PATENTS LIST
PATENTS
The patents are sorted by Date Filed
The PATENT NO. is a link to the United States Patent & Tradmark Office database file for the patent. CLICK on ABSTRACT to see the Patent Abstract
11272888
databases
ABSTRACT
Human biological change information in data form is obtained by one or more computer processing devices that utilize human biological change data from event data stream(s) and allows for ranking one or more changes in the biological change data. The data then correlates biological change data with ranking statistics from an event such that the correlation identifies and measures a magnitude of change of human biological responses from data acquired from event data stream(s). The correlation of human bioÂlogical change data with ranking statistics creates one or more objects for storage and analysis within in one or more databases, wherein the objects possess time synchronized temporal human biological responses before, during or after an event. These objects also possess biological change data that utilizes correlation of biological change data with ranking statistics and results in objects that also contain one or more ranked values of the human biological responses.
1116441
ABSTRACT
One or more apparatuses comprising at least two thermal image data capture and measuring devices that measure long wave infrared radiation intensity of energy flux on a per pixel basis wherein pixels provide dynamic image data that is transmitted and received between two or more digital devices so that the image data provides at least one captured dynamic image which is correlated with specific exact geographic locations and positions data and facial recognition data and correlated local air quality monitoring index atmospheric data is provided by sensors, and the devices include a lens, an optical system, a photodetector, one or more computerized micro-processors, and a gate that provides a constrained targeted pathway through which at least one person must travel so that dynamic thermal data, position and location data, facial recognition data, and local atmospheric data is measured, transmitted, and received for at least one person moving through the gate.
ABSTRACT
A method, system, and associated apparatus are described for installing, inventorying, actuating, and/or accessing down-hole equipment in a wellbore. This comprises tagging a casing by inserting permanent components of material compositions within sections along the length of a casing. Inserted components and/or portions of an original section function as unique readable active and/or passive markers. The piping system is at least one pipe having a plurality of markers placed in radial sections strategically arranged with independently identical or different material compositions or embedded in a length of the wellbore casing. The sections function as markers forming a readable pattern readable by the reader(s). The reader is one of or a combination of any of the group consisting of a plug, a probe, a sensor, and/or a computer for reading markers. The reader travels in either a forward or backward direction.
10909835
ABSTRACT
One or more temperature measuring devices are described that comprise; thermal imaging cameras capable of detection and provision of an exact location of at least one created dynamic image scanned by and triangulated with at least two thermal imaging cameras, and a gate that provides a constrained targeted pathway through which at least one person must travel so that dynamic thermal data of the person is captured as the person is moving through the gate and wherein thermal imaging cameras are geometrically arranged in positions such that the thermal imaging cameras field of view exist on or within the gate and wherein the person is scanned and provides targeted dynamic thermal data that is converted into one or more temperature readings that measure and transmit the temperature readings from one or more photodetectors that sense thermal radiation naturally emitted by people passing through.
10871174
ABSTRACT
Systems, methods and devices are described providing a selective hydraulic or electrically powered prime mover that is a bi-directional power unit system, including movement within a device used to compress and/or expand a fluid and provide fluid movement. The use of a hydraulic power unit is involved and comprises at least a pump or other fluid moving device, a first set of selective control valves delivering pressurized fluid to the device(s), and a second set of selective control valves returning unpressurized fluid from the device(s), a reservoir comprising a compensator tank, a port for operation at ambient pressure, and a pressure measuring device measuring ambient pressure allowing for unbalanced flow to and from the device as well as thermal expansion or compression. The use of a multiport and in some cases a swashplate pump that incorporates the features and functions of several valves for the system is also described.
10871068
ABSTRACT
A control system with probes for generating and utilizing at least one or more addressed datagrams that communicate information to and from devices along piping assemblies comprising; one or more transmitters, one or more receivers, and one or more controllers, wherein the transmitters transmit information via one or more addressed datagrams encoded within a working medium to one or more receivers among the piping assemblies, is described. Transmitters convert datagrams into signals that are transmitted within the working medium and the receivers receive signals from the transmitters and also convert signals from the working medium which is converted back into datagrams. The controllers receive and decode the datagrams so that the controllers selectively communicate and perform logical operations on piping assembly devices according to directions received from the addressed datagrams. The entire control system can function as a network of controllers, receivers, transmitters, and/or transponders as required by one or more users.
10764282
ABSTRACT
Described are user-wearable devices utilizing encryption authentication techniques to ensure security of any data transmission to and from these devices that utilize one or more securitized containers. The securitized containers can be software containers that are either real or virtual devices. The user-wearable devices communicate using digital signals transmitted and received via wireless, optical, radiative, and other forms of energy that can be converted into signals. In order to provide privacy and security of these signals, unique encryption technology is employed together with the use of biometrics associated with each user. Such devices include timepieces such as digital watches that perform functions suitable for user-wearable devices. The devices can establish communications with a counterpart communication device or system in order to provide the ability to perform specific secured transactions. The biometric data transceivers are capable of reading a user’s encrypted biometric data and then transmitting the encrypted data to a user identity validation distributed auto-synchronous array (DASA) database which allows for decryption, identification, and authentication of both the user(s) and the transaction(s).
10738595
ABSTRACT
A control system for generating and utilizing at least one or more addressed datagrams that communicate information to and from devices along piping assemblies comprising; one or more transmitters, one or more receivers, and one or more controllers, wherein the transmitters transmit information via one or more addressed datagrams encoded within a working medium to one or more receivers among the piping assemblies, is described. Transmitters convert datagrams into signals that are transmitted within the working medium and the receivers receive signals from the transmitters and also convert signals from the working medium which is converted back into datagrams. The controllers receive and decode the datagrams so that the controllers selectively communicate and perform logical operations on piping assembly devices according to directions received from the addressed datagrams. The entire control system can function as a network of controllers, receivers, transmitters, and/or transponders as required by one or more users.
10686764
ABSTRACT
The disclosure provides for two or more devices that securitize transmission(s) transmitted to and received from these devices comprising at least one executable coded cipher key(s), at least one executable coded encryption key (ECEK) device that encrypts transmission(s) that uses executable cipher coded key(s), and at least one executable coded decryption key (ECDK) device that decrypts transmission(s) and that also uses at least one executable coded cipher key(s), such that transmission(s) are sent to an encrypter/decrypter memory that stores transmission(s) while the transmission(s) is encrypted and/or decrypted. When encryption/decryption is completed, the transmission(s) is sent to at least one transmitter such that encryption/decryption of the transmission(s) is controlled and manipulated by the executable coded cipher key(s), wherein the executable coded cipher key(s) remain in the computer memory long enough to achieve encryption/decryption completion.
10673830
ABSTRACT
The disclosure provides for two or more transceiver devices and a system that utilizes one or more encrypters and one or more decrypters comprising one or more communication sources that provides transmission(s) and at least one connector, wherein transmission(s) from one or more communications sources enter a first transceiver through the connector and travels to a randomized encrypted data sub-channels (REDS) encrypter and wherein the (REDS) encrypter securely sends encrypted transmission(s) to a second transceiver. The encrypted transmission(s) enter a second transceiver and are sent to a randomized decrypted data sub-channels (RDDS) decrypter wherein the transmission(s) are decrypted.
10651591
ABSTRACT
A high pressure and temperature, hermetically sealed bulkhead connector with pin and socket contacts for use in logging tools is described. The bulkhead connector comprises (a) one or more contact(s) placed within one or more channels wherein the channels provide a clearance path between contact(s) and bulkhead body and travel at least a partial longitudinal distance between proximal and distal ends. The contact(s) reside in the channel(s) and include at least; an optional movement limiter section, one central elongated section, and one fixed section where the contact(s) is attached to the bulkhead body at the distal end. The body correctly positions respective ends of the contact so that the body secures contact(s) to be parallel to each other and the contact(s) have terminal ends for connection. This arrangement provides at least one pivotable, pliable, free floating contact extending away from the fixed distal end of the bulkhead body.
10650139
ABSTRACT
An access control system that protects signals between one or more secure databases for various user devices to ensure proper entrance or access into secure locations by approved personnel only that utilize one or more securitized container devices. These container devices may be software containers and either real or virtual devices. Specific methods and devices for securing (primarily digital and normally two-way) communications using applications that combine securing communications for wireless/cellular phones with personnel access card readers for entry into secure locations are also described. These combined communication and access devices require using specific encryption techniques impossible to corrupt and essential to denying fraudulent or otherwise unauthorized personnel the ability to enter or access security protected devices or locations. These securitized container devices utilize both a control and trust plane for ensuring that communication signals transmitted from and data residing within these containers are not corruptible.
10645070
ABSTRACT
An access control system and associated devices are described that conceal and securitize data transmissions between one or more secure databases for various user devices to ensure proper entrance or access into secure locations by approved personnel only. Specific methods and devices for securing (primarily digital and normally two-way) communications using applications that combine securing communications for wireless/cellular phones with personnel access card readers for entry into secure locations are also described. These combined communication and access devices require using specific encryption techniques that cannot be corrupted and are essential to denying fraudulent or otherwise unauthorized personnel the ability to enter or access security protected devices or locations.
10637854
ABSTRACT
Described are user-wearable devices utilizing encryption authentication techniques to ensure security of any data transmission to and from these devices. In order to provide privacy and security of user-wearable device signals, unique encryption technology is employed together with the use of biometrics associated with each user. The user-wearable devices may be electronic and can include one or more circuits, power sources, displays, and transceivers with biometric data transceiver portions. The devices can establish communications with a counterpart communication device or system in order to provide the ability to perform specific secured transactions. The biometric data transceivers are capable of reading a user’s encrypted biometric data and then transmitting the encrypted data to a user identity validation distributed auto-synchronous array (DASA) database which allows for decryption, identification, and authentication of both the user(s) and the transaction(s).
10633959
ABSTRACT
A method, system, and associated apparatus are described for installing, inventorying, actuating, and/or accessing down-hole equipment in a wellbore. This comprises tagging a casing by inserting permanent components of material compositions within sections along the length of a casing. Inserted components and/or portions of an original section function as unique readable active and/or passive markers. The piping system is at least one pipe having a plurality of markers placed in radial sections strategically arranged with independently identical or different material compositions or embedded in a length of the wellbore casing. The sections function as markers forming a readable pattern readable by the reader(s). The reader is one of or a combination of any of the group consisting of a plug, a probe, a sensor, and/or a computer for reading markers. The reader travels in either a forward or backward direction.
10623384
ABSTRACT
Devices that conceal transmission(s) transmitted to and/or reveal transmission(s) received from these devices comprising at least one executable coded cipher key(s) at least one executable coded encryption key (ECEK) device that securitizes transmission(s) that uses executable coded cipher key(s), and at least one executable coded decryption key (ECDK) device that reveals transmission(s) such that a combined device is a RDDS/ECDK device that transmits randomized data with data sub-channels and with ECEKs; and that also utilizes at least one executable coded cipher key(s), such that transmission(s) sent to an encrypter/decrypter memory that stores transmission(s) while the transmission(s) is concealed and/or revealed. When concealing/revealing operation(s) are completed the transmission(s) is sent to at least one transmitter such that the concealing/revealing operation of the transmission(s) is controlled and manipulated by the executable coded cipher key(s), wherein the executable coded cipher key(s) remain in the computer memory long enough to achieve securitization completion.
10616192
ABSTRACT
The disclosure provides for one or more devices and associated system that securitize and conceal data transmitted to and/or data received from the devices that utilize one or more master keys comprising at least one device that conceals and reveals such that the data and/or associated data files utilize both master keys and one or more key selectors, wherein the master keys and key selectors produce a specific set of one or more keys that conceal the data and/or associated data files such that one or more key selectors coincide with at least one value that directly corresponds with created cipher data and/or cipher data files. The key selectors can also be concealed and revealed as required. Produced concealed data and concealed data files can only be concealed and revealed with one or more master keys and one or more key selectors.
10601805
ABSTRACT
One more devices and/or access control systems are described that securitize data and data transmissions using three sets of computing operations including authentication, validation, and securitization that allows or denies access to the data and/or the data transmissions. The system includes securitization of signals between one or more secure master and/or partial DASA databases for various user devices. Specific methods and devices for securing (primarily digital and normally two-way) communications using applications that offer the combination of securing communications from user devices with reader devices, are also is provided.
10598193
ABSTRACT
Systems, methods and devices are described providing a selective hydraulic or electrically powered prime mover that is a bi-directional power unit system, including movement within a device used to compress and/or expand a fluid and provide fluid movement. The use of a hydraulic power unit is involved and comprises at least a pump or other fluid moving device, a first set of selective control valves delivering pressurized fluid to the device(s), and a second set of selective control valves returning unpressurized fluid from the device(s), a reservoir comprising a compensator tank, a port for operation at ambient pressure, and a pressure measuring device measuring ambient pressure allowing for unbalanced flow to and from the device as well as thermal expansion or compression. The use of a multiport and in some cases a swashplate pump that incorporates the features and functions of several valves for the system is also described.
10579793
ABSTRACT
This disclosure provides for the securitization and/or encryption of software container devices that utilize both a control plane and a trust plane for ensuring that communication signals transmitted from and data residing within these containers are not corruptible. In addition, processors for monitoring statistics regarding data at rest and data on the move associated with creating these secure containers are also included.
10536445
ABSTRACT
An access control system with devices that securitize one or more blockchains using three sets of rules including authentication, validation, and access is provided. The system also can include protection of signals between one or more secure DASA databases and/or one or more blockchains for various user devices. The DASA databases may exist external to, along with, or within the blockchains. Specific methods and devices for securing (primarily digital and normally two-way) communications using applications offering the combination of securing communications from user devices with reader devices, are also provided. This disclosure also provides for the securitization and/or encryption of blockchain(s) for ensuring communication signals transmitted from and data residing within databases and/or the blockchain itself are not corruptible or compromised. In addition, communication processors for monitoring statistics regarding data at rest and data on the move associated with creating these securitized blockchains are included.