The embodiments function as an interface between the user equipment and the applications that are running on several operating systems. Further, an enablement platform is created and modified for a digital ecosystem that sits on the network and user equipment to act as an interface. Essentially, a flexible and extensible API driven platform capable of seamlessly integrating multiple platforms spanning across network services and functions, analytics, device management and orchestration platforms in enabled. Full Article
al Data valuation based on development and deployment velocity By www.freepatentsonline.com Published On :: Thu, 29 Jun 2017 08:00:00 EDT One or more metrics indicative of velocity attributes associated with development and deployment of an application program are obtained. The one or more velocity metrics are stored in an application run-time environment in association with the application program and one or more data sets output by the application program. A valuation is computed for the one or more data sets based on the one or more velocity metrics. Full Article
al Scalable points-to analysis via multiple slicing By www.freepatentsonline.com Published On :: Thu, 29 Jun 2017 08:00:00 EDT A method for analyzing software with pointer analysis may include obtaining a software program, and determining a first independent program slice of the software program describing a first code segment of the software program. The method may further include determining, using a first pointer analysis objective, a first result from performing a first pointer analysis on the first independent program slice, and determining, using the first result, a first dependent program slice of the software program. The method may further include determining, using a second pointer analysis objective, a second result from performing a second pointer analysis on the first dependent program slice. The method may further include generating a report, using these results, indicating whether the software program satisfies a predetermined criterion. Full Article
al PROCESSING SPECIAL REQUESTS AT DEDICATED APPLICATION CONTAINERS By www.freepatentsonline.com Published On :: Thu, 29 Jun 2017 08:00:00 EDT Various embodiments of systems and methods to provide processing of special requests at dedicated application containers are described herein. In one aspect, an application instance is downloaded and deployed in an application runtime, at a dedicated application container, to process service requests. In another aspect, the dedicated application container starts a proxy process, independently from the application runtime to intercept incoming service requests. The regular service requests are passed by the proxy process to the application runtime for processing by the executing application instance. In yet another aspect, the proxy process executes special service requests directly to access the dedicated container landscape. Full Article
al METHOD OF OPERATING A DISPLAY UNIT AND A TERMINAL SUPPORTING THE SAME By www.freepatentsonline.com Published On :: Thu, 29 Jun 2017 08:00:00 EDT A method of operating a display unit enhances functionality of one hand control and a terminal supports the same. The method of operating the input area, output on the display unit, includes: determining whether one-hand operation mode is set; and displaying a first input module in which a key map area is displayed to be biased to a specific direction based on a center of the display unit when the one-hand operation mode is set. Full Article
al DATA RENDERING ON LOCAL AND REMOTE DISPLAYS By www.freepatentsonline.com Published On :: Thu, 29 Jun 2017 08:00:00 EDT Described are an apparatus and method for interactively retrieving data from one or more data sources and rendering the data in a three dimensional (3D) format. The rendering may be displayed on a hand-held device, e.g., a smart phone or tablet computer, or on a remote display device such as another phone, tablet, screen, or a projector. The apparatus and method may operate in response to one or more inputs or orientation sensors, e.g., proximity, gravimeter, gyroscope, photo, and touch sensors. Full Article
al USER TERMINAL DEVICE, AND MODE CONVERSION METHOD AND SOUND SYSTEM FOR CONTROLLING VOLUME OF SPEAKER THEREOF By www.freepatentsonline.com Published On :: Thu, 29 Jun 2017 08:00:00 EDT A user terminal apparatus is disclosed. The user terminal apparatus includes a touch screen which senses a multi gesture that is performed by using at least two fingers or other input tools, and a controller which provides an individual volume control mode by which a volume of one speaker apparatus is independently controllable with respect to a volume of the remainder of a plurality of speaker apparatuses, and which is convertible into a group volume control mode in order to combine a plurality of speaker apparatuses into a group such that volumes of the plurality of speaker apparatuses can be jointly controlled in response to the multi gesture sensed via the touch screen while the individual volume control mode is provided. Full Article
al TECHNIQUES FOR PROVIDING PERSONALIZED BEHAVIOR-BASED CONTENT By www.freepatentsonline.com Published On :: Thu, 29 Jun 2017 08:00:00 EDT Techniques for providing personalized content in substantially real time are disclosed. In one embodiment, a method for providing personalized content in substantially real time includes providing first content including a plurality of user-selectable content elements, detecting an interaction of a user with respect to the provided content including a selection by the user of one of the plurality of the user-selectable content elements displayed on a page of the first content, and providing second content in response to a request. The second content includes at least a portion of the first content modified according to the detected interaction by moving the user-selectable content element up on a page of the second content relative to a position of the content element on the page of the first content. Full Article
al SYSTEMS AND METHODS FOR ASYMMETRICAL FORMATTING OF WORD SPACES ACCORDING TO THE UNCERTAINTY BETWEEN WORDS By www.freepatentsonline.com Published On :: Thu, 29 Jun 2017 08:00:00 EDT Asymmetrical formatting of word spaces according to the uncertainty between words includes an initial filtering process and subsequent text formatting process. An equivocation filter generates a mapping of keys and values (output) from a corpus or word sequence frequency data (input). Text formatting process for asymmetrically adjusts the width of spaces adjacent to keys using the values. The filtering process, which generates a mapping of keys and values can be performed once to analyze a corpus and once generated, the key-value mapping can be used multiple times by a subsequent text processing process. Full Article
al SYMBOLIC REFERENTIAL THIRD-PARTY NOTIFICATION By www.freepatentsonline.com Published On :: Thu, 29 Jun 2017 08:00:00 EDT User input including a social network notification symbol followed by a social network tag is detected in association with a social network user interface. The social network tag includes a text keyword that identifies a social network topic within the social network. A referential third-party social network user notification subset within the social network is defined as a subset of social network users within the social network that follow the social network topic. A referential third-party social network notification is published to the defined referential third-party social network user notification subset within the social network. The referential third-party social network notification includes the detected user input that includes the social network notification symbol followed by the social network tag. Full Article
al REAL-TIME DOCUMENT ANNOTATION By www.freepatentsonline.com Published On :: Thu, 29 Jun 2017 08:00:00 EDT Aspects of the present disclosure relate to systems and methods for receiving, managing, and displaying annotations on documents in real-time. A user (e.g., an author of a document) uploads a document into a real-time annotation system, which may then generate a composite presentation based on the uploaded document. The composite presentation includes all the content of the document presented in a specially configured graphical user interface to receive and manage annotations from a plurality of user devices. Full Article
al WEB-BASED TOOL FOR COLLABORATIVE, SOCIAL LEARNING By www.freepatentsonline.com Published On :: Thu, 29 Jun 2017 08:00:00 EDT A computerized-social network provides a community of users with features and tools facilitating an immersive, collaborative environment where users can learn a language or help others learn a language. One user (user A) can view another user's (user B) Web page or document and make suggestions or comments for selected content on that Web page. These suggestions are linked specifically to the selected content. User B can review the suggestions, and accept or reject the suggestions by user A and others. Full Article
al SYSTEMS AND METHODS FOR ANALYZING ELECTRONIC COMMUNICATIONS TO DYNAMICALLY IMPROVE EFFICIENCY AND VISUALIZATION OF COLLABORATIVE WORK ENVIRONMENTS By www.freepatentsonline.com Published On :: Thu, 29 Jun 2017 08:00:00 EDT Systems and methods for managing a collaborative environment are provided. A plurality of sheets is stored in a collaboration system. The collaboration system tracks user interactions with the plurality of sheets and generates a collaboration graph based on the interactions. The collaboration graph is analyzed to determine similarities between the sheets and/or the users. One or more visualizations are generated based on the collaboration graph and the determined similarities. In some embodiments, the collaboration system is able to provide project management information even for dynamic workflows that are not explicitly defined. Full Article
al UNIVERSAL ADAPTOR FOR RAPID DEVELOPMENT OF WEB-BASED DATA VISUALIZATIONS By www.freepatentsonline.com Published On :: Thu, 29 Jun 2017 08:00:00 EDT A method of web-based data visualization includes: a Frontend sending a request over a computer network to a server configured as a Backend; a web server of the second server fetching data responsive to the request; the web server sending a response to the Frontend in a format compatible with a plurality software adaptors located on the Frontend, the response including information about objects to be presented on a web component; logic of the Frontend passing the response to a selected one of the software adaptors; and the selected software adaptor rendering the using a web visualization library associated with selected software adaptor. Full Article
al DYNAMICALLY DESIGNING WEB PAGES By www.freepatentsonline.com Published On :: Thu, 29 Jun 2017 08:00:00 EDT Various embodiments of systems, computer program products, and methods for dynamically designing webpages are described herein. In an aspect, a request for designing a webpage may be received. Based upon the request, a metadata related to the webpage may be identified. Based upon the identified metadata, one or more widgets for designing the webpage may be rendered. A selection of a widget from the one or more widgets may be received from a user. Multiple sections of the webpage and the widgets positioned in corresponding sections may be identified. The identified widgets of the webpage may be integrated with one or more security rules. Full Article
al AGGREGATING DATA FOR VISUALIZATION By www.freepatentsonline.com Published On :: Thu, 29 Jun 2017 08:00:00 EDT Data items are aggregated based on information relating to a display capability of a display device, to produce aggregated data. The aggregated data is for display in a visualization presented by the display device. Responsive to user selection in the visualization, dynamically created data at a second hierarchical level different from a first hierarchical level of the aggregated data is for display in the visualization. Full Article
al SYSTEMS AND METHODS FOR PROCESSING REAL-TIME AND HISTORICAL DATA AND GENERATING PREDICTIVE GRAPHICAL USER INTERFACES By www.freepatentsonline.com Published On :: Thu, 29 Jun 2017 08:00:00 EDT Computer implemented systems and methods are provided for generating a predictive graphical user interface. In some embodiments, a system for generating a predictive graphical user interface may comprise at least one processor configured to receive real-time and historical data associated with utilization of a facility. The at least one processor may be configured to generate, based on the real-time and historical data, instructions to display a user interface depicting a first representation of utilization of the facility at a first time. The at least one processor may be configured to receive a request to display a second representation of utilization of the facility, the request including a selection of a second time, and generate, based on the real-time and historical data, instructions to display, within the interface, a second representation of utilization of the facility, the second representation reflecting utilization at the second time, wherein the second time is a future time relative to the first time. Full Article
al REPRESENTATION OF OVERLAPPING VISUAL ENTITIES By www.freepatentsonline.com Published On :: Thu, 29 Jun 2017 08:00:00 EDT Various embodiments present a combined visual entity that represents overlapping visual entities. The combined visual entity can include a primary visualization that represents one of the overlapping visual entities and annotations that represent others of the overlapping visual entities. For example, a map view can include multiple geographical entities that overlap. A primary visualization can be rendered that represents one of the multiple geographical entities. The primary visualization can be visually annotated (e.g., with symbols, letters, or other visual indicators) to indicate others of the multiple geographical entities. In some embodiments, a zoom operation can cause visual entities to be added and/or removed from the combined visual entity. Full Article
al INFORMATION PROCESSING METHOD AND TERMINAL, AND COMPUTER STORAGE MEDIUM By www.freepatentsonline.com Published On :: Thu, 29 Jun 2017 08:00:00 EDT Disclosed are an information processing method and terminal. The method includes: acquiring a first operation (101); in response to the first operation, selecting a plurality of pictures from a local information base or an information base pulled and obtained by a background server, and displaying the same on a user interface of a terminal (102); acquiring a second operation (103); in response to the second operation, partitioning to-be-added first target information into a plurality of items of second target information according to a preset rule, and overlaying the plurality of items of second target information on the plurality of pictures in one batch (104); and forming complete information corresponding to the first target information by the plurality of items of second target information, the second target information being partial information in the first target information (105). Full Article
al SOUND OBJECT CONTROL APPARATUS AND METHOD BASED ON ADDITIONAL IMAGE OBJECT By www.freepatentsonline.com Published On :: Thu, 29 Jun 2017 08:00:00 EDT Disclosed is an apparatus and method for controlling a sound object based on an additional image object. A sound object controlling method includes displaying image objects synchronized with a plurality of sound objects, respectively, on a display; and controlling a sound object synchronized with an image object selected by a user from among the image objects displayed on the display. The sound object includes metadata that includes playback location information of the sound object on a specific space, sound level information of the sound object, and display location information of the image object synchronized with the sound object on the display. Full Article
al Magnetically repelling lock assembly By www.freepatentsonline.com Published On :: Tue, 07 Apr 2015 08:00:00 EDT A lock assembly (10) including a plug (12) having a keyway (14) for inserting therein a key (16), and a movable element (18) movingly disposed in the plug (12), the movable element (18) being divided into at least two separate magnetic portions (20, 22) arranged to move relative to one another and having identical magnetic polarity, wherein the magnetic portions (20, 22) are sufficiently near one another such that one of the magnetic portions (20, 22) applies a magnetic repelling force on the other magnetic portion (20, 22). Full Article
al Valve lockout device By www.freepatentsonline.com Published On :: Tue, 07 Apr 2015 08:00:00 EDT A lockout device that can be used to lock a valve in a closed position, for use particularly with valves that include a stationary member, such as a body, and a rotating member, such as a handle or wheel, for activating and deactivating the valve is disclosed. The lockout device can also be used to provide a connection point for connecting various types of connectors to a hose clamp or other elongate connecting member mounted on and locked onto a body such as a pipe or valve. Full Article
al Retractable key storage apparatus with original key adaptor By www.freepatentsonline.com Published On :: Tue, 21 Apr 2015 08:00:00 EDT The invention provides an apparatus to retractably store multiple keys. The apparatus is designed to permit a user to install up to eight (8) custom keys in a compact “key wallet.” Individual keys are pivotally deployed by pressing a designated button on the apparatus and are returned to a stowed position by rotating the key back into the apparatus until it locks into position. The apparatus uses a spring-loaded key release mechanism to release and retract the keys. Full Article
al Locking insert mechanism and receiver to secure personal weapons, valuables and other items By www.freepatentsonline.com Published On :: Tue, 21 Apr 2015 08:00:00 EDT A personal security apparatus to house weapons, valuables, and/or items requiring concealment includes a lockable insert mechanism to securely house items and at least one receiving apparatus adapted to mount the insert mechanism into or onto various structures and a lockable access door that provides convenient, rapid access to the items contained in the personal security apparatus and further prevents access by unauthorized persons. Full Article
al Valve switchbox By www.freepatentsonline.com Published On :: Tue, 21 Apr 2015 08:00:00 EDT A switchbox for monitoring the position of a manual quarter-turn valve has a housing mountable to the valve to be monitored/controlled. A handle-driven shaft extends through the housing, with one end of the shaft couplable to the valve stem such that movement of the shaft moves the valve stem. One or more shaft position sensor switches interact with a cam on the shaft to signal shaft position and/or provide control signals. A plate coupled to the shaft articulates within a recess on the surface of the switchbox to limit motion of the valve to an operable range, such as between full ON and full OFF. The switchbox has a pair of lock tabs with lock apertures. A lock aperture in the plate is alignable with the lock tab apertures to receive a pin or padlock for locking the valve in a selected position. A potentiometer can be utilized in place of a switch as a shaft position sensor. The switchbox may be used with an original or new handle and may feature detents to allow a range of valve settings. Full Article
al Valve switchbox By www.freepatentsonline.com Published On :: Tue, 21 Apr 2015 08:00:00 EDT A switchbox for monitoring the position of a manual quarter-turn valve has a housing mountable to the valve to be monitored/controlled. A handle-driven shaft extends through the housing, with one end of the shaft couplable to the valve stem such that movement of the shaft moves the valve stem. One or more shaft position sensor switches interact with a cam on the shaft to signal shaft position and/or provide control signals. A plate coupled to the shaft articulates within a recess on the surface of the switchbox to limit motion of the valve to an operable range, such as between full ON and full OFF. The switchbox has a pair of lock tabs with lock apertures. A lock aperture in the plate is alignable with the lock tab apertures to receive a pin or padlock for locking the valve in a selected position. A potentiometer can be utilized in place of a switch as a shaft position sensor. The switchbox may be used with an original or new handle and may feature detents to allow a range of valve settings. Full Article
al Falling latch locking device By www.freepatentsonline.com Published On :: Tue, 28 Apr 2015 08:00:00 EDT Falling latch locking device having a first locking device casing that includes a handle, a closing element and a lock, and having a second locking device casing that includes a cut-out for receiving the closing element in the closed state, wherein the lock comprises a stop that can be moved by locking and unlocking the lock and in the locked state the stop blocks the opening of the handle. Full Article
al Hasp seal lock assembly By www.freepatentsonline.com Published On :: Tue, 19 May 2015 08:00:00 EDT A hasp seal lock assembly includes a base member that is attached via a hinge to a cover member. The cover member, when rotated such that the cover member engages the base member, is functionally adapted to overlay a latch and seal. The base member and the cover member each have a plurality of apertures defined in adjacent side walls that allow the horizontal latch arm to extend through the assembly. The base member and the cover member also include a second plurality of cooperating apertures whereby the base member and the cover member may be locked together by use of a padlock. In a first preferred embodiment, each cover side wall includes a tab and tab-receiving apertures are defined within the base member. The tabs require that the cover be lifted vertically prior to rotation of the cover member about the base member. Full Article
al Shrink wrap removal tool By www.freepatentsonline.com Published On :: Tue, 31 Mar 2015 08:00:00 EDT A tool for removing shrink wrap from a product may include a first abrasive surface, a second abrasive surface, and a pressing surface, where the first and second abrasive surfaces are movable with respect to one another between an engaged position and a disengaged position, and where in the engaged position, the pressing surface presses the product into engagement with the first abrasive surface and the second abrasive surface. The first abrasive surface and the second abrasive surface may be located on a first arm and a second arm respectively. The first abrasive surface may be stationary relative to the first arm and the second abrasive surface may be stationary with respect to the second arm. The pressing surface may include a pressing element which is rotatable around an axis. Full Article
al Ratcheting tool with angular positioning handles for cutting non-metal pipe and tubing By www.freepatentsonline.com Published On :: Tue, 31 Mar 2015 08:00:00 EDT Disclosed is an improved pipe cutting tool based upon a ratchet closure action wherein handles are pivotedly attached to allow successive movement of a cutting blade in response to the squeezing of the handles. The handles are also hingedly coupled to the cutting member to maintain the cutting member in a position perpendicular to the tubular item to be cut while allowing the operator to squeeze the handles at offset angles, up to and including a right angle cut. The hinged handles allow for offset operation without forgoing the ease of operation by the consumer or causing a large reduction in the mechanical advantage. A ratchet allows sequential advancement of a cutting member toward a tubular shaped jaw that holds the item to be cut. Full Article
al Twine cutter for a bale processor By www.freepatentsonline.com Published On :: Tue, 31 Mar 2015 08:00:00 EDT A twine cutting apparatus for a bale processor has a guide extending along a length of a floor of the bale chamber, and a knife engaged in the guide and configured such that the knife can slide along the length of the drum and such that a cutting edge of the knife contacts twine wrapped around an outer surface of the drum. A rigid handle is attached at a knife end thereof to the knife and is configured to be gripped by an operator at a grip end thereof outside the bale chamber. A twine access area can be provided on the drum surface to facilitate cutting twine, and the apparatus can be stored inside the bale chamber during operation of the bale processor. Full Article
al Guarded surgical knife handle By www.freepatentsonline.com Published On :: Tue, 31 Mar 2015 08:00:00 EDT A guarded surgical knife handle includes a handle portion with a blade holder, a chamber within the handle portion, and a slot. The guarded surgical knife handle also includes a guard having an open distal end slidably mounted within the handle portion that can slide longitudinally between an unguarded position and a guarded position. The guard is sized to surround the blade in the guarded position. The guarded surgical knife handle also includes a latch that latches the guard when the guard is slid into the guarded position and a first button that disengages the latch. The guarded surgical knife handle includes a bias member that forces the guard in a proximal direction to an unguarded position when the latch is disengaged along with a second button extending through the slot used to slide the guard in a distal direction into the guarded position. Full Article
al Dustless drywall cutting tool By www.freepatentsonline.com Published On :: Tue, 21 Apr 2015 08:00:00 EDT A drywall-cutting tool comprises a rotary blade of a thin design that cuts a very small kerf resulting in a smooth cut as well as a small amount of dust. Any dust that is generated is immediately vacuumed away by an on-board vacuum system that collects the dust in a removable dust bag. Additionally, the saw is provided with an adjustable depth mechanism for the most common thicknesses of drywall. This feature allows for accurate cuts, especially in remodeling scenarios where drywall must be cut without damaging other building components behind the drywall. Full Article
al Scalpel handle having a blade shield By www.freepatentsonline.com Published On :: Tue, 12 May 2015 08:00:00 EDT A scalpel handle for holding a blade having a cutting edge includes a handle member and a blade shield for covering the blade cutting edge. The blade shield is connected to the handle member for pivotal movement relative thereto between a blade-covering condition and an out-of-the-way condition, and a movable shield latch mechanism is capable of releasably locking the blade shield in its blade-covering condition. A finger-operable actuator mechanism is mounted upon the handle member for movement between first and second conditions, and a spring is interposed between the actuator mechanism and the handle member. During a first phase of movement of the actuator mechanism from its first to its second condition, the shield latch mechanism unlocks the blade shield from its locked blade-covering condition, and during a second phase of movement, the blade shield is moved from its blade-covering condition to its out-of-the-way condition. Full Article
al Surgical probe By www.freepatentsonline.com Published On :: Tue, 12 May 2015 08:00:00 EDT An exemplary surgical probe and methods of making the same are disclosed. An exemplary surgical probe may include a tubular body and a scissor assembly received at least partially within the body. The scissor assembly may include a first blade fixed to the tubular body that includes a body portion and an end portion. The scissor assembly may further include a second blade that is configured to move longitudinally within the tubular body. The body portions of the first and second blades may each define respective cross sections normal to a longitudinal axis of the tubular body. The cross sections may each define centrally disposed edges adjacent one another, and the cross sections may each be asymmetrical about a line substantially parallel to the centrally disposed edges. Full Article
al Safety scalpel with replaceable blade cartridge and safety brake By www.freepatentsonline.com Published On :: Tue, 11 Aug 2015 08:00:00 EDT A safety scalpel that incorporates a reusable metal scalpel handle (500) similar in shape and feel to the conventional metal handle preferred by most surgeons, and a disposable blade cartridge (300) that covers the blade (100) before, during and after use, and is easily mounted and released from the scalpel handle. The blade cartridge includes a blade (100) with similar cutting profiles as standard surgical blades, a blade holder that is permanently fixed to the blade, and a blade guard (300) that covers the blade and within which the blade holder (200) is able to slide. The scalpel handle is reusable, while the blade cartridge is disposable. The blade cartridge is attachable and detachable from the scalpel handle and may include a mechanical brake (1301) to prevent movement of the blade except when the reusable handle is in place. A safety latch feature (2230) is provided. Full Article
al Gear unit at least partially filled with oil By www.freepatentsonline.com Published On :: Tue, 03 Mar 2015 08:00:00 EST A gear unit at least partially filled with oil, wherein a device is provided in the gear unit for lowering the oil level, especially of the oil pan of the gear unit, during operation, the device including at least one temporary storage. Full Article
al Oil supply device for an internal combustion engine By www.freepatentsonline.com Published On :: Tue, 10 Mar 2015 08:00:00 EDT An oil supply device for a crankcase of an internal combustion engine feeds oil from a reservoir to a main oil duct of the crankcase. A filter switching device allows a selection from a plurality of oil filter units in the flow path of the oil to be selectively connected into the oil flow path, to set a proportion of the oil filter units to active and a proportion of the oil filter units to passive. A switching unit switches between the active and passive states and opens up a pressurized oil flow path to the active oil filter unit(s) and also a drainage flow path between the passive oil filter unit(s) and a drainage duct. An evacuation device drains or evacuates oil from the drainage duct which has accumulated at the passive oil filter unit(s). Full Article
al Integrated thermal management system and environmental control system for a gas turbine engine By www.freepatentsonline.com Published On :: Tue, 17 Mar 2015 08:00:00 EDT A gas turbine engine includes a first and second pump driven by a spool. An Air-Oil Cooler downstream of the first pump. An air-air precooler is downstream of the second pump, the air-air precooler downstream of the Air-Oil Cooler. Full Article
al Dual-line pump unit, lubrication system, and related apparatus and method By www.freepatentsonline.com Published On :: Tue, 17 Mar 2015 08:00:00 EDT A dual-line pump unit for supplying lubricant includes a reservoir having an interior for holding lubricant. A first pump is provided for pumping lubricant from the reservoir through a first main line to a lubricant distribution system. A second pump is provided for pumping lubricant from the reservoir through a second main line to the lubricant distribution system. During a first stage of operation, the first pump operates to pump lubricant from the reservoir through the first main line to the lubricant distribution system and the second pump is idle, the second main line venting back to the reservoir via the second pump. During a second stage of operation, the second pump operates to pump lubricant from the reservoir through the second main line to the lubricant distribution system and the first pump is idle, the first main line venting back to the reservoir via the first pump. Full Article
al Accessing a valve assembly of a turbomachine By www.freepatentsonline.com Published On :: Tue, 24 Mar 2015 08:00:00 EDT An example method of accessing a valve assembly of a turbomachine includes accessing a check valve of the valve assembly from a first position that is radially outside a flow path through the turbomachine. The method accessing a shut off valve of the valve assembly from a second position that is radially outside the flow path. The check valve and the shut off valve are configured to influence communication of lubricant along a lubricant communication path that extends between a location radially outboard the flow path and a location radially inboard the flow path. The first position is the same as the second position in some examples. Full Article
al Case with integral lubricant scavenge passage By www.freepatentsonline.com Published On :: Tue, 24 Mar 2015 08:00:00 EDT A case comprises a radially inner case hub, a radially outer case section with an outer wall, a plurality of circumferentially distributed struts extending radially between the inner hub and the outer case section, and a lubricant scavenge passage disposed circumferentially apart from a bottom dead center (BDC) position of the case. The lubricant scavenge passage includes an inner scavenge section extending radially through a first one of the plurality of struts. Full Article
al Control of balance drift in turbocharger rotating assembly By www.freepatentsonline.com Published On :: Tue, 31 Mar 2015 08:00:00 EDT A turbocharger for an internal combustion engine includes a bearing housing with a bearing bore and a thrust wall. The bearing housing includes a journal bearing disposed within the bore. The turbocharger also includes a shaft supported by the journal bearing for rotation about an axis within the bore. The turbocharger also includes a turbine wheel fixed to the shaft and configured to be rotated about the axis by the engine's post-combustion gasses. The turbocharger additionally includes a compressor wheel fixed to the shaft and configured to pressurize an ambient airflow. Furthermore, the turbocharger includes a thrust bearing assembly pressed onto the shaft and configured to transmit thrust forces developed by the turbine wheel to the thrust wall. Pressing the thrust bearing assembly onto the shaft minimizes radial motion between the thrust bearing assembly and the shaft. An internal combustion engine employing such a turbocharger is also disclosed. Full Article