Patents by Inventor Daniel Bailey

Daniel Bailey has filed for patents to protect the following inventions. This listing includes patent applications that are pending as well as patents that have already been granted by the United States Patent and Trademark Office (USPTO).

  • Publication number: 20100082127
    Abstract: An object can be used in an industrial control configuration in relation to performing a function or task. Matching can occur such that an object with operational requirements can bind with a host that has capabilities that meet those operational requirements—matching can occur automatically as well as through user operation. Once matched, different functionality can be presented to a user pertaining to the object. To assist the user, the object can include external references, logic, local or private data, as well as others in addition to resources. To facilitate operation, capabilities and resources can be published in a directory that can be accessed by different entities—sometimes with security constraints in order to protect configuration integrity. Likewise, a subscription system can be employed such that when a change to a related entity is made, a notice can transfer to related entities and operation can alter based upon the change.
    Type: Application
    Filed: September 30, 2008
    Publication date: April 1, 2010
    Applicant: ROCKWELL AUTOMATION TECHNOLOGIES, INC.
    Inventors: Kenneth Scott Plache, Daniel Bailey Seger, Raymond John Staron, Taryl Jon Jasper, James Harry Jarrett, Russell William Brandes, Ronald Eric Bliss, Michael Dan Kalan, Subbian Govindaraj, Kenwood Henry Hall, Douglas James Reichard, Robert John Kretschmann
  • Patent number: 7665119
    Abstract: A method, of automatically determining one or more remediations for a device that includes a processor, may include: receiving values of a plurality of parameters which collectively characterize an operational state of the device, there being at least one policy associated with at least a given one of the plurality of parameters, policy defining as a condition thereof one or more potential values of, or based upon, the given parameter, satisfaction of the condition potentially being indicative of unauthorized activity or manipulation of the device; automatically determining, from the received parameter values, whether the conditions for any policies are satisfied, respectively; and automatically selecting one or more remediations for the device according to the satisfied policies, respectively.
    Type: Grant
    Filed: September 3, 2004
    Date of Patent: February 16, 2010
    Assignee: Secure Elements, Inc.
    Inventors: Daniel Bailey Bezilla, John Leonard Immordino, James Le Ogura
  • Publication number: 20100026018
    Abstract: A lock knob for covering an end of a lock rod protruding through a door of a motor vehicle is disclosed herein. The lock knob includes a first knob portion. The lock knob also includes a second knob portion. The lock knob also includes a multi-stage locking structure operable to engage the first knob portion and the second knob portion together in a first configuration. When the first and second knob portions are in the first configuration, the end of the lock rod can be slidably received between the first knob portion and the second knob portion. The multi-stage locking structure is also operable to engage the first knob portion and the second knob portion together in a second configuration. When the first and second knob portions are in the second configuration, the lock rod is fixed relative to the first knob portion and to the second knob portion.
    Type: Application
    Filed: July 31, 2008
    Publication date: February 4, 2010
    Inventors: Charles Daniel Bailey, Michael Cass, Jeffrey Allen Borchers, Don Stacherski, Thomas Franz Josef Gehring
  • Publication number: 20090177927
    Abstract: A method and system for determining an impact of a failure of a component for one or more services that the component is supporting. A data feed received from a processing node includes data indicative of an identity and system status of a component running on the processing node. The system status of the component identifies whether the component has failed or is active. The one or more services is mapped into a calendar function. After determining that the component supports the one or more services, a lookup in the calendar function is performed to identify a temporal activity and a level of criticality of each service of the one or more services. An impact of the system status of the component on the one or more services is determined from analysis of the identified temporal activity and the identified level of criticality of the one or more services.
    Type: Application
    Filed: March 12, 2009
    Publication date: July 9, 2009
    Inventors: Daniel Bailey, Charlotte Newton, Gary Paul Noble, Maurice James Perks, Andrew Tinsley, Melissa Jane Bailey
  • Patent number: 7536024
    Abstract: A loudspeaker comprising a loudspeaker drive unit being operable to radiate sound in a forward direction and a rearward direction and an enclosure configured to receive sound radiated in the rearward direction. The enclosure comprises a passageway system comprising a plurality of parts of different lengths. Each of the different length parts has an opening, whereby rearward radiated sound induces standing wave resonances of air in the different length parts at different fundamental frequencies.
    Type: Grant
    Filed: May 13, 2005
    Date of Patent: May 19, 2009
    Assignee: Mordaunt-Short Ltd.
    Inventors: Daniel Bailey, Graeme Foy
  • Patent number: 7509518
    Abstract: The invention provides a method for determining the impact of a failure of a component on one or more services that the component is supporting. The method receiving a data feed from a processing node, the data feed containing data indicative of the identity and system status of a component running on the processing node; in response to the identity of the component, first determining if the component supports one or more services; identifying the temporal activity of the one or more services and, in dependence on the determining step, second determining the impact of the system status on the one or more services.
    Type: Grant
    Filed: December 16, 2004
    Date of Patent: March 24, 2009
    Assignee: International Business Machines Corporation
    Inventors: Daniel Bailey, Charlotte Newton, Gary Paul Noble, Maurice James Perks, Andrew Tinsley, Melissa Jane Tongue
  • Publication number: 20080065892
    Abstract: In one aspect, a first processing device, which may be an authentication token, establishes a shared key through a pairing protocol carried out between the first processing device and a second processing device. The pairing protocol also involves communication between the second processing device and an authentication server. As part of the pairing protocol, the first processing device sends identifying information to the second processing device, and the second processing device utilizes the identifying information to obtain the shared key from the authentication server. The first processing device encrypts authentication information utilizing the shared key, and transmits the encrypted authentication information from the first processing device to the second processing device. The second processing device utilizes the shared key to decrypt the encrypted authentication information.
    Type: Application
    Filed: November 13, 2007
    Publication date: March 13, 2008
    Inventors: Daniel Bailey, John Brainard, Ari Juels, Burton Kaliski
  • Publication number: 20080009345
    Abstract: Techniques for providing authentication functionality in a gaming system are disclosed. In one aspect, a gaming system is configured such that, at a given point during a current session of a game in progress that involves at least one user previously granted access by the system to participate in the current session, information available from an authentication token associated with the user is obtained prior to allowing the user to take a particular action in the game. A determination is made as to whether or not the user will be allowed to take the particular action in the game, based on the obtained information. The obtained information may comprise, for example, at least a portion of a one-time password generated by a hardware or software authentication token.
    Type: Application
    Filed: July 9, 2007
    Publication date: January 10, 2008
    Inventors: Daniel Bailey, Burton Kaliski, Ari Juels, Ronald Rivest
  • Publication number: 20070198872
    Abstract: A system, apparatus, and method for a core rationing logic to enable cores of a multi-core processor to adhere to various power and thermal constraints.
    Type: Application
    Filed: March 15, 2007
    Publication date: August 23, 2007
    Inventors: Daniel Bailey, Todd Dutton, Tryggve Fossum
  • Publication number: 20070194889
    Abstract: Enhanced security is provided in an RFID system comprising a plurality of RFID devices and at least one reader which communicates with one or more of the devices. In one aspect of the invention, a first command is transmitted from the reader to write a first data unit to a memory of given one of the RFID devices. A reply is received in the reader from the given RFID device indicating that a second data unit determined based on contents of the first data unit is available in the memory to be accessed by the reader. A second command is transmitted from the reader to the given RFID device to allow the reader to read the memory to thereby obtain the second data unit. The first and second data units comprise information exchanged as part of a cryptographic protocol carried out between the reader and the given RFID device. In an illustrative embodiment, the cryptographic protocol may comprise a challenge-response authentication protocol.
    Type: Application
    Filed: February 5, 2007
    Publication date: August 23, 2007
    Inventors: Daniel Bailey, Ari Juels
  • Publication number: 20070186105
    Abstract: A first processing device, which may be, for example, a wireless authentication token or an RFID tag, transmits information in a wireless network in a manner that emulates standard communications of an access point of the wireless network, although the first processing device is not configured to operate as an actual access point of the wireless network. A second processing device, which may be, for example, a computer or other station of the wireless network, receives the transmitted information and is able to determine therefrom that the information originates from an emulated access point rather than an actual access point. The second processing device responds to this condition by utilizing the transmitted information in a manner distinct from its utilization of similar information received from the actual access point of the wireless network.
    Type: Application
    Filed: February 5, 2007
    Publication date: August 9, 2007
    Inventors: Daniel Bailey, John Brainard, Ari Juels, Burton Kaliski
  • Publication number: 20070061566
    Abstract: In a system comprising a transient storage device (TSD) or other type of peripheral configured for communication with a host device, a first one-time password or other type of code is generated in the peripheral and transmitted to the host device. The first code is presented by the host device to an authentication server for authentication. The host device receives a second one-time password or other type of code from the authentication server and transmits it to the peripheral for authentication.
    Type: Application
    Filed: September 11, 2006
    Publication date: March 15, 2007
    Inventors: Daniel Bailey, John Brainard, Burton Kaliski, Michael Szydlo
  • Publication number: 20060123263
    Abstract: A system, apparatus, and method for a core rationing logic to enable cores of a multi-core processor to adhere to various power and thermal constraints.
    Type: Application
    Filed: January 20, 2006
    Publication date: June 8, 2006
    Inventors: Daniel Bailey, Todd Dutton, Tryggve Fossum
  • Publication number: 20060123264
    Abstract: A system, apparatus, and method for a core rationing logic to enable cores of a multi-core processor to adhere to various power and thermal constraints.
    Type: Application
    Filed: January 20, 2006
    Publication date: June 8, 2006
    Inventors: Daniel Bailey, Todd Dutton, Tryggve Fossum
  • Publication number: 20060117199
    Abstract: A system, apparatus, and method for a core rationing logic to enable cores of a multi-core processor to adhere to various power and thermal constraints.
    Type: Application
    Filed: January 20, 2006
    Publication date: June 1, 2006
    Inventors: Daniel Bailey, Todd Dutton, Tryggve Fossum
  • Publication number: 20060117200
    Abstract: A system, apparatus, and method for a core rationing logic to enable cores of a multi-core processor to adhere to various power and thermal constraints.
    Type: Application
    Filed: January 20, 2006
    Publication date: June 1, 2006
    Inventors: Daniel Bailey, Todd Dutton, Tryggve Fossum
  • Publication number: 20060070805
    Abstract: This invention is a singular unit, designed to work with almost any extension ladder, for the purpose of protecting the surface upon which the ladder is employed form dents, scratches, or marks caused by the bare ends of the ladder rails. It consists of a solid base plate of approximately twelve inches by eighteen inches, on one side of which is fastened by means of adhesive a foam rubber cushion. On the opposite side of which at each end is a means of attaching a nylon strap. These are used opposing each other to attach the unit to the ladder at the top or directly above any rung on the ladder, thereby securing the unit and yet allowing enough flexibility so that the unit will seek its own level against the surface upon which it is employed.
    Type: Application
    Filed: September 17, 2004
    Publication date: April 6, 2006
    Inventors: Daniel Bailey, Robert Campbell
  • Publication number: 20060033608
    Abstract: A proxy device is disclosed for use in an RFID system comprising a plurality of RFID devices and at least one reader which communicates with the proxy device and one or more of the RFID devices. The proxy device acquires information characterizing at least a given one of the RFID devices, controls the given RFID device so as to at least partially prevent the given RFID device from being read by the reader, and communicates with the reader in a manner which simulates the given RFID device. This advantageously allows the proxy device to implement privacy policies of arbitrary sophistication on behalf of the given RFID device. The proxy device subsequently releases control of the given RFID device so as to permit the given RFID device to again be read by the reader.
    Type: Application
    Filed: July 29, 2005
    Publication date: February 16, 2006
    Inventors: Ari Juels, Daniel Bailey
  • Publication number: 20050254681
    Abstract: A loudspeaker comprising a loudspeaker drive unit being operable to radiate sound in a forward direction and a rearward direction and an enclosure configured to receive sound radiated in the rearward direction. The enclosure comprises a passageway system comprising a plurality of parts of different lengths. Each of the different length parts has an opening, whereby rearward radiated sound induces standing wave resonances of air in the different length parts at different fundamental frequencies.
    Type: Application
    Filed: May 13, 2005
    Publication date: November 17, 2005
    Inventors: Daniel Bailey, Graeme Foy
  • Publication number: 20050144188
    Abstract: The invention provides a method for determining the impact of a failure of a component on one or more services that the component is supporting. The method receiving a data feed from a processing node, the data feed containing data indicative of the identity and system status of a component running on the processing node; in response to the identity of the component, first determining if the component supports one or more services; identifying the temporal activity of the one or more services and, in dependence on the determining step, second determining the impact of the system status on the one or more services.
    Type: Application
    Filed: December 16, 2004
    Publication date: June 30, 2005
    Applicant: International Business Machines Corporation
    Inventors: Daniel Bailey, Charlotte Newton, Gary Noble, Maurice Perks, Andrew Tinsley, Melissa Tongue