A61G17/044

Reusable metal casket
09872809 · 2018-01-23 ·

A reusable metal casket is configured to receive a tray supporting the deceased. The casket includes a base, having a head end, a first side, a second side, and a foot end, and a lid. The lid is rotatably coupled to the first side or the second side. The foot end is rotatable relative to a bottom of the casket to enable insertion and removal of the tray. The head end and the foot end include curved corners. Accordingly, the interfaces between the head end and the foot end and the first side and the second side are formed separately from the curved corners.

REUSABLE METAL CASKET
20180000678 · 2018-01-04 ·

A reusable metal casket is configured to receive a tray supporting the deceased. The casket includes a base, having a head end, a first side, a second side, and a foot end, and a lid. The lid is rotatably coupled to the first side or the second side. The foot end is rotatable relative to a bottom of the casket to enable insertion and removal of the tray. The head end and the foot end include curved corners. Accordingly, the interfaces between the head end and the foot end and the first side and the second side are formed separately from the curved corners.

Performing Rule-Based Actions Based on Accessed Domain Name Registrations
20170359371 · 2017-12-14 ·

Domain names are determined for each computational event in a set, each event detailing requests or posts of webpages. A number of events or accesses associated with each domain name within a time period is determined. A registrar is further queried to determine when the domain name was registered. An object is generated that includes a representation of the access count and an age since registration for each domain names. A client can interact with the object to explore representations of domain names associated with high access counts and recent registrations. Upon determining that a given domain name is suspicious, a rule can be generated to block access to the domain name.

Blocking domain name access using access patterns and domain name registrations
09756068 · 2017-09-05 · ·

Domain names are determined for each computational event in a set, each event detailing requests or posts of webpages. A number of events or accesses associated with each domain name within a time period is determined. A registrar is further queried to determine when the domain name was registered. An object is generated that includes a representation of the access count and an age since registration for each domain names. A client can interact with the object to explore representations of domain names associated with high access counts and recent registrations. Upon determining that a given domain name is suspicious, a rule can be generated to block access to the domain name.

Casket Assembly
20170209326 · 2017-07-27 ·

A casket assembly includes a base and a first side panel and a second side panel configured to be partially received within the base. The casket assembly also includes a first rail fixedly coupled to an inside of the first side panel and a second rail fixedly coupled to an inside of the second side panel. The casket assembly further includes a lid configured to be supported by the first rail and the second rail. The first side panel forms at least a first portion of a head end of the casket assembly and a first side of the casket assembly. The second side panel forms at least a first portion of the foot end of the casket assembly, and a second side of the casket assembly.

BLOCKING DOMAIN NAME ACCESS USING ACCESS PATTERNS AND DOMAIN NAME REGISTRATIONS
20170208089 · 2017-07-20 ·

Domain names are determined for each computational event in a set, each event detailing requests or posts of webpages. A number of events or accesses associated with each domain name within a time period is determined. A registrar is further queried to determine when the domain name was registered. An object is generated that includes a representation of the access count and an age since registration for each domain names. A client can interact with the object to explore representations of domain names associated with high access counts and recent registrations. Upon determining that a given domain name is suspicious, a rule can be generated to block access to the domain name.

Security threat detection using access patterns and domain name registrations
09648037 · 2017-05-09 · ·

Domain names are determined for each computational event in a set, each event detailing requests or posts of webpages. A number of events or accesses associated with each domain name within a time period is determined. A registrar is further queried to determine when the domain name was registered. An object is generated that includes a representation of the access count and an age since registration for each domain names. A client can interact with the object to explore representations of domain names associated with high access counts and recent registrations. Upon determining that a given domain name is suspicious, a rule can be generated to block access to the domain name.

Casket system including rollers and height adjustment mechanism
09597248 · 2017-03-21 · ·

A casket system includes a casket container and a height adjustment mechanism. The casket container has a bottom, a head end panel, a foot end panel, and rollers supported by the bottom. The height adjustment mechanism includes a threaded shaft, a worm nut, and a crossbar. The threaded shaft extends at least partly in the vertical direction. The shaft is rotatably coupled to the casket container proximate the head end panel. The worm nut is rigidly secured to the crossbar. The worm nut rotatably engages the threaded shaft and translates rotational movement into axial movement along the shaft. The crossbar includes spaced-apart extensions extending from an edge thereof away from the head end panel. The spaced-apart extensions are configured to contact and engage a casket insert that is sized and configured to receive a deceased. The axial movement of the worm nut causes the crossbar to move vertically with respect to the head end panel.

Environmentally Friendly and Quickly Assembled Flat Pack Coffin
20250082533 · 2025-03-13 ·

The invention provides a flat-pack coffin made of environmentally friendly materials, the coffin comprising a lid, left- and right-hand side panels, head and foot end panels and a base assembly, wherein each right- and left-hand side panel independently has a top edge, a bottom edge, a head end edge and a foot end edge, each side panel independently being provided with a plurality of downwardly extending locking protrusions on the bottom edge for insertion into the base assembly and a slot on each end edge for accepting a connector from an end panel; wherein each foot and head end panel independently has a top edge, a bottom edge, an interior face and an exterior face, each end panel independently being provided with a plurality of downwardly extending protrusions on the bottom edge for insertion into the base assembly and connectors on the interior face for insertion into the slots in the side panels so as to secure the end panels to the side panels; and wherein the base assembly comprises a layer of base slats, and a padded layer on top of the base slat layer to form a resting surface for a corpse, wherein the resting surface has upstanding edges defining a rim around the perimeter thereof, the rim having a first plurality of apertures for accepting the downwardly extending protrusions of the end panels and a second plurality of apertures for accepting the locking protrusions of the side panels so as to secure the side panels to the base assembly.

SECURITY THREAT DETECTION USING ACCESS PATTERNS AND DOMAIN NAME REGISTRATIONS
20170034206 · 2017-02-02 ·

Domain names are determined for each computational event in a set, each event detailing requests or posts of webpages. A number of events or accesses associated with each domain name within a time period is determined. A registrar is further queried to determine when the domain name was registered. An object is generated that includes a representation of the access count and an age since registration for each domain names. A client can interact with the object to explore representations of domain names associated with high access counts and recent registrations. Upon determining that a given domain name is suspicious, a rule can be generated to block access to the domain name.