Patents by Inventor Darrell Long
Darrell Long has filed for patents to protect the following inventions. This listing includes patent applications that are pending as well as patents that have already been granted by the United States Patent and Trademark Office (USPTO).
-
Patent number: 11565924Abstract: A system for a pallet truck load wheel mechanism comprises a logic device and first and second sensor arrangements. The first and second sensor arrangements include first and second sensing fields that define first and second edges of an operability window, respectively. The logic device has an operable state indicating that the load wheel mechanism can raise a pallet lifting device and an inoperable state indicating that the load wheel mechanism should not raise the pallet lifting device. The logic device is initialized in the operable state and is configured to change to the inoperable state in response to each time the first sensor arrangement detects an edge of a board intersecting, the first edge of the operability window and to change to the operable state in response to each time the second sensor arrangement detects an edge of a board intersecting the second edge of the operability window.Type: GrantFiled: June 29, 2020Date of Patent: January 31, 2023Assignee: Hyster-Yale Group, Inc.Inventor: Darrell Long
-
Publication number: 20210002114Abstract: A system for a pallet truck load wheel mechanism comprises a logic device and first and second sensor arrangements. The first and second sensor arrangements include first and second sensing fields that define first and second edges of an operability window, respectively. The logic device has an operable state indicating that the load wheel mechanism can raise a pallet lifting device and an inoperable state indicating that the load wheel mechanism should not raise the pallet lifting device. The logic device is initialized in the operable state and is configured to change to the inoperable state in response to each time the first sensor arrangement detects an edge of a board intersecting, the first edge of the operability window and to change to the operable state in response to each time the second sensor arrangement detects an edge of a board intersecting the second edge of the operability window.Type: ApplicationFiled: June 29, 2020Publication date: January 7, 2021Applicant: Hyster-Yale Group, Inc.Inventor: Darrell Long
-
Patent number: 9692656Abstract: A policy distribution server provides, on a subscription basis, policy updates to effect desired behaviors of network intermediary devices. The policy updates may specify caching policies, and may in some instances, include instructions for data collection by the network intermediary devices. Data collected in accordance with such instructions may be used to inform future policy updates distributed to the network intermediary devices.Type: GrantFiled: January 8, 2016Date of Patent: June 27, 2017Assignee: Symantec CorporationInventors: Kevin Porter, Thomas J. Kelly, Marcin Lukasz Lizon, Darrell Long, Eric Maki, Kim Tremblay, Jennifer Vance
-
Publication number: 20160127189Abstract: A policy distribution server provides, on a subscription basis, policy updates to effect desired behaviors of network intermediary devices. The policy updates may specify caching policies, and may in some instances, include instructions for data collection by the network intermediary devices. Data collected in accordance with such instructions may be used to inform future policy updates distributed to the network intermediary devices.Type: ApplicationFiled: January 8, 2016Publication date: May 5, 2016Inventors: Kevin Porter, Thomas J. Kelly, Marcin Lukasz Lizon, Darrell Long, Eric Maki, Kim Tremblay, Jennifer Vance
-
Patent number: 9237068Abstract: A policy distribution server provides, on a subscription basis, policy updates to effect desired behaviors of network intermediary devices. The policy updates may specify caching policies, and may in some instances, include instructions for data collection by the network intermediary devices. Data collected in accordance with such instructions may be used to inform future policy updates distributed to the network intermediary devices.Type: GrantFiled: January 30, 2011Date of Patent: January 12, 2016Assignee: Blue Coat Systems, Inc.Inventors: Kevin Porter, Thomas J. Kelly, Marcin Lukasz Lizon, Darrell Long, Eric Maki, Kim Tremblay, Jennifer Vance
-
Patent number: 8793307Abstract: A cache logically disposed in a communication path between a client and a server receives a request for a content item and, in response thereto, requests from the server header information concerning the content item and an initial portion of data that makes up the content item. The cache then computes a first hashing value from the header information and a second hashing value from the initial portion of data. A content identifier is created by combining the first hashing value and the second hashing value. Using the content identifier, the cache determines whether a copy of the content item is stored by the cache; and, if so provides same to the client. Otherwise, the cache requests the content item from the server and, upon receipt thereof, provides it to the client.Type: GrantFiled: January 28, 2010Date of Patent: July 29, 2014Assignee: Blue Coat Systems, Inc.Inventors: Wei Lu, Jamshid Mahdavi, Darrell Long
-
Patent number: 8316429Abstract: A host computer system is categorized according to uniform resource locator (URL) information extracted from a digital certificate purportedly associated with said host. Thereafter, a secure communication session (e.g., an SSL session) with said host may be granted or denied according to results of the categorizing. If granted, messages associated with the secure session may be tunneled through a proxy without decryption, or, in some cases, even though the secure communication session was authorized messages may be decrypted at the proxy.Type: GrantFiled: January 31, 2006Date of Patent: November 20, 2012Assignee: Blue Coat Systems, Inc.Inventors: Darrell Long, Lee Dolsen, Doug Moen
-
Publication number: 20120198038Abstract: A policy distribution server provides, on a subscription basis, policy updates to effect desired behaviors of network intermediary devices. The policy updates may specify caching policies, and may in some instances, include instructions for data collection by the network intermediary devices. Data collected in accordance with such instructions may be used to inform future policy updates distributed to the network intermediary devices.Type: ApplicationFiled: January 30, 2011Publication date: August 2, 2012Applicant: BLUE COAT SYSTEMS, INC.Inventors: Kevin Porter, Thomas J. Kelly, Marcin Lukasz Lizon, Darrell Long, Eric Maki, Kim Tremblay, Jennifer Vance
-
Publication number: 20100191805Abstract: A cache logically disposed in a communication path between a client and a server receives a request for a content item and, in response thereto, requests from the server header information concerning the content item and an initial portion of data that makes up the content item. The cache then computes a first hashing value from the header information and a second hashing value from the initial portion of data. A content identifier is created by combining the first hashing value and the second hashing value. Using the content identifier, the cache determines whether a copy of the content item is stored by the cache; and, if so provides same to the client. Otherwise, the requests the content item from the server and, upon receipt thereof, provides it to the client.Type: ApplicationFiled: January 28, 2010Publication date: July 29, 2010Inventors: Wei Lu, Jamshid Mahdavi, Darrell Long
-
Publication number: 20080209216Abstract: A first computer-based device is authenticated at a second computer-based device communicatively coupled thereto through use of a unique identifier and an encrypted token, each received from the first device. Following the authentication, configuration information for the first device is sent from the second device to the first device and the first device authorized to join a network that includes the second device. Further, permissions related to the network may be granted to the first device.Type: ApplicationFiled: January 31, 2008Publication date: August 28, 2008Inventors: Thomas J. Kelly, Samuel H. McLane, Ronald Frederick, Dharmendra Mohan, Darrell Long
-
Publication number: 20070180510Abstract: A host computer system is categorized according to uniform resource locator (URL) information extracted from a digital certificate purportedly associated with said host. Thereafter, a secure communication session (e.g., an SSL session) with said host may be granted or denied according to results of the categorizing.Type: ApplicationFiled: January 31, 2006Publication date: August 2, 2007Inventors: Darrell Long, Lee Dolsen, Doug Moen
-
Publication number: 20070027941Abstract: A resource utilization enforcement system enforces resource quotas in a distributed system. A bank on a central server maintains an account for each principal; the account is equivalent to a resource quota for the principal. Quotas are tracked through the use of digital coins that represent resource consumption. The bank is allowed coin generation privileges. At initiation of a computing session, a purse manager on the client accesses the account of the principal and requests coins to exchange for consumed resources. The purse manager manages the coins withdrawn in a “purse” for the principal. The purse manager submits coins to a cashier on the storage device to “purchase” storage for the principal. Refunds are provided if the storage consumption event frees storage.Type: ApplicationFiled: July 27, 2005Publication date: February 1, 2007Inventors: Ralph Attila Becker-Szendy, Richard Golding, Darrell Long
-
Publication number: 20050132154Abstract: A method and system for election of a cluster leader in a storage area network is provided Each node in a grouping of storage area network nodes communicates with each of the nodes on a periodic basis to determine if any of the nodes have failed (42). In the event of a cluster fault, each node may request a position of cluster leader. A pruning protocol (60) is invoked to ensure efficient convergence of a single cluster leader candidate to favor a majority grouping leader candidate to become the new cluster leader. In the event the leader candidate from the majority grouping has failed to become the new cluster leader, a minority grouping leader candidate can become the cluster leader. Following the pruning protocol, a voting protocol (100) is invoked followed by lock of the quorum disk (138) by the elected cluster leader candidate.Type: ApplicationFiled: October 3, 2003Publication date: June 16, 2005Applicant: International Business Machines CorporationInventors: Sudhir Rao, Robert Rees, Randal Burns, Darrell Long
-
Patent number: 6792424Abstract: A data management system for storage area networks (SANs) includes an authentication and directory service that integrates the management of cache coherency and synchronization into an authentication mechanism, referred to herein as a ticket. The data in the system is notionally classified into colors. When a principal computer requests a read or a write access to data of a particular “color”, the service determines whether the principal is authorized for the requested access, and if so, the service issues a ticket to the principal that specifies a data color that the bearer of the ticket is authorized to access using the type of access mechanism specified on the ticket. A hidden “hue” can also be specified on the ticket. The service can variously inform principals to cancel tickets based on color or time of issue and can also variously inform storage devices not to honor tickets of a certain hue or time of issue as appropriate to thereby maintain cache coherency and data consistency.Type: GrantFiled: April 23, 1999Date of Patent: September 14, 2004Assignee: International Business Machines CorporationInventors: Randal Chilton Burns, Darrell Long
-
Patent number: 6405315Abstract: A decentralized file system based on a network of remotely encrypted storage devices is disclosed. The file system includes a network to which a network client, a secure remotely encrypted storage device, a key manager, and a lock manager are attached. The system organizes data as files and directories. Files or directories are composed of one or more streams, which logically partition the data associated with the files or directories. The device serves as a repository of the system's data. The key manager controls data access keys while the lock manager handles consistency of the files. A network user may have read or write access to a file. Access is controlled using keys and access lists maintained by the key manager.Type: GrantFiled: September 11, 1997Date of Patent: June 11, 2002Assignee: International Business Machines CorporationInventors: Randal Chilton Burns, Edward Gustav Chron, Darrell Long, Benjamin Clay Reed
-
Patent number: 5931947Abstract: A network storage device is disclosed for use in a secure array of such devices to support a distributed file system. Each device is an independent repository of remotely encrypted data objects to be accessed by authorized network clients. All encryption is done by the clients, rather than by the devices. In order for the system to revoke access to an object on the device, the object must be re-encrypted. Each storage device has a device owner for controlling access to the device's data. All data requests from the clients and responses to them are authenticated using keys derived from the owner key and hashed message authentication codes.Type: GrantFiled: September 11, 1997Date of Patent: August 3, 1999Assignee: International Business Machines CorporationInventors: Randal Chilton Burns, Edward Gustav Chron, Darrell Long, Benjamin Clay Reed