Patent application number | Description | Published |
20090090204 | Actuator Arrangement - An actuator arrangement comprises a rotatable shaft, a nut mounted upon the shaft and translatable along the shaft upon rotation of the shaft relative to the nut, and a lock arrangement operable to lock the shaft and nut against relative rotation, the lock arrangement comprising a lock component mounted upon one of the shaft and the nut for axial movement relative thereto but held against angular movement relative thereto, the lock component being co-operable with an abutment provided on the other of the shaft and the nut, or a component associated therewith, to lock the shaft and nut to one another against relative rotation. | 04-09-2009 |
20100078608 | Actuator - An actuator comprises a gear arrangement operatively connected to a rotatable input of a linearly extendable actuator device, wherein the gear arrangement comprises a pinion gear and a face gear in meshing engagement with one another. | 04-01-2010 |
20110072780 | Thrust Reverser Actuation - A thrust reverser drive arrangement is described for use in driving a thrust reverser cowl for movement relative to first and second guide tracks, the drive arrangement comprising a first actuator located, in use, close to the first guide track, and a second actuator located, in use, close to the second guide track, the actuators being arranged to be driven in synchronism and at the same speed by a drive motor to drive the cowl for movement, wherein at least one of the first and second actuators is provided with a load limiter to limit the transmission of loads through that actuator in the event that that actuator is subject to a compressive loading greater than a predetermined level. | 03-31-2011 |
20110073421 | No-Back Arrangement - A no-back arrangement is disclosed for use in applying a braking load to a rotary actuator member, the no-back arrangement comprising a no-back device operable to apply a braking load to the rotary actuator member when the rotary actuator member is subject to a tensile loading, and limit means operable to limit the magnitude of the applied braking load. | 03-31-2011 |
20110232406 | Thrust Reverser Actuation - A thrust reverser drive arrangement for driving a thrust reverser cowl for movement relative to first and second guide tracks is described which comprises a first actuator located, in use, close to the first guide track, a second actuator located, in use, close to the second guide track, and a third actuator, the actuators being arranged to be driven in synchronism and at the same speed by a drive motor to drive the cowl for movement, the third actuator being of smaller size and/or weight than the first and second actuators, and wherein the third actuator is provided with a load limiter to limit the transmission of loads through the third actuator in the event that the third actuator is subject to a compressive loading greater than a predetermined level. The invention further relates to a load limiter device suitable for use in such an arrangement | 09-29-2011 |
Patent application number | Description | Published |
20130290733 | SYSTEMS AND METHODS FOR CACHING SECURITY INFORMATION - Systems and methods are provided for caching security information. A method can include receiving security information for a file, performing a first hash function on the security information using a first salt and a first mixer to compute a key associated with the security information, performing a second hash function on the key using a second salt and a second mixer to compute an index associated with the key, wherein the second mixer is different from the first mixer, caching at least one of the security information and the key in a storage medium, and storing the index with the file, wherein the index is associated with the at least one of the security information and the key stored in the storage medium. | 10-31-2013 |
20130290734 | SYSTEMS AND METHODS FOR CACHING SECURITY INFORMATION - Systems and methods are provided for caching security information. A method can include receiving security information for a file to be accessed at a device, performing a first hash function on the security information using a salt and a first mixer to compute a key associated with the security information, generating a device identifier (ID) unique to the device, performing a second hash function on the key using the device ID and a second mixer to compute an index associated with the key, wherein the second mixer is different from the first mixer, caching at least one of the security information and the key in a storage medium, wherein the index refers to the at least one of the security information and the key cached in the storage medium, and storing the index with the file. | 10-31-2013 |
20140025636 | SYSTEMS AND METHODS FOR PROVIDING METADATA ENHANCED FILENAMES - Described are computer-based methods and apparatuses, including computer program products, for metadata enhanced filenames. A filename is received, the filename including a first set of characters that represents a name for the electronic file, and a second set of additional characters. The filename is parsed to identify the second set of additional characters. Metadata associated with the electronic file is determined based on the second set of additional characters without downloading additional data of the electronic file. The electronic file is processed based on the determined metadata. | 01-23-2014 |
20140047234 | ADAPTIVE DOCUMENT REDACTION - Described are computer-based methods and apparatuses, including computer program products, for adaptive document redaction. A container is generated comprising a set of redacted documents corresponding to an original document, each redacted document having a level of redaction corresponding to a viewing location, and a header comprising encryption information for each redacted document in the set of redacted documents. A request to view the original document is received from a requesting device. The container is transmitted to the requesting device. A request for additional encryption information for a redacted document from the set of redacted documents is received from the requesting device, wherein the redacted document comprises a level of redaction for a viewing location that is equal to a location of the requesting device. The additional encryption information is transmitted to the requesting device. | 02-13-2014 |
20140059344 | FILE PROTECTION USING SESSION-BASED DIGITAL RIGHTS MANAGEMENT - Systems and methods are provided for encrypting electronic files during a transfer to a low-security storage location is provided. In one embodiment, a method comprises receiving a file copy request for a file stored on a source storage system to be copied to a destination storage system; determining a desired file security level of the file based on a desired security level for the file when the file is accessed; determining a destination security level of the destination storage system; comparing the file security level and the destination security level; encrypting the file to create an encrypted file when the destination security level is less than the file security level prior to copying the file; and copying at least one of the file and the encrypted file to the destination storage system as a function of the comparison of the file security level and the destination security level. | 02-27-2014 |
20140063048 | VISUAL ACCESSIBILITY INDICATORS - Systems and methods are described for providing visual accessibility indicators on mobile devices. A computerized method of presenting a visual accessibility indicator relating to a target file includes detecting, using a mobile device, an active network connection of the mobile device to be used to transfer the target file, retrieving a connection profile for the active network connection, the connection profile including attributes relating to the active network connection, projecting accessibility of the target file at least partially based on the connection profile, and displaying, on the mobile device, a visual accessibility indicator representing the projected accessibility, wherein the visual accessibility indicator contains an icon illustrating the accessibility. | 03-06-2014 |
Patent application number | Description | Published |
20140139530 | SYSTEMS AND METHODS FOR USER VIEWABLE TRUNCATION - Systems and methods are provided for displaying and manipulating the display of digital character strings where the length of the character string extends beyond the width of a desired output display. In response to a user request to display a character string, a client can generate a truncated representation of the character string using at least one truncation symbol when the character string extends beyond the width of an output display. A client can modify the display of the truncated representation of the character string in response to detecting a signal. For example, the client can display a selected character string in its entirety or an excerpt of the truncated representation. The signal can be detected from a touchscreen or input device. This allows a user to view those portions of the selected character string that may be obscured by the truncation symbol. | 05-22-2014 |
20140143662 | Systems and Methods for User Modifiable Truncation - Systems and methods are provided for displaying and manipulating the display of digital character strings where the length of the character string extends beyond the width of a desired output display. In response to a user request to display a character string, a client can generate a truncated representation of the character string using at least one truncation symbol when the character string extends beyond the width of an output display. A client can modify the display of the truncated representation of the character string in response to detecting a signal corresponding to a change in location of the truncation symbol. The signal can be detected from a touchscreen or input device. This allows a user to view any portion of a selected character string, including those portions that may be obscured by the truncation symbol. | 05-22-2014 |
20140143663 | SYSTEMS AND METHODS FOR PROVIDING CONTEXTUAL BASED TRUNCATION - Systems and methods are provided for displaying and manipulating the display of digital character strings where the length of the character string extends beyond the width of a desired output display. A client can perform contextual based truncations of character strings using at least one truncation symbol when the characters strings extend beyond the width of an output display. The client can analyze the character strings for differences and similarities. The client can then generate the truncated representations of the character strings based on predetermined parameters for truncation. The truncated representations can include similar and different portions of the character strings that maintain descriptive information that differentiates them. | 05-22-2014 |
20140176562 | SYSTEMS AND METHODS FOR PROVIDING A SOFTWARE APPLICATION PRIVACY SCREEN - Systems and methods are provided for applying a localized software privacy screen over the display of specific applications, files, and/or other content on a computing device. In response to a user request, a computing device can open a window comprising a file or content in an associated application on its output display, determine whether a privacy screen should be applied to the user interface, and apply the privacy screen in a visual layer over the user interface if specified by the settings, rules, and/or permissions. The privacy screen can be user modifiable and can be made up of plurality of privacy lines that may be of any suitable orientation, thickness, spacing, and/or color and opaqueness that permits the user of the computing device to view the underlying window while preventing unauthorized onlookers from viewing the same. | 06-26-2014 |
20140188802 | PULL AND PASTE - Systems and methods are described for providing pull and paste functionalities. A computerized method of pulling and pasting data among computing devices includes determining attributes of a first computing device, transmitting the attributes of the first computing device to a second computing device, receiving a pulling request for copying information from the first computing device to the second computing device, wherein the information resides on the first computing device, automatically processing the pulling request at the first computing device and automatically generating a response to the pulling request, and automatically sending the response to the pulling request back to the second computing device, wherein the response contains the information. | 07-03-2014 |
20140195593 | SYSTEMS, METHODS AND MEDIA FOR MANAGING EMBEDDED CONTENT - A method, system and medium for managing embedded content in documents are provided. The method, e.g., includes detecting, at a host device running a host application program, a user's action to initiate editing of content embedded in a document associated with the host application program and querying for the user's content management configuration to determine a target device having an interface suitable for editing the embedded content. If it is determined that the user's configuration specifies a device other than the host device as the target device, the method further includes sending a revision notification to the target device, wherein the notification includes a copy of, or a reference to, the document and receiving an update notification from the target device, wherein the update notification includes one of a copy of or a reference to a latest version of the document including the latest edits made to the embedded content. | 07-10-2014 |
20140250069 | SYSTEMS AND METHODS FOR SELECTIVELY SYNCHRONIZING FILES - Systems and methods are provided for selectively synchronizing files. Data is received from a remote storage device indicative of a set of files stored on the remote storage device. A first file from the set of files is downloaded, but not a second file from the set of files. Both (a) the first file and (b) data indicative of the second file are stored in a database. A list of files stored in the database is displayed, the list including the first file and the second file. | 09-04-2014 |
20140258875 | SYSTEMS, METHODS AND MEDIA FOR PROVIDING HISTORICAL NAVIGATION CONTROLS FOR A MOBILE DEVICE USER - Systems, methods and media for providing multi-dimensional historical navigation controls are provided. One method includes recording, at a mobile device, a first navigation path associated with a data item accessed by a user using the mobile device and enabling a plurality of elements in the first navigation path by generating a plurality of active controls each corresponding to one of the plurality of elements. The method also includes displaying a UI control including the first navigation path that is presented using the enabled elements. The method further includes detecting a selection of one of the enabled elements of the first navigation path when the user selects the active control corresponding to the selected one of the enabled elements and navigating to the site associated with the selected one of the enabled elements by jumping to the site from a first site associated with any other one of the enabled elements. | 09-11-2014 |
20140279873 | SYSTEM AND METHOD FOR OPTIMIZING FILE STORAGE ON A COMPANY COMPUTER AND A USER COMPUTER - Embodiments of the invention include a system, computer program product and computer-implemented method for synchronizing data files on a company computer and performing a process of determining whether a data file should be synchronized with the computer and a process of synchronizing the data file. These process may include the steps of receiving a request for the data file from a user computer; determining whether the data file is located in the computer memory; determining whether the file is stored in a remote computer memory; requesting the data file from the remote computer; and determining a rank for the data file retrieved from the remote computer based whether the data file is associated with a plurality of users accessing the computer. | 09-18-2014 |
20140281875 | MULTI-USER LAYER ANNOTATION - Techniques are disclosed for providing collaborative annotation of documents. In one embodiment, a computerized method is disclosed for providing collaborative annotation of documents that can include receiving, at a first computer, a first annotation from a first user for an original file; storing the first annotation to a first layer file; uploading the first layer file to a cloud storage server; receiving, at the first computer from the cloud storage server, a second layer file created by a second user; retrieving a second annotation from the second layer file; and concurrently displaying the original file together with the first annotation and the second annotation by overlaying the first annotation and the second annotation over the original file. | 09-18-2014 |
20140282820 | SECURE DATA MANAGEMENT - The disclosed subject matter includes a method. The method includes determining, by a module running on a computer platform in communication with non-transitory computer readable medium having a plurality of security zones, whether an application instance is in a foreground of a user interface for the computer platform. The method further includes determining, by the module, an alert level associated with the application instance in the foreground of the user interface, wherein the alert level includes at least one of a restriction level and an access level. The method also includes providing the alert level to a user of the computer platform using a visual cue displayed on the user interface. | 09-18-2014 |
20140283107 | SECURE DATA MANAGEMENT - The disclosed subject matter includes a method. The method includes identifying an attempt to access, by an application instance running in a user space of an operating system, a first security zone of a computer readable medium, where the first security zone is associated with a first security level. The method further includes determining whether a restriction level associated with the application instance is higher than the first security level, where the restriction level is a function of previous security zones that have been accessed by the application instance. When the restriction level associated with the application instance is higher than the first security level, the method would prevent the application instance from writing to the first security zone. When the restriction level associated with the application instance is not higher than the first security level, the method would authorize the application instance to access the first security zone. | 09-18-2014 |
20140337495 | WEB EVENT FRAMEWORK - Systems and methods are described for a web event framework. A computerized method includes receiving at a framework plugin an event from a web browser, wherein the framework plugin is coupled to the web browser, generating, by the framework plugin, a framework event based on the event, forwarding the framework event to a framework server coupled to the framework plugin, receiving at the framework server the framework event from the framework plugin, determining, at the framework server, a framework action based on the framework event and a framework policy, forwarding the framework action to the framework plugin, and executing the framework action by the framework plugin. | 11-13-2014 |
Patent application number | Description | Published |
20130212133 | VIRTUALISED SYSTEMS - A computer system comprising a plurality of managed applications, a plurality of virtual application stores for storing data for respective managed applications, a metadata store and a composer engine configured to receive entity write requests from a managed application and to store metadata to identify the application store of the most recently updated application store for the entity, to receive entity read requests from another managed application and to look up in the metadata store the application store most recently updated for the requested entity and to return the entity from the application store; whereby the composer engine is configured to consolidate multiple virtual stores into a single composite virtual store. | 08-15-2013 |
20130290730 | SYSTEMS AND METHODS FOR DATA ACCESS PROTECTION - Systems and methods are provided for data access protection. The disclosed computing system can provide an adjusted iteration count to a dynamic key stretching module. The computer system can determine whether the adjusted iteration count is to be used to enhance a passphrase for data encryption or data decryption. When the adjusted iteration count is to be used for data encryption, the computing system is configured to compute the adjusted iteration count by modifying a base iteration count according to an adjustment configuration; when the adjusted iteration count is to be used for data decryption, the computing system is configured to retrieve the adjusted iteration count that was used to encrypt the data. Once the adjusted iteration count is determined, the computing system is configured to provide the adjusted iteration count to the dynamic key stretching module. | 10-31-2013 |
20130291080 | SYSTEMS AND METHODS FOR DATA ACCESS PROTECTION - Systems and methods are provided for data access protection. The disclosed computing system can determine a passphrase for controlling access to a file, operate a hash function on the passphrase by a predetermined number of iterations to provide an intermediate passphrase, and send a request for an enhanced passphrase to a server in communication with the apparatus, where the request can include the intermediate passphrase. Subsequently, the disclosed computing system can receive, from the server, the enhanced passphrase based on the intermediate passphrase in response to the request. | 10-31-2013 |
20140143646 | SYSTEMS AND METHODS FOR DYNAMIC EXTERNAL DOCUMENT CONTENT - Systems and methods are provided for updating content of an electronic document. An electronic document is opened that includes a dynamic content portion configured to be updated with custom content each time the document is opened. A request for content is transmitted for the dynamic content portion to a remote server. The content for the dynamic content portion is received from the remote server. The electronic document is updated so that the dynamic content portion includes the received content. The electronic document is displayed with the received content. | 05-22-2014 |
20140149499 | REMOTE REQUEST FULFILLMENT AND DELIVERY - Systems and methods are described for described for providing remote request fulfillment and delivery. A computerized method of sharing and distributing data among computing devices includes receiving at a server a request from a first computing device, wherein the request targets a second computing device and contains information about a data object, retrieving, using the server, at least a portion of the data object from a source of the data object, determining, using the server, attributes of the second computing device, adapting at least a portion of the data object according to the attributes of the second computing device, and notifying the second computing device of an availability of the data object. | 05-29-2014 |
20140165003 | TOUCH SCREEN DISPLAY - Systems and methods are disclosed for a slide-in menu that provides extended actions for grid layouts on touch screen devices. The slide-in menu provides a signposted visual interface object for user interaction with an application that is discoverable and usable and that provides several selectable options for touch-screen users, while requiring minimal screen real estate and retaining touch target sizes for individual screen controls that is appropriate for touch screen users. The slide-in menu may be augmented with an additional plurality of menu options and with a “more” button that displays the additional plurality of menu options. | 06-12-2014 |