Patent application number | Description | Published |
20110030190 | SYSTEM AND METHOD FOR PROVIDING FINAL DROP IN A LIVING UNIT IN A BUILDING - A system and method for providing a final drop in a living unit in a building. The system comprises a point-of-entry unit, such as a low profile base unit, disposed within the living unit at a location corresponding to an access position of horizontal cabling disposed in a hallway of the building that provides a first anchor point. The system also includes an adhesive-backed duct, having one or more communication lines disposed therein, mountable to a wall within the living unit. The system also includes a second anchor point, such as a wall receptacle, disposed within the living unit to receive a first communication line via the duct. The components of the system are also designed with very low impact profiles for better aesthetics within the living unit. | 02-10-2011 |
20110030832 | ADHESIVE BACKED DUCTS FOR CABLING APPLICATIONS - A duct for distributing one or more communication lines comprises an elongated body having a length and a conduit portion with a lengthwise bore formed therein, the conduit portion containing one or more communication lines. The duct also includes a flange extending lengthwise adjacent the elongated body to mount the duct to a mounting surface. The duct also includes an adhesive layer disposed on a bottom surface of the flange. The duct may further include a strength member extending lengthwise with the flange. The strength member may be disposed between the bottom surface and the adhesive layer or within the conduit. The duct may include an open slot in the top to allow for insertion and removal of the communication line. The duct may also be configured such that the conduit portion is attached to the flange structure via a thin web of material having a thickness such that upon modest application of a peeling force, a segment of the conduit portion is detachable from the flange structure. | 02-10-2011 |
20120027360 | COLLAR BODY FOR FIELD TERMINABLE OPTICAL CONNECTOR - An optical fiber connector for terminating an optical fiber is provided. The optical fiber connector includes a housing configured to mate with a receptacle. The connector also includes a collar body disposed in the housing and retained between the housing's outer shell and a backbone. The collar body includes a swivel head coupled to a front end portion of the collar body, where the swivel head is configured to receive a ferrule. The swivel head is configured to pivot with respect to the front end portion of the collar body by a controlled amount upon a side pull force being placed on the connector and/or optical fiber. | 02-02-2012 |
20120141082 | BLADELESS OPTICAL FIBER CLEAVER - An optical fiber cleaver to cleave an optical fiber is provided. The optical fiber cleaver comprises a generally planar main body and a generally planar flap portion movable with respect to the main body. The optical fiber cleaver also includes a first clamp disposed on the main body to receive and hold a first bare glass portion of the optical fiber and a second clamp disposed on the flap portion to receive and hold a second bare glass portion of the optical fiber. A shuttle device is disposed on the main body axially between the first clamp and the second clamp and is configured to move laterally with respect to an axis of the optical fiber. The shuttle device further includes a flexible abrasive material configured to contact the optical fiber and create a flaw on an outer surface thereof during cleaving. | 06-07-2012 |
20120328248 | FIELD TERMINABLE OPTICAL CONNECTOR WITH SPLICE ELEMENT FOR JACKETED CABLE - An LC format optical connector for terminating an optical fiber includes a housing configured to mate with an LC receptacle. A backbone is configured to engage an outer surface of the outer shell of the housing and includes a mounting structure that is configured to engage a boot. A collar body is retained between the outer shell and the backbone and includes a fiber stub disposed in a first portion of the collar body, the fiber stub being mounted in a ferrule. A mechanical splice is disposed in a second portion of the collar body, the mechanical splice configured to splice the fiber stub to the optical fiber. The backbone also includes a fiber jacket clamping portion to clamp a jacket portion that surrounds a portion of the optical fiber upon actuation. | 12-27-2012 |
20140037250 | FIELD INSTALLED OPTICAL FIBER CONNECTOR FOR JACKETED FIBER CABLE AND TERMINATION METHOD - An optical fiber connector includes a housing configured to mate with a receptacle, a collar body that includes a fiber stub and a mechanical splice device, a backbone to retain the collar body within the housing, and a boot. The backbone includes a cable jacket clamping portion to clamp a cable jacket that surrounds a portion of the terminated optical fiber upon actuation. The boot actuates the cable jacket clamping portion of the backbone upon attachment to the backbone. A method for terminating the optical fiber in the field includes slitting or removing a portion of the cable jacket prior to splicing the optical fiber to the fiber stub. The method also includes utilizing a protective sheath or tube to protect exposed portion of the fiber cable and provide structural integrity to the optical connector. | 02-06-2014 |
Patent application number | Description | Published |
20090319435 | SECURE TRANSACTION PERSONAL COMPUTER - A personal computer is provided comprising a network communication interface configured to communicate with the Internet. The computer further includes a memory device configured to store information and computer-executable program code. The computer further includes a processor operatively coupled to the network communication interface and the memory device. The processor and the computer-executable program code are both configured to provide enhanced security features for safeguarding financial transactions conducted over the Internet and for safeguarding non-public information stored in the memory from being retrieved over the Internet by an unauthorized entity. The computer further includes indicia attached to the computer. The indicia is visible to a potential user of the computer and is configured to portray to the potential user of the computer that the computer is specifically designed and built to provide increased security for financial transactions handled over the Internet. | 12-24-2009 |
20100169202 | SECURE PLATFORMS FOR FINANCIAL TRANSACTION APPLICATIONS - Systems, methods, and computer program products are provided for a secure platform for conducting financial institution transactions. A game console platform is defined that provides for both individual customers and business customers to conduct financial transactions while ensuring higher integrity and confidentiality of the customer's transactions. Additionally, the platform provides for greater user-interface functionality and a heightened user experience. | 07-01-2010 |
20100169659 | GAMING CONSOLE-SPECIFIC USER AUTHENTICATION - Systems, methods, and computer program products are provided for user authentication required for conducting online financial institution transactions. The disclosed embodiments leverage the capabilities of platforms other than conventional personal computers and laptops, such as gaming consoles and wireless devices. Unique intrinsic user activities, such as controller motions or activities, built-in hardware signatures or other input data associated with a gaming console are used as the authentication mechanism, so as to provide a higher degree of security in the overall authentication process by lessening the likelihood of password replication or interception during network communication. | 07-01-2010 |
Patent application number | Description | Published |
20110185417 | Memory Whitelisting - An enhanced whitelisting module associated within a system whitelists unknown files for execution on the system. The whitelisting module may oversee the computation of a hash of a file loaded into the memory and comparison of the hash to hashes within a hash table generated from clean files located on a clean system. The whitelisting module may communicate to a device internal and/or external to the system to retrieve the hash table of clean files. In certain embodiments, a rolling hash (or other piecewise hash) may be used to determine the location and/or extent of the differences between a modified file and a clean file. | 07-28-2011 |
20110219059 | COMPLIANCE TOOL - Described herein are apparatuses, methods, and computer program products for changing an out of compliance client device into a client device that is in compliance utilizing a compliance tool. In some embodiments of the invention the compliance tool identifies the location of the out of compliance client device, determines why the client device is out of compliance, brings the client device into compliance, and modifies the client device to allow it to access the network. In other embodiments of the invention the compliance tool is a compliance agent, wherein at a least a part of the compliance agent is uploaded on the client device. The compliance agent periodically checks the client device to determine if the client device has been brought into compliance, and when it is brought into compliance the compliance agent modifies the client device to allow it to access the network, and is then uninstalled from the client device. | 09-08-2011 |
20110219103 | QUARANTINE TOOL - Described herein are apparatuses, methods, and computer program products for quarantining an out of compliance client device from other client devices on a network. Quarantining the out of compliance client device prevents the out of compliance device from corrupting other client devices on the network. For example, in operation, embodiments of the present invention involve: (1) receiving identification and location information for an out of compliance client device; (2) running a tool that utilizes the identification and location information to access the out of compliance device; (3) using the tool to modify the out of compliance device such that the out of compliance client device broadcasts a request for configuration information to which a network server is programmed to respond with configuration information associated with an isolated network; and (4) using the tool to cause the out of compliance client device to logout of the network. When the device logs back into the network, the network server responds by directing the device to the isolated network. | 09-08-2011 |