Patents by Inventor Merrill Smith
Merrill Smith has filed for patents to protect the following inventions. This listing includes patent applications that are pending as well as patents that have already been granted by the United States Patent and Trademark Office (USPTO).
-
Patent number: 11675944Abstract: In an approach utilizing static analysis, a processor receives a netlist for an integrated circuit. For at least one node of the integrated circuit in the netlist, a processor calculates (i) a total capacitive load of the respective node and (ii) a minimum required driver size. For a driver of the respective node, a processor (i) determines an effective driver size of the driver based on at least a number of fins of the driver and (ii) determines that the effective driver size exceeds the minimum required driver size multiplied by a predefined sizing margin. A processor, responsive to determining that the effective driver size exceeds the minimum required driver size multiplied by the predefined sizing margin, generates a report, where the report includes at least the driver and a suggestion to reduce the effective size of the driver.Type: GrantFiled: May 17, 2021Date of Patent: June 13, 2023Assignee: International Business Machines CorporationInventors: Lior Arie, Derrick Merrill Smith, Israel A. Wagner
-
Publication number: 20220366110Abstract: In an approach utilizing static analysis, a processor receives a netlist for an integrated circuit. For at least one node of the integrated circuit in the netlist, a processor calculates (i) a total capacitive load of the respective node and (ii) a minimum required driver size. For a driver of the respective node, a processor (i) determines an effective driver size of the driver based on at least a number of fins of the driver and (ii) determines that the effective driver size exceeds the minimum required driver size multiplied by a predefined sizing margin. A processor, responsive to determining that the effective driver size exceeds the minimum required driver size multiplied by the predefined sizing margin, generates a report, where the report includes at least the driver and a suggestion to reduce the effective size of the driver.Type: ApplicationFiled: May 17, 2021Publication date: November 17, 2022Inventors: Lior Arie, Derrick Merrill Smith, Israel A. Wagner
-
Patent number: 9433715Abstract: An aortic blood pump is described that is secured to a patient aorta that can be inflated and deflated in response to selective communication with a source of pressurized fluid or air. An expanded stent creates an area in with the pump and inflate and deflate. A system is also detailed including the pump and an external air line external to a patient body.Type: GrantFiled: August 21, 2013Date of Patent: September 6, 2016Assignee: L-VAD Technology, Inc.Inventors: Adrian Kantrowitz, Robert Merrill Smith
-
Publication number: 20160164913Abstract: The present invention is a security tool for protection of data on a mobile computing device. The security tool provides a plurality of security policies to be enforced based on source information for the data and a location associated with a network environment in which a mobile device is operating. The security tool may be either located at the mobile computing device or at the server. The security tool includes a file access module for determining whether files are visible or accessible. The file access module comprises a tag generator, an association module, and a policy enforcement module. The tag generator creates source information for the file being accessed and the policy enforcement module determines what actions, if any, can be performed on the file and under what conditions such as location and network environment, type of file and other factors.Type: ApplicationFiled: February 7, 2014Publication date: June 9, 2016Applicant: Apple Inc.Inventors: Peter BOUCHER, Michael WRIGHT, Tim CRANNY, Gabe NAULT, Merrill SMITH
-
Patent number: 9197668Abstract: The present invention is a security tool for protection of data on a mobile computing device. The security tool provides a plurality of security policies to be enforced based on source information for the data and a location associated with a network environment in which a mobile device is operating. The security tool may be either located at the mobile computing device or at the server. The security tool includes a file access module for determining whether files are visible or accessible. The file access module comprises a tag generator, an association module, and a policy enforcement module. The tag generator creates source information for the file being accessed and the policy enforcement module determines what actions, if any, can be performed on the file and under what conditions such as location and network environment, type of file and other factors.Type: GrantFiled: January 11, 2006Date of Patent: November 24, 2015Assignee: NOVELL, INC.Inventors: Peter Boucher, Michael Wright, Tim Cranny, Gabe Nault, Merrill Smith
-
Publication number: 20140259092Abstract: The present invention is a security tool for protection of data on a mobile computing device. The security tool provides a plurality of security policies to be enforced based on source information for the data and a location associated with a network environment in which a mobile device is operating. The security tool may be either located at the mobile computing device or at the server. The security tool includes a file access module for determining whether files are visible or accessible. The file access module comprises a tag generator, an association module, and a policy enforcement module. The tag generator creates source information for the file being accessed and the policy enforcement module determines what actions, if any, can be performed on the file and under what conditions such as location and network environment, type of file and other factors.Type: ApplicationFiled: February 7, 2014Publication date: September 11, 2014Applicant: Apple Inc.Inventors: Peter BOUCHER, Michael WRIGHT, Tim CRANNY, Gabe NAULT, Merrill SMITH
-
Publication number: 20140088340Abstract: An aortic blood pump is described that is secured to a patient aorta that can be inflated and deflated in response to selective communication with a source of pressurized fluid or air. An expanded stent creates an area in with the pump and inflate and deflate. A system is also detailed including the pump and an external air line external to a patient body.Type: ApplicationFiled: August 21, 2013Publication date: March 27, 2014Applicant: L-VAD TECHNOLOGY, INC.Inventors: Adrian Kantrowitz, Robert Merrill Smith
-
Patent number: 8540618Abstract: An aortic blood pump is described that can be inflated and deflated in response to selective communication with a source of pressurized fluid or air. The pump includes a structure adapted to maintain implant stability in the face of mechanical and fluid forces to which it is exposed in situ. The pump may include a wall adapted to maintain implant stability by connection of the wall to a stiffening element, such as a stent, a brace, a stiffener or any combination of these. Additionally, the pump optionally includes a wall adapted to maintain implant stability by configuring the interior volume to generally follow the contour of the native human aorta.Type: GrantFiled: February 2, 2004Date of Patent: September 24, 2013Assignee: L-VAD Technology, Inc.Inventors: Adrian Kantrowski, Robert Merrill Smith
-
Patent number: 8020192Abstract: The protection of data on a client mobile computing device by a server computer system such as within an enterprise network or on a separate mobile computing device is described. Security tools are described that provide different security policies to be enforced based on a location associated with a network environment in which a mobile device is operating. Methods for detecting the location of the mobile device are described. Additionally, the security tools may also provide for enforcing different policies based on security features. Examples of security features include the type of connection, wired or wireless, over which data is being transferred, the operation of anti-virus software, or the type of network adapter card. The different security policies provide enforcement mechanisms that may be tailored based upon the detected location and/or active security features associated with the mobile device. Examples of enforcement mechanisms are adaptive port blocking, file hiding and file encryption.Type: GrantFiled: October 29, 2007Date of Patent: September 13, 2011Inventors: Michael Wright, Peter Boucher, Gabe Nault, Merrill Smith, Sterling K. Jacobson, Jonathan Wood, Robert Mims
-
Patent number: 7636936Abstract: The administration of protection of data on a client mobile computing device by a server computer system such as within an enterprise network or on a separate mobile computing device is described. Security tools are described that provide different security policies to be enforced based on a location associated with a network environment in which a mobile device is operating. Methods for detecting the location of the mobile device are described. Additionally, the security tools may also provide for enforcing different policies based on security features. Examples of security features include the type of connection, wired or wireless, over which data is being transferred, the operation of anti-virus software, or the type of network adapter card. The different security policies provide enforcement mechanisms that may be tailored based upon the detected location and/or active security features associated with the mobile device.Type: GrantFiled: October 29, 2007Date of Patent: December 22, 2009Assignee: Novell, Inc.Inventors: Michael Wright, Peter Boucher, Gabe Nault, Merrill Smith, Sterling K Jacobson, Jonathan Wood, Robert Mims
-
Patent number: 7526800Abstract: The protection of data on a client mobile computing device by a server computer system such as within an enterprise network or on a separate mobile computing device is described. Security tools are described that provide different security policies to be enforced based on a location associated with a network environment in which a mobile device is operating. Methods for detecting the location of the mobile device are described. Additionally, the security tools may also provide for enforcing different policies based on security features. Examples of security features include the type of connection, wired or wireless, over which data is being transferred, the operation of anti-virus software, or the type of network adapter card. The different security policies provide enforcement mechanisms that may be tailored based upon the detected location and/or active security features associated with the mobile device. Examples of enforcement mechanisms are adaptive port blocking, file hiding and file encryption.Type: GrantFiled: July 21, 2004Date of Patent: April 28, 2009Assignee: Novell, Inc.Inventors: Michael Wright, Peter Boucher, Gabe Nault, Merrill Smith, Sterling K. Jacobson, Jonathan Wood, Robert Mims
-
Patent number: 7478420Abstract: The protection of data on a client mobile computing device by a server computer system such as within an enterprise network or on a separate mobile computing device is described. Security tools are described that provide different security policies to be enforced based on a location associated with a network environment in which a mobile device is operating. Methods for detecting the location of the mobile device are described. Additionally, the security tools may also provide for enforcing different policies based on security features. Examples of security features include the type of connection, wired or wireless, over which data is being transferred, the operation of anti-virus software, or the type of network adapter card. The different security policies provide enforcement mechanisms that may be tailored based upon the detected location and/or active security features associated with the mobile device. Examples of enforcement mechanisms are adaptive port blocking, file hiding and file encryption.Type: GrantFiled: October 29, 2007Date of Patent: January 13, 2009Assignee: Novell, Inc.Inventors: Michael Wright, Peter Boucher, Gabe Nault, Merrill Smith, Sterling K. Jacobson, Jonathan Wood, Robert Mims
-
Publication number: 20080109679Abstract: The administration of protection of data on a client mobile computing device by a server computer system such as within an enterprise network or on a separate mobile computing device is described. Security tools are described that provide different security policies to be enforced based on a location associated with a network environment in which a mobile device is operating. Methods for detecting the location of the mobile device are described. Additionally, the security tools may also provide for enforcing different policies based on security features. Examples of security features include the type of connection, wired or wireless, over which data is being transferred, the operation of anti-virus software, or the type of network adapter card. The different security policies provide enforcement mechanisms that may be tailored based upon the detected location and/or active security features associated with the mobile device.Type: ApplicationFiled: October 29, 2007Publication date: May 8, 2008Inventors: Michael Wright, Peter Boucher, Gabe Nault, Merrill Smith, Sterling Jacobson, Jonathan Wood, Robert Mims
-
Patent number: 7353533Abstract: The administration of protection of data on a client mobile computing device by a server computer system such as within an enterprise network or on a separate mobile computing device is described. Security tools are described that provide different security policies to be enforced based on a location associated with a network environment in which a mobile device is operating. Methods for detecting the location of the mobile device are described. Additionally, the security tools may also provide for enforcing different policies based on security features. Examples of security features include the type of connection, wired or wireless, over which data is being transferred, the operation of anti-virus software, or the type of network adapter card. The different security policies provide enforcement mechanisms that may be tailored based upon the detected location and/or active security features associated with the mobile device.Type: GrantFiled: April 11, 2003Date of Patent: April 1, 2008Assignee: Novell, Inc.Inventors: Michael Wright, Peter Boucher, Gabe Nault, Merrill Smith, Sterling K Jacobson, Jonathan Wood, Robert Mims
-
Publication number: 20080077971Abstract: The administration of protection of data on a client mobile computing device by a server computer system such as within an enterprise network or on a separate mobile computing device is described. Security tools are described that provide different security policies to be enforced based on a location associated with a network environment in which a mobile device is operating. Methods for detecting the location of the mobile device are described. Additionally, the security tools may also provide for enforcing different policies based on security features. Examples of security features include the type of connection, wired or wireless, over which data is being transferred, the operation of anti-virus software, or the type of network adapter card. The different security policies provide enforcement mechanisms that may be tailored based upon the detected location and/or active security features associated with the mobile device.Type: ApplicationFiled: October 29, 2007Publication date: March 27, 2008Inventors: Michael Wright, Peter Boucher, Gabe Nault, Merrill Smith, Sterling Jacobson, Jonathan Wood, Robert Mims
-
Publication number: 20080052395Abstract: The protection of data on a client mobile computing device by a server computer system such as within an enterprise network or on a separate mobile computing device is described. Security tools are described that provide different security policies to be enforced based on a location associated with a network environment in which a mobile device is operating. Methods for detecting the location of the mobile device are described. Additionally, the security tools may also provide for enforcing different policies based on security features. Examples of security features include the type of connection, wired or wireless, over which data is being transferred, the operation of anti-virus software, or the type of network adapter card. The different security policies provide enforcement mechanisms that may be tailored based upon the detected location and/or active security features associated with the mobile device. Examples of enforcement mechanisms are adaptive port blocking, file hiding and file encryption.Type: ApplicationFiled: October 29, 2007Publication date: February 28, 2008Inventors: Michael Wright, Peter Boucher, Gabe Nault, Merrill Smith, Sterling Jacobson, Jonathan Wood, Robert Mims
-
Publication number: 20080052108Abstract: Methods of activating a communication device are disclosed. These methods may comprise receiving at a central processor an authorization request from a merchant terminal at the merchant store to authorize activation of a communication device, the central processor being in selective communication with the merchant terminal and a communications service provider; determining at the central processor whether the communication device was validly sold from the merchant store in a purchase transaction; authorizing at the central processor activation of the communication device, responsive to a determination that the communication device was validly sold from the merchant store in a purchase transaction; informing the communications service provider that the communication device is authorized and ready for activation; receiving at the central processor an activation notification from the communications service provider; and sending an activation notification message to the communication device.Type: ApplicationFiled: October 31, 2007Publication date: February 28, 2008Applicant: e2interactive, Inc. d/b/a e2Interactive, Inc.Inventors: Merrill Smith, Phillip Graves
-
Publication number: 20080046965Abstract: The protection of data on a client mobile computing device by a server computer system such as within an enterprise network or on a separate mobile computing device is described. Security tools are described that provide different security policies to be enforced based on a location associated with a network environment in which a mobile device is operating. Methods for detecting the location of the mobile device are described. Additionally, the security tools may also provide for enforcing different policies based on security features. Examples of security features include the type of connection, wired or wireless, over which data is being transferred, the operation of anti-virus software, or the type of network adapter card. The different security policies provide enforcement mechanisms that may be tailored based upon the detected location and/or active security features associated with the mobile device. Examples of enforcement mechanisms are adaptive port blocking, file hiding and file encryption.Type: ApplicationFiled: October 29, 2007Publication date: February 21, 2008Inventors: Michael Wright, Peter Boucher, Gabe Nault, Merrill Smith, Sterling Jacobson, Jonathan Wood, Robert Mims
-
Publication number: 20080020734Abstract: Systems and methods of authorizing the activation of a previously functioning by subsequently deactivated or disabled communication device are disclosed. The method comprises receiving at a central processor an authorization request from a merchant terminal at the merchant store to authorize activation of a communication device, the central processor being in selective communication with the merchant terminal and a communications service provider; determining at the central processor whether the communication device was validly sold from the merchant store in a purchase transaction; authorizing at the central processor activation of the communication device, responsive to a determination that the communication device was validly sold from the merchant store in a purchase transaction; and sending a notification from the central processor to the communications service provider that the communication device is authorized and ready for activation.Type: ApplicationFiled: October 12, 2007Publication date: January 24, 2008Applicant: e2interactive, Inc. d/b/a e2Interactive, Inc.Inventors: Merrill Smith, Phillip Graves
-
Patent number: 7308703Abstract: Security tools are described that provide different security policies to be enforced based on a location associated with a network environment in which a mobile device is operating. Methods for detecting the location of the mobile device are described. Additionally, the security tools may also provide for enforcing different policies based on security features. Examples of security features include the type of connection, wired or wireless, over which data is being transferred, the operation of anti-virus software, or the type of network adapter card. The different security policies provide enforcement mechanisms that may be tailored based upon the detected location and/or active security features associated with the mobile device. Examples of enforcement mechanisms are adaptive port blocking, file hiding and file encryption.Type: GrantFiled: February 28, 2003Date of Patent: December 11, 2007Assignee: Novell, Inc.Inventors: Michael Wright, Peter Boucher, Gabe Nault, Merrill Smith, Sterling K Jacobson, Jonathan Wood, Robert Mims