会员体验
专利管家(专利管理)
工作空间(专利管理)
风险监控(情报监控)
数据分析(专利分析)
侵权分析(诉讼无效)
联系我们
交流群
官方交流:
QQ群: 891211   
微信请扫码    >>>
现在联系顾问~
热词
    • 3. 发明授权
    • Spring biasing locking mechanism for step and repeat motors
    • 用于步进和重复电机的弹簧偏置锁定机构
    • US07471030B2
    • 2008-12-30
    • US11682128
    • 2007-03-05
    • David S. BennettJeffrey S. N. Paine
    • David S. BennettJeffrey S. N. Paine
    • H02N2/00H01L41/083H01L41/09
    • H02N2/023H02N2/101
    • A spring biasing locking mechanism is provided for a step and repeat motor. The motor includes a base having a channel, an output member in the channel, at least one translator drive element and first and second clamping elements. The spring biasing locking mechanism includes a locking structure joined to the base by a hinge. The locking structure spans both clamping elements. A spring biases the locking structure toward the channel so that the spring force is transmitted to the two clamping elements. The spring biased locking mechanism accommodates wear of the device, accommodates thermal expansion of the motor components, provides a limit on clamping force and provides a zero power hold condition.
    • 为步进电机和重复电机提供弹簧偏置锁定机构。 马达包括具有通道的基座,通道中的输出构件,至少一个转换器驱动元件以及第一和第二夹紧元件。 弹簧偏置锁定机构包括通过铰链连接到基座的锁定结构。 锁定结构跨越两个夹紧元件。 弹簧将锁定结构偏压到通道,使得弹簧力传递到两个夹紧元件。 弹簧偏压的锁定机构适应装置的磨损,适应电动机部件的热膨胀,提供夹紧力的限制并提供零功率保持条件。
    • 4. 发明申请
    • USER COMMUNICATION RESTRICTIONS
    • 用户通信限制
    • US20080005325A1
    • 2008-01-03
    • US11427193
    • 2006-06-28
    • Roger H. WynnTimothy A. GillPeter M. WiestDavid S. BennettStan D. PenningtonAaron Culbreth
    • Roger H. WynnTimothy A. GillPeter M. WiestDavid S. BennettStan D. PenningtonAaron Culbreth
    • G06F15/173
    • G06Q10/107
    • Communications provided via e-mail, instant messaging, chat, and web-based telephony applications, are monitored and restricted at a computer host. In one approach, messages from unknown or unsafe senders are intercepted and stored in a location inaccessible to all but an authorized person, until they can be reviewed by the authorized person, such as a parent. Via a user interface, the authorized user can review the messages at a later time to determine if the intended recipient, such as a child, should be able to access them. Once access is authorized, the stored messages are retrieved and provided to the recipient. In another aspect, a shared allow/block contact list identifies a user having different user names from one or more service providers. The contact list can integrate users from different services and communication modes. In another aspect, notification of monitoring is provided in the monitored messages or in newly generated messages.
    • 通过电子邮件,即时消息,聊天和基于Web的电话应用程序提供的通信在计算机主机上被监视和限制。 在一种方法中,来自未知或不安全的发件人的消息被截取并存储在除被授权人员之外的所有人不可访问的位置,直到被授权人员(如父母)进行审核。 通过用户界面,授权用户可以稍后查看消息,以确定预期的接收者(如小孩)是否应该能够访问它们。 一旦访问被授权,存储的消息被检索并提供给接收者。 在另一方面,共享允许/阻止联系人列表从一个或多个服务提供者识别具有不同用户名的用户。 联系人列表可以整合来自不同服务和通信模式的用户。 在另一方面,在所监视的消息或新生成的消息中提供监视通知。