Patents by Inventor David M. O'Rourke
David M. O'Rourke has filed for patents to protect the following inventions. This listing includes patent applications that are pending as well as patents that have already been granted by the United States Patent and Trademark Office (USPTO).
-
Publication number: 20240138934Abstract: Systems and methods for performing concomitant medical procedures are disclosed. In one aspect, the method involves controlling a first robotic arm to insert a first medical instrument through a first opening of a patient and controlling a second robotic arm to insert a second medical instrument through a second opening of the patient. The first robotic arm and the second robotic arm are part of a first platform and the first opening and the second opening are positioned at two different anatomical regions of the patient.Type: ApplicationFiled: January 8, 2024Publication date: May 2, 2024Inventors: Joshua F. DEFONZO, Alexander Tarek HASSAN, Frederic H. MOLL, David Stephen MINTZ, David M. SCHUMMERS, Paxton H. MAEDER-YORK, Andrew F. O'ROURKE
-
Publication number: 20170201550Abstract: Techniques are disclosed relating to accessing credential information on multiple devices. In one embodiment, a computer system is disclosed that includes one or processors and memory having program instructions stored therein that are executable by the one or more processors to cause the computer system to perform operations. The operations include storing registration information identifying a plurality of devices as being registered to an organization and receiving, over a network from a first device, a request for credential information of a first of a plurality of users associated with the organization. The operations further include authenticating the first request, including verifying that the first device is being used by the first user and determining, based on the registration information, whether the first device is one of the plurality of devices. The operations include granting or denying the first request for the credential information based on the authenticating.Type: ApplicationFiled: September 23, 2016Publication date: July 13, 2017Inventors: Wade Benson, David M. O'Rourke, Michael D. Santos, Gopi K. Rangaswamy, Selvarajan Subramaniam, Timothy P. Hannon, Pierre-Olivier Martel, Raghu Pai, Andrew R. Whalley, Michael Brouwer
-
Patent number: 9166926Abstract: A duplicate suppression protocol is introduced in order to suppress duplicate entries from appearing in a list of available network resources. With the duplicate suppression protocol of the present invention, a computer that wishes to query for network resources also asks for duplicate suppression information from the responding network resources. The duplicate suppression information for a particular network resource specifies identifiers associated with that network resource for various protocols. Thus, if a particular network resource responds to more than one network resource request from a single requesting entity, that requesting entity will be able to locate duplicate network resource information. Thus, a single unified list of network resources available for various different protocols may be presented with all duplicate network resources removed.Type: GrantFiled: August 19, 2014Date of Patent: October 20, 2015Assignee: Apple Inc.Inventors: Kevin Arnold, David M. O'Rourke
-
Patent number: 9059840Abstract: Private message system, method, and apparatus are described. A private message that includes encrypted data and identifying information indicating a recipient client device authorized to read the private message is stored at a server computer. Since the client devices perform all encryption and decryption processing, the server computer stores the private message in a platform agnostic manner and without performing any encryption/decryption related processes. Although any number of recipient devices can receive the private message, only a recipient client device authorized in accordance with the identifying information can read the private message.Type: GrantFiled: May 31, 2012Date of Patent: June 16, 2015Assignee: Apple Inc.Inventors: Jeffrey A. Connelly, David M. O'Rourke, Matthew M. Patenaude
-
Patent number: 8954604Abstract: A method for a client computer to find a network address of a server computer by searching for the network address using at a backup search procedure if the address of the server computer cannot be identified using a primary search procedure. The primary and backup search procedures can be performed in parallel and multiple backup search procedures can be performed to identify the address of the server computer. Alternatively, the primary and backup search procedures can be performed in serial wherein the backup search procedure is performed only when the primary search procedure does not identify the address of the server computer.Type: GrantFiled: September 20, 2012Date of Patent: February 10, 2015Assignee: Apple Inc.Inventors: Steven Neil Simon, David M. O'Rourke
-
Publication number: 20140365663Abstract: A duplicate suppression protocol is introduced in order to suppress duplicate entries from appearing in a list of available network resources. With the duplicate suppression protocol of the present invention, a computer that wishes to query for network resources also asks for duplicate suppression information from the responding network resources. The duplicate suppression information for a particular network resource specifies identifiers associated with that network resource for various protocols. Thus, if a particular network resource responds to more than one network resource request from a single requesting entity, that requesting entity will be able to locate duplicate network resource information. Thus, a single unified list of network resources available for various different protocols may be presented with all duplicate network resources removed.Type: ApplicationFiled: August 19, 2014Publication date: December 11, 2014Inventors: Kevin Arnold, David M. O'Rourke
-
Patent number: 8825868Abstract: A duplicate suppression protocol is introduced in order to suppress duplicate entries from appearing in a list of available network resources. With the duplicate suppression protocol of the present invention, a computer that wishes to query for network resources also asks for duplicate suppression information from the responding network resources. The duplicate suppression information for a particular network resource specifies identifiers associated with that network resource for various protocols. Thus, if a particular network resource responds to more than one network resource request from a single requesting entity, that requesting entity will be able to locate duplicate network resource information. Thus, a single unified list of network resources available for various different protocols may be presented with all duplicate network resources removed.Type: GrantFiled: January 16, 2013Date of Patent: September 2, 2014Assignee: Apple Inc.Inventors: Kevin Arnold, David M. O'Rourke
-
Patent number: 8813185Abstract: A mechanism that allows a user to easily configure a rules engine to apply rules to decide which requests for access to a user's computer resources are to be granted and which are denied. A trusted token, such as a certificate of identity issued by a trusted third party authority that verifies identities of computer users, is included in a calling card object provided by the requesting user to the (server) computer that controls the resources desired by the requester. Additional conditions for access may be specified as desired by the user of the server computer.Type: GrantFiled: June 11, 2012Date of Patent: August 19, 2014Assignee: Apple Inc.Inventors: Leland A. Wallace, David M. O'Rourke
-
Publication number: 20130326220Abstract: Private message system, method, and apparatus are described. A private message that includes encrypted data and identifying information indicating a recipient client device authorized to read the private message is stored at a server computer. Since the client devices perform all encryption and decryption processing, the server computer stores the private message in a platform agnostic manner and without performing any encryption/decryption related processes. Although any number of recipient devices can receive the private message, only a recipient client device authorized in accordance with the identifying information can read the private message.Type: ApplicationFiled: May 31, 2012Publication date: December 5, 2013Applicant: Apple Inc.Inventors: Jeffrey A. CONNELLY, David M. O'Rourke, Matthew M. Patenaude
-
Patent number: 8392612Abstract: A method for a client computer to find a network address of a server computer by searching for the network address using at a backup search procedure if the address of the server computer cannot be identified using a primary search procedure. The primary and backup search procedures can be performed in parallel and multiple backup search procedures can be performed to identify the address of the server computer. Alternatively, the primary and backup search procedures can be performed in serial wherein the backup search procedure is performed only when the primary search procedure does not identify the address of the server computer.Type: GrantFiled: December 24, 2003Date of Patent: March 5, 2013Assignee: Apple Inc.Inventors: Steven N. Simon, David M. O'Rourke
-
Patent number: 8392570Abstract: A duplicate suppression protocol is introduced in order to suppress duplicate entries from appearing in a list of available network resources. With the duplicate suppression protocol of the present invention, a computer that wishes to query for network resources also asks for duplicate suppression information from the responding network resources. The duplicate suppression information for a particular network resource specifies identifiers associated with that network resource for various protocols. Thus, if a particular network resource responds to more than one network resource request from a single requesting entity, that requesting entity will be able to locate duplicate network resource information. Thus, a single unified list of network resources available for various different protocols may be presented with all duplicate network resources removed.Type: GrantFiled: April 12, 2010Date of Patent: March 5, 2013Assignee: Apple Inc.Inventors: Kevin Arnold, David M. O'Rourke
-
Publication number: 20120278863Abstract: A mechanism that allows a user to easily configure a rules engine to apply rules to decide which requests for access to a user's computer resources are to be granted and which are denied. A trusted token, such as a certificate of identity issued by a trusted third party authority that verifies identities of computer users, is included in a calling card object provided by the requesting user to the (server) computer that controls the resources desired by the requester. Additional conditions for access may be specified as desired by the user of the server computer.Type: ApplicationFiled: June 11, 2012Publication date: November 1, 2012Inventors: Leland A. WALLACE, David M. O'ROURKE
-
Patent number: 8201214Abstract: A mechanism that allows a user to easily configure a rules engine to apply rules to decide which requests for access to a user's computer resources are to be granted and which are denied. A trusted token, such as a certificate of identity issued by a trusted third party authority that verifies identities of computer users, is included in a calling card object provided by the requesting user to the (server) computer that controls the resources desired by the requester. Additional conditions for access may be specified as desired by the user of the server computer.Type: GrantFiled: September 30, 2005Date of Patent: June 12, 2012Assignee: Apple Inc.Inventors: Leland A. Wallace, David M. O'Rourke
-
Patent number: 8001148Abstract: A method for determining group membership in a computer system, the method comprising: obtaining an identifier that describes a member of a group, the member of a group having a member hash table that contains group membership information describing to what groups a member belongs; performing a primary search of a plurality of groups to determine if each group contains the member's identifier, each group in the plurality having a group hash table that describes to what other groups the group belongs, caching the results of the primary search in the member hash table, for each group to which the member belongs, performing a secondary search of a plurality of groups to determine what groups contain the group to which the member belongs, and caching the results of the secondary search into the group hash table and merging the results into the member hash table, and reading the member hash table to determine group membership.Type: GrantFiled: August 21, 2007Date of Patent: August 16, 2011Assignee: Apple Inc.Inventors: Greg B. Vaughan, David M. O'Rourke
-
Publication number: 20100299729Abstract: Methods and systems for authenticating computers is disclosed. The methods and system include issue a credential from a first computer to a second computer. When the second computer authenticates to the first computer, the second computer transmits the credential and a first challenge to the first computer. The first computer determines whether the credential is valid, computes a first response to the first challenge, and generates a second challenge. The first computer transmits the first response and the second challenge to the second computer. The second computer determines whether the first response is valid and computes a second response to the second challenge. The second computer transmits the second response to the first computer in order to verify and authenticate the computers.Type: ApplicationFiled: April 21, 2010Publication date: November 25, 2010Applicant: APPLE INC.Inventors: Leland A. Wallace, David M. O'Rourke
-
Publication number: 20100223387Abstract: A duplicate suppression protocol is introduced in order to suppress duplicate entries from appearing in a list of available network resources. With the duplicate suppression protocol of the present invention, a computer that wishes to query for network resources also asks for duplicate suppression information from the responding network resources. The duplicate suppression information for a particular network resource specifies identifiers associated with that network resource for various protocols. Thus, if a particular network resource responds to more than one network resource request from a single requesting entity, that requesting entity will be able to locate duplicate network resource information. Thus, a single unified list of network resources available for various different protocols may be presented with all duplicate network resources removed.Type: ApplicationFiled: April 12, 2010Publication date: September 2, 2010Inventors: Kevin Arnold, David M. O'Rourke
-
Patent number: 7747747Abstract: A duplicate suppression protocol is introduced in order to suppress duplicate entries from appearing in a list of available network resources. With the duplicate suppression protocol of the present invention, a computer that wishes to query for network resources also asks for duplicate suppression information from the responding network resources. The duplicate suppression information for a particular network resource specifies identifiers associated with that network resource for various protocols. Thus, if a particular network resource responds to more than one network resource request from a single requesting entity, that requesting entity will be able to locate duplicate network resource information. Thus, a single unified list of network resources available for various different protocols may be presented with all duplicate network resources removed.Type: GrantFiled: May 6, 2002Date of Patent: June 29, 2010Assignee: Apple Inc.Inventors: Kevin Arnold, David M. O'Rourke
-
Patent number: 7735120Abstract: A method for authenticating computers is disclosed. The method comprises issuing a credential from a first computer to a second computer. When the second computer authenticates to the first computer, the second computer transmits the credential and a first challenge to the first computer. The first computer determines whether the credential is valid, computes a first response to the first challenge, and generates a second challenge. The first computer transmits the first response and the second challenge to the second computer. The second computer determines whether the first response is valid and computes a second response to the second challenge. The second computer transmits the second response to the first computer in order to verify and authenticate the computers.Type: GrantFiled: December 24, 2003Date of Patent: June 8, 2010Assignee: Apple Inc.Inventors: Leland A. Wallace, David M. O'Rourke
-
Patent number: 7424615Abstract: The invention provides a cryptographic method which includes receiving at a first entity a second public key MA. At least one of a first session key KB and a first secret SB may be generated based on the second public key MA. A first random nonce NB may be generated which may be encrypted with at least one of the first session key KB and the first secret SB to obtain an encrypted random nonce. The encrypted random nonce may be transmitted from the first entity. In response to transmitting the encrypted random nonce, the first computer may receive a data signal containing a modification of the first random nonce NB+1. If the modification of the first random nonce NB+1 was correctly performed, then at least one of (i) opening a communication link at the first computer, and (ii) generating a first initialization vector IB is performed.Type: GrantFiled: July 30, 2001Date of Patent: September 9, 2008Assignee: Apple Inc.Inventors: Christopher P. Jalbert, Leland A. Wallace, David M. O'Rourke
-
Patent number: 7340463Abstract: A method for determining group membership in a computer system, the method comprising: obtaining an identifier that describes a member of a group, the member of a group having a member hash table that contains group membership information describing to what groups a member belongs; performing a primary search of a plurality of groups to determine if each group contains the member's identifier, each group in the plurality having a group hash table that describes to what other groups the group belongs, caching the results of the primary search in the member hash table, for each group to which the member belongs, performing a secondary search of a plurality of groups to determine what groups contain the group to which the member belongs, and caching the results of the secondary search into the group hash table and merging the results into the member hash table, and reading the member hash table to determine group membership.Type: GrantFiled: June 25, 2004Date of Patent: March 4, 2008Assignee: Apple Inc.Inventors: Greg B. Vaughan, David M. O'Rourke