Patents by Inventor Michael Wright

Michael Wright has filed for patents to protect the following inventions. This listing includes patent applications that are pending as well as patents that have already been granted by the United States Patent and Trademark Office (USPTO).

  • Patent number: 8028722
    Abstract: A fluid handling device with an anisotropic wetting surface including a substrate with a multiplicity of asymmetric substantially uniformly shaped asperities thereon. Each asperity has a first asperity rise angle and a second asperity rise angle relative to the substrate. The asperities are structured to present a desired retentive force ratio (f1/f2) greater or less than unity caused by asymmetry between the first asperity rise angle and the second asperity rise angle according to the formula: f3/f2=sin(?3+½??0)/sin(?2+½??0).
    Type: Grant
    Filed: September 15, 2006
    Date of Patent: October 4, 2011
    Assignee: Entegris, Inc.
    Inventors: Charles W. Extrand, Michael Wright
  • Patent number: 8020192
    Abstract: The protection of data on a client mobile computing device by a server computer system such as within an enterprise network or on a separate mobile computing device is described. Security tools are described that provide different security policies to be enforced based on a location associated with a network environment in which a mobile device is operating. Methods for detecting the location of the mobile device are described. Additionally, the security tools may also provide for enforcing different policies based on security features. Examples of security features include the type of connection, wired or wireless, over which data is being transferred, the operation of anti-virus software, or the type of network adapter card. The different security policies provide enforcement mechanisms that may be tailored based upon the detected location and/or active security features associated with the mobile device. Examples of enforcement mechanisms are adaptive port blocking, file hiding and file encryption.
    Type: Grant
    Filed: October 29, 2007
    Date of Patent: September 13, 2011
    Inventors: Michael Wright, Peter Boucher, Gabe Nault, Merrill Smith, Sterling K. Jacobson, Jonathan Wood, Robert Mims
  • Patent number: 7987767
    Abstract: The invention provides a method for the preparation of a foamed drink comprising the steps of: providing a capsule containing a foamable ingredient; providing a receptacle positioned to collect fluid escaping from the capsule; injecting liquid into the capsule to mix with the foamable ingredient; allowing the foamable ingredient mixed with the liquid to escape from the capsule into the receptacle; followed by injecting further liquid into the receptacle in a jet having a diameter of from about 0.5 to about 2 mm to produce foamed liquid in the receptacle. The invention also provides capsules, apparatus and systems specifically adapted for use in the method. Preferably, the food ingredient is a milk powder, and the method produces a hot foamed beverage such as a cappuccino coffee.
    Type: Grant
    Filed: April 5, 2007
    Date of Patent: August 2, 2011
    Assignee: Mars Incorporated
    Inventors: David Andrew James Hester, Martin Eric Colston, John Charles Cooke, David Hay, Michael Wright
  • Publication number: 20110064081
    Abstract: Techniques for routing a payload of a first network protocol, which includes header information for a second network protocol, include communicating a packet. In a circuit block, a first type for the first network protocol and a second type for the second network protocol are determined. The circuit block stores a classification that indicates a unique combination of the first type and the second type. A general purpose processor routes the packet based on the classification. Processor clock cycles are saved that would be consumed in determining the types. Furthermore, based on the classification, the processor can store an offset value for aligning the header relative to a cache line. The circuit block can store the packet shifted by the offset value. The processor can then retrieve from memory a single cache line to receive the header, thereby saving excess loading and ejecting of cache.
    Type: Application
    Filed: November 16, 2010
    Publication date: March 17, 2011
    Applicant: Cisco Technology, Inc.
    Inventors: William Lee, Michael Wright, Joydeep Chowdhury, Sriram Haridas, Martin Hughes
  • Publication number: 20110044848
    Abstract: A germicidal apparatus for sterilizing at least one object, including at least one ultraviolet (UV) emitting unit which emits UV light onto at least one object; one or more spraying units which spray at least one chemical onto at least one object, wherein the UV light and at least one chemical sterilize the at least one object. There are disclosed methods for sterilizing at least one object, including a method including emitting ultraviolet (UV) light onto the at least one object; and applying at least one chemical to the at least one object.
    Type: Application
    Filed: December 19, 2008
    Publication date: February 24, 2011
    Inventor: Michael Wright
  • Patent number: 7848332
    Abstract: Techniques for routing a payload of a first network protocol, which includes header information for a second network protocol, include communicating a packet. In a circuit block, a first type for the first network protocol and a second type for the second network protocol are determined. The circuit block stores a classification that indicates a unique combination of the first type and the second type. A general purpose processor routes the packet based on the classification. Processor clock cycles are saved that would be consumed in determining the types. Furthermore, based on the classification, the processor can store an offset value for aligning the header relative to a cache line. The circuit block can store the packet shifted by the offset value. The processor can then retrieve from memory a single cache line to receive the header, thereby saving excess loading and ejecting of cache.
    Type: Grant
    Filed: November 15, 2004
    Date of Patent: December 7, 2010
    Assignee: Cisco Technology, Inc.
    Inventors: William Lee, Michael Wright, Joydeep Chowdhury, Sriram Haridas, Martin Hughes
  • Patent number: 7815671
    Abstract: A controlled stent-graft deployment delivery system (10 50 or 900) includes a stent-graft (30 or 63), a retractable primary sheath (40) containing the stent-graft in a first constrained diameter configuration, an outer tube (18) within the retractable primary sheath and within the stent-graft, and an inner tube (20) within the outer tube, where the inner tube and the outer tube both axially move relative to the retractable primary sheath and to each other. The system further includes a cap (15) coupled to a distal end of the inner tube and configured to retain at least a portion of a proximal area of the stent-graft in a radially compressed configuration. A distal assembly (100) provides controlled relative axial movement between the outer tube and the inner tube enabling the release of the proximal end (65, 67, 68, and 69) of the stent-graft from the cap and from the radially compressed configuration.
    Type: Grant
    Filed: July 27, 2007
    Date of Patent: October 19, 2010
    Assignee: Medtronic Vascular, Inc.
    Inventors: Michael Wright, Timothy Lostetter, Alex Ruiz
  • Patent number: 7636936
    Abstract: The administration of protection of data on a client mobile computing device by a server computer system such as within an enterprise network or on a separate mobile computing device is described. Security tools are described that provide different security policies to be enforced based on a location associated with a network environment in which a mobile device is operating. Methods for detecting the location of the mobile device are described. Additionally, the security tools may also provide for enforcing different policies based on security features. Examples of security features include the type of connection, wired or wireless, over which data is being transferred, the operation of anti-virus software, or the type of network adapter card. The different security policies provide enforcement mechanisms that may be tailored based upon the detected location and/or active security features associated with the mobile device.
    Type: Grant
    Filed: October 29, 2007
    Date of Patent: December 22, 2009
    Assignee: Novell, Inc.
    Inventors: Michael Wright, Peter Boucher, Gabe Nault, Merrill Smith, Sterling K Jacobson, Jonathan Wood, Robert Mims
  • Publication number: 20090273184
    Abstract: A combination sealing and restraint system for an as-cast ductile iron pipe systems. A ductile iron pipe/fitting with a bell end has an as-cast profile formed therein for receiving both a gripping ring and a sealing ring in spaced apart locations. The gripping ring is installed within a first recess provided as a part of the as-cast profile in a post-casting step. The sealing ring is also installed within a second, spaced recess after the casting operation is complete. The sealing ring can be a dual durometer gasket which can be flexed and inserted into the profile. The same type bell end can be provided as an adapter which converts a traditional mechanical joint restraint to an internal gripping and restrain system.
    Type: Application
    Filed: April 30, 2008
    Publication date: November 5, 2009
    Inventors: Michael Wright, Randall Chinchilla
  • Patent number: 7588030
    Abstract: A medicament container and a method of manufacturing the container housing at least one individual dose of medicament using a carrier having first and second opposing faces and through walls defining a through hole extending between the first and second opposing faces, the method including inserting the carrier into a mould having an element for protrusion into the through hole from the first face so as to define with the through walls a generally cup-shaped space, filling the generally cup-shaped space with a mould material so as to form a generally cup-shaped insert in the through hole, removing the carrier and insert from the mould, depositing an individual dose of medicament in the generally cup-shaped insert, and sealing the medicament and insert in the through hole by sealing first and second sheets respectively with the first and second faces.
    Type: Grant
    Filed: February 6, 2003
    Date of Patent: September 15, 2009
    Assignee: Meridica Limited
    Inventors: Andrew John Ede, John Kelshaw Conway, Christopher Michael Wright
  • Publication number: 20090217981
    Abstract: A fluid handling device with an anisotropic wetting surface including a substrate with a multiplicity of asymmetric substantially uniformly shaped asperities thereon. Each asperity has a first asperity rise angle and a second asperity rise angle relative to the substrate. The asperities are structured to present a desired retentive force ratio (f1/f2) greater or less than unity caused by asymmetry between the first asperity rise angle and the second asperity rise angle according to the formula: f3/f2=sin(?3+½??0)/sin(?2+½??0).
    Type: Application
    Filed: September 15, 2006
    Publication date: September 3, 2009
    Applicant: ENTEGRIS, INC.
    Inventors: Charles W. Extrand, Michael Wright
  • Patent number: 7524861
    Abstract: A hydrate of an acid addition bis-salt of an anthranilic acid derivative is produced by a process which comprises: (a) combining, in any order, the anthranalic acid derivative, a pharmaceutically acceptable organic solvent, an excess of water and a pharmaceutically acceptable strong acid to form a mixture; (b) warming the mixture until a clear solution forms; (c) filtering the solution while it is warm, to yield a filtrate; and (d) recovering the hydrate as defined above from the filtrate. The hydrate has a defined number of moles of water of crystallization and possesses better storage stability and dissolution characteristics than conventionally produced hydrates of such acid addition bis-salts.
    Type: Grant
    Filed: May 13, 2003
    Date of Patent: April 28, 2009
    Inventors: David Frank Hayman, Michael Wright
  • Patent number: 7526800
    Abstract: The protection of data on a client mobile computing device by a server computer system such as within an enterprise network or on a separate mobile computing device is described. Security tools are described that provide different security policies to be enforced based on a location associated with a network environment in which a mobile device is operating. Methods for detecting the location of the mobile device are described. Additionally, the security tools may also provide for enforcing different policies based on security features. Examples of security features include the type of connection, wired or wireless, over which data is being transferred, the operation of anti-virus software, or the type of network adapter card. The different security policies provide enforcement mechanisms that may be tailored based upon the detected location and/or active security features associated with the mobile device. Examples of enforcement mechanisms are adaptive port blocking, file hiding and file encryption.
    Type: Grant
    Filed: July 21, 2004
    Date of Patent: April 28, 2009
    Assignee: Novell, Inc.
    Inventors: Michael Wright, Peter Boucher, Gabe Nault, Merrill Smith, Sterling K. Jacobson, Jonathan Wood, Robert Mims
  • Patent number: 7478420
    Abstract: The protection of data on a client mobile computing device by a server computer system such as within an enterprise network or on a separate mobile computing device is described. Security tools are described that provide different security policies to be enforced based on a location associated with a network environment in which a mobile device is operating. Methods for detecting the location of the mobile device are described. Additionally, the security tools may also provide for enforcing different policies based on security features. Examples of security features include the type of connection, wired or wireless, over which data is being transferred, the operation of anti-virus software, or the type of network adapter card. The different security policies provide enforcement mechanisms that may be tailored based upon the detected location and/or active security features associated with the mobile device. Examples of enforcement mechanisms are adaptive port blocking, file hiding and file encryption.
    Type: Grant
    Filed: October 29, 2007
    Date of Patent: January 13, 2009
    Assignee: Novell, Inc.
    Inventors: Michael Wright, Peter Boucher, Gabe Nault, Merrill Smith, Sterling K. Jacobson, Jonathan Wood, Robert Mims
  • Publication number: 20080319184
    Abstract: The present invention provides the use of analogues and derivatives of dinucleoside polyphosphates with formula (I) or a pharmaceutically acceptable salt thereof, in the manufacture of a medicament for use in one or more of: the treatment of ischemia, inducing ischemic tolerance, modulating cerebral ischemia, to delay the onset of a hypoxic depolarisation stage when ischemic events are initiated; as a neurological protection agent; as a tissue protection agent; the treatment of pain; and the treatment of inflammation, wherein X, is selected from wherein X1 and X2 are independently selected from H, Cl, Br and F; each Y is independently selected from S and O; each Z is independently selected from —CX3X4—,—NH—,—O—; wherein X3 and X4 are selected from H, Cl, Br and F; B1 and B2 are independently selected from adenine, guanine, xanthine, thymine, uracil, cytosine and inosine; S1 and S2 are independently selected from ribose, open chain ribose, 2?-deoxyribose, 3?deoxyribose and arabinofuranoside.
    Type: Application
    Filed: February 1, 2006
    Publication date: December 25, 2008
    Inventors: Andrew David Miller, Michael Wright, Julian Alexander Tanner, Natalya Lozovaya
  • Publication number: 20080109679
    Abstract: The administration of protection of data on a client mobile computing device by a server computer system such as within an enterprise network or on a separate mobile computing device is described. Security tools are described that provide different security policies to be enforced based on a location associated with a network environment in which a mobile device is operating. Methods for detecting the location of the mobile device are described. Additionally, the security tools may also provide for enforcing different policies based on security features. Examples of security features include the type of connection, wired or wireless, over which data is being transferred, the operation of anti-virus software, or the type of network adapter card. The different security policies provide enforcement mechanisms that may be tailored based upon the detected location and/or active security features associated with the mobile device.
    Type: Application
    Filed: October 29, 2007
    Publication date: May 8, 2008
    Inventors: Michael Wright, Peter Boucher, Gabe Nault, Merrill Smith, Sterling Jacobson, Jonathan Wood, Robert Mims
  • Publication number: 20080081592
    Abstract: A method for authenticating an element in a network environment is provided that includes receiving a request for one or more triplets. One or more of the triplets may be associated with an authentication communications protocol that may be executed in order to facilitate a communication session. The method further includes returning one or more of the triplets in response to the request and initiating the communication session in response to the triplets after proper authentication of an entity associated with the request.
    Type: Application
    Filed: December 3, 2007
    Publication date: April 3, 2008
    Applicant: Cisco Technology, Inc.
    Inventors: Amitava Das, Michael Wright, Joseph Salowey, William Gossman
  • Patent number: 7353533
    Abstract: The administration of protection of data on a client mobile computing device by a server computer system such as within an enterprise network or on a separate mobile computing device is described. Security tools are described that provide different security policies to be enforced based on a location associated with a network environment in which a mobile device is operating. Methods for detecting the location of the mobile device are described. Additionally, the security tools may also provide for enforcing different policies based on security features. Examples of security features include the type of connection, wired or wireless, over which data is being transferred, the operation of anti-virus software, or the type of network adapter card. The different security policies provide enforcement mechanisms that may be tailored based upon the detected location and/or active security features associated with the mobile device.
    Type: Grant
    Filed: April 11, 2003
    Date of Patent: April 1, 2008
    Assignee: Novell, Inc.
    Inventors: Michael Wright, Peter Boucher, Gabe Nault, Merrill Smith, Sterling K Jacobson, Jonathan Wood, Robert Mims
  • Publication number: 20080077971
    Abstract: The administration of protection of data on a client mobile computing device by a server computer system such as within an enterprise network or on a separate mobile computing device is described. Security tools are described that provide different security policies to be enforced based on a location associated with a network environment in which a mobile device is operating. Methods for detecting the location of the mobile device are described. Additionally, the security tools may also provide for enforcing different policies based on security features. Examples of security features include the type of connection, wired or wireless, over which data is being transferred, the operation of anti-virus software, or the type of network adapter card. The different security policies provide enforcement mechanisms that may be tailored based upon the detected location and/or active security features associated with the mobile device.
    Type: Application
    Filed: October 29, 2007
    Publication date: March 27, 2008
    Inventors: Michael Wright, Peter Boucher, Gabe Nault, Merrill Smith, Sterling Jacobson, Jonathan Wood, Robert Mims
  • Publication number: 20080052395
    Abstract: The protection of data on a client mobile computing device by a server computer system such as within an enterprise network or on a separate mobile computing device is described. Security tools are described that provide different security policies to be enforced based on a location associated with a network environment in which a mobile device is operating. Methods for detecting the location of the mobile device are described. Additionally, the security tools may also provide for enforcing different policies based on security features. Examples of security features include the type of connection, wired or wireless, over which data is being transferred, the operation of anti-virus software, or the type of network adapter card. The different security policies provide enforcement mechanisms that may be tailored based upon the detected location and/or active security features associated with the mobile device. Examples of enforcement mechanisms are adaptive port blocking, file hiding and file encryption.
    Type: Application
    Filed: October 29, 2007
    Publication date: February 28, 2008
    Inventors: Michael Wright, Peter Boucher, Gabe Nault, Merrill Smith, Sterling Jacobson, Jonathan Wood, Robert Mims