Patents by Inventor James H. Koenig

James H. Koenig has filed for patents to protect the following inventions. This listing includes patent applications that are pending as well as patents that have already been granted by the United States Patent and Trademark Office (USPTO).

  • Publication number: 20240077890
    Abstract: The present disclosure generally relates to methods and system used to collect waste fluids. A system controller is disclosed to control the operation of at least a portion of the system. The controller has a CPU. The fabrication facility includes a first processing system having fluid dispensed therein for processing a material on a part. A first drain is configured to collect the processing fluid as waste fluid after processing the part. The fabrication facility also includes a waste collection system fluidly coupled to the system drain. The waste collection system has two or more valves configured to couple the system drain and two or more facility drains. Each facility drain is uniquely coupled to one of the two or more valves. The CPU is configured to operate the valves between an open and a closed state in response to the fluid entering the system drain.
    Type: Application
    Filed: September 1, 2022
    Publication date: March 7, 2024
    Inventors: Maxime CAYER, John L. KOENIG, Tony H. TONG, Shaun W. CRAWFORD, James L'HEUREUX, Andreas NEUBER, Ching-Hong HSIEH
  • Patent number: 7634545
    Abstract: A method for controlling distribution of network communications (messages). An incoming message either carries priority information, or is assigned priority information based on a shared characteristic with other messages. The priority information is used to determine how and/or when to deliver the message, e.g. by delaying the message for a fixed time. Preferences for receipt of messages by priority level may be communication to upstream hosts along a network path. Accordingly, an intermediary host may reject and/or delay messages that the intended recipient does not wish to receive. This pushes the burden of low-priority messages back to the sender, thereby reducing or eliminating burdens on network/system resources of the recipient and/or intermediaries between the recipient and the sender. Accordingly, it can “squelch” spam messages at or close to their source. Trusted senders complying with prescribed practices may include priority information allowing for delivery of their messages with higher priority.
    Type: Grant
    Filed: September 28, 2007
    Date of Patent: December 15, 2009
    Assignee: Symantec Corporation
    Inventors: Vincent J. Schiavone, James H. Koenig, David I. Brussin
  • Patent number: 7571214
    Abstract: A method for controlling distribution of network communications (messages). An incoming message either carries priority information, or is assigned priority information based on a shared characteristic with other messages. The priority information is used to determine how and/or when to deliver the message, e.g. by delaying the message for a fixed time. Preferences for receipt of messages by priority level may be communication to upstream hosts along a network path. Accordingly, an intermediary host may reject and/or delay messages that the intended recipient does not wish to receive. This pushes the burden of low-priority messages back to the sender, thereby reducing or eliminating burdens on network/system resources of the recipient and/or intermediaries between the recipient and the sender. Accordingly, it can “squelch” spam messages at or close to their source. Trusted senders complying with prescribed practices may include priority information allowing for delivery of their messages with higher priority.
    Type: Grant
    Filed: September 28, 2007
    Date of Patent: August 4, 2009
    Assignee: Symantec Corporation
    Inventors: Vincent J. Schiavone, James H. Koenig, David I. Brussin
  • Patent number: 7543036
    Abstract: A method for controlling distribution of network communications (messages). An incoming message either carries priority information, or is assigned priority information based on a shared characteristic with other messages. The priority information is used to determine how and/or when to deliver the message, e.g. by delaying the message for a fixed time. Preferences for receipt of messages by priority level may be communication to upstream hosts along a network path. Accordingly, an intermediary host may reject and/or delay messages that the intended recipient does not wish to receive. This pushes the burden of low-priority messages back to the sender, thereby reducing or eliminating burdens on network/system resources of the recipient and/or intermediaries between the recipient and the sender. Accordingly, it can “squelch” spam messages at or close to their source. Trusted senders complying with prescribed practices may include priority information allowing for delivery of their messages with higher priority.
    Type: Grant
    Filed: September 28, 2007
    Date of Patent: June 2, 2009
    Assignee: Symantec Corporation
    Inventors: Vincent J. Schiavone, James H. Koenig, David I. Brussin
  • Patent number: 7415504
    Abstract: A method for controlling distribution of network communications (messages). An incoming message either carries priority information, or is assigned priority information based on a shared characteristic with other messages. The priority information is used to determine how and/or when to deliver the message, e.g. by delaying the message for a fixed time. Preferences for receipt of messages by priority level may be communicated to upstream hosts along a network path. Accordingly, an intermediary host may reject and/or delay messages that the intended recipient does not wish to receive. This pushes the burden of low-priority messages back to the sender, thereby reducing or eliminating burdens on network/system resources of the recipient and/or intermediaries between the recipient and the sender. Accordingly, it can “squelch” spam messages at or close to their source. Trusted senders complying with prescribed practices may include priority information allowing for delivery of their messages with higher priority.
    Type: Grant
    Filed: February 26, 2002
    Date of Patent: August 19, 2008
    Assignee: Symantec Corporation
    Inventors: Vincent J. Schiavone, James H. Koenig, David I. Brussin
  • Publication number: 20020120600
    Abstract: A method for negotiating an electronic mail transaction. An electronic mail message's mail type specifier is identified. A data store stores data specific to the intended recipient. The data store is referenced and the electronic mail message is processed as a function of the mail type specifier and data retrieved from the data store. The mail may be processed at the recipient's mail client device and the information maintained confidential. The processing may be based upon reference to a rule applicable to that particular message. The rule includes a conditional instruction conditioned upon a result of a logic or other function of recipient profile data. Alternatively, the processing may provide for modification of the content of the message as a function of such recipient profile data. Recipient preferences from multiple recipients may be aggregated and propagated to senders and/or intermediaries to allow for pre-transmission processing of electronic mail messages.
    Type: Application
    Filed: February 26, 2001
    Publication date: August 29, 2002
    Inventors: Vincent J. Schiavone, James H. Koenig, Simson Garfinkel
  • Publication number: 20020120705
    Abstract: A method for controlling distribution of network communications (messages). An incoming message either carries priority information, or is assigned priority information based on a shared characteristic with other messages. The priority information is used to determine how and/or when to deliver the message, e.g. by delaying the message for a fixed time. Preferences for receipt of messages by priority level may be communication to upstream hosts along a network path. Accordingly, an intermediary host may reject and/or delay messages that the intended recipient does not wish to receive. This pushes the burden of low-priority messages back to the sender, thereby reducing or eliminating burdens on network/system resources of the recipient and/or intermediaries between the recipient and the sender. Accordingly, it can “squelch” spam messages at or close to their source.
    Type: Application
    Filed: February 26, 2002
    Publication date: August 29, 2002
    Inventors: Vincent J. Schiavone, James H. Koenig
  • Publication number: 20020120748
    Abstract: A method for selectively delivering and forwarding electronic mail messages. A user having a certain electronic mailbox for receiving electronic mail messages provides an alternate electronic mail address of an alternate electronic mailbox. Criteria is established for determining whether an e-mail message addressed for delivery to the certain electronic mailbox will be delivered to that mailbox or forwarded to the alternate electronic mail address. The method is implemented by mail routing software running on a mail server. The mail routing software forwards mail messages meeting the criteria without delivering them to the electronic mailbox to which they were addressed. The method thereby lessens the burdens on the electronic mail system servicing the certain electronic mailbox and prevents delivery of inappropriate messages to the certain electronic mailbox while permitting retrieval of such messages via an alternate electronic mailbox. An apparatus for carrying out the inventive method is also provided.
    Type: Application
    Filed: February 26, 2001
    Publication date: August 29, 2002
    Inventors: Vincent J. Schiavone, James H. Koenig, Cedarampattu Mohan
  • Publication number: 20020120692
    Abstract: An electronic mail transaction system for rule-based processing of e-mail messages to conduct predefined transactions via an electronic mail messaging infrastructure. Rules are defined for conducting various transactions. Senders and/or receivers specify a rule selected from among a common set of accepted rules. Preferably, each rule provides for automated retrieval of at least some required data elements from a data store. The data store may be stored privately, which protects the privacy of users of the system. Senders and receivers can then conduct transactions according to the predefined rules, which standardizes and facilitates the transactions. Establishment, management and/or approval of rules by a trusted third party intermediary protects and engenders trust in users of the system and facilitates order and efficiency. The system permits users to conduct transactions without a continuous network connection, i.e.
    Type: Application
    Filed: February 26, 2001
    Publication date: August 29, 2002
    Inventors: Vincent J. Schiavone, James H. Koenig, Cedarampattu Mohan
  • Publication number: 20020120702
    Abstract: A method for prioritization of a recipient's electronic mail messages. Messages are displayed in descending order of an associated priority bid. Messages include an initial priority bid and/or a maximum priority bid, e.g., a cash value. An incoming message's initial bid is compared to current bids of previous messages and the bid is increased if it is lower than any previous message's current bid so that it will appear first in descending sorted order, e.g. in the recipient's electronic mail inbox, and thus have priority. Prioritization may continue to permit a previous message to increase its bid until it has the highest priority bid among the messages or until the incoming message has a priority bid higher than the maximum bid of all previous messages or until the incoming mail message reaches its maximum bid. Messages may be displayed in categorized sections and prioritization performed on fewer than all sections.
    Type: Application
    Filed: February 26, 2001
    Publication date: August 29, 2002
    Inventors: Vincent J. Schiavone, James H. Koenig
  • Publication number: 20020120581
    Abstract: A rule-based electronic mail transaction system and method for conducting predefined transactions via electronic mail messaging. An electronic mail message prescribes a reply action for confirming agreement to conduct the transaction. If the recipient performs the action, a rule for conducting the transaction is identified. The rule defines data required for the transaction. Required data is gathered from a recipient data store responsive to a confirming action on the part of the recipient. The required data is used to complete the transaction. Optionally, information may be retrieved from the sender's side to complete the transaction. Diverse transactions may be conducted in this manner, including sale and non-sale transactions, such as promotional and viral marketing, charitable donations, online bill payment, electoral voting, customer service communications, customer relationship management communications, product returns, and membership and enrollment transactions.
    Type: Application
    Filed: February 26, 2001
    Publication date: August 29, 2002
    Inventors: Vincent J. Schiavone, James H. Koenig