Kenneth W. Conley - Mountain View CA, US Dirk Balfanz - Menlo Park CA, US Bryan A. Pendleton - Menlo Park CA, US Diana K. Smetters - San Francisco CA, US Glenn E. Durfee - San Francisco CA, US
Assignee:
Palo Alto Research Center Incorporated - Palo Alto CA
International Classification:
H04K 1/00 H04L 9/00
US Classification:
380 33, 380270, 713150, 713168
Abstract:
A method for establishing a secondary communication channel between at least two computing devices over a network medium through use of a primary channel connects a first computing device with a first telephonic unit and a second computing device with a second telephonic unit. If the two telephonic units are in communication with each other over a primary channel, and communication channels are established between the computing devices and their respective telephonic units, then the first computing device transmits its location information to the second computing device over the primary channel. A connection is then established between the second computing device and the first computing device over a secondary communication channel.
Kenneth A. Conley - Laplata MD, US Raymond M. Gamache - King George VA, US Jason T. Drotar - King George VA, US
Assignee:
The United States of America as represented by the Secretary of the Navy - Washington DC
International Classification:
F42B 12/22 H04B 1/034
US Classification:
102293, 102494, 102509, 455 98
Abstract:
A shock-triggered warhead fragment transmitter is described. The transmitter is designed to radiate a pulse upon either detonation of the warhead or impact of the fragment with the target. The pulse energy is obtained by shock de-poling of a ferroelectric material and is radiated using a dipole antenna. Detection of the radiated pulses may be used to confirm detonation of the warhead and determine the time and location of the detonation and facilitate battle damage assessment.
System And Method For Establishing Secondary Channels
Kenneth W. Conley - Mountain View CA, US Dirk Balfanz - Menlo Park CA, US Bryan A. Pendleton - Menlo Park CA, US Diana K. Smetters - San Francisco CA, US Glenn E. Durfee - San Francisco CA, US
Assignee:
Palo Alto Research Center Incorporated - Palo Alto CA
International Classification:
H04L 9/32
US Classification:
380 33, 713168, 713169, 709227, 709228
Abstract:
A method for establishing a secondary communication channel between at least two computing devices over a network medium through use of a primary channel connects a first computing device with a first telephonic unit and a second computing device with a second telephonic unit. If the two telephonic units are in communication with each other over a primary channel, and communication channels are established between the computing devices and their respective telephonic units, then the first computing device transmits its location information to the second computing device over the primary channel. A connection is then established between the second computing device and the first computing device over a secondary communication channel.
Systems And Methods For Authenticating Communications In A Network Medium
Dirk Balfanz - Redwood City CA, US Diana Smetters - Belmont CA, US Kenneth Conley - Mountain View CA, US Bryan Pendleton - Menlo Park CA, US Steve Cousins - San Jose CA, US
Assignee:
Palo Alto Research Center Incorporated - Palo Alto CA
A system and method for sharing files securely includes server software on a first device configured to communicate with server software operating on one or more other preauthorized devices, such as a second device. The servers communicate with each other securely using cryptographic information exchanged during a preauthorization phase using a range-limited communication channel. The server on the first device obtains file information from the other preauthorized device(s) and combines the information with local file information from the first device. This combined file information is sent to client software operating on the machine, which presents the combined file information to users.
Systems And Methods For Authenticating Communications In A Network Medium
Diana Smetters - San Francisco CA, US Kenneth Conley - Mountain View CA, US Bryan Pendleton - Menlo Park CA, US Glenn Durfee - San Francisco CA, US Steve Cousins - San Jose CA, US Dirk Balfanz - Menlo Park CA, US Hadar Shemtov - Palo Alto CA, US
Assignee:
PARC INC. - Palo Alto CA
International Classification:
H04L009/00 G06F011/30
US Classification:
380277000, 713163000, 713201000
Abstract:
A location-limited channel is implemented using physical exchanges of physical tokens. The physical tokens are implemented using writeable or re-writeable storage media. Location-limited channels, when used to implement pre-authentication protocols, provide demonstrative identification and authenticity. A group originator loads pre-authentication information and a network location from a communication device onto the location-limited physical token channel. The location-limited physical token channel is passed to another participant, who copies the originator's pre-authentication information and location onto that participant's communication device. That participant then adds that participant's own pre-authentication information and network location onto the location-limited physical token channel. This is repeated until the last participant passes the location-limited physical token channel back to the group originator. The originator thus has pre-authentication information and network locations for all other participants. The originator establishes secure communications with each participant based on the originator' and that participant's shared information.
A computer-implemented method includes determining interesting moments in a video. The method further includes generating video segments based on the interesting moments, wherein each of the video segments includes at least one of the interesting moments from the video. The method further includes generating a collage from the video segments, where the collage includes at least two windows and wherein each window includes one of the video segments.
- Mountain View CA, US Matthias GRUNDMANN - San Jose CA, US Kenneth CONLEY - Mountain View CA, US
Assignee:
Google Inc. - Mountain View CA
International Classification:
G11B 27/034 G11B 27/34 G11B 27/28
Abstract:
A computer-implemented method includes determining interesting moments in a video. The method further includes generating video segments based on the interesting moments, wherein each of the video segments includes at least one of the interesting moments from the video. The method further includes generating a collage from the video segments, where the collage includes at least two windows and wherein each window includes one of the video segments.
Eugene Cross Elementary School Marion NC 1970-1974
Community:
Goddard Arrowood, Gary Cox, Kathy Early, David Raffield, Addie Smith, Della Waycaster, Marianne Bradburn, Louane Coward, Joseph Davis, Glenn Wilson, Thomas Mcgalliard
The FBI says surveillance footage from a camera nearby shows Kenneth Conley and Joseph Banks getting into a cab at around 2:45 a.m. Tuesday. That's about four hours before workers spotted the rope dangling from the federal jail.
The FBI said surveillance footage from a camera near the Metropolitan Correction Center shows Kenneth Conley and Joseph Banks getting into a cab at about 2:45 a.m. Thursday about two hours after guards were supposed to do a bed check and four hours before workers spotted the rope dangling from the
Date: Dec 19, 2012
Category: U.S.
Source: Google
Two bank robbers escape Chicago jail by scaling 15 stories down a rope ...
m. on Tuesday, staff at the Metropolitan Correctional Center in downtown Chicago realized that cellmates Joseph Jose Banks, 37, and Kenneth Conley, 38, were missing. After searching the premises, authorities noticed that a long knotted rope, reportedly made out of bed sheets, was dangling from the
Date: Dec 19, 2012
Category: U.S.
Source: Google
Wanted Tinley Park man once threatened to shoot teller during bank robbery
Kenneth Conley was awaiting his sentencing at the Metropolitan Correctional Center for robbing the Homewood bank on May 13, 2011. He stole $3,969 from an MB Financial Bank branch inside the Walts Food Center at 2345 W. 183rd St.
Two convicted bank robbers, 37-year-old Jose Banks and 38-year-old Kenneth Conley, were discovered missing. According to the complaint affidavit, Banks and Conley were cellmates and were present during a physical head count at 10 p.m. Monday.
Banks and another man, Kenneth Conley, were last seen during a head count of prisoners at 10 p.m. Monday. FBIofficials said surveillance video showed them getting into a cab on Michigan Avenue nearly five hours later.
Police helicopters and canine units swarmed the area, but not until more than three hours after Joseph "Jose" Banks and Kenneth Conley went unaccounted for during a 5 a.m. headcount, U.S. Marshal's Service spokeswoman Belkis Cantor said.
Date: Dec 19, 2012
Category: U.S.
Source: Google
SWAT teams burst into Tinley Park home in search for prison escapees
The inmates, who shared the same cell, are Jose Banks, the so-called Secondhand Bandit who was convicted last week of four bank heists, and Kenneth Conley, a former strip club floor host who pleaded guilty in October to robbing about $4,000 from a bank in Homewood.