Patents by Inventor Steven Kirsch
Steven Kirsch has filed for patents to protect the following inventions. This listing includes patent applications that are pending as well as patents that have already been granted by the United States Patent and Trademark Office (USPTO).
-
Publication number: 20070250586Abstract: The origin address of an e-mail message is validated to enable blocking of e-mail from spam e-mail sources, by preparing, in response to the receipt of a predetermined e-mail message from an unverified source address, a data key encoding information reflective of the predetermined e-mail message. This message, including the data key, is then issued to the unverified source address. The computer system then operates to detect whether a response e-mail message, responsive to the challenge e-mail message, is received and whether the response e-mail message includes a response key encoding predetermined information reflective of a predetermined aspect of the challenge e-mail message. The unverified source address may be recorded in a verified source address list.Type: ApplicationFiled: March 16, 2007Publication date: October 25, 2007Inventor: Steven Kirsch
-
Publication number: 20060253452Abstract: A message is provided to a tracking server system in response to a client system referencing a predetermined resource locator that corresponds to a resource external to the tracking server system. The tracking server system indirectly provides for the client system to have an informational element selectable by the client system, where the informational element is graphically identified on the client system with informational content obtainable from a content server system through use of a content resource locator. The informational element includes a tracking resource locator, referencing the tracking server system, and data identifying the informational element. The selection of the informational element causes the client system to use the tracking resource locator to provide the data to the tracking server system and to use the content resource locator to obtain the informational content from the content server system.Type: ApplicationFiled: January 6, 2005Publication date: November 9, 2006Inventors: Steven Kirsch, Christopher Lindblad
-
Publication number: 20050251418Abstract: The present invention is directed to a method and system for managing patient care in order to minimize caregiver error and to accommodate ad hoc entry of orders. The system may be driven by machine readable identifiers. The identifiers may include bar codes. The system may include a portable computing device having an identifier recognition mechanism and a patient machine-readable identifier. The system may additionally include a patient task list for an identified patient, wherein the task list becomes automatically available upon recognition of the patient machine readable identifier. The system may also include recognition tools for determining if an entered task is a recognized task that is consistent with any task contained within the patient task list. The portable computing device may include a user interface mechanism for allowing an authorized caregiver to enter a new order including an unrecognized task.Type: ApplicationFiled: January 3, 2005Publication date: November 10, 2005Applicant: Cerner Innovation, Inc.Inventors: Charles Fox, Steven Kirsch, Greg Meyer
-
Publication number: 20050198159Abstract: An e-mail filtering method and system that categorizes received e-mail messages based on information about the origin, such as the sender sending the message or the site from where the message was sent, which is contained in the message header and the SMTP session used to send the message. This data, whether the sender is familiar to the receiver, and other information about the message is then sent by each member of an e-mail network to one or more central databases (in one embodiment, the information will also be stored at a database associated with the recipient's e-mail program and filtering software) which stores the information and compiles statistics about e-mails sent from the origin to indicate the likelihood that the e-mail is unsolicited and determine the reputation of the origin (a good reputation indicates the sender sends solicited messages while a bad reputation indicates the sender sends unsolicited e-mail messages).Type: ApplicationFiled: March 8, 2004Publication date: September 8, 2005Inventor: Steven Kirsch
-
Publication number: 20050177866Abstract: A system and method of accelerating delivery of SSL webpages. A client proxy associated with a client browser rewrites links to secure websites in a webpage before returning the webpage to the browser. The links are rewritten such that they are recognized and processed as a request for a secure webpage by another proxy in the network. The proxy returns the request to its original format and requests the page. The proxy establishes an SSL session with the server and decrypts and compresses the response before sending it to the client proxy, where the response is scanned for any links to secure webpages that should be rewritten before the response is returned to the client. This approach, which is transparent to the client, may be combined with other solutions, for instance, certain compression techniques and/or network architectures, for further reducing bandwidth and communication latency.Type: ApplicationFiled: February 9, 2004Publication date: August 11, 2005Inventor: Steven Kirsch
-
Publication number: 20050125416Abstract: A message is provided to a tracking server system in response to a client system referencing a predetermined resource locator that corresponds to a resource external to the tracking server system. The tracking server system indirectly provides for the client system to have an informational element selectable by the client system, where the informational element is graphically identified on the client system with informational content obtainable from a content server system through use of a content resource locator. The informational element includes a tracking resource locator, referencing the tracking server system, and data identifying the informational element. The selection of the informational element causes the client system to use the tracking resource locator to provide the data to the tracking server system and to use the content resource locator to obtain the informational content from the content server system.Type: ApplicationFiled: January 6, 2005Publication date: June 9, 2005Inventors: Steven Kirsch, Christopher Lindblad
-
Publication number: 20050102366Abstract: An e-mail filter employing an adaptive ruleset for classifying received e-mail messages. The individual rules of the ruleset are applied to all or some received e-mail messages, depending on the configuration of the filter. In some embodiments, an initial rule or filter is applied to the message to obtain an initial rating indicating whether the recipient would want the message. Statistics collected for each rule in the ruleset are used to determine a weighted probability the message is wanted. A different weighted probability is obtained if the rule is satisfied or if the rule is not satisfied. A final probability the message is wanted is obtained after applying the filter's adaptive ruleset and using a weighted average to combine that score with any other rules and the message is processed accordingly. Statistics are updated using the machine-generated final probability, so the adaptive ruleset of the filter is constantly updated without requiring user input.Type: ApplicationFiled: November 7, 2003Publication date: May 12, 2005Inventor: Steven Kirsch
-
Publication number: 20050091319Abstract: A database for receiving, storing, and compiling information about senders of e-mail messages that is used to categorize received e-mail messages. Data about the sender is contained in the message and is used to identify the actual sender of the message using a signature combining pieces of information from the message header or derived from information in the message header. This and other information about the message is then sent by each member of an e-mail network to one or more central databases (in one embodiment, the information will also be stored at a database associated with the recipient's e-mail program and filtering software) which stores the information and compiles statistics about e-mails sent by the sender to indicate the likelihood that the e-mail is unsolicited and determine the reputation of the sender (a good reputation indicates the sender does not send unwanted messages while a bad reputation indicates the sender sends unsolicited e-mail messages).Type: ApplicationFiled: October 9, 2003Publication date: April 28, 2005Inventor: Steven Kirsch
-
Publication number: 20050091320Abstract: An e-mail filtering method and system that categorize received e-mail messages based on information about the sender. Data about the sender is contained in the message and is used to identify the actual sender of the message using a signature combining pieces of information from the message header or derived from information in the message header. This and other information about the message is then sent by each member of an e-mail network to one or more central databases (in one embodiment, the information will also be stored at a database associated with the recipient's e-mail program and filtering software) which stores the information and compiles statistics about e-mails sent by the sender to indicate the likelihood that the e-mail is unsolicited and determine the reputation of the sender (a good reputation indicates the sender does not send unwanted messages while a bad reputation indicates the sender sends unsolicited e-mail messages).Type: ApplicationFiled: October 9, 2003Publication date: April 28, 2005Inventors: Steven Kirsch, David Murray
-
Publication number: 20050080856Abstract: An e-mail filtering method and system that categorize received e-mail messages based on information about the sender. Data about the sender is contained in the message and is used to identify the actual sender of the message using a signature combining pieces of information from the message header or derived from information in the message header. This and other information about the message is then sent by each member of an e-mail network to one or more central databases (in one embodiment, the information will also be stored at a database associated with the recipient's e-mail program and filtering software) which stores the information and compiles statistics about e-mails sent by the sender to indicate the likelihood that the e-mail is unsolicited and determine the reputation of the sender (a good reputation indicates the sender does not send unwanted messages while a bad reputation indicates the sender sends unsolicited e-mail messages).Type: ApplicationFiled: October 9, 2003Publication date: April 14, 2005Inventor: Steven Kirsch
-
Publication number: 20050080857Abstract: An e-mail filtering method and system that categorize received e-mail messages based on information about the sender. Data about the sender is contained in the message and is used to identify the actual sender of the message using a signature combining pieces of information from the message header or derived from information in the message header. This and other information about the message is then sent by each member of an e-mail network to one or more central databases (in one embodiment, the information will also be stored at a database associated with the recipient's e-mail program and filtering software) which stores the information and compiles statistics about e-mails sent by the sender to indicate the likelihood that the e-mail is unsolicited and determine the reputation of the sender (a good reputation indicates the sender does not send unwanted messages while a bad reputation indicates the sender sends unsolicited e-mail messages).Type: ApplicationFiled: October 9, 2003Publication date: April 14, 2005Inventors: Steven Kirsch, David Murray
-
Publication number: 20040199405Abstract: A system and method for modifying healthcare related orders is provided. Upon receiving one or more modifications to an existing order for a clinical agent the system updates the existing order to reflect said modifications. The system evaluates the modifications for validity and compatibility. The system also identifies historical information regarding modifications to the order.Type: ApplicationFiled: September 2, 2003Publication date: October 7, 2004Inventors: Ellen Harper, Mallika Edwards, Lei Han, Steven Kirsch, Troy J. Miller
-
Patent number: 5828897Abstract: Computer apparatus having a first processor that runs legacy software implemented using a first instruction set, and a second processor that runs new or updated software using a second instruction set. An operand memory is coupled to the first and second processors and stores shared operands in a native representation of the first instruction set. The second instruction set has an extended address space which is used to permit access by the new or updated software to the shared operands. To achieve this, the second processor has a software-implemented object request broker and a reference repository that contains information regarding the location and format of shared operands.Type: GrantFiled: December 19, 1996Date of Patent: October 27, 1998Assignee: Raytheon CompanyInventors: Steven A. Kirsch, Dwight J. Mellema