Patents by Inventor Mark Stevens
Mark Stevens has filed for patents to protect the following inventions. This listing includes patent applications that are pending as well as patents that have already been granted by the United States Patent and Trademark Office (USPTO).
-
Publication number: 20220153552Abstract: Systems, apparatuses, and methods are described for a stairlift overspeed safety system are disclosed. The overspeed safety system may include a centripetal cam assembly, a trigger assembly, and a jammer assembly. The centripetal cam assembly may include a spring-loaded plate and a plurality of centripetal cams connected to the spring-loaded plate, configured to move to an extended position when the rail speed exceeds the speed threshold. The trigger assembly may include a trigger plate configured to be pushed by at least one of the centripetal cams when moved to the extended position. Pushing the trigger plate may cause a switch to open to shut off power to the motorized stairlift. The jammer assembly may include a jammer configured to wedge between teeth of a rack and pinion of the motorized stairlift to initiate a deceleration to stop movement of the motorized stairlift.Type: ApplicationFiled: November 19, 2020Publication date: May 19, 2022Inventors: Robert Alexander Pratt, IV, Derek J. Nash, Mark L. Hill, Mark Steven Jackson
-
Patent number: 11334245Abstract: A clustered memory system includes a first computing system coupled to a second computing system via a network, and including a clustered memory management subsystem coupled to a central processing subsystem and a networking device. The clustered memory management subsystem receives a processor memory-centric access request associated with a memory access operation from the central processing subsystem, and uses memory management hardware to determine that the processor memory-centric access request is directed to a second memory subsystem in the second computing system. The clustered memory management subsystem then uses remote memory access hardware to generate memory access information for performing the memory access operation at the second memory subsystem, and instructs the networking device to utilize the memory access information to transmit at least one memory access communication that provides for the performance of the memory access operation at the second memory subsystem.Type: GrantFiled: October 30, 2020Date of Patent: May 17, 2022Assignee: Dell Products L.P.Inventors: Robert W. Hormuth, Jimmy D. Pike, Elie Jreij, Gaurav Chawla, Mark Steven Sanders
-
Patent number: 11327852Abstract: A live migration/high availability system includes a first computing system having a first SCP subsystem coupled to first computing system components and a first hypervisor subsystem that provides a first virtual machine. Each time the first SCP subsystem receives snapshot commands from the hypervisor subsystem, it retrieves respective SCP component state information that was not retrieved in response to a previous snapshot command from each first SCP component included in the first SCP subsystem, and uses the respective SCP component state information to generate a respective SCP subsystem snapshot based on that snapshot command. The first SCP subsystem then transmits the SCP subsystem snapshots to a second SCP subsystem in a second computing system, and the second SCP subsystem uses the SCP subsystem snapshots to allow a second hypervisor subsystem on the second computing system to provide a second virtual machine that operates the same as the first virtual machine.Type: GrantFiled: October 22, 2020Date of Patent: May 10, 2022Assignee: Dell Products L.P.Inventors: William Price Dawkins, Robert W. Hormuth, Elie Jreij, Gaurav Chawla, Mark Steven Sanders, Jimmy D. Pike
-
Patent number: 11324620Abstract: One or more medical devices may be provided that may be used, for example, in bariatric surgery including a vertical sleeve gastrectomy. Occlusion devices can be integrated with a catheter or tube to occlude one or more proximal or distal landmarks of a stomach and a stapling guide may be used to occlude a lateral boundary of the stomach to define a cavity. A volume of the potential resultant sleeve may be determined by inserting fluid or gas into the catheter or tube, measuring pressure, and calculating the volume of the cavity.Type: GrantFiled: April 1, 2019Date of Patent: May 10, 2022Assignee: Standard Bariatrics, Inc.Inventors: Jonathan Thompson, Mark Steven Ortiz
-
Publication number: 20220137816Abstract: A clustered memory system includes a first computing system coupled to a second computing system via a network, and including a clustered memory management subsystem coupled to a central processing subsystem and a networking device. The clustered memory management subsystem receives a processor memory-centric access request associated with a memory access operation from the central processing subsystem, and uses memory management hardware to determine that the processor memory-centric access request is directed to a second memory subsystem in the second computing system. The clustered memory management subsystem then uses remote memory access hardware to generate memory access information for performing the memory access operation at the second memory subsystem, and instructs the networking device to utilize the memory access information to transmit at least one memory access communication that provides for the performance of the memory access operation at the second memory subsystem.Type: ApplicationFiled: October 30, 2020Publication date: May 5, 2022Inventors: Robert W. Hormuth, Jimmy D. Pike, Elie Jreij, Gaurav Chawla, Mark Steven Sanders
-
Publication number: 20220138013Abstract: A workload compliance governor system includes a management system coupled to a computing system. A workload compliance governor subsystem in the computing system receives a workload performance request associated with a workload, exchanges hardware compose communications with the management system to compose hardware components for the workload, and receives back an identification of hardware components. The workload compliance governor subsystem then determines that the identified hardware components satisfy hardware compliance requirements for the workload, and configures the identified hardware components in the computing system based on the software compliance requirements for the workload in order to cause those identified hardware components to provide an operating system and at least one application that operate to perform the workload.Type: ApplicationFiled: October 29, 2020Publication date: May 5, 2022Inventors: Mukund P. Khatri, Gaurav Chawla, William Price Dawkins, Elie Jreij, Mark Steven Sanders, Walter A. O'Brien, III, Robert W. Hormuth, Jimmy D. Pike
-
Publication number: 20220129536Abstract: A device access control system includes a first computing system that is coupled to a second computing system via a network, and that includes a device access controller subsystem coupled to devices, a central processing subsystem, and a device access control manager subsystem. The device access control manager subsystem identifies first application(s) configured for provisioning by the central processing subsystem and second application(s) configured for provisioning by the second computing system, configures the device access controller subsystem to provide the central processing subsystem access to a first subset of the devices to allow the central processing subsystem to provide the first application(s), and configures the device access controller subsystem to provide the second computing system access via the device access control manager subsystem to a second subset of the devices to allow the second computing device to provide the second application(s) using the second subset of the devices.Type: ApplicationFiled: October 27, 2020Publication date: April 28, 2022Inventors: Walter A. O'Brien, III, Mukund P. Khatri, Mark Steven Sanders, William Price Dawkins, Elie Jreij, Robert W. Hormuth, Jimmy D. Pike, Gaurav Chawla
-
Publication number: 20220131695Abstract: A distributed secure communication system includes a first System Control Processor (SCP) subsystem coupled to second and third SCP subsystems via a network. The first SCP subsystem identifies the second SCP subsystem, signs a first SCP authentication communication with a first private key to provide a first signed SCP authentication communication that it transmits to the second SCP subsystem. The first SCP subsystem receives a second signed SCP authentication communication from the second SCP subsystem, authenticates the second signed SCP authentication communication using a second public key associated with the second SCP subsystem and, in response, establishes a first secure communication channel with the second SCP subsystem.Type: ApplicationFiled: October 26, 2020Publication date: April 28, 2022Inventors: Jimmy D. Pike, Gaurav Chawla, William Price Dawkins, Mark Steven Sanders, Elie Jreij, Robert W. Hormuth, Mukund P. Khatri, Walter A. O'Brien, III
-
Publication number: 20220129571Abstract: A device access control system includes a computing system having a device access controller subsystem coupled to devices and a central processing subsystem. A device access control manager subsystem is coupled to the device access controller subsystem and operates, during initialization operations for the computing system, to identify application(s) that are configured to be provided by the central processing subsystem, and identify a first subset of the devices that satisfy application provisioning requirements for the application(s).Type: ApplicationFiled: April 2, 2021Publication date: April 28, 2022Inventors: Walter A. O'Brien, III, Mukund P. Khatri, Jimmy D. Pike, Mark Steven Sanders, Elie Jreij, Gaurav Chawla, William Price Dawkins
-
Publication number: 20220128041Abstract: A method and system are provided for cooling a heat-exchanger in a wind turbine that has an electric generator with a cooling air flow directed therethrough. Effluent cooling air flow from the electric generator is directed into an air ejector pump and acts as motive air through the air ejector pump. Cold air is drawn into the air ejector pump by the vacuum generated by the motive air moving through the air ejector pump. The heat exchanger is disposed in-line with the cold air flow so that the cold air is drawn through the heat-exchanger, removes heat from the fluid circulated through the heat-exchanger, and becomes heated air that is combined with the motive air and discharged from the nacelle.Type: ApplicationFiled: October 28, 2020Publication date: April 28, 2022Inventors: Ulrich Werner Neumann, Mark Steven Pape
-
Publication number: 20220129356Abstract: A live migration/high availability system includes a first computing system having a first SCP subsystem coupled to first computing system components and a first hypervisor subsystem that provides a first virtual machine. Each time the first SCP subsystem receives snapshot commands from the hypervisor subsystem, it retrieves respective SCP component state information that was not retrieved in response to a previous snapshot command from each first SCP component included in the first SCP subsystem, and uses the respective SCP component state information to generate a respective SCP subsystem snapshot based on that snapshot command. The first SCP subsystem then transmits the SCP subsystem snapshots to a second SCP subsystem in a second computing system, and the second SCP subsystem uses the SCP subsystem snapshots to allow a second hypervisor subsystem on the second computing system to provide a second virtual machine that operates the same as the first virtual machine.Type: ApplicationFiled: October 22, 2020Publication date: April 28, 2022Inventors: William Price Dawkins, Robert W. Hormuth, Elie Jreij, Gaurav Chawla, Mark Steven Sanders, Jimmy D. Pike
-
Publication number: 20220121580Abstract: A graph-based data flow control system includes a control plane system coupled to SCP subsystems. The control plane system identifies a workload, and identifies service(s) on the SCP subsystems for manipulting/exchanging data to perform the workload. The control plane system generates a respective SCP-local data flow control graph for each SCP subsystem that defines how their service(s) will manipulate/exchange data within that SCP subsystem, and generates inter-SCP data flow control graph(s) that define how service(s) provided by at least one SCP subsystem will manipulate/exchange data with service(s) provided by at least one other SCP subsystem. The control plane system then transmits each respective SCP-local data flow control graph to each of the SCP subsystems, and the inter-SCP data flow control graph(s) to at least one SCP subsystem, for use by the SCP subsystems in causing their service(s) to manipulate/exchange data to perform the workload.Type: ApplicationFiled: October 15, 2020Publication date: April 21, 2022Inventors: Gaurav Chawla, Mark Steven Sanders, Elie Jreij, Jimmy D. Pike, Robert W. Hormuth, William Price Dawkins
-
Publication number: 20220121546Abstract: A graph-based data multi-operation system includes a data multi-operation management subsystem coupled to an application and accelerator subsystems. The data multi-operation management subsystem receives a data multi-operation graph from the application that identifies first data and defines operations for performance on the first data to transform the first data into second data. The data multi-operation management subsystem assigns each of the operations to at least one of the accelerator systems, and configures the accelerator subsystems to perform the operations in a sequence that transforms the first data into the second data, When the data multi-operation management subsystem determine a completion status for the performance of the operations by the accelerator subsystems, it transmits a completion status communication to the application that indicates the completion status of the performance of the plurality of operations by the plurality of accelerator subsystems.Type: ApplicationFiled: October 21, 2020Publication date: April 21, 2022Inventors: Gaurav Chawla, Mark Steven Sanders, William Price Dawkins, Jimmy D. Pike, Elie Jreij, Robert W. Hormuth
-
Publication number: 20220123920Abstract: A distributed key management system includes a first SCP subsystem coupled to second SCP subsystems via a network. The first SCP subsystem establishes secure communication channels with the second SCP subsystems, and a first key management subsystem in the first SCP subsystem retrieves enabling key(s) for communicating via the secure communication channels from a second key management subsystem in one of the second SCP subsystems, and stores the enabling key(s). The first key management subsystem then receives a first enabling key request from the first SCP subsystem and determines whether the first SCP subsystem is trusted. If the first SCP subsystem is trusted, the first key management subsystem provides the first SCP subsystem access to the at least one enabling key. If the first SCP subsystem is not trusted, the first key management subsystem prevents the first SCP subsystem from accessing the at least one enabling key stored.Type: ApplicationFiled: October 15, 2020Publication date: April 21, 2022Inventors: Jimmy D. Pike, Robert W. Hormuth, Gaurav Chawla, Mark Steven Sanders, Elie Jreij, William Price Dawkins
-
Publication number: 20220116404Abstract: Methods and systems for adaptive multi-factored geo-location based access rights management and enforcement for accessing location restricted data services are described. The method performed by server system includes receiving request to access a data service from a user device associated with a user. The method includes accessing geo-location information associated with the user upon receipt of request. The geo-location information includes geo-location data associated with the user device. The method includes generating geo-location signature associated with the user device, based on the geo-location information. The geo-location signature includes a plurality of location context identifiers. The method includes validating the user device when the geo-location signature and a geo-fence of the data service meet a matching threshold condition and transmitting a response message to the user device based on the validating step.Type: ApplicationFiled: March 22, 2021Publication date: April 14, 2022Inventors: Mark Steven MANASSE, Sanjay JAIN, Ajay JOTWANI, Ananya JAIN, Patricia BOLTON, Ravi JOTWANI
-
Publication number: 20220113980Abstract: A System Control Processor (SCP) cloning system includes a first computing system coupled to second computing systems via a network. The first computing system includes a first SCP subsystem coupled to a central processing system and first computing system components in the first computing system. The first SCP subsystem receives a first cloning command via the network from a management system and, based on the first cloning command, retrieves respective first SCP component state information from each of a plurality of first SCP components that are included in the first SCP subsystem, uses the respective first SCP component state information to generate a first SCP subsystem image that is configured for installation on an SCP subsystem to configure that SCP subsystem the same as the first SCP subsystem, and transmits the first SCP subsystem image to a second SCP subsystem in each of at least one second computing system.Type: ApplicationFiled: October 13, 2020Publication date: April 14, 2022Inventors: William Price Dawkins, Gaurav Chawla, Mark Steven Sanders, Elie Jreij, Robert W. Hormuth, Jimmy D. Pike
-
Patent number: 11301259Abstract: A System Control Processor (SCP) cloning system includes a first computing system coupled to second computing systems via a network. The first computing system includes a first SCP subsystem coupled to a central processing system and first computing system components in the first computing system. The first SCP subsystem receives a first cloning command via the network from a management system and, based on the first cloning command, retrieves respective first SCP component state information from each of a plurality of first SCP components that are included in the first SCP subsystem, uses the respective first SCP component state information to generate a first SCP subsystem image that is configured for installation on an SCP subsystem to configure that SCP subsystem the same as the first SCP subsystem, and transmits the first SCP subsystem image to a second SCP subsystem in each of at least one second computing system.Type: GrantFiled: October 13, 2020Date of Patent: April 12, 2022Assignee: Dell Products L.P.Inventors: William Price Dawkins, Gaurav Chawla, Mark Steven Sanders, Elie Jreij, Robert W. Hormuth, Jimmy D. Pike
-
Publication number: 20220105793Abstract: An example system includes a vehicle having a prime mover motively coupled to a drive line; a motor/generator selectively coupled to the drive line, and configured to selectively modulate power transfer between an electrical load and the drive line; a battery pack; a DC/DC converter electrically interposed between the motor/generator and the electrical load, and between the battery pack and the electrical load, the DC/DC converter comprising a DC/DC converter housing; and a covering tray positioned over a plurality of batteries of the battery pack, the covering tray comprising a connectivity layer configured to provide electrical connectivity to terminals of the plurality of batteries.Type: ApplicationFiled: December 17, 2021Publication date: April 7, 2022Inventors: Nihal Sukhatankar, Mahesh Prabhakar Joshi, Shivaprasad Vithal Goud, Thomas Joseph Stoltz, Matthew Richard Busdiecker, Kaylah J. Berndt, Glenn Clark Fortune, Sarah Elizabeth Behringer, Mark Steven George, Dennis Dukaric, Thomas Alan Genise, Gary Baker, Tissaphem Mirfakhrai, Elizabeth Jane Mercer, Viken Rafi Yeranosian, Lesley Earl Candler, Nicole Downing, Lalit Murlidhar Patil, Suyog Shekhar Kulkami, Sunil Kumar Kunche, Rishabh Kumar Jain, Juan Chen
-
Patent number: 11292465Abstract: A traffic controller includes a controller configured to reject a request and issue a speed requirement based on a priority to cause a speed of a one of a plurality of vehicles to be within a speed band before entering a road. The rejection is responsive to receiving the speed request from the one approaching the road having priority less than a predetermined threshold and outside of a speed band and a predetermined acceleration band of vehicles on the road.Type: GrantFiled: November 26, 2018Date of Patent: April 5, 2022Assignee: Ford Global Technologies, LLCInventors: Yanan Zhao, Ming Cheng, Girish Gokul Chennupalli, Alex Szczepaniak, Mark Steven Yamazaki
-
Patent number: 11288008Abstract: A reflective memory system includes network-connected computing systems including respective memory subsystems. A reflective memory management subsystem in a first computing system receives a processor memory-centric reflective write request associated with a local reflective memory write operation and remote reflective memory write operations, performs the local reflective memory write operation to write data to a memory subsystem in the first computing system, and uses remote memory access hardware to generate remote memory write information for performing the remote reflective memory write operations to write the data at respective second memory subsystems in second computing systems.Type: GrantFiled: October 30, 2020Date of Patent: March 29, 2022Assignee: Dell Products L.P.Inventors: Robert W. Hormuth, Jimmy D. Pike, Gaurav Chawla, William Price Dawkins, Elie Jreij, Mukund P. Khatri, Walter A. O'Brien, III, Mark Steven Sanders