Patents by Inventor Daniel Birk
Daniel Birk has filed for patents to protect the following inventions. This listing includes patent applications that are pending as well as patents that have already been granted by the United States Patent and Trademark Office (USPTO).
-
Publication number: 20240367257Abstract: Systems and methods are disclosed that address the problem of large-scale optical manufacturing of microstructures. The systems and methods utilize one or more optical processing systems to generate a first set of alignment marks in a first region on a surface. The optical processing systems then move their focus to a second region on the surface. The second region generally partially overlaps the first region such that the optical processing systems can detect the location of the first set of alignment marks. The optical processing systems then generate a second set of alignment marks based on the location of the first set of alignment marks. This process is repeated in an iterative manner until alignment marks have been generated on all regions of the surface. The alignment marks can be used to optically align one or more optical processing systems configured to produce 3D structures on the surface.Type: ApplicationFiled: June 24, 2022Publication date: November 7, 2024Applicant: NIKON CORPORATIONInventors: Daniel Gene SMITH, Michael Birk BINNARD, Alton Hugh PHILLIPS, Heather Lynn DURKO, GO ICHINOSE, Kaneyuki NAITO
-
Publication number: 20230091940Abstract: An adaptor configured for use with surgical retractors including a body defining an adaptor surface supporting a plurality of friction grips. The body defines a rear plate opposite the adaptor surface. A mating connecting window is defined in the body. The mating connecting window is configured to receive a surgical retractor head. A connecting element is positioned in the mating connecting window. The connecting element is configured to receive an upper surface of the surgical retractor head. The mating connecting window is configured to conceal the retractor head therein to prevent contact between the retractor head and surgical tissue.Type: ApplicationFiled: February 17, 2021Publication date: March 23, 2023Inventors: Daniel Birk, Vincent DeStefano, Nicole Hershkowitz
-
Patent number: 10169564Abstract: Facilities are provided herein for authenticating a user to use a processing device. A user predefines authenticators of one or more types and associates these with graphical images. Upon on attempt to activate the processing device, a graphical image, of the graphical images, is selected for presentation to the user. The selected graphical image is presented to the user, who then provides input to authenticate with the device. A determination is made as to whether the user is authenticated to use the device. The determination is made based on input received from the user and based further on the authenticator associated with the selected graphical image. Varying the selection of image(s), each associated with a predefined authenticator and authentication type, enables variability in the authenticator that is suitable for unlocking a device at a given time, providing greater security to the authentication process.Type: GrantFiled: July 22, 2016Date of Patent: January 1, 2019Assignee: INTERNATIONAL BUSINESS MACHINES CORPORATIONInventors: Peter Daniel Birk, Cesar Eduardo Gonzalez Borjon, Nader M. Nassar
-
Publication number: 20160328553Abstract: Facilities are provided herein for authenticating a user to use a processing device. A user predefines authenticators of one or more types and associates these with graphical images. Upon on attempt to activate the processing device, a graphical image, of the graphical images, is selected for presentation to the user. The selected graphical image is presented to the user, who then provides input to authenticate with the device. A determination is made as to whether the user is authenticated to use the device. The determination is made based on input received from the user and based further on the authenticator associated with the selected graphical image. Varying the selection of image(s), each associated with a predefined authenticator and authentication type, enables variability in the authenticator that is suitable for unlocking a device at a given time, providing greater security to the authentication process.Type: ApplicationFiled: July 22, 2016Publication date: November 10, 2016Inventors: Peter Daniel BIRK, Cesar Eduardo GONZALEZ BORJON, Nader M. NASSAR
-
Patent number: 9460279Abstract: Facilities are provided herein for authenticating a user to use a processing device. A user predefines authenticators of one or more types and associates these with graphical images. Upon on attempt to activate the processing device, a graphical image, of the graphical images, is selected for presentation to the user. The selected graphical image is presented to the user, who then provides input to authenticate with the device. A determination is made as to whether the user is authenticated to use the device. The determination is made based on input received from the user and based further on the authenticator associated with the selected graphical image. Varying the selection of image(s), each associated with a predefined authenticator and authentication type, enables variability in the authenticator that is suitable for unlocking a device at a given time, providing greater security to the authentication process.Type: GrantFiled: November 12, 2014Date of Patent: October 4, 2016Assignee: INTERNATIONAL BUSINESS MACHINES CORPORATIONInventors: Peter Daniel Birk, Cesar Eduardo Gonzalez Borjon, Nader M. Nassar
-
Publication number: 20160132673Abstract: Facilities are provided herein for authenticating a user to use a processing device. A user predefines authenticators of one or more types and associates these with graphical images. Upon on attempt to activate the processing device, a graphical image, of the graphical images, is selected for presentation to the user. The selected graphical image is presented to the user, who then provides input to authenticate with the device. A determination is made as to whether the user is authenticated to use the device. The determination is made based on input received from the user and based further on the authenticator associated with the selected graphical image. Varying the selection of image(s), each associated with a predefined authenticator and authentication type, enables variability in the authenticator that is suitable for unlocking a device at a given time, providing greater security to the authentication process.Type: ApplicationFiled: November 12, 2014Publication date: May 12, 2016Inventors: Peter Daniel BIRK, Cesar Eduardo GONZALEZ BORJON, Nader M. NASSAR
-
Patent number: 8925780Abstract: A nailer includes a power source including a piston reciprocating within a cylinder; a driver blade secured to the piston for common movement relative to a nosepiece; a magazine connected to the nosepiece for feeding fasteners sequentially for being driven into a workpiece by the driver blade; a fastener delay mechanism operatively associated with the magazine and configured for engaging a subsequent fastener and delaying advancement of the second fastener to the nosepiece until the driver blade returns to the pre-firing position after driving a leading fastener; and wherein the delay mechanism includes an electromagnetic solenoid with a reciprocating plunger connected to a pivoting cam member such that extension of the plunger causes the pivoting cam member to pivot into a blocking position between the fasteners.Type: GrantFiled: December 23, 2013Date of Patent: January 6, 2015Assignee: Illinois Tool Works Inc.Inventors: Marc Largo, Hanxin Zhao, Christopher H. Porth, Daniel Birk
-
Publication number: 20140278503Abstract: System and methods configured to permit a user such as a health care provider to organize and manage patient information quickly and efficiently from a simplified representation. Such simplified representations may include a patient representation and a context representation. The representations may be updated to represent real-time patient conditions through the input of information directly from treatment or monitoring devices or from user input.Type: ApplicationFiled: March 14, 2014Publication date: September 18, 2014Inventors: Daniel BIRK, Ugo Alessandro Buy, Kevin Samuel Paul, Christa Wellman, Fady Charbel, Sepideh Amin-Hanjani
-
Publication number: 20140110451Abstract: A nailer includes a power source including a piston reciprocating within a cylinder; a driver blade secured to the piston for common movement relative to a nosepiece; a magazine connected to the nosepiece for feeding fasteners sequentially for being driven into a workpiece by the driver blade; a fastener delay mechanism operatively associated with the magazine and configured for engaging a subsequent fastener and delaying advancement of the second fastener to the nosepiece until the driver blade returns to the pre-firing position after driving a leading fastener; and wherein the delay mechanism includes an electromagnetic solenoid with a reciprocating plunger connected to a pivoting cam member such that extension of the plunger causes the pivoting cam member to pivot into a blocking position between the fasteners.Type: ApplicationFiled: December 23, 2013Publication date: April 24, 2014Applicant: ILLINOIS TOOL WORKS INC.Inventors: Marc Largo, Hanxin Zhao, Christopher H. Porth, Daniel Birk
-
Patent number: 8636185Abstract: A nailer includes a power source including a piston reciprocating within a cylinder, a driver blade secured to the piston for common movement relative to a nosepiece, a magazine connected to the nosepiece for feeding fasteners sequentially for being driven into a workpiece by the driver blade, a delay mechanism operatively associated with the magazine and configured for engaging a second fastener and delaying advancement of the subsequent fastener to the nosepiece until the driver blade returns to the pre-firing position after driving a leading fastener.Type: GrantFiled: November 15, 2010Date of Patent: January 28, 2014Assignee: Illinois Tool Works Inc.Inventors: Marc Largo, Hanxin Zhao, Christopher H. Porth, Daniel Birk
-
Publication number: 20120118932Abstract: A nailer includes a power source including a piston reciprocating within a cylinder, a driver blade secured to the piston for common movement relative to a nosepiece, a magazine connected to the nosepiece for feeding fasteners sequentially for being driven into a workpiece by the driver blade, a delay mechanism operatively associated with the magazine and configured for engaging a second fastener and delaying advancement of the subsequent fastener to the nosepiece until the driver blade returns to the pre-firing position after driving a leading fastener.Type: ApplicationFiled: November 15, 2010Publication date: May 17, 2012Inventors: Marc Largo, Hanxin Zhao, Christopher H. Porth, Daniel Birk
-
Patent number: 7925881Abstract: A method and apparatus for preventing rogue implementations of a security-sensitive class interface are provided. With the method and apparatus, a unique identifier (UID) is created by a server process when the server process is started. Anytime the server process, i.e. a server runtime environment, instantiates a new credential object following start-up of the server process, the encrypted UID is placed into a private field within the new credential object. In addition, the UID is encrypted and stored in a private class of the server runtime environment. A verification class is provided within the server runtime environment which includes one or more methods that receive the credential object as a parameter and return true or false as to the validity of the credential object.Type: GrantFiled: October 4, 2007Date of Patent: April 12, 2011Assignee: International Business Machines CorporationInventors: Peter Daniel Birk, Ching-Yun Chao, Hyen Vui Chung
-
Patent number: 7810132Abstract: Objects on application servers are distributed to one or more application servers; a user is allowed to declare in a list which objects residing on each application server are to be protected; the list is read by an interceptor; responsive to exportation of a Common Object Request Broker Architecture (“CORBA”) compliant Interoperable Object Reference (“IOR”) for a listed object, the interceptor associates one or more application server security flags with interfaces to the listed objects by tagging components of the IOR with one or more security flags; and one or more security operations are performed by an application server according to the security flags tagged to the IOR when a client accesses an application server-stored object, the security operations including an operation besides establishing secure communications between the client process and the server-stored object.Type: GrantFiled: May 20, 2008Date of Patent: October 5, 2010Assignee: International Business Machines CorporationInventors: Peter Daniel Birk, Ching-Yun Chao, Hyen Vui Chung, Carlton Keith Mason, Ajaykumar Karkala Reddy, Vishwanath Venkataramappa
-
Patent number: 7752452Abstract: A system and method for tracking user security credentials in a distributed computing environment. The security credentials of an authenticated user includes not just his unique user identifier, but also a set of security attributes such as the time of authentication, the location where the user is authenticated (i.e., intranet user v. internet user), the authentication strength, and so on. The security attributes are used in access control decisions. The same user can be given different authorization if he has a different security attribute value. Security credentials may be generated either by WebSphere security code or by third party security provider code. This invention stores the user credentials in a distributed cache and provides a system and method to compute the unique key based on the dynamic security credentials for cache lookup.Type: GrantFiled: February 2, 2009Date of Patent: July 6, 2010Assignee: International Business Machines CorporationInventors: Peter Daniel Birk, Ching-Yun Chao, Hyen Vui Chung
-
Patent number: 7734918Abstract: A method and apparatus for preventing rogue implementations of a security-sensitive class interface are provided. With the method and apparatus, a unique identifier (UID) is created by a server process when the server process is started. Anytime the server process, i.e. a server runtime environment, instantiates a new credential object following start-up of the server process, the encrypted UID is placed into a private field within the new credential object. In addition, the UID is encrypted and stored in a private class of the server runtime environment. A verification class is provided within the server runtime environment which includes one or more methods that receive the credential object as a parameter and return true or false as to the validity of the credential object.Type: GrantFiled: January 17, 2008Date of Patent: June 8, 2010Assignee: International Business Machines CorporationInventors: Peter Daniel Birk, Ching-Yun Chao, Hyen Vui Chung
-
Patent number: 7634803Abstract: An extensible token framework is provided for identifying purpose and behavior of run time security objects. The framework includes a set of marker token interfaces, which extends from a default token interface. A service provider may implement one or more marker token interfaces for a Subject or a thread of execution. A service provider may also implement its own custom marker tokens to perform custom operations. The security infrastructure runtime recognizes behavior and purpose of run time security objects based on the marker or custom marker token interfaces the token implements and handles the security objects accordingly.Type: GrantFiled: June 30, 2004Date of Patent: December 15, 2009Assignee: International Business Machines CorporationInventors: Peter Daniel Birk, Ching-Yun Chao, Hyen Vui Chung
-
Publication number: 20090138951Abstract: A system and method for tracking user security credentials in a distributed computing environment. The security credentials of an authenticated user includes not just his unique user identifier, but also a set of security attributes such as the time of authentication, the location where the user is authenticated (i.e., intranet user v. internet user), the authentication strength, and so on. The security attributes are used in access control decisions. The same user can be given different authorization if he has a different security attribute value. Security credentials may be generated either by WebSphere security code or by third party security provider code.Type: ApplicationFiled: February 2, 2009Publication date: May 28, 2009Applicant: INTERNATIONAL BUSINESS MACHINES CORPORATIONInventors: Peter Daniel Birk, Ching-Yun Chao, Hyen Vui Chung
-
Patent number: 7526799Abstract: A method for tracking security attributes along invocation chain using secure propagation token. When a user is authenticated, a propagation token is created. The propagation token includes a caller list, a host list, and custom attributes. The propagation token may be propagated downstream along with other marker tokens. A service provider may associate custom attributes in the propagation token or create custom propagation token to be propagated. The propagation token tracks the original caller and subsequent callers when user switches occur and a list of hosts at which the propagation token lands on.Type: GrantFiled: June 30, 2004Date of Patent: April 28, 2009Assignee: International Business Machines CorporationInventors: Peter Daniel Birk, Keys Dylan Botzum, Ching Yun Chao, Hyen-Vui Chung
-
Patent number: 7487361Abstract: A system and method for tracking user security credentials in a distributed computing environment. The security credentials of an authenticated user includes not just his unique user identifier, but also a set of security attributes such as the time of authentication, the location where the user is authenticated (i.e., intranet user v. internet user), the authentication strength, and so on. The security attributes are used in access control decisions. The same user can be given different authorization if he has a different security attribute value. Security credentials may be generated either by WebSphere security code or by third party security provider code.Type: GrantFiled: June 30, 2004Date of Patent: February 3, 2009Assignee: International Business Machines CorporationInventors: Peter Daniel Birk, Ching-Yun Chao, Hyen Vui Chung
-
Patent number: 7448066Abstract: Objects on application servers may be defined into classes which receive different levels of security protection, such as definition of user objects and administrative objects. Domain-wide security may be enforced on administrative objects, which user object security may be configured separately for each application server in a domain. In a CORBA architecture, IOR's for shared objects which are to be secured on a domain-wide basis, such as administrative objects, are provided with tagged components during IOR creation and exporting to a name server. Later, when the IOR is used by a client, the client invokes necessary security measures such as authentication, authorization and transport protection according to the tagged components.Type: GrantFiled: September 19, 2002Date of Patent: November 4, 2008Assignee: International Business Machines CorporationInventors: Peter Daniel Birk, Ching-Yun Chao, Hyen Vui Chung, Carlton Keith Mason, Ajaykumar Karkala Reddy, Vishwanath Venkataramappa