Beverage container lid and beverage container using same

    公开(公告)号:US12194423B2

    公开(公告)日:2025-01-14

    申请号:US18144130

    申请日:2023-05-05

    Abstract: A lid usable with a beverage container and a refillable reservoir positioned within the container. The lid has a mixing chamber, an additive passageway extending between the mixing chamber and the reservoir, and a beverage passageway extending between the mixing chamber and the container. A slider gate is movable between a first position closing communication between the additive passageway and the mixing chamber, but providing communication between the beverage passageway and the mixing chamber, a second position providing communication between the additive passageway and the mixing chamber, and between the beverage passageway and the mixing chamber, and a third position providing communication between the additive passageway and the mixing chamber, but closing communication between the beverage passageway and the mixing chamber. The second position comprises a plurality of selectable second gate positions, with each providing a different ratio of the permitted flow of additive and beverage to the mixing chamber.

    Identity token for accessing computing resources

    公开(公告)号:US12192358B1

    公开(公告)日:2025-01-07

    申请号:US17478499

    申请日:2021-09-17

    Inventor: Rameez Loladia

    Abstract: A technology is described for device communication with computing regions. An example method may include receiving at a first computing region a request for a computing resource. In response to receiving the request, a device associated with the request may be authenticated using authentication credentials for the device. An identity token that indicates permission for the device to access the computing resource in a second computing region may be generated and the identity token and instructions to connect to the second computing region may be provided to the device. The device may present the identity token to the second computing region in order to access the computing resource in the second computing region.

    Point-in-time restore with delayed instantiation

    公开(公告)号:US12189656B1

    公开(公告)日:2025-01-07

    申请号:US16201774

    申请日:2018-11-27

    Abstract: A system responds to a request to enable a restoration capability for a first database instance of a first operating environment. The system stores, in the first operating environment, transaction data for the first database instance and data indicative of aspects of the configuration of the first operating environment on which the first database instance is dependent. The transaction data and configuration data are replicated to a second environment. In response to a request to restore the first database instance, a second operating environment is configured according to the replicated configuration data, and the data is restored to a second database instance, in the second operating environment, based on the replicated transaction data.

    Minimal configuration and priority-based frugal throttling solution

    公开(公告)号:US12182623B1

    公开(公告)日:2024-12-31

    申请号:US16216691

    申请日:2018-12-11

    Abstract: A computing system may detect that a service, which receives a plurality of task requests associated with clients or profiles, is under duress based on performance information associated with the service. The computing system, responsive to detecting that the service is under duress, may successively, until the service is detected to not be under duress, select a profile based on a respective volume of requests associated with the profile, apply a task request limit to the profile, and detect whether the service is still under duress.

    Securing blockchain transaction based on undetermined data

    公开(公告)号:US12177364B2

    公开(公告)日:2024-12-24

    申请号:US18199822

    申请日:2023-05-19

    Inventor: Ying Chan

    Abstract: A technique for locking a blockchain transaction based on undetermined data, using a blockchain network. A locking node may include a locking script in a blockchain transaction to lock a digital asset. The locking script includes a public key for a determined data source and instructions to cause a validating node executing the locking script to verify the source of data provided in an unlocking script by: a) generating a modified public key based on the public key for the determined data source and based on data defined in the unlocking script; and b) evaluating a cryptographic signature in the unlocking script based on the modified public key. The blockchain transaction containing the locking script is sent by the locking node to the blockchain network. The lock may be removed using a cryptographic signature generated from a private key modified based on the data.

    Authentication provider discovery
    10.
    发明授权

    公开(公告)号:US12170666B1

    公开(公告)日:2024-12-17

    申请号:US16143307

    申请日:2018-09-26

    Abstract: A system receives an authentication request from a requestor system for a token to access one or more computing resources associated with a computing resource service provider. The system analyzes information included with the authentication request and, based on the information included with the authentication request, selects an authentication provider from a plurality of authentication providers without additional input from the requestor system. The requestor system is redirected to the selected authentication provider such that the token is provided in response to the authentication request. The requestor system then presents the token to obtain an identity assertion that can be used to access the one or more computing resources.

Patent Agency Ranking