Patents by Inventor John Sharko

John Sharko has filed for patents to protect the following inventions. This listing includes patent applications that are pending as well as patents that have already been granted by the United States Patent and Trademark Office (USPTO).

  • Publication number: 20110191674
    Abstract: The invention relates to a virtual musical interface for composing, editing, and/or performing audio works. In certain embodiments, the invention relates to a virtual musical interface rendered as a virtual object in a haptic environment, where one or more parameters of the virtual object are associated with one or more audio attributes. Thus, methods and systems of the invention provide audio, visual, and/or haptic feedback in response to a user interaction.
    Type: Application
    Filed: August 4, 2005
    Publication date: August 4, 2011
    Applicant: SENSABLE TECHNOLOGIES, INC.
    Inventors: Curt Rawley, Georges Grinstein, Alex Bauman, Jon Victorine, Abdulrahmane Bezzati, Vivek Gupta, John Sharko, Paul Bubert
  • Patent number: 6978376
    Abstract: A method of controlling distribution of a segment of encrypted electronic information is presented. A key server receives a protected copy of a decryption key for the segment. The segment is retrieved at a user location. The protected copy of the decryption key is accessed. In response to the accessing, the segment is decrypted using the accessed copy of the decryption key at the user location. The accessed copy of the decryption key is destroyed at the user location in response to the decrypting. The decrypted segment is displayed in response to the decrypting. The decrypted segment is destroyed in response to the displaying.
    Type: Grant
    Filed: December 15, 2000
    Date of Patent: December 20, 2005
    Assignee: Authentica, Inc.
    Inventors: David Giroux, John Sharko
  • Publication number: 20020078361
    Abstract: A method of controlling distribution of a segment of encrypted electronic information is presented. A key server receives a protected copy of a decryption key for the segment The segment is retrieved at a user location. The protected copy of the decryption key is accessed. In response to the accessing, the segment is decrypted using the accessed copy of the decryption key at the user location. The accessed copy of the decryption key is destroyed at the user location in response to the decrypting. The decrypted segment is displayed in response to the decrypting. The decrypted segment is destroyed in response to the displaying.
    Type: Application
    Filed: December 15, 2000
    Publication date: June 20, 2002
    Inventors: David Giroux, John Sharko