Patents by Inventor Kenneth Dean

Kenneth Dean has filed for patents to protect the following inventions. This listing includes patent applications that are pending as well as patents that have already been granted by the United States Patent and Trademark Office (USPTO).

  • Publication number: 20240307935
    Abstract: An assembly, system and method for compensating a crane position offset error based on wheel float by viewing, with an optical sensor located on a trolley on the crane, a target or target shape adjacent a storage rack containing a vertically stored mill roll and determining a positional compensation signal based on a separation or offset of a center of a field of view of the sensor from a center of the target shape. The assembly, system or method compensates for the crane position offset error by moving the crane, as instructed by the positional compensation signal, a distance equal to the separation or offset of the center of the field of view of the sensor from the center of the target.
    Type: Application
    Filed: March 16, 2023
    Publication date: September 19, 2024
    Applicant: Morgan Engineering Systems, Inc.
    Inventors: Mark Len Fedor, Steve D. Herron, Kenneth Dean Maurer, Jay Allen May, Michael B. Fagan, II, Scott A. Zilke, Keith Allen Mathews
  • Publication number: 20240250517
    Abstract: A method for providing thermal protection to a pre-charge unit (PRC) of an electric power conversion system, such as a medium-voltage adjustable-speed drive, with a step-up transformer and a DC link includes the steps of executing a parameter identification block identifying the electrical and thermal parameters of the PRC; of an electric power conversion system executing a current estimation block estimating the current flowing though the PRC's step-up transformer based on a voltage input; executing a thermal level estimation block estimating a thermal level at the PRC's step-up transformer based on the estimated current flowing though the PRC's step-up transformer; executing a protection logic block comparing the estimated thermal level to a pre-determined trip threshold to determine whether a thermal overload has occurred; and outputting a trip signal if the trip threshold has been exceeded.
    Type: Application
    Filed: January 18, 2024
    Publication date: July 25, 2024
    Inventors: Zhi Gao, Stefan Schroeder, Markus Sjoblom, Kenneth Dean
  • Patent number: 11922168
    Abstract: A program is executed using a call stack and shadow stack. The call stack includes frames having respective return addresses. The frames may also store variables and/or parameters. The shadow stack stores duplicates of the return addresses in the call stack. The call stack and the shadow stack are maintained by, (i) each time a function is called, adding a corresponding stack frame to the call stack and adding a corresponding return address to the shadow stack, and (ii) each time a function is exited, removing a corresponding frame from the call stack and removing a corresponding return address from the shadow stack. A backtrace of the program's current call chain is generated by accessing the return addresses in the shadow stack. The outputted backtrace includes the return addresses from the shadow stack and/or information about the traced functions that is derived from the shadow stack's return addresses.
    Type: Grant
    Filed: March 23, 2022
    Date of Patent: March 5, 2024
    Assignee: Microsoft Technology Licensing, LLC
    Inventors: Ben Niu, Gregory John Colombo, Weidong Cui, Jason Lin, Kenneth Dean Johnson
  • Publication number: 20230376320
    Abstract: A system and method enable an external user interface (UI) control for interacting with content in an iFrame web page to be invoked from within the iFrame and displayed outside the iFrame. The iFrame web page detects a predefined user interaction with a UI element in the iFrame web page and sends a UI request message to the host application using cross-domain communication. The host application activates the external UI control in response to receiving the UI request message and displays the external UI control outside of the iFrame element. User input is received with the external UI control and communicated from the host application to the iFrame web page and applied to the UI element.
    Type: Application
    Filed: May 19, 2022
    Publication date: November 23, 2023
    Applicant: Microsoft Technology Licensing, LLC
    Inventors: Brian Daniel MEERSMA, Brian Robert MARSHALL, Marco CIMMINO GIBELLINI TORNIELLI BONIPERTI, Jonathan Seth KAUFTHAL, Kenneth Dean STILL, Kenneth Kit Yu MUI
  • Publication number: 20230259371
    Abstract: Dynamically overriding a function based on a capability set. A computer system reads a portion of an executable image file. The portion includes a first memory address corresponding to a first callee function implementation. The first memory address was inserted into the portion by a compiler toolchain. Based on extensible metadata included in the executable image file, and based on a capability set that is specific to the computer system, the computer system determines a second memory address corresponding to a second callee function implementation. Before execution of the portion, the computer system modifies the portion to replace the first memory address with the second memory address.
    Type: Application
    Filed: April 19, 2022
    Publication date: August 17, 2023
    Inventors: Pranav KANT, Joseph Norman BIALEK, Xiang FAN, YongKang ZHU, Gabriel Thomas Kodjo DOS REIS, Russell Bivens KELDORPH, Mehmet IYIGUN, Russell Charles HADLEY, Roy WILLIAMS, Kenneth Dean JOHNSON, Pedro Miguel SEQUEIRA DE JUSTO TEIXEIRA, Yevgeniy BAK
  • Patent number: 11720374
    Abstract: Dynamically overriding a function based on a capability set. A computer system reads a portion of an executable image file. The portion includes a first memory address corresponding to a first callee function implementation. The first memory address was inserted into the portion by a compiler toolchain. Based on extensible metadata included in the executable image file, and based on a capability set that is specific to the computer system, the computer system determines a second memory address corresponding to a second callee function implementation. Before execution of the portion, the computer system modifies the portion to replace the first memory address with the second memory address.
    Type: Grant
    Filed: April 19, 2022
    Date of Patent: August 8, 2023
    Assignee: Microsoft Technology Licensing, LLC
    Inventors: Pranav Kant, Joseph Norman Bialek, Xiang Fan, YongKang Zhu, Gabriel Thomas Kodjo Dos Reis, Russell Bivens Keldorph, Mehmet Iyigun, Russell Charles Hadley, Roy Williams, Kenneth Dean Johnson, Pedro Miguel Sequeira De Justo Teixeira, Yevgeniy Bak
  • Patent number: 11709931
    Abstract: Enforcing shadow stack violations at module granularity, rather than at thread or process granularity. An exception is processed during execution of a thread based on code of an application binary, which is enabled for shadow stack enforcement, that calls an external module. The exception results from a mismatch between a return address popped from the thread's call stack and a return address popped from the thread's shadow stack. Processing the exception includes determining that the exception resulted from execution of an instruction in the external module, and determining whether or not the external module is enabled for shadow stack enforcement. Based at least on these determinations, execution of the thread is terminated when the external module is enabled for shadow stack enforcement, or the thread is permitted to continue executing when the external module is not enabled for shadow stack enforcement.
    Type: Grant
    Filed: June 6, 2022
    Date of Patent: July 25, 2023
    Assignee: Microsoft Technology Licensing, LLC
    Inventors: Jason Lin, Jin Lin, Gregory John Colombo, Niraj Majmudar, Mehmet Iyigun, Shayne Daniel Hiet-Block, Kenneth Dean Johnson
  • Publication number: 20220342983
    Abstract: Enforcing shadow stack violations at module granularity, rather than at thread or process granularity. An exception is processed during execution of a thread based on code of an application binary, which is enabled for shadow stack enforcement, that calls an external module. The exception results from a mismatch between a return address popped from the thread's call stack and a return address popped from the thread's shadow stack. Processing the exception includes determining that the exception resulted from execution of an instruction in the external module, and determining whether or not the external module is enabled for shadow stack enforcement. Based at least on these determinations, execution of the thread is terminated when the external module is enabled for shadow stack enforcement, or the thread is permitted to continue executing when the external module is not enabled for shadow stack enforcement.
    Type: Application
    Filed: June 6, 2022
    Publication date: October 27, 2022
    Inventors: Jason LIN, Jin LIN, Gregory John COLOMBO, Niraj MAJMUDAR, Mehmet IYIGUN, Shayne Daniel HIET-BLOCK, Kenneth Dean JOHNSON
  • Publication number: 20220214882
    Abstract: A program is executed using a call stack and shadow stack. The call stack includes frames having respective return addresses. The frames may also store variables and/or parameters. The shadow stack stores duplicates of the return addresses in the call stack. The call stack and the shadow stack are maintained by, (i) each time a function is called, adding a corresponding stack frame to the call stack and adding a corresponding return address to the shadow stack, and (ii) each time a function is exited, removing a corresponding frame from the call stack and removing a corresponding return address from the shadow stack. A backtrace of the program's current call chain is generated by accessing the return addresses in the shadow stack. The outputted backtrace includes the return addresses from the shadow stack and/or information about the traced functions that is derived from the shadow stack's return addresses.
    Type: Application
    Filed: March 23, 2022
    Publication date: July 7, 2022
    Inventors: Ben NIU, Gregory John COLOMBO, Weidong CUI, Jason LIN, Kenneth Dean JOHNSON
  • Patent number: 11379579
    Abstract: Enforcing shadow stack violations at module granularity, rather than at thread or process granularity. An exception is processed during execution of a thread based on code of an application binary, which is enabled for shadow stack enforcement, that calls an external module. The exception results from a mismatch between a return address popped from the thread's call stack and a return address popped from the thread's shadow stack. Processing the exception includes determining that the exception resulted from execution of an instruction in the external module, and determining whether or not the external module is enabled for shadow stack enforcement. Based at least on these determinations, execution of the thread is terminated when the external module is enabled for shadow stack enforcement, or the thread is permitted to continue executing when the external module is not enabled for shadow stack enforcement.
    Type: Grant
    Filed: March 24, 2020
    Date of Patent: July 5, 2022
    Assignee: Microsoft Technology Licensing, LLC
    Inventors: Jason Lin, Jin Lin, Gregory John Colombo, Niraj Majmudar, Mehmet Iyigun, Shayne Daniel Hiet-Block, Kenneth Dean Johnson
  • Patent number: 11294682
    Abstract: A program is executed using a call stack and shadow stack. The call stack includes frames having respective return addresses. The frames may also store variables and/or parameters. The shadow stack stores duplicates of the return addresses in the call stack. The call stack and the shadow stack are maintained by, (i) each time a function is called, adding a corresponding stack frame to the call stack and adding a corresponding return address to the shadow stack, and (ii) each time a function is exited, removing a corresponding frame from the call stack and removing a corresponding return address from the shadow stack. A backtrace of the program's current call chain is generated by accessing the return addresses in the shadow stack. The outputted backtrace includes the return addresses from the shadow stack and/or information about the traced functions that is derived from the shadow stack's return addresses.
    Type: Grant
    Filed: May 20, 2019
    Date of Patent: April 5, 2022
    Assignee: Microsoft Technology Licensing, LLC
    Inventors: Ben Niu, Gregory John Colombo, Weidong Cui, Jason Lin, Kenneth Dean Johnson
  • Publication number: 20210303680
    Abstract: Enforcing shadow stack violations at module granularity, rather than at thread or process granularity. An exception is processed during execution of a thread based on code of an application binary, which is enabled for shadow stack enforcement, that calls an external module. The exception results from a mismatch between a return address popped from the thread's call stack and a return address popped from the thread's shadow stack. Processing the exception includes determining that the exception resulted from execution of an instruction in the external module, and determining whether or not the external module is enabled for shadow stack enforcement. Based at least on these determinations, execution of the thread is terminated when the external module is enabled for shadow stack enforcement, or the thread is permitted to continue executing when the external module is not enabled for shadow stack enforcement.
    Type: Application
    Filed: March 24, 2020
    Publication date: September 30, 2021
    Inventors: Jason LIN, Jin LIN, Gregory John COLOMBO, Niraj MAJMUDAR, Mehmet IYIGUN, Shayne Daniel HIET-BLOCK, Kenneth Dean JOHNSON
  • Patent number: 11014670
    Abstract: A method for the deployment of reconnaissance devices including buoy cameras and robotic devices in a target mission area of a remote location in space utilizing a maneuverable descent de-booster capsule and a buoyant vessel for the deployment is disclosed, including identifying the target area from an orbiting spacecraft; deploying the de-booster into orbit over the target area; initiating gradual descent of the de-booster in the atmosphere of the remote location in space; ejecting the buoyant vessel and its payload from the de-booster; filling the buoyant portion of the buoyant vessel with a lifting gas to cause the buoyant portion to become a large balloon; activating reconnaissance devices on the bay portion of the buoyant vessel, including video and other devices for monitoring and surveiling the target mission area; maneuvering the buoyant vessel to refine mission site selection; opening cargo bay doors at a predetermined altitude to deliver payloads including buoy cameras to the target mission area; ca
    Type: Grant
    Filed: September 20, 2018
    Date of Patent: May 25, 2021
    Inventor: Kenneth Dean Stephens, Jr.
  • Publication number: 20210122285
    Abstract: A covered mattress assembly for a vehicle bed is provided. The covered mattress assembly includes at least one mattress having multiple joints and a cover assembly. The mattress is concealed within a vehicle bed by the cover assembly. In some cases, the cover assembly is inverted for use from the storage position. The cover assembly includes a spring-loaded arm operative to lift the cover assembly.
    Type: Application
    Filed: October 28, 2020
    Publication date: April 29, 2021
    Inventor: Kenneth Dean Brown
  • Patent number: 10876913
    Abstract: A device, system, and method for testing and measuring the grip strength of tongs for a crane system is provided. The device may include a frame body carrying a testing assembly configured to measure the tong grip strength. The system may include the grip strength tester used in conjunction with a crane including an operator tower and a pulley assembly operatively connected to the tongs. The method of use associated with the tong grip strength tester may include the steps of expanding a distance between teeth on the tongs and positioning the teeth adjacent sides of the testing assembly, then closing the tongs thereby clamping teeth to the sides of the testing assembly. Then, the testing assembly measures the compressive force associated with the tongs and registers the compressive force in a computer system to determine whether the grip strength is sufficient to lift a weighted slab of material.
    Type: Grant
    Filed: July 24, 2018
    Date of Patent: December 29, 2020
    Assignee: Morgan Engineering Systems, Inc.
    Inventors: Mark Len Fedor, Nelson Elroy Baker, Kenneth Dean Maurer
  • Publication number: 20200377809
    Abstract: Use of pyrolysis oil (commonly referred to as bio-oil, bio-crude or tire oil) in combination with naphtha or liquified petroleum gas (LPG) can be utilized to reduce viscosity, increase API gravity and/or liquify paraffin and/or asphaltene in heavy crude oil at a reduced, overall percentage of naphtha. Terpene, citrus isolates and/or non-ionic surfactants can be added to pyrolysis oil to form an additive. The additive can be combined with naphtha or LPG and added to heavy crude oil to reduce viscosity, increase API gravity, and/or liquify paraffin and/or asphaltene at a reduced, overall percentage of naphtha.
    Type: Application
    Filed: June 3, 2020
    Publication date: December 3, 2020
    Applicant: EWO SOLUTIONS LLC
    Inventors: Douglas Wilson Swain, Susan Townsend Swain, Kenneth Dean Hammett
  • Publication number: 20200371809
    Abstract: A program is executed using a call stack and shadow stack. The call stack includes frames having respective return addresses. The frames may also store variables and/or parameters. The shadow stack stores duplicates of the return addresses in the call stack. The call stack and the shadow stack are maintained by, (i) each time a function is called, adding a corresponding stack frame to the call stack and adding a corresponding return address to the shadow stack, and (ii) each time a function is exited, removing a corresponding frame from the call stack and removing a corresponding return address from the shadow stack. A backtrace of the program's current call chain is generated by accessing the return addresses in the shadow stack. The outputted backtrace includes the return addresses from the shadow stack and/or information about the traced functions that is derived from the shadow stack's return addresses.
    Type: Application
    Filed: May 20, 2019
    Publication date: November 26, 2020
    Inventors: Ben NIU, Gregory John COLOMBO, Weidong CUI, Jason LIN, Kenneth Dean JOHNSON
  • Patent number: 10691121
    Abstract: Methods and systems for controlling the movements of a proxy robot utilizing electrical signals from the nervous system of a user are presented; including identifying signal pickup points on the body of the user; connecting electrodes to the pickup points; amplifying and processing the signals from each pickup point; aggregating and encoding the processed signals for transmission to a proxy robot; receiving and decoding the processed electrical signals at the location of the proxy robot into their original component electrical signals corresponding to an electrical signal from a particular pickup point on the body of the user; processing each component electrical signal by a driver configured for an individual motion-producing element in the proxy robot; addressing by the component electrical signals each motion-producing element in the motor system of the proxy robot surrogate; and causing the proxy robot surrogate to emulate every movement of the user.
    Type: Grant
    Filed: November 26, 2017
    Date of Patent: June 23, 2020
    Inventor: Kenneth Dean Stephens, Jr.
  • Patent number: 10641718
    Abstract: A system and method for processing X-ray fluorescence data in a hand-held X-ray Fluorescence (XRF) analyzer are provided. The X-ray fluorescence (XRF) analyzer includes a radiation source assembly including a first centerline axis and configured to direct an X-ray beam to impinge on a sample to be tested. The XRF analyzer also includes a radiation detector assembly including a second centerline axis configured to sense X-ray fluorescence (XRF) emitted from the sample in response to the X-ray beam. The XRF analyzer further includes a processor configured to determine a property of the sample to be tested from the emitted XRF, and a proximity sensor configured to continuously measure a distance between the XRF analyzer and the sample to be tested, the distance being at least one of displayed to a user and used by the processor to determine the property.
    Type: Grant
    Filed: July 27, 2017
    Date of Patent: May 5, 2020
    Assignee: Bruker Handheld LLC
    Inventors: Brian Scott Parks, Robert Matthew Burton, Robert Francis Shannon, Jr., Jiyan Gu, Lance Thompson Doyle, Fredericus Vosman, Kenneth Dean Wheeler, Michael Scott Kirsch
  • Patent number: D906543
    Type: Grant
    Filed: August 19, 2019
    Date of Patent: December 29, 2020
    Assignee: DEACERO SAPI DE CV
    Inventor: Kenneth Dean Edwards