Patents by Inventor David M. O'Rourke

David M. O'Rourke has filed for patents to protect the following inventions. This listing includes patent applications that are pending as well as patents that have already been granted by the United States Patent and Trademark Office (USPTO).

  • Publication number: 20240138934
    Abstract: Systems and methods for performing concomitant medical procedures are disclosed. In one aspect, the method involves controlling a first robotic arm to insert a first medical instrument through a first opening of a patient and controlling a second robotic arm to insert a second medical instrument through a second opening of the patient. The first robotic arm and the second robotic arm are part of a first platform and the first opening and the second opening are positioned at two different anatomical regions of the patient.
    Type: Application
    Filed: January 8, 2024
    Publication date: May 2, 2024
    Inventors: Joshua F. DEFONZO, Alexander Tarek HASSAN, Frederic H. MOLL, David Stephen MINTZ, David M. SCHUMMERS, Paxton H. MAEDER-YORK, Andrew F. O'ROURKE
  • Publication number: 20170201550
    Abstract: Techniques are disclosed relating to accessing credential information on multiple devices. In one embodiment, a computer system is disclosed that includes one or processors and memory having program instructions stored therein that are executable by the one or more processors to cause the computer system to perform operations. The operations include storing registration information identifying a plurality of devices as being registered to an organization and receiving, over a network from a first device, a request for credential information of a first of a plurality of users associated with the organization. The operations further include authenticating the first request, including verifying that the first device is being used by the first user and determining, based on the registration information, whether the first device is one of the plurality of devices. The operations include granting or denying the first request for the credential information based on the authenticating.
    Type: Application
    Filed: September 23, 2016
    Publication date: July 13, 2017
    Inventors: Wade Benson, David M. O'Rourke, Michael D. Santos, Gopi K. Rangaswamy, Selvarajan Subramaniam, Timothy P. Hannon, Pierre-Olivier Martel, Raghu Pai, Andrew R. Whalley, Michael Brouwer
  • Patent number: 9166926
    Abstract: A duplicate suppression protocol is introduced in order to suppress duplicate entries from appearing in a list of available network resources. With the duplicate suppression protocol of the present invention, a computer that wishes to query for network resources also asks for duplicate suppression information from the responding network resources. The duplicate suppression information for a particular network resource specifies identifiers associated with that network resource for various protocols. Thus, if a particular network resource responds to more than one network resource request from a single requesting entity, that requesting entity will be able to locate duplicate network resource information. Thus, a single unified list of network resources available for various different protocols may be presented with all duplicate network resources removed.
    Type: Grant
    Filed: August 19, 2014
    Date of Patent: October 20, 2015
    Assignee: Apple Inc.
    Inventors: Kevin Arnold, David M. O'Rourke
  • Patent number: 9059840
    Abstract: Private message system, method, and apparatus are described. A private message that includes encrypted data and identifying information indicating a recipient client device authorized to read the private message is stored at a server computer. Since the client devices perform all encryption and decryption processing, the server computer stores the private message in a platform agnostic manner and without performing any encryption/decryption related processes. Although any number of recipient devices can receive the private message, only a recipient client device authorized in accordance with the identifying information can read the private message.
    Type: Grant
    Filed: May 31, 2012
    Date of Patent: June 16, 2015
    Assignee: Apple Inc.
    Inventors: Jeffrey A. Connelly, David M. O'Rourke, Matthew M. Patenaude
  • Patent number: 8954604
    Abstract: A method for a client computer to find a network address of a server computer by searching for the network address using at a backup search procedure if the address of the server computer cannot be identified using a primary search procedure. The primary and backup search procedures can be performed in parallel and multiple backup search procedures can be performed to identify the address of the server computer. Alternatively, the primary and backup search procedures can be performed in serial wherein the backup search procedure is performed only when the primary search procedure does not identify the address of the server computer.
    Type: Grant
    Filed: September 20, 2012
    Date of Patent: February 10, 2015
    Assignee: Apple Inc.
    Inventors: Steven Neil Simon, David M. O'Rourke
  • Publication number: 20140365663
    Abstract: A duplicate suppression protocol is introduced in order to suppress duplicate entries from appearing in a list of available network resources. With the duplicate suppression protocol of the present invention, a computer that wishes to query for network resources also asks for duplicate suppression information from the responding network resources. The duplicate suppression information for a particular network resource specifies identifiers associated with that network resource for various protocols. Thus, if a particular network resource responds to more than one network resource request from a single requesting entity, that requesting entity will be able to locate duplicate network resource information. Thus, a single unified list of network resources available for various different protocols may be presented with all duplicate network resources removed.
    Type: Application
    Filed: August 19, 2014
    Publication date: December 11, 2014
    Inventors: Kevin Arnold, David M. O'Rourke
  • Patent number: 8825868
    Abstract: A duplicate suppression protocol is introduced in order to suppress duplicate entries from appearing in a list of available network resources. With the duplicate suppression protocol of the present invention, a computer that wishes to query for network resources also asks for duplicate suppression information from the responding network resources. The duplicate suppression information for a particular network resource specifies identifiers associated with that network resource for various protocols. Thus, if a particular network resource responds to more than one network resource request from a single requesting entity, that requesting entity will be able to locate duplicate network resource information. Thus, a single unified list of network resources available for various different protocols may be presented with all duplicate network resources removed.
    Type: Grant
    Filed: January 16, 2013
    Date of Patent: September 2, 2014
    Assignee: Apple Inc.
    Inventors: Kevin Arnold, David M. O'Rourke
  • Patent number: 8813185
    Abstract: A mechanism that allows a user to easily configure a rules engine to apply rules to decide which requests for access to a user's computer resources are to be granted and which are denied. A trusted token, such as a certificate of identity issued by a trusted third party authority that verifies identities of computer users, is included in a calling card object provided by the requesting user to the (server) computer that controls the resources desired by the requester. Additional conditions for access may be specified as desired by the user of the server computer.
    Type: Grant
    Filed: June 11, 2012
    Date of Patent: August 19, 2014
    Assignee: Apple Inc.
    Inventors: Leland A. Wallace, David M. O'Rourke
  • Publication number: 20130326220
    Abstract: Private message system, method, and apparatus are described. A private message that includes encrypted data and identifying information indicating a recipient client device authorized to read the private message is stored at a server computer. Since the client devices perform all encryption and decryption processing, the server computer stores the private message in a platform agnostic manner and without performing any encryption/decryption related processes. Although any number of recipient devices can receive the private message, only a recipient client device authorized in accordance with the identifying information can read the private message.
    Type: Application
    Filed: May 31, 2012
    Publication date: December 5, 2013
    Applicant: Apple Inc.
    Inventors: Jeffrey A. CONNELLY, David M. O'Rourke, Matthew M. Patenaude
  • Patent number: 8392612
    Abstract: A method for a client computer to find a network address of a server computer by searching for the network address using at a backup search procedure if the address of the server computer cannot be identified using a primary search procedure. The primary and backup search procedures can be performed in parallel and multiple backup search procedures can be performed to identify the address of the server computer. Alternatively, the primary and backup search procedures can be performed in serial wherein the backup search procedure is performed only when the primary search procedure does not identify the address of the server computer.
    Type: Grant
    Filed: December 24, 2003
    Date of Patent: March 5, 2013
    Assignee: Apple Inc.
    Inventors: Steven N. Simon, David M. O'Rourke
  • Patent number: 8392570
    Abstract: A duplicate suppression protocol is introduced in order to suppress duplicate entries from appearing in a list of available network resources. With the duplicate suppression protocol of the present invention, a computer that wishes to query for network resources also asks for duplicate suppression information from the responding network resources. The duplicate suppression information for a particular network resource specifies identifiers associated with that network resource for various protocols. Thus, if a particular network resource responds to more than one network resource request from a single requesting entity, that requesting entity will be able to locate duplicate network resource information. Thus, a single unified list of network resources available for various different protocols may be presented with all duplicate network resources removed.
    Type: Grant
    Filed: April 12, 2010
    Date of Patent: March 5, 2013
    Assignee: Apple Inc.
    Inventors: Kevin Arnold, David M. O'Rourke
  • Publication number: 20120278863
    Abstract: A mechanism that allows a user to easily configure a rules engine to apply rules to decide which requests for access to a user's computer resources are to be granted and which are denied. A trusted token, such as a certificate of identity issued by a trusted third party authority that verifies identities of computer users, is included in a calling card object provided by the requesting user to the (server) computer that controls the resources desired by the requester. Additional conditions for access may be specified as desired by the user of the server computer.
    Type: Application
    Filed: June 11, 2012
    Publication date: November 1, 2012
    Inventors: Leland A. WALLACE, David M. O'ROURKE
  • Patent number: 8201214
    Abstract: A mechanism that allows a user to easily configure a rules engine to apply rules to decide which requests for access to a user's computer resources are to be granted and which are denied. A trusted token, such as a certificate of identity issued by a trusted third party authority that verifies identities of computer users, is included in a calling card object provided by the requesting user to the (server) computer that controls the resources desired by the requester. Additional conditions for access may be specified as desired by the user of the server computer.
    Type: Grant
    Filed: September 30, 2005
    Date of Patent: June 12, 2012
    Assignee: Apple Inc.
    Inventors: Leland A. Wallace, David M. O'Rourke
  • Patent number: 8001148
    Abstract: A method for determining group membership in a computer system, the method comprising: obtaining an identifier that describes a member of a group, the member of a group having a member hash table that contains group membership information describing to what groups a member belongs; performing a primary search of a plurality of groups to determine if each group contains the member's identifier, each group in the plurality having a group hash table that describes to what other groups the group belongs, caching the results of the primary search in the member hash table, for each group to which the member belongs, performing a secondary search of a plurality of groups to determine what groups contain the group to which the member belongs, and caching the results of the secondary search into the group hash table and merging the results into the member hash table, and reading the member hash table to determine group membership.
    Type: Grant
    Filed: August 21, 2007
    Date of Patent: August 16, 2011
    Assignee: Apple Inc.
    Inventors: Greg B. Vaughan, David M. O'Rourke
  • Publication number: 20100299729
    Abstract: Methods and systems for authenticating computers is disclosed. The methods and system include issue a credential from a first computer to a second computer. When the second computer authenticates to the first computer, the second computer transmits the credential and a first challenge to the first computer. The first computer determines whether the credential is valid, computes a first response to the first challenge, and generates a second challenge. The first computer transmits the first response and the second challenge to the second computer. The second computer determines whether the first response is valid and computes a second response to the second challenge. The second computer transmits the second response to the first computer in order to verify and authenticate the computers.
    Type: Application
    Filed: April 21, 2010
    Publication date: November 25, 2010
    Applicant: APPLE INC.
    Inventors: Leland A. Wallace, David M. O'Rourke
  • Publication number: 20100223387
    Abstract: A duplicate suppression protocol is introduced in order to suppress duplicate entries from appearing in a list of available network resources. With the duplicate suppression protocol of the present invention, a computer that wishes to query for network resources also asks for duplicate suppression information from the responding network resources. The duplicate suppression information for a particular network resource specifies identifiers associated with that network resource for various protocols. Thus, if a particular network resource responds to more than one network resource request from a single requesting entity, that requesting entity will be able to locate duplicate network resource information. Thus, a single unified list of network resources available for various different protocols may be presented with all duplicate network resources removed.
    Type: Application
    Filed: April 12, 2010
    Publication date: September 2, 2010
    Inventors: Kevin Arnold, David M. O'Rourke
  • Patent number: 7747747
    Abstract: A duplicate suppression protocol is introduced in order to suppress duplicate entries from appearing in a list of available network resources. With the duplicate suppression protocol of the present invention, a computer that wishes to query for network resources also asks for duplicate suppression information from the responding network resources. The duplicate suppression information for a particular network resource specifies identifiers associated with that network resource for various protocols. Thus, if a particular network resource responds to more than one network resource request from a single requesting entity, that requesting entity will be able to locate duplicate network resource information. Thus, a single unified list of network resources available for various different protocols may be presented with all duplicate network resources removed.
    Type: Grant
    Filed: May 6, 2002
    Date of Patent: June 29, 2010
    Assignee: Apple Inc.
    Inventors: Kevin Arnold, David M. O'Rourke
  • Patent number: 7735120
    Abstract: A method for authenticating computers is disclosed. The method comprises issuing a credential from a first computer to a second computer. When the second computer authenticates to the first computer, the second computer transmits the credential and a first challenge to the first computer. The first computer determines whether the credential is valid, computes a first response to the first challenge, and generates a second challenge. The first computer transmits the first response and the second challenge to the second computer. The second computer determines whether the first response is valid and computes a second response to the second challenge. The second computer transmits the second response to the first computer in order to verify and authenticate the computers.
    Type: Grant
    Filed: December 24, 2003
    Date of Patent: June 8, 2010
    Assignee: Apple Inc.
    Inventors: Leland A. Wallace, David M. O'Rourke
  • Patent number: 7424615
    Abstract: The invention provides a cryptographic method which includes receiving at a first entity a second public key MA. At least one of a first session key KB and a first secret SB may be generated based on the second public key MA. A first random nonce NB may be generated which may be encrypted with at least one of the first session key KB and the first secret SB to obtain an encrypted random nonce. The encrypted random nonce may be transmitted from the first entity. In response to transmitting the encrypted random nonce, the first computer may receive a data signal containing a modification of the first random nonce NB+1. If the modification of the first random nonce NB+1 was correctly performed, then at least one of (i) opening a communication link at the first computer, and (ii) generating a first initialization vector IB is performed.
    Type: Grant
    Filed: July 30, 2001
    Date of Patent: September 9, 2008
    Assignee: Apple Inc.
    Inventors: Christopher P. Jalbert, Leland A. Wallace, David M. O'Rourke
  • Patent number: 7340463
    Abstract: A method for determining group membership in a computer system, the method comprising: obtaining an identifier that describes a member of a group, the member of a group having a member hash table that contains group membership information describing to what groups a member belongs; performing a primary search of a plurality of groups to determine if each group contains the member's identifier, each group in the plurality having a group hash table that describes to what other groups the group belongs, caching the results of the primary search in the member hash table, for each group to which the member belongs, performing a secondary search of a plurality of groups to determine what groups contain the group to which the member belongs, and caching the results of the secondary search into the group hash table and merging the results into the member hash table, and reading the member hash table to determine group membership.
    Type: Grant
    Filed: June 25, 2004
    Date of Patent: March 4, 2008
    Assignee: Apple Inc.
    Inventors: Greg B. Vaughan, David M. O'Rourke