Patents by Inventor Kim Edwards

Kim Edwards has filed for patents to protect the following inventions. This listing includes patent applications that are pending as well as patents that have already been granted by the United States Patent and Trademark Office (USPTO).

  • Publication number: 20240115824
    Abstract: Systems and methods can determine respiratory rates of a patient using a respiratory device by performing one or more frequency analyses of a signal from the gases flow. The signal from the gases flow can be one that varies with the patient's breathing. The system can include a non-sealed patient interface, such as a nasal cannula in a nasal high flow therapy, or any other patient interfaces. The respiratory system can also detect whether the patient has taken off the patient interface and/or whether the patient connected to the patient interface is talking or eating. Data of the patient's use of the respiratory system and the patient's respiratory rates can provide therapy compliance and long-term trend of use information and/or progress in the patient's respiratory functions and/or other physiological functions.
    Type: Application
    Filed: November 30, 2023
    Publication date: April 11, 2024
    Inventors: Rhys Matthew James Williams, Charles Grady Cantrell, David Martin Russell, Brett James Ryan, Bryn Alan Edwards, Anton Kim Gulley
  • Publication number: 20190051427
    Abstract: A composite formulation of the present disclosure may have conductive properties (i.e. low resistance), such that the formulation may be used in resistive heating applications. The composite may have one or more matrix materials and one or more conductive fillers. The composite may be used in the formation of resistive heaters having a number of layers, including a conductive layer, the conductive layer including the composite. Heaters of the present disclosure may be used for a number of applications including ground, floor, or roof heating, or laboratory equipment heating.
    Type: Application
    Filed: October 17, 2018
    Publication date: February 14, 2019
    Inventor: Kim Edward Elverud
  • Patent number: 10134502
    Abstract: A composite formulation of the present disclosure may have conductive properties (i.e. low resistance), such that the formulation may be used in resistive heating applications. The composite may have one or more matrix materials and one or more conductive fillers. The composite may be used in the formation of resistive heaters having a number of layers, including a conductive layer, the conductive layer including the composite. Heaters of the present disclosure may be used for a number of applications including ground, floor, or roof heating, or laboratory equipment heating.
    Type: Grant
    Filed: July 17, 2015
    Date of Patent: November 20, 2018
    Inventor: Kim Edward Elverud
  • Publication number: 20160021704
    Abstract: A composite formulation of the present disclosure may have conductive properties (i.e. low resistance), such that the formulation may be used in resistive heating applications. The composite may have one or more matrix materials and one or more conductive fillers. The composite may be used in the formation of resistive heaters having a number of layers, including a conductive layer, the conductive layer including the composite. Heaters of the present disclosure may be used for a number of applications including ground, floor, or roof heating, or laboratory equipment heating.
    Type: Application
    Filed: July 17, 2015
    Publication date: January 21, 2016
    Inventor: Kim Edward Elverud
  • Publication number: 20140215221
    Abstract: In a hitless manual cryptographic key refresh scheme, a state machine is independently maintained at each network node. The state machine includes a first state, a second state, and a third state. In the first state, which is the steady state, a current cryptographic key is used both for generating signatures for outgoing packets and for authenticating signatures of incoming packets. In the second state, which is entered when a new cryptographic key is provisioned, the old (i.e. formerly current) key is still used for generating signatures for outgoing packets, however one or, if necessary, both of the old key and the newly provisioned key is used for authenticating signatures of incoming packets. In the third state, the new key is used for generating signatures for outgoing packets and either one or both of the old key and new key are used for authenticating signatures of incoming packets.
    Type: Application
    Filed: December 18, 2013
    Publication date: July 31, 2014
    Applicant: ROCKSTAR CONSORTIUM US LP
    Inventors: RICHARD GAUVREAU, MICHAEL AALDERS, KIM EDWARDS
  • Patent number: 8631228
    Abstract: In a hitless manual cryptographic key refresh scheme, a state machine is independently maintained at each network node. The state machine includes a first state, a second state, and a third state. In the first state, which is the steady state, a current cryptographic key is used both for generating signatures for outgoing packets and for authenticating signatures of incoming packets. In the second state, which is entered when a new cryptographic key is provisioned, the old (i.e. formerly current) key is still used for generating signatures for outgoing packets, however one or, if necessary, both of the old key and the newly provisioned key is used for authenticating signatures of incoming packets. In the third state, the new key is used for generating signatures for outgoing packets and either one or both of the old key and new key are used for authenticating signatures of incoming packets.
    Type: Grant
    Filed: November 18, 2011
    Date of Patent: January 14, 2014
    Assignee: Rockstar Consortium US LP
    Inventors: Richard Gauvreau, Michael Aalders, Kim Edwards
  • Publication number: 20120066491
    Abstract: In a hitless manual cryptographic key refresh scheme, a state machine is independently maintained at each network node. The state machine includes a first state, a second state, and a third state. In the first state, which is the steady state, a current cryptographic key is used both for generating signatures for outgoing packets and for authenticating signatures of incoming packets. In the second state, which is entered when a new cryptographic key is provisioned, the old (i.e. formerly current) key is still used for generating signatures for outgoing packets, however one or, if necessary, both of the old key and the newly provisioned key is used for authenticating signatures of incoming packets. In the third state, the new key is used for generating signatures for outgoing packets and either one or both of the old key and new key are used for authenticating signatures of incoming packets.
    Type: Application
    Filed: November 18, 2011
    Publication date: March 15, 2012
    Applicant: NORTEL NETWORKS LIMITED
    Inventors: RICHARD GAUVREAU, MICHAEL AALDERS, KIM EDWARDS
  • Patent number: 8082441
    Abstract: In a hitless manual cryptographic key refresh scheme, a state machine is independently maintained at each network node. The state machine includes a first state, a second state, and a third state. In the first state, which is the steady state, a current cryptographic key is used both for generating signatures for outgoing packets and for authenticating signatures of incoming packets. In the second state, which is entered when a new cryptographic key is provisioned, the old (i.e. formerly current) key is still used for generating signatures for outgoing packets, however one or, if necessary, both of the old key and the newly provisioned key is used for authenticating signatures of incoming packets. In the third state, the new key is used for generating signatures for outgoing packets and either one or both of the old key and new key are used for authenticating signatures of incoming packets.
    Type: Grant
    Filed: June 10, 2009
    Date of Patent: December 20, 2011
    Assignee: Nortel Networks Limited
    Inventors: Richard Gauvreau, Michael Aalders, Kim Edwards
  • Publication number: 20090282237
    Abstract: In a hitless manual cryptographic key refresh scheme, a state machine is independently maintained at each network node. The state machine includes a first state, a second state, and a third state. In the first state, which is the steady state, a current cryptographic key is used both for generating signatures for outgoing packets and for authenticating signatures of incoming packets. In the second state, which is entered when a new cryptographic key is provisioned, the old (i.e. formerly current) key is still used for generating signatures for outgoing packets, however one or, if necessary, both of the old key and the newly provisioned key is used for authenticating signatures of incoming packets. In the third state, the new key is used for generating signatures for outgoing packets and either one or both of the old key and new key are used for authenticating signatures of incoming packets.
    Type: Application
    Filed: June 10, 2009
    Publication date: November 12, 2009
    Inventors: Richard Gauvreau, Michael Aalders, Kim Edwards
  • Publication number: 20090217840
    Abstract: The invention provides tissue marking pigment or dye particle retained within a tissue cell, the cellular cytoplasm, or one or more intracellular organelles. Also, the invention provides nanoparticles, which are phagocytosed, engulfed or otherwise entrapped by cells.
    Type: Application
    Filed: August 2, 2006
    Publication date: September 3, 2009
    Applicant: FREEDOM-2, INC.
    Inventors: Ljiljana Kundakovic, Bruce Klitzman, Kim Edward Koger, Edith Mathiowitz, Craig A. Drill
  • Patent number: 7581093
    Abstract: In a hitless manual cryptographic key refresh scheme, a state machine may be independently maintained at each network node. The state machine may include a first state, a second state, and a third state. In the first state, which may be the steady state, a current cryptographic key may be used both for generating signatures for outgoing packets and for authenticating signatures of incoming packets. In the second state, which is entered when a new cryptographic key is provisioned, the old (i.e. formerly current) key may still be used for generating signatures for outgoing packets, however one or, if necessary, both of the old key and the newly provisioned key may be used for authenticating signatures of incoming packets. In the third state, the new key may be used for generating signatures for outgoing packets and either one or both of the old key and new key may be used for authenticating signatures of incoming packets.
    Type: Grant
    Filed: December 22, 2003
    Date of Patent: August 25, 2009
    Assignee: Nortel Networks Limited
    Inventors: Richard Gauvreau, Michael Aalders, Kim Edwards
  • Publication number: 20050246495
    Abstract: A system for exchanging digital data among a plurality of hand-held computer devices. Digital signals are written by a first hand-held device to a mini-cartridge that mini-cartridge is inter-operable among a class of hand-held devices, each of which is equipped with a mini-disk drive. A common digital data format is employed to further facilitate exchange of data between devices.
    Type: Application
    Filed: July 6, 2005
    Publication date: November 3, 2005
    Inventors: Kim Edwards, George Krieger, Fred Thomas, Brent Watson
  • Publication number: 20050138352
    Abstract: In a hitless manual cryptographic key refresh scheme, a state machine is independently maintained at each network node. The state machine includes a first state, a second state, and a third state. In the first state, which is the steady state, a current cryptographic key is used both for generating signatures for outgoing packets and for authenticating signatures of incoming packets. In the second state, which is entered when a new cryptographic key is provisioned, the old (i.e. formerly current) key is still used for generating signatures for outgoing packets, however one or, if necessary, both of the old key and the newly provisioned key is used for authenticating signatures of incoming packets. In the third state, the new key is used for generating signatures for outgoing packets and either one or both of the old key and new key are used for authenticating signatures of incoming packets.
    Type: Application
    Filed: December 22, 2003
    Publication date: June 23, 2005
    Inventors: Richard Gauvreau, Michael Aalders, Kim Edwards
  • Publication number: 20050002333
    Abstract: An emulated multi-QoS link provides an application-level Connection (e.g. a Multi-Protocol Label Switching (MPLS) E-LSP) with the capability of receiving or transmitting messages of various QoS levels over an interconnection employing a connection-oriented protocol (e.g. ATM) at the data link layer. The emulated multi-QoS link may provide the application managing the application-level Connection (e.g. MPLS) with a control plane Application Programming Interface (API) like that of a multi-QoS link which may provide link status based on the status of underlying connections at the data link layer. The connection-oriented or non connection-oriented nature of the data link layer protocol is transparent to an application instance using the emulated multi-QoS link. Advantageously, emulated multi-QoS links may simplify merging in the case where the application is MPLS.
    Type: Application
    Filed: June 18, 2003
    Publication date: January 6, 2005
    Inventors: Michael Aalders, Kim Edwards, Dwight Jamieson
  • Patent number: 6223303
    Abstract: The present invention provides a method of operating a disk drive having data sites on a disk for recording data thereon. The disk drive is connectable to a host computer and maintains a defect table comprising defective sites reportable to the host computer. The method includes the step of discovering a defective data site on the disk. The defective data site is bounded with a first tier of marginal data sites which are selected based on their proximity to the defective data site. The first tier of marginal data sites is bounded with a second tier of reserved data sites which are selected based on their proximity to the first tier of marginal data sites. The locations of the defective data site, the first tier of marginal data sites and the second tier of reserved data sites are stored in a defect table. The defective data sites and the first tier of marginal data sites are marked as defective sites reportable to the host.
    Type: Grant
    Filed: June 29, 1998
    Date of Patent: April 24, 2001
    Assignee: Western Digital Corporation
    Inventors: Russell A. Billings, Kim Edward Russell
  • Patent number: 6013122
    Abstract: Tattoo inks are composed of pigments or dyes combined with a tattoo pigment vehicle which entraps, encases, incorporates, complexes, encapsulates, or is otherwise associated with the pigment to form pigment/vehicle complexes that retain the pigment in the tissue. The vehicle can be chosen so that pigments which alone are unsuitable for tattooing can be used for tattooing and optionally can be retained in the tissue permanently. Alternatively, the vehicle renders the tattoo erasable, wherein the tattoo disappears after imposition of an exogenous energy. Alternatively, the tattoo pigment vehicle renders the tattoo semi-permanent, so that the tattoo spontaneously disappears at a predetermined time.
    Type: Grant
    Filed: August 18, 1998
    Date of Patent: January 11, 2000
    Assignee: Option Technologies, Inc.
    Inventors: Bruce Klitzman, Kim Edward Koger