Patents by Inventor Joel A. Howard
Joel A. Howard has filed for patents to protect the following inventions. This listing includes patent applications that are pending as well as patents that have already been granted by the United States Patent and Trademark Office (USPTO).
-
Patent number: 11957575Abstract: Stented prosthetic heart valves including a stent frame having a plurality of stent frame support structures collectively defining an interior surface, an exterior surface and a plurality of cells. The stented prosthetic heart valve further including a valve structure including valve leaflets disposed within and secured to the stent frame and defining a margin of attachment. The stented prosthetic heart valve including one or both of an outer paravalvular leakage prevention wrap and an inner skirt for supporting the valve leaflets. In various embodiments, the outer wrap is positioned entirely on one side of the margin of attachment. In embodiments including an inner skirt, the outer wrap and the inner skirt are on opposite sides of the margin of attachment such that the inner skirt and the outer wrap do not overlap. In other embodiments, the outer wrap includes a plurality of zones having varying thickness.Type: GrantFiled: July 13, 2022Date of Patent: April 16, 2024Assignee: MEDTRONIC VASCULAR, INC.Inventors: Elliot Howard, Amy Hallak, Ana Menk, Matthew Weston, Joel Racchini
-
Patent number: 11672029Abstract: Embodiments are disclosed that allow data to be sent between a Bluetooth enabled device and a virtual device associated with a corresponding physical device. In particular, embodiments of a virtual mobile device system may include one or more components for processing Bluetooth calls where these Bluetooth components may process received Bluetooth calls in a first manner in a connected state and process Bluetooth calls in a disconnected state in a second manner.Type: GrantFiled: October 21, 2020Date of Patent: June 6, 2023Assignee: HYPORI, LLCInventor: Joel Howard Schopp
-
Patent number: 11596008Abstract: Embodiments are disclosed that allow encrypted data to be sent between a Bluetooth enabled device and a virtual device associated with a corresponding physical device. In particular, a Bluetooth implementation on the physical device may include one or more raw interfaces to facilitate endpoint to endpoint secure Bluetooth cryptography. Using these raw interfaces, an encrypted Bluetooth channel may be established directly between the virtual device and the Bluetooth enabled device using the radio of the physical device, where data may be encrypted and decrypted at an endpoint of the Bluetooth communication channel (such as at the virtual device or the Bluetooth enabled device) and passed through a Bluetooth implementation on the physical device without any additional encryption or decryption being performed on that data.Type: GrantFiled: May 24, 2021Date of Patent: February 28, 2023Assignee: HYPORI LLCInventor: Joel Howard Schopp
-
Publication number: 20210282196Abstract: Embodiments are disclosed that allow encrypted data to be sent between a Bluetooth enabled device and a virtual device associated with a corresponding physical device. In particular, a Bluetooth implementation on the physical device may include one or more raw interfaces to facilitate endpoint to endpoint secure Bluetooth cryptography. Using these raw interfaces, an encrypted Bluetooth channel may be established directly between the virtual device and the Bluetooth enabled device using the radio of the physical device, where data may be encrypted and decrypted at an endpoint of the Bluetooth communication channel (such as at the virtual device or the Bluetooth enabled device) and passed through a Bluetooth implementation on the physical device without any additional encryption or decryption being performed on that data.Type: ApplicationFiled: May 24, 2021Publication date: September 9, 2021Applicant: Hypori LLCInventor: Joel Howard Schopp
-
Patent number: 11039486Abstract: Embodiments are disclosed that allow encrypted data to be sent between a Bluetooth enabled device and a virtual device associated with a corresponding physical device. In particular, a Bluetooth implementation on the physical device may include one or more raw interfaces to facilitate endpoint to endpoint secure Bluetooth cryptography. Using these raw interfaces, an encrypted Bluetooth channel may be established directly between the virtual device and the Bluetooth enabled device using the radio of the physical device, where data may be encrypted and decrypted at an endpoint of the Bluetooth communication channel (such as at the virtual device or the Bluetooth enabled device) and passed through a Bluetooth implementation on the physical device without any additional encryption or decryption being performed on that data.Type: GrantFiled: February 1, 2018Date of Patent: June 15, 2021Assignee: Hypori LLCInventor: Joel Howard Schopp
-
Patent number: 10963280Abstract: Systems, apparatuses, and methods for implementing hypervisor post-write notification of processor state register modifications. A write to a state register of the processor may be detected during guest execution. In response to detecting the write to the state register, the processor may trigger microcode to perform the write and copy the new value of the register to a memory location prior to exiting the guest. The hypervisor may be notified of the update to the state register after it occurs, and the hypervisor may be prevented from modifying the value of the guest's state register. The hypervisor may terminate the guest if the update to the state register is unacceptable. Alternatively, the hypervisor may recommend an alternate value to the guest. If the guest agrees, the guest may set the state register to the alternate value recommended by the hypervisor when the guest resumes operation.Type: GrantFiled: February 3, 2016Date of Patent: March 30, 2021Assignee: Advanced Micro Devices, Inc.Inventors: David A. Kaplan, Joel Howard Schopp
-
Publication number: 20210037579Abstract: Embodiments are disclosed that allow data to be sent between a Bluetooth enabled device and a virtual device associated with a corresponding physical device. In particular, embodiments of a virtual mobile device system may include one or more components for processing Bluetooth calls where these Bluetooth components may process received Bluetooth calls in a first manner in a connected state and process Bluetooth calls in a disconnected state in a second manner.Type: ApplicationFiled: October 21, 2020Publication date: February 4, 2021Applicant: Intelligent Waves LLCInventor: Joel Howard SCHOPP
-
Patent number: 10849172Abstract: Embodiments are disclosed that allow data to be sent between a BLUETOOTH® enabled device and a virtual device associated with a corresponding physical device. In particular, embodiments of a virtual mobile device system may include one or more components for processing BLUETOOTH® calls where these components may process received BLUETOOTH® calls in a first manner in a connected state and process BLUETOOTH® calls in a disconnected state in a second manner.Type: GrantFiled: February 1, 2018Date of Patent: November 24, 2020Assignee: Intelligent Waves LLCInventor: Joel Howard Schopp
-
Publication number: 20200030534Abstract: A medicament injection device including a needle, a first stage that controls positioning of the needle at a depth into an animal when the device is pressed against the animal, and a second stage that injects the medicament through the needle into the animal after the needle is positioned at the depth and the device is further pressed against the animal. The device preferably includes a mechanism that permits the second stage to inject the medicament only after the needle is positioned at the depth. The depth of the needle preferably is adjustable, as is the amount of the medicament injected. In preferred aspects, these two features are independently adjustable. One or more springs, pneumatics elements, or other elements may automatically reset the first stage, the second stage, or both after the device is withdrawn from the animal. Also, associated methods.Type: ApplicationFiled: July 28, 2018Publication date: January 30, 2020Inventor: Joel Howard
-
Publication number: 20180220472Abstract: Embodiments are disclosed that allow data to be sent between a Bluetooth enabled device and a virtual device associated with a corresponding physical device. In particular, embodiments of a virtual mobile device system may include one or more components for processing Bluetooth calls where these Bluetooth components may process received Bluetooth calls in a first manner in a connected state and process Bluetooth calls in a disconnected state in a second manner.Type: ApplicationFiled: February 1, 2018Publication date: August 2, 2018Inventor: Joel Howard Schopp
-
Publication number: 20180219672Abstract: Embodiments are disclosed that allow encrypted data to be sent between a Bluetooth enabled device and a virtual device associated with a corresponding physical device. In particular, a Bluetooth implementation on the physical device may include one or more raw interfaces to facilitate endpoint to endpoint secure Bluetooth cryptography. Using these raw interfaces, an encrypted Bluetooth channel may be established directly between the virtual device and the Bluetooth enabled device using the radio of the physical device, where data may be encrypted and decrypted at an endpoint of the Bluetooth communication channel (such as at the virtual device or the Bluetooth enabled device) and passed through a Bluetooth implementation on the physical device without any additional encryption or decryption being performed on that data.Type: ApplicationFiled: February 1, 2018Publication date: August 2, 2018Inventor: Joel Howard Schopp
-
Patent number: 9734078Abstract: A method for resetting of memory locks in a transactional memory system. The method includes a processor setting at least one new memory lock during execution of a transaction that acquires access to a region of memory. The new memory lock indicates that the transaction and its associated thread have exclusive temporary access to the memory region. The method further includes determining if a first in first out (FIFO) memory lock register is full of memory locks and, in response to the FIFO memory lock register being full, a memory lock is removed from a tail position of the FIFO memory lock register. The removed memory lock is reset to return to a transactional memory state and the new memory lock is added to a head position in the FIFO memory lock register.Type: GrantFiled: August 31, 2015Date of Patent: August 15, 2017Assignee: International Business Machines CorporationInventors: Nathan Fontenot, Ryan Patrick Grimm, Robert Cory Jennings, Jr., Joel Howard Schopp, Michael Thomas Strosaker
-
Publication number: 20170220369Abstract: Systems, apparatuses, and methods for implementing hypervisor post-write notification of processor state register modifications. A write to a state register of the processor may be detected during guest execution. In response to detecting the write to the state register, the processor may trigger microcode to perform the write and copy the new value of the register to a memory location prior to exiting the guest. The hypervisor may be notified of the update to the state register after it occurs, and the hypervisor may be prevented from modifying the value of the guest's state register. The hypervisor may terminate the guest if the update to the state register is unacceptable. Alternatively, the hypervisor may recommend an alternate value to the guest. If the guest agrees, the guest may set the state register to the alternate value recommended by the hypervisor when the guest resumes operation.Type: ApplicationFiled: February 3, 2016Publication date: August 3, 2017Inventors: David A. Kaplan, Joel Howard Schopp
-
Patent number: 9524246Abstract: A system and computer program product for resetting of memory locks in a transactional memory system. The system includes a processor setting at least one new memory lock during execution of a transaction that acquires access to a region of memory. The new memory lock indicates that the transaction and its associated thread have exclusive temporary access to the memory region. The system further includes the processor determining if a first in first out (FIFO) memory lock register is full of memory locks and, in response to the FIFO memory lock register being full, a memory lock is removed from a tail position of the FIFO memory lock register. The removed memory lock is reset to return to a transactional memory state and the new memory lock is added to a head position in the FIFO memory lock register.Type: GrantFiled: September 10, 2014Date of Patent: December 20, 2016Assignee: International Business Machines CorporationInventors: Nathan Fontenot, Ryan Patrick Grimm, Robert Cory Jennings, Jr., Joel Howard Schopp, Michael Thomas Strosaker
-
Patent number: 9380286Abstract: Stereoscopic target region filling techniques are described. Techniques are described in which stereo consistency is promoted between target regions, such as by sharing information during computation. Techniques are also described in which target regions of respective disparity maps are completed to promote consistency between the disparity maps. This estimated disparity may then be used as a guide to completion of a missing texture in the target region. Techniques are further described in which cross-image searching and matching is employed by leveraging a plurality of images. This may including giving preference to matches with cross-image consistency to promote consistency, thereby enforcing stereo consistency between stereo images when applicable.Type: GrantFiled: April 19, 2013Date of Patent: June 28, 2016Assignee: Adobe Systems IncorporatedInventors: Scott D. Cohen, Brian L. Price, Bryan Stuart Morse, Joel A. Howard
-
Patent number: 9350969Abstract: Target region filling techniques are described. Techniques are described in which stereo consistency is promoted between target regions, such as by sharing information during computation. Techniques are also described in which target regions of respective disparity maps are completed to promote consistency between the disparity maps. This estimated disparity may then be used as a guide to completion of a missing texture in the target region. Techniques are further described in which cross-image searching and matching is employed by leveraging a plurality of images. This may including giving preference to matches with cross-image consistency to promote consistency, thereby enforcing stereo consistency between stereo images when applicable.Type: GrantFiled: April 19, 2013Date of Patent: May 24, 2016Assignee: Adobe Systems IncorporatedInventors: Scott D. Cohen, Brian L. Price, Bryan Stuart Morse, Joel A. Howard
-
Publication number: 20160070650Abstract: A method for resetting of memory locks in a transactional memory system. The method includes a processor setting at least one new memory lock during execution of a transaction that acquires access to a region of memory. The new memory lock indicates that the transaction and its associated thread have exclusive temporary access to the memory region. The method further includes determining if a first in first out (FIFO) memory lock register is full of memory locks and, in response to the FIFO memory lock register being full, a memory lock is removed from a tail position of the FIFO memory lock register. The removed memory lock is reset to return to a transactional memory state and the new memory lock is added to a head position in the FIFO memory lock register.Type: ApplicationFiled: August 31, 2015Publication date: March 10, 2016Applicant: INTERNATIONAL BUSINESS MACHINES CORPORATIONInventors: Nathan FONTENOT, Ryan Patrick GRIMM, Robert Cory JENNINGS, JR., Joel Howard SCHOPP, Michael Thomas STROSAKER
-
Publication number: 20160070660Abstract: A system and computer program product for resetting of memory locks in a transactional memory system. The system includes a processor setting at least one new memory lock during execution of a transaction that acquires access to a region of memory. The new memory lock indicates that the transaction and its associated thread have exclusive temporary access to the memory region. The system further includes the processor determining if a first in first out (FIFO) memory lock register is full of memory locks and, in response to the FIFO memory lock register being full, a memory lock is removed from a tail position of the FIFO memory lock register. The removed memory lock is reset to return to a transactional memory state and the new memory lock is added to a head position in the FIFO memory lock register.Type: ApplicationFiled: September 10, 2014Publication date: March 10, 2016Applicant: INTERNATIONAL BUSINESS MACHINES CORPORATIONInventors: NATHAN FONTENOT, RYAN PATRICK GRIMM, ROBERT CORY JENNINGS, JR., JOEL HOWARD SCHOPP, MICHAEL THOMAS STROSAKER
-
Publication number: 20150097827Abstract: Target region fill techniques involving transformations are described. In one or more implementations, a patch to be used to fill a target region in an image of an scene is identified. A transformation to be applied to the patch is guided using depth information of the scene and at least a portion of the target region in the image is filled using the transformed patch.Type: ApplicationFiled: October 9, 2013Publication date: April 9, 2015Applicant: Adobe Systems IncorporatedInventors: Scott D. Cohen, Brian L. Price, Bryan S. Morse, Joel A. Howard
-
Publication number: 20140313188Abstract: Target region filling techniques are described. Techniques are described in which stereo consistency is promoted between target regions, such as by sharing information during computation. Techniques are also described in which target regions of respective disparity maps are completed to promote consistency between the disparity maps. This estimated disparity may then be used as a guide to completion of a missing texture in the target region. Techniques are further described in which cross-image searching and matching is employed by leveraging a plurality of images. This may including giving preference to matches with cross-image consistency to promote consistency, thereby enforcing stereo consistency between stereo images when applicable.Type: ApplicationFiled: April 19, 2013Publication date: October 23, 2014Applicant: Adobe Systems IncorporatedInventors: Scott D. Cohen, Brian L. Price, Bryan Stuart Morse, Joel A. Howard