Patents by Inventor James Nielson
James Nielson has filed for patents to protect the following inventions. This listing includes patent applications that are pending as well as patents that have already been granted by the United States Patent and Trademark Office (USPTO).
-
Patent number: 11032252Abstract: A device stores a first portion of a database, which is distributed across communication devices of a network, and to authenticate a first interaction with a second device: sends a first ID to the second device to authenticate itself with the second device; receives a second ID from the second device; retrieve, using the second ID, a public key associated with one of the first portion of the database or a second portion of the database stored in a third device, which has a third address that is numerically within a threshold value of a first address of the device; and verify, based on a permission stored in relation to the public key, that the second device is authorized to engage in the first interaction with the device.Type: GrantFiled: January 2, 2019Date of Patent: June 8, 2021Assignee: SYCCURE, INC.Inventors: Seth James Nielson, Thomas Capola
-
Publication number: 20190207912Abstract: A device stores a first portion of a database, which is distributed across communication devices of a network, and to authenticate a first interaction with a second device: sends a first ID to the second device to authenticate itself with the second device; receives a second ID from the second device; retrieve, using the second ID, a public key associated with one of the first portion of the database or a second portion of the database stored in a third device, which has a third address that is numerically within a threshold value of a first address of the device; and verify, based on a permission stored in relation to the public key, that the second device is authorized to engage in the first interaction with the device.Type: ApplicationFiled: January 2, 2019Publication date: July 4, 2019Inventors: Seth James Nielson, Thomas Capola
-
Publication number: 20170253471Abstract: A hose header for a lift truck mast is constructed to inhibit wear of hydraulic hoses.Type: ApplicationFiled: May 19, 2017Publication date: September 7, 2017Applicant: Hyster-Yale Group, Inc.Inventors: Joseph A. Brotherton, James Nielson, Dennis Loewen
-
Patent number: 9516002Abstract: Two approaches are provided for distributing trust among certificate authorities. Each approach may be used to secure data in motion. One approach provides methods and systems in which a secure data parser is used to distribute trust in a set of certificate authorities during initial negotiation (e.g., the key establishment phase) of a connection between two devices. Another approach of the present invention provides methods and systems in which the secure data parser is used to disperse packets of data into shares. A set of tunnels is established within a communication channel using a set of certificate authorities, keys developed during the establishment of the tunnels are used to encrypt shares of data for each of the tunnels, and the shares of data are transmitted through each of the tunnels. Accordingly, trust is distributed among a set of certificate authorities in the structure of the communication channel itself.Type: GrantFiled: April 15, 2014Date of Patent: December 6, 2016Assignee: Security First Corp.Inventors: Mark S. O'Hare, Rick L. Orsini, Stephen C. Bono, Gabriel D. Landau, Seth James Nielson
-
Publication number: 20150158707Abstract: A hose header for a lift truck mast is constructed to inhibit wear of hydraulic hoses.Type: ApplicationFiled: December 10, 2014Publication date: June 11, 2015Applicant: NACCO MATERIALS HANDLING GROUP, INC.Inventors: Joseph A. Brotherton, James Nielson, Dennis Loewen
-
Publication number: 20140343601Abstract: Systems and methods for treating internal tissue defects, such as septal defects, with clip-based devices are provided. An exemplary clip-based device includes a tubular body having at least a first and a second deflectable member coupled thereto. The first and second members are coupled on opposite ends of the tubular body and configured to deflect between an undeployed configuration and a deployed configuration. In the deployed configuration, each member extends outwardly away from the tubular body in a position configured to abut a tissue surface. The first and second members are preferably configured to maintain a tissue wall therebetween and at least partially close any opening in the tissue wall.Type: ApplicationFiled: April 7, 2014Publication date: November 20, 2014Applicant: PROMED, INC.Inventors: Ryan Abbott, W. Martin Belef, Dean Carson, Peter Fitzgerald, Ronald J. Jabba, James Nielson, Peter Thornton
-
Publication number: 20140310516Abstract: Two approaches are provided for distributing trust among certificate authorities. Each approach may be used to secure data in motion. One approach provides methods and systems in which a secure data parser is used to distribute trust in a set of certificate authorities during initial negotiation (e.g., the key establishment phase) of a connection between two devices. Another approach of the present invention provides methods and systems in which the secure data parser is used to disperse packets of data into shares. A set of tunnels is established within a communication channel using a set of certificate authorities, keys developed during the establishment of the tunnels are used to encrypt shares of data for each of the tunnels, and the shares of data are transmitted through each of the tunnels. Accordingly, trust is distributed among a set of certificate authorities in the structure of the communication channel itself.Type: ApplicationFiled: June 27, 2014Publication date: October 16, 2014Inventors: Mark S. O'Hare, Rick L. Orsini, Stephen C. Bono, Gabriel D. Landau, Seth James Nielson
-
Publication number: 20140304503Abstract: Two approaches are provided for distributing trust among certificate authorities. Each approach may be used to secure data in motion. One approach provides methods and systems in which a secure data parser is used to distribute trust in a set of certificate authorities during initial negotiation (e.g., the key establishment phase) of a connection between two devices. Another approach of the present invention provides methods and systems in which the secure data parser is used to disperse packets of data into shares. A set of tunnels is established within a communication channel using a set of certificate authorities, keys developed during the establishment of the tunnels are used to encrypt shares of data for each of the tunnels, and the shares of data are transmitted through each of the tunnels. Accordingly, trust is distributed among a set of certificate authorities in the structure of the communication channel itself.Type: ApplicationFiled: April 15, 2014Publication date: October 9, 2014Applicant: SECURITY FIRST CORP.Inventors: Mark S. O'Hare, Rick L. Orsini, Stephen C. Bono, Gabriel D. Landau, Seth James Nielson
-
Publication number: 20140236205Abstract: Systems and methods for treating internal tissue defects, such as septal defects, with implantable devices are provided. An exemplary clip-based device includes a tubular body having at least a deflectable anchors coupled thereto. The anchors can be coupled on opposite ends of the tubular body and configured to deflect between an undeployed configuration and a deployed configuration. In the deployed configuration, each anchor extends outwardly away from the tubular body in a position configured to abut a tissue surface. The anchors are preferably configured to maintain a tissue wall therebetween and at least partially close any opening in the tissue wall. Also provided are delivery devices for delivering the implantable closure device and methods for using the various devices.Type: ApplicationFiled: September 13, 2013Publication date: August 21, 2014Applicant: PROMED, INC.Inventors: Ronald J. Jabba, Ryan Abbott, Dean Carson, James Nielson, W. Martin Belef
-
Publication number: 20140201538Abstract: Systems and methods are provided for securing data. A processing device receives a data set and identifies a first subset of data from a first dimension of a multi-dimensional representation of the data set. The processing device encrypts the first subset of data using a first encryption technique to yield a first encrypted subset of data and replaces the first subset of data in the multi-dimensional representation of the data set with the first subset of encrypted data. The processing device then identifies a second subset of data from a second dimension of the multi-dimensional representation of the data set, with the second subset of data including at least a portion of the first subset of encrypted data, and encrypts the second subset of data using a second encryption technique to yield a second encrypted subset of data.Type: ApplicationFiled: January 27, 2014Publication date: July 17, 2014Applicant: Security First Corp.Inventors: Mark S. O'Hare, Rick L. Orsini, Stephen C. Bono, Gabriel D. Landau, Seth James Nielson
-
Patent number: 8745379Abstract: Two approaches are provided for distributing trust among a set of certificate authorities. Each approach may be used to secure data in motion. One approach provides methods and systems in which the secure data parser is used to distribute trust in a set of certificate authorities during initial negotiation (e.g., the key establishment phase) of a connection between two devices. Another approach provides methods and systems in which the secure data parser is used to disperse packets of data into shares. A set of tunnels is established within a communication channel using a set of certificate authorities, keys developed during the establishment of the tunnels are used to encrypt shares of data for each of the tunnels, and the shares of data are transmitted through each of the tunnels. Accordingly, trust is distributed among a set of certificate authorities in the structure of the communication channel itself.Type: GrantFiled: August 20, 2012Date of Patent: June 3, 2014Assignee: Security First Corp.Inventors: Rick L. Orsini, Mark S. O'Hare, Stephen C. Bono, Gabriel D. Landau, Seth James Nielson
-
Patent number: 8745372Abstract: Systems and methods are provided for distributing trust among a set of certificate authorities. One approach provides methods and systems in which the secure data parser is used to distribute trust in a set of certificate authorities during initial negotiation of a connection between two devices. Another approach provides methods and systems in which the secure data parser is used to disperse packets of data into shares. A set of tunnels is established within a communication channel using a set of certificate authorities, keys developed during the establishment of the tunnels are used to encrypt shares of data, and the shares of data are transmitted through each of the tunnels.Type: GrantFiled: November 24, 2010Date of Patent: June 3, 2014Assignee: Security First Corp.Inventors: Rick L. Orsini, Mark S. O'Hare, Stephen C. Bono, Gabriel D. Landau, Seth James Nielson
-
Patent number: 8677148Abstract: Systems and methods are provided for securing data. A processing device receives a data set and identifies a first subset of data from a first dimension of a multi-dimensional representation of the data set. The processing device encrypts the first subset of data using a first encryption technique to yield a first encrypted subset of data and replaces the first subset of data in the multi-dimensional representation of the data set with the first subset of encrypted data. The processing device then identifies a second subset of data from a second dimension of the multi-dimensional representation of the data set, with the second subset of data including at least a portion of the first subset of encrypted data, and encrypts the second subset of data using a second encryption technique to yield a second encrypted subset of data.Type: GrantFiled: January 27, 2012Date of Patent: March 18, 2014Assignee: Security First Corp.Inventors: Mark S. O'Hare, Rick L. Orsini, Stephen C. Bono, Gabriel D. Landau, Seth James Nielson
-
Publication number: 20130042105Abstract: Two approaches are provided for distributing trust among a set of certificate authorities. Each approach may be used to secure data in motion. One approach provides methods and systems in which the secure data parser is used to distribute trust in a set of certificate authorities during initial negotiation (e.g., the key establishment phase) of a connection between two devices. Another approach provides methods and systems in which the secure data parser is used to disperse packets of data into shares. A set of tunnels is established within a communication channel using a set of certificate authorities, keys developed during the establishment of the tunnels are used to encrypt shares of data for each of the tunnels, and the shares of data are transmitted through each of the tunnels. Accordingly, trust is distributed among a set of certificate authorities in the structure of the communication channel itself.Type: ApplicationFiled: August 20, 2012Publication date: February 14, 2013Applicant: Security First Corp.Inventors: Rick L. Orsini, Mark S. O'Hare, Stephen C. Bono, Gabriel D. Landau, Seth James Nielson
-
Publication number: 20120198241Abstract: Systems and methods are provided for securing data. A processing device receives a data set and identifies a first subset of data from a first dimension of a multi-dimensional representation of the data set. The processing device encrypts the first subset of data using a first encryption technique to yield a first encrypted subset of data and replaces the first subset of data in the multi-dimensional representation of the data set with the first subset of encrypted data. The processing device then identifies a second subset of data from a second dimension of the multi-dimensional representation of the data set, with the second subset of data including at least a portion of the first subset of encrypted data, and encrypts the second subset of data using a second encryption technique to yield a second encrypted subset of data.Type: ApplicationFiled: January 27, 2012Publication date: August 2, 2012Applicant: Security First Corp.Inventors: Mark S. O'Hare, Rick L. Orsini, Stephen C. Bono, Gabriel D. Landau, Seth James Nielson
-
Publication number: 20120136469Abstract: A system for controlling the operation of a printing press used to apply an aqueous printable electrically conductive ink onto a substrate to create electrically conductive traces of such ink includes a probe for contacting the electrical traces and for obtaining a resistance measurement therefrom. A computer receives the resistance measurement, compares such measurement with pre-selected data correlating resistance with acceptable performance criteria for such traces, determines whether such resistance measurement signifies acceptable performance, and signals an appropriate mechanism for identifying those electrical traces which do not meet the acceptable performance criteria. Unacceptable traces are removed from the press prior to further processing. The computer can also signal an ink replenishment or conditioning system, contained in a replaceable cartridge, to correct any abnormalities in the ink properties.Type: ApplicationFiled: June 8, 2006Publication date: May 31, 2012Inventors: Michael Petersen, Mykola Sherstyuk, James Nielson
-
Publication number: 20110202755Abstract: Two approaches are provided for distributing trust among a set of certificate authorities. Both approaches are equally secure. In each approach, a secure data parser is integrated with any suitable encryption technology. Each approach may be used to secure data in motion. One approach provides methods and systems in which the secure data parser is used to distribute trust in a set of certificate authorities during initial negotiation (e.g., the key establishment phase) of a connection between two devices. Another approach of the present invention provides methods and systems in which the secure data parser is used to disperse packets of data into shares. A set of tunnels is established within a communication channel using a set of certificate authorities, keys developed during the establishment of the tunnels are used to encrypt shares of data for each of the tunnels, and the shares of data are transmitted through each of the tunnels.Type: ApplicationFiled: November 24, 2010Publication date: August 18, 2011Applicant: Security First Corp.Inventors: RICK L. ORSINI, Mark S. O'Hare, Stephen C. Bono, Gabriel D. Landau, Seth James Nielson
-
Patent number: D764740Type: GrantFiled: December 20, 2013Date of Patent: August 23, 2016Assignee: Hyster-Yale Group, Inc.Inventors: Joseph A. Brotherton, Kevin Miles, Todd Morgan, James Nielson, John Deodato
-
Patent number: D820551Type: GrantFiled: July 8, 2016Date of Patent: June 12, 2018Assignee: HYSTER-YALE GROUP, INC.Inventors: Joseph A. Brotherton, Kevin Miles, Todd Morgan, James Nielson, John Deodato
-
Patent number: D876043Type: GrantFiled: May 7, 2018Date of Patent: February 18, 2020Assignee: HYSTER-YALE GROUP, INC.Inventors: Joseph A. Brotherton, Kevin Miles, Todd Morgan, James Nielson, John Deodato