1
Vincent Le Chevalier
Vincent Le Chevalier, Charles F Geiger, James R Kellas: Automated document conversion testing. Chegg, Fenwick & West, June 30, 2015: US09069732 (1 worldwide citation)

Embodiments of the invention provide a system for automated document conversion testing. For each page in the received documents, the system first converts the page into a source image. The system then converts the document page into a set of markup language page elements and generates a rendered im ...


2
Taro Ikeda, Yuki Osada, Shigeru Kasai: Electromagnetic-radiation power-supply mechanism for exciting a coaxial waveguide by using first and second poles and a ring-shaped reflection portion. Tokyo Electron, Oblon McClelland Maier & Neustadt L, June 30, 2015: US09072158 (48 worldwide citation)

An electromagnetic-radiation power-supply mechanism includes a microwave power introduction port provided on the side of the coaxial waveguide, a power line being connected to the microwave power introduction port; and a power supply antenna for radiating the electromagnetic wave power into the wave ...


3
Nurettin Burcak Beser: Systems and methods for fractional routing redundancy. Telsima Corporation, Sheppard Mullin Richter & Hampton, June 30, 2015: US09071498 (42 worldwide citation)

Systems and methods for fractional routing are described. An exemplary method may include receiving, by a first router, data information regarding routing by a first portion of a third router, receiving, by a second router, data information regarding routing by a second portion of a third router, wh ...


4
Susan Corcoran: Method of programming a symbol reading system. Hand Held Products, Additon Higgins & Pendleton P A, June 30, 2015: US09070032 (39 worldwide citation)

A method of programming a symbol reading system having a field of view includes selecting a programming command from a list of programming commands for programming a symbol reading system. The list of programming commands is typically stored on a computer that includes a processor configured for, in ...


5
Ashar Aziz, Wei Lung Lai, Jayaraman Manni: System and method for malware containment. FireEye, Rutan & Tucker, William W Schaal, June 30, 2015: US09071638 (37 worldwide citation)

Systems and methods for malware containment on connection is provided. In exemplary embodiments, digital devices are quarantined for a predetermined period of time upon connection to the communication network. When a digital device is quarantined, all network data transmitted by the digital device i ...


6
Steven E Morris, James M Kushner, Victoria L Enyedy, Jennifer P Lawall, Piotr J Ogonek: Elastic retaining arrangement for jointed components and method of reducing a gap between jointed components. GM Global Technology Operations, Cantor Colburn, June 30, 2015: US09067625 (29 worldwide citation)

A retaining arrangement includes a first component having a first main body portion and a first interface edge. Also included is a second component operatively coupled to the first component, the second component comprising a second main body portion, a second interface edge in contact with the firs ...


7
Ryan J Schoenefeld, Robert C Gutierrez, Philip A Mellinger: Patient-specific sacroiliac guides and associated methods. Biomet Manufacturing, Harness Dickey, June 30, 2015: US09066734 (26 worldwide citation)

A patient-specific alignment guide includes a patient-specific portion and a guiding element having a through opening. The patient-specific portion has a patient-specific surface preoperatively configured to mate as a negative of a portion of an iliac crest of a pelvis of a specific patient and mate ...


8
Lyle W Paczkowski, William M Parsel, Carl J Persson, Matthew C Schlesener: Method for enabling hardware assisted operating system region for safe execution of untrusted code using trusted transitional memory. Sprint Communications Company, June 30, 2015: US09069952 (23 worldwide citation)

An electronic device. The device comprises an anti-trusted-security-zone in the trusted security zone that, when installed and managed by the trusted security zone manager, places non-trusted applications into the anti-trusted-security-zone for execution, restricts access of the non-trusted applicat ...


9
Harm Cronie: Multiply accumulate operations in the analog domain. KANDOU LABS, Invention Mine LCC, June 30, 2015: US09069995 (23 worldwide citation)

Fixed capacitive circuits are described which perform arithmetical summation operations over sets of scaled analog values, where the constant parameters of the summations and scaling multiplications are formed as ratios of circuit element values. The passive nature of the design can enable efficient ...


10
Assaf Natanzon, Jehuda Shemer: Dynamic granularity in data replication. EMC International Company, Daly Crowley Mofford & Durkee, June 30, 2015: US09069709 (22 worldwide citation)

In one aspect, a method includes sending a snapshot of a primary volume to a replica site, determining if a bandwidth is available to send changes in the primary volume to the replica site to allow any point in time recovery of data in the primary volume and sending the changes from the primary volu ...



Click the thumbnails below to visualize the patent trend.