Patents by Inventor Daniel Birk

Daniel Birk has filed for patents to protect the following inventions. This listing includes patent applications that are pending as well as patents that have already been granted by the United States Patent and Trademark Office (USPTO).

  • Publication number: 20230091940
    Abstract: An adaptor configured for use with surgical retractors including a body defining an adaptor surface supporting a plurality of friction grips. The body defines a rear plate opposite the adaptor surface. A mating connecting window is defined in the body. The mating connecting window is configured to receive a surgical retractor head. A connecting element is positioned in the mating connecting window. The connecting element is configured to receive an upper surface of the surgical retractor head. The mating connecting window is configured to conceal the retractor head therein to prevent contact between the retractor head and surgical tissue.
    Type: Application
    Filed: February 17, 2021
    Publication date: March 23, 2023
    Inventors: Daniel Birk, Vincent DeStefano, Nicole Hershkowitz
  • Patent number: 10169564
    Abstract: Facilities are provided herein for authenticating a user to use a processing device. A user predefines authenticators of one or more types and associates these with graphical images. Upon on attempt to activate the processing device, a graphical image, of the graphical images, is selected for presentation to the user. The selected graphical image is presented to the user, who then provides input to authenticate with the device. A determination is made as to whether the user is authenticated to use the device. The determination is made based on input received from the user and based further on the authenticator associated with the selected graphical image. Varying the selection of image(s), each associated with a predefined authenticator and authentication type, enables variability in the authenticator that is suitable for unlocking a device at a given time, providing greater security to the authentication process.
    Type: Grant
    Filed: July 22, 2016
    Date of Patent: January 1, 2019
    Assignee: INTERNATIONAL BUSINESS MACHINES CORPORATION
    Inventors: Peter Daniel Birk, Cesar Eduardo Gonzalez Borjon, Nader M. Nassar
  • Publication number: 20160328553
    Abstract: Facilities are provided herein for authenticating a user to use a processing device. A user predefines authenticators of one or more types and associates these with graphical images. Upon on attempt to activate the processing device, a graphical image, of the graphical images, is selected for presentation to the user. The selected graphical image is presented to the user, who then provides input to authenticate with the device. A determination is made as to whether the user is authenticated to use the device. The determination is made based on input received from the user and based further on the authenticator associated with the selected graphical image. Varying the selection of image(s), each associated with a predefined authenticator and authentication type, enables variability in the authenticator that is suitable for unlocking a device at a given time, providing greater security to the authentication process.
    Type: Application
    Filed: July 22, 2016
    Publication date: November 10, 2016
    Inventors: Peter Daniel BIRK, Cesar Eduardo GONZALEZ BORJON, Nader M. NASSAR
  • Patent number: 9460279
    Abstract: Facilities are provided herein for authenticating a user to use a processing device. A user predefines authenticators of one or more types and associates these with graphical images. Upon on attempt to activate the processing device, a graphical image, of the graphical images, is selected for presentation to the user. The selected graphical image is presented to the user, who then provides input to authenticate with the device. A determination is made as to whether the user is authenticated to use the device. The determination is made based on input received from the user and based further on the authenticator associated with the selected graphical image. Varying the selection of image(s), each associated with a predefined authenticator and authentication type, enables variability in the authenticator that is suitable for unlocking a device at a given time, providing greater security to the authentication process.
    Type: Grant
    Filed: November 12, 2014
    Date of Patent: October 4, 2016
    Assignee: INTERNATIONAL BUSINESS MACHINES CORPORATION
    Inventors: Peter Daniel Birk, Cesar Eduardo Gonzalez Borjon, Nader M. Nassar
  • Publication number: 20160132673
    Abstract: Facilities are provided herein for authenticating a user to use a processing device. A user predefines authenticators of one or more types and associates these with graphical images. Upon on attempt to activate the processing device, a graphical image, of the graphical images, is selected for presentation to the user. The selected graphical image is presented to the user, who then provides input to authenticate with the device. A determination is made as to whether the user is authenticated to use the device. The determination is made based on input received from the user and based further on the authenticator associated with the selected graphical image. Varying the selection of image(s), each associated with a predefined authenticator and authentication type, enables variability in the authenticator that is suitable for unlocking a device at a given time, providing greater security to the authentication process.
    Type: Application
    Filed: November 12, 2014
    Publication date: May 12, 2016
    Inventors: Peter Daniel BIRK, Cesar Eduardo GONZALEZ BORJON, Nader M. NASSAR
  • Patent number: 8925780
    Abstract: A nailer includes a power source including a piston reciprocating within a cylinder; a driver blade secured to the piston for common movement relative to a nosepiece; a magazine connected to the nosepiece for feeding fasteners sequentially for being driven into a workpiece by the driver blade; a fastener delay mechanism operatively associated with the magazine and configured for engaging a subsequent fastener and delaying advancement of the second fastener to the nosepiece until the driver blade returns to the pre-firing position after driving a leading fastener; and wherein the delay mechanism includes an electromagnetic solenoid with a reciprocating plunger connected to a pivoting cam member such that extension of the plunger causes the pivoting cam member to pivot into a blocking position between the fasteners.
    Type: Grant
    Filed: December 23, 2013
    Date of Patent: January 6, 2015
    Assignee: Illinois Tool Works Inc.
    Inventors: Marc Largo, Hanxin Zhao, Christopher H. Porth, Daniel Birk
  • Publication number: 20140278503
    Abstract: System and methods configured to permit a user such as a health care provider to organize and manage patient information quickly and efficiently from a simplified representation. Such simplified representations may include a patient representation and a context representation. The representations may be updated to represent real-time patient conditions through the input of information directly from treatment or monitoring devices or from user input.
    Type: Application
    Filed: March 14, 2014
    Publication date: September 18, 2014
    Inventors: Daniel BIRK, Ugo Alessandro Buy, Kevin Samuel Paul, Christa Wellman, Fady Charbel, Sepideh Amin-Hanjani
  • Publication number: 20140110451
    Abstract: A nailer includes a power source including a piston reciprocating within a cylinder; a driver blade secured to the piston for common movement relative to a nosepiece; a magazine connected to the nosepiece for feeding fasteners sequentially for being driven into a workpiece by the driver blade; a fastener delay mechanism operatively associated with the magazine and configured for engaging a subsequent fastener and delaying advancement of the second fastener to the nosepiece until the driver blade returns to the pre-firing position after driving a leading fastener; and wherein the delay mechanism includes an electromagnetic solenoid with a reciprocating plunger connected to a pivoting cam member such that extension of the plunger causes the pivoting cam member to pivot into a blocking position between the fasteners.
    Type: Application
    Filed: December 23, 2013
    Publication date: April 24, 2014
    Applicant: ILLINOIS TOOL WORKS INC.
    Inventors: Marc Largo, Hanxin Zhao, Christopher H. Porth, Daniel Birk
  • Patent number: 8636185
    Abstract: A nailer includes a power source including a piston reciprocating within a cylinder, a driver blade secured to the piston for common movement relative to a nosepiece, a magazine connected to the nosepiece for feeding fasteners sequentially for being driven into a workpiece by the driver blade, a delay mechanism operatively associated with the magazine and configured for engaging a second fastener and delaying advancement of the subsequent fastener to the nosepiece until the driver blade returns to the pre-firing position after driving a leading fastener.
    Type: Grant
    Filed: November 15, 2010
    Date of Patent: January 28, 2014
    Assignee: Illinois Tool Works Inc.
    Inventors: Marc Largo, Hanxin Zhao, Christopher H. Porth, Daniel Birk
  • Publication number: 20120118932
    Abstract: A nailer includes a power source including a piston reciprocating within a cylinder, a driver blade secured to the piston for common movement relative to a nosepiece, a magazine connected to the nosepiece for feeding fasteners sequentially for being driven into a workpiece by the driver blade, a delay mechanism operatively associated with the magazine and configured for engaging a second fastener and delaying advancement of the subsequent fastener to the nosepiece until the driver blade returns to the pre-firing position after driving a leading fastener.
    Type: Application
    Filed: November 15, 2010
    Publication date: May 17, 2012
    Inventors: Marc Largo, Hanxin Zhao, Christopher H. Porth, Daniel Birk
  • Patent number: 7925881
    Abstract: A method and apparatus for preventing rogue implementations of a security-sensitive class interface are provided. With the method and apparatus, a unique identifier (UID) is created by a server process when the server process is started. Anytime the server process, i.e. a server runtime environment, instantiates a new credential object following start-up of the server process, the encrypted UID is placed into a private field within the new credential object. In addition, the UID is encrypted and stored in a private class of the server runtime environment. A verification class is provided within the server runtime environment which includes one or more methods that receive the credential object as a parameter and return true or false as to the validity of the credential object.
    Type: Grant
    Filed: October 4, 2007
    Date of Patent: April 12, 2011
    Assignee: International Business Machines Corporation
    Inventors: Peter Daniel Birk, Ching-Yun Chao, Hyen Vui Chung
  • Patent number: 7810132
    Abstract: Objects on application servers are distributed to one or more application servers; a user is allowed to declare in a list which objects residing on each application server are to be protected; the list is read by an interceptor; responsive to exportation of a Common Object Request Broker Architecture (“CORBA”) compliant Interoperable Object Reference (“IOR”) for a listed object, the interceptor associates one or more application server security flags with interfaces to the listed objects by tagging components of the IOR with one or more security flags; and one or more security operations are performed by an application server according to the security flags tagged to the IOR when a client accesses an application server-stored object, the security operations including an operation besides establishing secure communications between the client process and the server-stored object.
    Type: Grant
    Filed: May 20, 2008
    Date of Patent: October 5, 2010
    Assignee: International Business Machines Corporation
    Inventors: Peter Daniel Birk, Ching-Yun Chao, Hyen Vui Chung, Carlton Keith Mason, Ajaykumar Karkala Reddy, Vishwanath Venkataramappa
  • Patent number: 7752452
    Abstract: A system and method for tracking user security credentials in a distributed computing environment. The security credentials of an authenticated user includes not just his unique user identifier, but also a set of security attributes such as the time of authentication, the location where the user is authenticated (i.e., intranet user v. internet user), the authentication strength, and so on. The security attributes are used in access control decisions. The same user can be given different authorization if he has a different security attribute value. Security credentials may be generated either by WebSphere security code or by third party security provider code. This invention stores the user credentials in a distributed cache and provides a system and method to compute the unique key based on the dynamic security credentials for cache lookup.
    Type: Grant
    Filed: February 2, 2009
    Date of Patent: July 6, 2010
    Assignee: International Business Machines Corporation
    Inventors: Peter Daniel Birk, Ching-Yun Chao, Hyen Vui Chung
  • Patent number: 7734918
    Abstract: A method and apparatus for preventing rogue implementations of a security-sensitive class interface are provided. With the method and apparatus, a unique identifier (UID) is created by a server process when the server process is started. Anytime the server process, i.e. a server runtime environment, instantiates a new credential object following start-up of the server process, the encrypted UID is placed into a private field within the new credential object. In addition, the UID is encrypted and stored in a private class of the server runtime environment. A verification class is provided within the server runtime environment which includes one or more methods that receive the credential object as a parameter and return true or false as to the validity of the credential object.
    Type: Grant
    Filed: January 17, 2008
    Date of Patent: June 8, 2010
    Assignee: International Business Machines Corporation
    Inventors: Peter Daniel Birk, Ching-Yun Chao, Hyen Vui Chung
  • Patent number: 7634803
    Abstract: An extensible token framework is provided for identifying purpose and behavior of run time security objects. The framework includes a set of marker token interfaces, which extends from a default token interface. A service provider may implement one or more marker token interfaces for a Subject or a thread of execution. A service provider may also implement its own custom marker tokens to perform custom operations. The security infrastructure runtime recognizes behavior and purpose of run time security objects based on the marker or custom marker token interfaces the token implements and handles the security objects accordingly.
    Type: Grant
    Filed: June 30, 2004
    Date of Patent: December 15, 2009
    Assignee: International Business Machines Corporation
    Inventors: Peter Daniel Birk, Ching-Yun Chao, Hyen Vui Chung
  • Publication number: 20090138951
    Abstract: A system and method for tracking user security credentials in a distributed computing environment. The security credentials of an authenticated user includes not just his unique user identifier, but also a set of security attributes such as the time of authentication, the location where the user is authenticated (i.e., intranet user v. internet user), the authentication strength, and so on. The security attributes are used in access control decisions. The same user can be given different authorization if he has a different security attribute value. Security credentials may be generated either by WebSphere security code or by third party security provider code.
    Type: Application
    Filed: February 2, 2009
    Publication date: May 28, 2009
    Applicant: INTERNATIONAL BUSINESS MACHINES CORPORATION
    Inventors: Peter Daniel Birk, Ching-Yun Chao, Hyen Vui Chung
  • Patent number: 7526799
    Abstract: A method for tracking security attributes along invocation chain using secure propagation token. When a user is authenticated, a propagation token is created. The propagation token includes a caller list, a host list, and custom attributes. The propagation token may be propagated downstream along with other marker tokens. A service provider may associate custom attributes in the propagation token or create custom propagation token to be propagated. The propagation token tracks the original caller and subsequent callers when user switches occur and a list of hosts at which the propagation token lands on.
    Type: Grant
    Filed: June 30, 2004
    Date of Patent: April 28, 2009
    Assignee: International Business Machines Corporation
    Inventors: Peter Daniel Birk, Keys Dylan Botzum, Ching Yun Chao, Hyen-Vui Chung
  • Patent number: 7487361
    Abstract: A system and method for tracking user security credentials in a distributed computing environment. The security credentials of an authenticated user includes not just his unique user identifier, but also a set of security attributes such as the time of authentication, the location where the user is authenticated (i.e., intranet user v. internet user), the authentication strength, and so on. The security attributes are used in access control decisions. The same user can be given different authorization if he has a different security attribute value. Security credentials may be generated either by WebSphere security code or by third party security provider code.
    Type: Grant
    Filed: June 30, 2004
    Date of Patent: February 3, 2009
    Assignee: International Business Machines Corporation
    Inventors: Peter Daniel Birk, Ching-Yun Chao, Hyen Vui Chung
  • Patent number: 7448066
    Abstract: Objects on application servers may be defined into classes which receive different levels of security protection, such as definition of user objects and administrative objects. Domain-wide security may be enforced on administrative objects, which user object security may be configured separately for each application server in a domain. In a CORBA architecture, IOR's for shared objects which are to be secured on a domain-wide basis, such as administrative objects, are provided with tagged components during IOR creation and exporting to a name server. Later, when the IOR is used by a client, the client invokes necessary security measures such as authentication, authorization and transport protection according to the tagged components.
    Type: Grant
    Filed: September 19, 2002
    Date of Patent: November 4, 2008
    Assignee: International Business Machines Corporation
    Inventors: Peter Daniel Birk, Ching-Yun Chao, Hyen Vui Chung, Carlton Keith Mason, Ajaykumar Karkala Reddy, Vishwanath Venkataramappa
  • Publication number: 20080222697
    Abstract: Objects on application servers may be defined into classes which receive different levels of security protection, such as definition of user objects and administrative objects. Domain-wide security may be enforced on administrative objects, which user object security may be configured separately for each application server in a domain. In a CORBA architecture, IOR's for shared objects which are to be secured on a domain-wide basis, such as administrative objects, are provided with tagged components during IOR creation and exporting to a name server. Later, when the IOR is used by a client, the client invokes necessary security measures such as authentication, authorization and transport protection according to the tagged components.
    Type: Application
    Filed: May 20, 2008
    Publication date: September 11, 2008
    Inventors: Peter Daniel Birk, Ching-Yun Chao, Hyen Vui Chung, Carlton Keith Mason, Ajaykumar Karkala Reddy, Vishwanath Venkataramappa