Patents by Inventor Dean Johnson
Dean Johnson has filed for patents to protect the following inventions. This listing includes patent applications that are pending as well as patents that have already been granted by the United States Patent and Trademark Office (USPTO).
-
Patent number: 11970987Abstract: A phasing system for varying a rotational relationship between a first rotary component and a second rotary component includes a gear hub and a cradle rotor. A spider rotor is arranged between the gear hub and the cradle rotor to selectively lock and unlock relative rotation between the gear hub and the cradle rotor. A torsion spring is coupled between the gear hub and the cradle rotor to apply a torque load between the gear hub and the cradle rotor. A planetary actuator is coupled to the gear hub and the spider rotor. The planetary actuator is operable between a steady-state mode, in which relative rotation between the gear hub and the cradle rotor is inhibited, and a phasing mode, in which the planetary actuator receives a rotary input at a predetermined magnitude to selectively provide a relative rotation between the gear hub and the cradle rotor.Type: GrantFiled: March 15, 2023Date of Patent: April 30, 2024Assignee: HUSCO Automotive Holdings LLCInventors: Curtis L. Van Weelden, Dean Wardle, Bryce Johnson
-
Patent number: 11938036Abstract: An expandable interbody device for placement between adjacent vertebrae having an upper structure, a lower structure and a screw mechanism, wherein actuation of the screw mechanism moves the upper and lower structures between a collapsed configuration and an expanded configuration. A deployment tool couples to the expandable interbody device for positioning the device between adjacent vertebrae, actuating the screw mechanism and delivering a material to a chamber of the expandable interbody device.Type: GrantFiled: April 2, 2020Date of Patent: March 26, 2024Assignee: Spinal Elements, Inc.Inventors: Jason Blain, David Solum, Dean Johnson, Markanthony Flores
-
Publication number: 20240078167Abstract: A method of validating a regulated application by generating, on a local data processing system, an automated agent to oversee a validation process of the regulated application on the local data processing system regardless of a local or web-based nature of the regulated application.Type: ApplicationFiled: September 2, 2022Publication date: March 7, 2024Applicant: Minitab, LLCInventors: Dawn Elaine Keller, Martin Dean Johnson, Jeremy C. Zerbe, Duane Long, Michael J. Yeaney
-
Patent number: 11922168Abstract: A program is executed using a call stack and shadow stack. The call stack includes frames having respective return addresses. The frames may also store variables and/or parameters. The shadow stack stores duplicates of the return addresses in the call stack. The call stack and the shadow stack are maintained by, (i) each time a function is called, adding a corresponding stack frame to the call stack and adding a corresponding return address to the shadow stack, and (ii) each time a function is exited, removing a corresponding frame from the call stack and removing a corresponding return address from the shadow stack. A backtrace of the program's current call chain is generated by accessing the return addresses in the shadow stack. The outputted backtrace includes the return addresses from the shadow stack and/or information about the traced functions that is derived from the shadow stack's return addresses.Type: GrantFiled: March 23, 2022Date of Patent: March 5, 2024Assignee: Microsoft Technology Licensing, LLCInventors: Ben Niu, Gregory John Colombo, Weidong Cui, Jason Lin, Kenneth Dean Johnson
-
Patent number: 11913340Abstract: A seal system for a gas turbine engine includes a ceramic matrix composite (CMC) seal arc segment and a carrier supporting the CMC seal arc segment. The CMC seal arc segment defines radially inner and outer sides and has an abradable layer disposed on the radially outer side. There is a cooling cavity radially between the carrier and the abradable layer. The carrier includes a ridge that projects into a groove in the abradable layer and provides a labyrinth seal that partitions the cooling cavity into sub-cavities.Type: GrantFiled: June 17, 2022Date of Patent: February 27, 2024Assignee: RTX CORPORATIONInventors: Dean Johnson, Thomas E. Clark
-
Publication number: 20230407757Abstract: A seal system for a gas turbine engine includes a ceramic matrix composite (CMC) seal arc segment and a carrier supporting the CMC seal arc segment. The CMC seal arc segment defines radially inner and outer sides and has an abradable layer disposed on the radially outer side. There is a cooling cavity radially between the carrier and the abradable layer. The carrier includes a ridge that projects into a groove in the abradable layer and provides a labyrinth seal that partitions the cooling cavity into sub-cavities.Type: ApplicationFiled: June 17, 2022Publication date: December 21, 2023Inventors: Dean Johnson, Thomas E. Clark
-
Patent number: 11766519Abstract: A flexible plunger rod, drug delivery mechanism, drug delivery device, and methods are described that utilize the flexible plunger rod perform drug delivery operations. In embodiments, the flexible plunger rod can be stored in a curved configuration to thereby reduce a footprint of the drug delivery mechanism and device.Type: GrantFiled: January 17, 2019Date of Patent: September 26, 2023Assignee: AMGEN INC.Inventors: Sudeshna Dutta Ray, Scott R. Gibson, Daniel Eduardo Groszmann, Mehran Mojarrad, Robert Allen Dees, Jonathan Dean Johnson, Antonio S. Murcia
-
Publication number: 20230259371Abstract: Dynamically overriding a function based on a capability set. A computer system reads a portion of an executable image file. The portion includes a first memory address corresponding to a first callee function implementation. The first memory address was inserted into the portion by a compiler toolchain. Based on extensible metadata included in the executable image file, and based on a capability set that is specific to the computer system, the computer system determines a second memory address corresponding to a second callee function implementation. Before execution of the portion, the computer system modifies the portion to replace the first memory address with the second memory address.Type: ApplicationFiled: April 19, 2022Publication date: August 17, 2023Inventors: Pranav KANT, Joseph Norman BIALEK, Xiang FAN, YongKang ZHU, Gabriel Thomas Kodjo DOS REIS, Russell Bivens KELDORPH, Mehmet IYIGUN, Russell Charles HADLEY, Roy WILLIAMS, Kenneth Dean JOHNSON, Pedro Miguel SEQUEIRA DE JUSTO TEIXEIRA, Yevgeniy BAK
-
Patent number: 11720374Abstract: Dynamically overriding a function based on a capability set. A computer system reads a portion of an executable image file. The portion includes a first memory address corresponding to a first callee function implementation. The first memory address was inserted into the portion by a compiler toolchain. Based on extensible metadata included in the executable image file, and based on a capability set that is specific to the computer system, the computer system determines a second memory address corresponding to a second callee function implementation. Before execution of the portion, the computer system modifies the portion to replace the first memory address with the second memory address.Type: GrantFiled: April 19, 2022Date of Patent: August 8, 2023Assignee: Microsoft Technology Licensing, LLCInventors: Pranav Kant, Joseph Norman Bialek, Xiang Fan, YongKang Zhu, Gabriel Thomas Kodjo Dos Reis, Russell Bivens Keldorph, Mehmet Iyigun, Russell Charles Hadley, Roy Williams, Kenneth Dean Johnson, Pedro Miguel Sequeira De Justo Teixeira, Yevgeniy Bak
-
Patent number: 11709931Abstract: Enforcing shadow stack violations at module granularity, rather than at thread or process granularity. An exception is processed during execution of a thread based on code of an application binary, which is enabled for shadow stack enforcement, that calls an external module. The exception results from a mismatch between a return address popped from the thread's call stack and a return address popped from the thread's shadow stack. Processing the exception includes determining that the exception resulted from execution of an instruction in the external module, and determining whether or not the external module is enabled for shadow stack enforcement. Based at least on these determinations, execution of the thread is terminated when the external module is enabled for shadow stack enforcement, or the thread is permitted to continue executing when the external module is not enabled for shadow stack enforcement.Type: GrantFiled: June 6, 2022Date of Patent: July 25, 2023Assignee: Microsoft Technology Licensing, LLCInventors: Jason Lin, Jin Lin, Gregory John Colombo, Niraj Majmudar, Mehmet Iyigun, Shayne Daniel Hiet-Block, Kenneth Dean Johnson
-
Publication number: 20220387189Abstract: A spinal implant device is provided comprising a body structure with a central cavity and a movable lid configured to cover the central cavity. The movable lid is configured to be opened to pack a material in the central cavity. The movable lid can be connected to the body structure with a moveable joint. The spinal implant device can include a compressible feature. A method for treating the spine is provided comprising opening a movable lid of a spinal implant device, packing a material in a central cavity of a spinal implant device, closing the movable lid, and inserting the spinal implant device between vertebrae.Type: ApplicationFiled: May 17, 2022Publication date: December 8, 2022Inventors: Jason Blain, David Hart, Dean Johnson, Gregory Martin
-
Publication number: 20220342983Abstract: Enforcing shadow stack violations at module granularity, rather than at thread or process granularity. An exception is processed during execution of a thread based on code of an application binary, which is enabled for shadow stack enforcement, that calls an external module. The exception results from a mismatch between a return address popped from the thread's call stack and a return address popped from the thread's shadow stack. Processing the exception includes determining that the exception resulted from execution of an instruction in the external module, and determining whether or not the external module is enabled for shadow stack enforcement. Based at least on these determinations, execution of the thread is terminated when the external module is enabled for shadow stack enforcement, or the thread is permitted to continue executing when the external module is not enabled for shadow stack enforcement.Type: ApplicationFiled: June 6, 2022Publication date: October 27, 2022Inventors: Jason LIN, Jin LIN, Gregory John COLOMBO, Niraj MAJMUDAR, Mehmet IYIGUN, Shayne Daniel HIET-BLOCK, Kenneth Dean JOHNSON
-
Publication number: 20220273458Abstract: Devices for fixing interbody fusion devices to bone by helically or corkscrew-shaped elements are provided. Methods for surgically implanting an interbody fusion device using helically-shaped fixation wire are provided.Type: ApplicationFiled: May 6, 2022Publication date: September 1, 2022Inventors: Jason Blain, Dean Johnson
-
Patent number: 11382769Abstract: A spinal implant device is provided comprising a body structure with a central cavity and a movable lid configured to cover the central cavity. The movable lid is configured to be opened to pack a material in the central cavity. The movable lid can be connected to the body structure with a moveable joint. The spinal implant device can include a compressible feature. A method for treating the spine is provided comprising opening a movable lid of a spinal implant device, packing a material in a central cavity of a spinal implant device, closing the movable lid, and inserting the spinal implant device between vertebrae.Type: GrantFiled: September 20, 2019Date of Patent: July 12, 2022Assignee: Spinal Elements, Inc.Inventors: Jason Blain, David Hart, Dean Johnson, Gregory Martin
-
Publication number: 20220214882Abstract: A program is executed using a call stack and shadow stack. The call stack includes frames having respective return addresses. The frames may also store variables and/or parameters. The shadow stack stores duplicates of the return addresses in the call stack. The call stack and the shadow stack are maintained by, (i) each time a function is called, adding a corresponding stack frame to the call stack and adding a corresponding return address to the shadow stack, and (ii) each time a function is exited, removing a corresponding frame from the call stack and removing a corresponding return address from the shadow stack. A backtrace of the program's current call chain is generated by accessing the return addresses in the shadow stack. The outputted backtrace includes the return addresses from the shadow stack and/or information about the traced functions that is derived from the shadow stack's return addresses.Type: ApplicationFiled: March 23, 2022Publication date: July 7, 2022Inventors: Ben NIU, Gregory John COLOMBO, Weidong CUI, Jason LIN, Kenneth Dean JOHNSON
-
Patent number: 11379579Abstract: Enforcing shadow stack violations at module granularity, rather than at thread or process granularity. An exception is processed during execution of a thread based on code of an application binary, which is enabled for shadow stack enforcement, that calls an external module. The exception results from a mismatch between a return address popped from the thread's call stack and a return address popped from the thread's shadow stack. Processing the exception includes determining that the exception resulted from execution of an instruction in the external module, and determining whether or not the external module is enabled for shadow stack enforcement. Based at least on these determinations, execution of the thread is terminated when the external module is enabled for shadow stack enforcement, or the thread is permitted to continue executing when the external module is not enabled for shadow stack enforcement.Type: GrantFiled: March 24, 2020Date of Patent: July 5, 2022Assignee: Microsoft Technology Licensing, LLCInventors: Jason Lin, Jin Lin, Gregory John Colombo, Niraj Majmudar, Mehmet Iyigun, Shayne Daniel Hiet-Block, Kenneth Dean Johnson
-
Publication number: 20220192841Abstract: A spinal implant device is provided comprising a body structure with a central cavity and a movable lid configured to cover the central cavity. The movable lid is configured to be opened to pack a material in the central cavity. The movable lid can be connected to the body structure with a moveable joint. The spinal implant device can include a compressible feature. A method for treating the spine is provided comprising opening a movable lid of a spinal implant device, packing a material in a central cavity of a spinal implant device, closing the movable lid, and inserting the spinal implant device between vertebrae.Type: ApplicationFiled: December 15, 2021Publication date: June 23, 2022Inventors: Jason Blain, David Hart, Dean Johnson, Gregory Martin, Morton Albert, Samuel Tolpen, David Ortiz, Christiana Gabrielle Salvosa
-
Patent number: 11351038Abstract: Devices for fixing interbody fusion devices to bone by helically or corkscrew-shaped elements are provided. Methods for surgically implanting an interbody fusion device using helically-shaped fixation wire are provided.Type: GrantFiled: May 5, 2020Date of Patent: June 7, 2022Assignee: Spinal Elements, inc.Inventors: Jason Blain, Dean Johnson
-
Patent number: 11294682Abstract: A program is executed using a call stack and shadow stack. The call stack includes frames having respective return addresses. The frames may also store variables and/or parameters. The shadow stack stores duplicates of the return addresses in the call stack. The call stack and the shadow stack are maintained by, (i) each time a function is called, adding a corresponding stack frame to the call stack and adding a corresponding return address to the shadow stack, and (ii) each time a function is exited, removing a corresponding frame from the call stack and removing a corresponding return address from the shadow stack. A backtrace of the program's current call chain is generated by accessing the return addresses in the shadow stack. The outputted backtrace includes the return addresses from the shadow stack and/or information about the traced functions that is derived from the shadow stack's return addresses.Type: GrantFiled: May 20, 2019Date of Patent: April 5, 2022Assignee: Microsoft Technology Licensing, LLCInventors: Ben Niu, Gregory John Colombo, Weidong Cui, Jason Lin, Kenneth Dean Johnson
-
Publication number: 20210303680Abstract: Enforcing shadow stack violations at module granularity, rather than at thread or process granularity. An exception is processed during execution of a thread based on code of an application binary, which is enabled for shadow stack enforcement, that calls an external module. The exception results from a mismatch between a return address popped from the thread's call stack and a return address popped from the thread's shadow stack. Processing the exception includes determining that the exception resulted from execution of an instruction in the external module, and determining whether or not the external module is enabled for shadow stack enforcement. Based at least on these determinations, execution of the thread is terminated when the external module is enabled for shadow stack enforcement, or the thread is permitted to continue executing when the external module is not enabled for shadow stack enforcement.Type: ApplicationFiled: March 24, 2020Publication date: September 30, 2021Inventors: Jason LIN, Jin LIN, Gregory John COLOMBO, Niraj MAJMUDAR, Mehmet IYIGUN, Shayne Daniel HIET-BLOCK, Kenneth Dean JOHNSON