Patent classifications
A61G17/04
Removable customizable casket panel
Caskets, cap panel assemblies for a casket, and methods for manufacturing cap panel assemblies are described. A casket may include a casket shell, at least one casket cap pivotally mounted on the casket shell, and a cap panel assembly mounted in the at least one casket cap. The cap panel assembly may include a cap panel, a puffing member attached to each edge of the cap panel, a cap panel insert positioned in-line with the cap panel, and a plurality of resilient members positioned on a front face of the cap panel insert. The plurality of resilient members may be tensioned, for example, to hold keepsakes, memorabilia, or other types of objects on or in the cap panel insert. The cap panel insert can include a mounting bracket or a screw and wire assembly for mounting the cap panel insert on a wall.
Lightweight casket assembly with side panel rails
A casket assembly includes a base, and first and second fabric sheets. The base includes a bottom panel, first and second side panels, and first and second end panels. The base has a length and a width sized and adapted to receive a deceased. The first fabric sheet is operably coupled to the base such that the first fabric sheet extends along and adjacent to an inside surface of the first side panel and an edge of the first fabric sheet is movable. The first fabric sheet is sized and coupled to substantially cover a width of the bottom panel. The second fabric sheet is operably coupled to the base such that the second fabric sheet extends along and adjacent to an inside surface of the second side panel and an edge of the second fabric sheet is movable. The second fabric sheet is sized to substantially cover the width of the bottom panel.
CASKET ORNAMENT ATTACHMENT MECHANISM
A combination casket and ornament comprises a casket shell having a pair of keyhole-shaped grooves in a corner thereof, an L-shaped adapter having a leg and a foot, the leg having a pair of studs on a rear side thereof each of which is received in a respective one of the keyhole-shaped grooves, and a decorative ornament that is three-dimensional an entire 360 degrees about a vertical axis of the ornament, the ornament positioned on the foot of the L-shaped adapter.
Casket ornament attachment mechanism
A combination casket and ornament comprises a casket shell having a pair of keyhole-shaped grooves in a corner thereof, an L-shaped adapter having a leg and a foot, the leg having a pair of studs on a rear side thereof each of which is received in a respective one of the keyhole-shaped grooves, and a decorative ornament that is three-dimensional an entire 360 degrees about a vertical axis of the ornament, the ornament positioned on the foot of the L-shaped adapter.
Burial vault system and method
Disclosed is a system and method for accessing a burial vault after burying the burial vault to place remains of a second individual within the burial vault.
Burial vault system and method
Disclosed is a system and method for accessing a burial vault after burying the burial vault to place remains of a second individual within the burial vault.
CASKET HARDWARE ATTACHMENT STRUCTURE
Hardware for a casket comprises a clevis having a pair of side walls, a back wall adapted to be attached to the casket shell wall, a pair of tabs each of which extends laterally outwardly from a respective one of the side walls and each of which is spaced forwardly from the rear wall, an arm pivoted at an upper end to the clevis, and a decorative ear having a downwardly facing recess in a lower edge thereof and a pair of tapered resilient arms each of which is located on a respective side of the recess, each resilient arm having a laterally inwardly projecting tab on a lower free end thereof, each resilient arm becoming progressively thicker from the free end toward a base thereof as measured in a direction generally normal to the casket shell wall.
CASKET HARDWARE ATTACHMENT STRUCTURE
Hardware for a casket comprises a clevis having a pair of side walls, a back wall adapted to be attached to the casket shell wall, a pair of tabs each of which extends laterally outwardly from a respective one of the side walls and each of which is spaced forwardly from the rear wall, an arm pivoted at an upper end to the clevis, and a decorative ear having a downwardly facing recess in a lower edge thereof and a pair of tapered resilient arms each of which is located on a respective side of the recess, each resilient arm having a laterally inwardly projecting tab on a lower free end thereof, each resilient arm becoming progressively thicker from the free end toward a base thereof as measured in a direction generally normal to the casket shell wall.
Performing rule-based actions for newly observed domain names
Domain names are determined for each computational event in a set, each event detailing requests or posts of webpages. A number of events or accesses associated with each domain name within a time period is determined. A registrar is further queried to determine when the domain name was registered. An object is generated that includes a representation of the access count and an age since registration for each domain names. A client can interact with the object to explore representations of domain names associated with high access counts and recent registrations. Upon determining that a given domain name is suspicious, a rule can be generated to block access to the domain name.
Performing rule-based actions for newly observed domain names
Domain names are determined for each computational event in a set, each event detailing requests or posts of webpages. A number of events or accesses associated with each domain name within a time period is determined. A registrar is further queried to determine when the domain name was registered. An object is generated that includes a representation of the access count and an age since registration for each domain names. A client can interact with the object to explore representations of domain names associated with high access counts and recent registrations. Upon determining that a given domain name is suspicious, a rule can be generated to block access to the domain name.