Patents by Inventor Myron Smith

Myron Smith has filed for patents to protect the following inventions. This listing includes patent applications that are pending as well as patents that have already been granted by the United States Patent and Trademark Office (USPTO).

  • Publication number: 20220298051
    Abstract: A glass manufacturing apparatus includes a delivery tube terminating at a lower end in a delivery slot. A stream of molten material is delivered along a travel plane in a travel direction. A first plate is positioned adjacent the lower end of the delivery tube on a first side of the travel plane. The first plate includes a first edge extending adjacent the travel plane and a first thermal expansion slot extending from the first edge to a first interior. A second plate is positioned adjacent the lower end of the delivery tube on a second side of the travel plane. The second plate includes a second edge extending adjacent the travel plane and a second thermal expansion slot extending from the second edge to a second interior. The second edge is spaced apart from the first edge to define a delivery opening through which the delivery tube extends.
    Type: Application
    Filed: June 10, 2020
    Publication date: September 22, 2022
    Inventors: Kathryn Jean Russell Bourlotos, Gilbert De Angelis, Dale Madard Fisher, Jr., Chunhong Chelsie He, Timothy Joseph Helmers, Benjamin Pelham Schrock, Christopher Myron Smith
  • Patent number: 9430135
    Abstract: Certain exemplary embodiments disclosed herein relate to paging systems and methods that help users navigate through large or small datasets. For example, in certain exemplary embodiments, paging control elements are provided according to either a binary subdivision approach or a serial progressive approach. Paging control elements are displayed according to either the binary subdivision approach or the serial progressive approach in dependence on a determination as to which approach is more advantageous based at least in part on factors such as, for example, total number of pages, current page location, distance to end points, screen size, etc.
    Type: Grant
    Filed: October 1, 2012
    Date of Patent: August 30, 2016
    Assignee: e2interactive, Inc.
    Inventor: James Myron Smith
  • Patent number: 8712036
    Abstract: The described system and method provide for an encryption and authentication technique that achieves enhanced integrity verification through assured error-propagation using a multistage sequence of pseudorandom permutations. The method generates intermediate data-dependent cryptographic variables at each stage, which are systematically combined into feedback loops. The encryption technique also generates an authentication tag with minimal post processing that is the size of the state. The size of the state is dependent on the number of pseudorandom permutations and the size of the LFSR. The authentication tag provides a unique mapping to the plaintext for any number of plaintext blocks that is less than or equal the size of the state. In addition to being a stand alone encryption algorithm, the disclosed technique is applicable to any mode that uses pseudorandom permutations such as, key dependent lookup tables, S-Boxes, and block ciphers such as RC5, TEA, and AES.
    Type: Grant
    Filed: December 28, 2010
    Date of Patent: April 29, 2014
    Inventors: Eric Myron Smith, Daniel Jason Williams, Troy Allan Schultz, Peter Schweitzer
  • Patent number: 8515059
    Abstract: An efficient implementation of a cryptographic processor that dynamically updates the encryption state is described. The cryptographic processor can be implemented with a minimal number of gates, yet still perform cryptographic operations quickly. The cryptographic processor has an interface, a memory, a pseudorandom permutation block and control logic. The interface receives input data blocks and returns cryptographically processed data blocks. The memory is used to store an encryption state of the cryptographic processor. The pseudorandom permutation block transforms a portion of the encryption state that is modified for each input data block by at least the input data block and a previously transformed data block. The control logic routes data in the cryptographic processor to return cryptographically processed data blocks at the interface and update dynamically the encryption state stored in memory using the transformed data blocks from the pseudorandom permutation block.
    Type: Grant
    Filed: March 30, 2011
    Date of Patent: August 20, 2013
    Inventors: Daniel W. Engels, Kenneth Alan Lauffenburger, Eric Myron Smith, Troy Hicks
  • Patent number: 8509427
    Abstract: An encryption and authentication technique that achieves enhanced integrity verification through assured error-propagation using a multistage sequence of pseudorandom permutations. The method generates intermediate data-dependent cryptographic variables at each stage, which are systematically combined into feedback loops. The encryption technique also generates an authentication tag with minimal post processing that is the size of the state.
    Type: Grant
    Filed: May 5, 2011
    Date of Patent: August 13, 2013
    Inventors: Eric Myron Smith, Daniel W. Engels, Peter Schweitzer, Troy A. Schultz
  • Patent number: 8357130
    Abstract: Disclosed is an apparatus for the treatment of a wound on a patient. The apparatus is capable of administering localized negative pressure therapy to the wound using a hospital wall vacuum source and a drain line for removing exudate from the wound. The apparatus may also be capable of administering localized hyperbaric oxygen therapy to the wound using a hospital wall oxygen source and a supply line for supplying oxygen to the wound. The apparatus includes at least one regulator to control the application of negative pressure therapy and hyperbaric oxygen therapy.
    Type: Grant
    Filed: February 19, 2008
    Date of Patent: January 22, 2013
    Inventors: Joshua David Smith, David Myron Smith
  • Patent number: 8302024
    Abstract: Certain exemplary embodiments disclosed herein relate to paging systems and methods that help users navigate through large or small datasets. For example, in certain exemplary embodiments, paging control elements are provided according to either a binary subdivision approach or a serial progressive approach. Paging control elements are displayed according to either the binary subdivision approach or the serial progressive approach in dependence on a determination as to which approach is more advantageous based at least in part on factors such as, for example, total number of pages, current page location, distance to end points, screen size, etc.
    Type: Grant
    Filed: September 11, 2009
    Date of Patent: October 30, 2012
    Assignee: Nintendo of America Inc.
    Inventor: James Myron Smith
  • Patent number: 8184691
    Abstract: An encryption and authentication technique that achieves enhanced integrity verification through assured error-propagation using a multistage sequence of pseudorandom permutations. The present invention generates intermediate data-dependent cryptographic variables at each stage, which are systematically combined into feedback loops. The encryption technique also generates an authentication tag without any further steps that is N times longer than the block size where N is the number of pseudorandom permutations used in the encipherment of each block. The authentication tag provides a unique mapping to the plaintext for any number of plaintext blocks that is less than or equal to N. In addition to being a stand alone encryption algorithm, the disclosed technique is applicable to any mode that uses pseudorandom permutations such as, key dependent lookup tables, S-Boxes, and block ciphers such as RC5, TEA, and AES.
    Type: Grant
    Filed: July 31, 2006
    Date of Patent: May 22, 2012
    Inventors: Kevin Martin Henson, Eric Myron Smith
  • Publication number: 20120087488
    Abstract: An efficient implementation of a cryptographic processor that dynamically updates the encryption state is described. The cryptographic processor can be implemented with a minimal number of gates, yet still perform cryptographic operations quickly. The cryptographic processor has an interface, a memory, a pseudorandom permutation block and control logic. The interface receives input data blocks and returns cryptographically processed data blocks. The memory is used to store an encryption state of the cryptographic processor. The pseudorandom permutation block transforms a portion of the encryption state that is modified for each input data block by at least the input data block and a previously transformed data block. The control logic routes data in the cryptographic processor to return cryptographically processed data blocks at the interface and update dynamically the encryption state stored in memory using the transformed data blocks from the pseudorandom permutation block.
    Type: Application
    Filed: March 30, 2011
    Publication date: April 12, 2012
    Inventors: Daniel W. ENGELS, Kenneth Alan Lauffenburger, Eric Myron Smith, Troy Hicks
  • Publication number: 20120076293
    Abstract: An encryption and authentication technique that achieves enhanced integrity verification through assured error-propagation using a multistage sequence of pseudorandom permutations. The method generates intermediate data-dependent cryptographic variables at each stage, which are systematically combined into feedback loops. The encryption technique also generates an authentication tag with minimal post processing that is the size of the state.
    Type: Application
    Filed: May 5, 2011
    Publication date: March 29, 2012
    Inventors: Eric Myron Smith, Daniel W. Engels, Peter Schweitzer, Troy A. Schultz
  • Publication number: 20120008767
    Abstract: The described system and method provide for an encryption and authentication technique that achieves enhanced integrity verification through assured error-propagation using a multistage sequence of pseudorandom permutations. The method generates intermediate data-dependent cryptographic variables at each stage, which are systematically combined into feedback loops. The encryption technique also generates an authentication tag with minimal post processing that is the size of the state. The size of the state is dependent on the number of pseudorandom permutations and the size of the LFSR. The authentication tag provides a unique mapping to the plaintext for any number of plaintext blocks that is less than or equal the size of the state. In addition to being a stand alone encryption algorithm, the disclosed technique is applicable to any mode that uses pseudorandom permutations such as, key dependent lookup tables, S-Boxes, and block ciphers such as RC5, TEA, and AES.
    Type: Application
    Filed: December 28, 2010
    Publication date: January 12, 2012
    Inventors: Eric Myron Smith, Daniel Jason Williams, Troy Allan Schultz, Peter Schweitzer
  • Publication number: 20110066853
    Abstract: The present invention describes a system and method for securely identifying and authenticating devices in a symmetric encryption system. An RFID tag can generate indicators using encryption state variables and a symmetric key. An RFID reader, after receiving the encryption state variables from the tag, may identify the tag by performing an exhaustive key search in a key database. Each key in the database may be tested by using the key and encryption state variables to perform an encryption operation similar to that performed by the tag. The result is then compared with the received tag indicators to determine if the tag has been identified. A rotor-based encryption scheme provides for a low cost key search while providing resilience against cloning, tracking, tampering and replay attacks.
    Type: Application
    Filed: May 13, 2010
    Publication date: March 17, 2011
    Inventors: Daniel Wayne Engels, Eric Myron Smith, Troy Allan Schultz
  • Patent number: 7844813
    Abstract: A system, process and method for data encryption and transmission are disclosed. By adopting the paradigm of a pre-paid self addressed express envelope end-users will interact with this invention in much the same way they interact with traditional delivery systems. They simply provide the content, and delivery takes place without any further user intervention. The encryption is a “software appliance”. This software already knows the identity of the sender and the receiver and the encryption key that is to be used; all it needs from the user is the information which is to be securely transported.
    Type: Grant
    Filed: July 15, 2002
    Date of Patent: November 30, 2010
    Inventors: Kevin M. Henson, Eric Myron Smith
  • Publication number: 20100257486
    Abstract: Certain exemplary embodiments disclosed herein relate to paging systems and methods that help users navigate through large or small datasets. For example, in certain exemplary embodiments, paging control elements are provided according to either a binary subdivision approach or a serial progressive approach. Paging control elements are displayed according to either the binary subdivision approach or the serial progressive approach in dependence on a determination as to which approach is more advantageous based at least in part on factors such as, for example, total number of pages, current page location, distance to end points, screen size, etc.
    Type: Application
    Filed: September 11, 2009
    Publication date: October 7, 2010
    Applicant: Nintendo of America Inc.
    Inventor: James Myron Smith
  • Publication number: 20100172494
    Abstract: An encryption and authentication technique that achieves enhanced integrity verification through assured error-propagation using a multistage sequence of pseudorandom permutations. The present invention generates intermediate data-dependent cryptographic variables at each stage, which are systematically combined into feedback loops. The encryption technique also generates an authentication tag without any further steps that is N times longer than the block size where N is the number of pseudorandom permutations used in the encipherment of each block. The authentication tag provides a unique mapping to the plaintext for any number of plaintext blocks that is less than or equal to N. In addition to being a stand alone encryption algorithm, the disclosed technique is applicable to any mode that uses pseudorandom permutations such as, key dependent lookup tables, S-Boxes, and block ciphers such as RC5, TEA, and AES.
    Type: Application
    Filed: March 19, 2010
    Publication date: July 8, 2010
    Inventors: Kevin Martin Henson, ERIC MYRON SMITH, Daniel Jason Williams, Peter Schweitzer
  • Publication number: 20100121287
    Abstract: Disclosed is an apparatus for the treatment of a wound on a patient. The apparatus is capable of administering localized negative pressure therapy to the wound using a negative pressure source and a drain line for removing exudate from the wound. The apparatus is also capable of administering localized hyperbaric fluid therapy to the wound using a fluid source and a supply line for supplying fluid to the wound.
    Type: Application
    Filed: January 15, 2010
    Publication date: May 13, 2010
    Applicant: Pioneer Technology LLC
    Inventors: Joshua David Smith, David Myron Smith, Thomas G. Andrews, Jack Fisher, David P. Bohman, Robert Stephen Porter
  • Patent number: 7715553
    Abstract: An encryption and authentication technique that achieves enhanced integrity verification through assured error-propagation using a multistage sequence of pseudorandom permutations. The present invention generates intermediate data-dependent cryptographic variables at each stage, which are systematically combined into feedback loops. The encryption technique also generates an authentication tag without any further steps that is N times longer than the block size where N is the number of pseudorandom permutations used in the encipherment of each block. The authentication tag provides a unique mapping to the plaintext for any number of plaintext blocks that is less than or equal to N. In addition to being a stand alone encryption algorithm, the disclosed technique is applicable to any mode that uses pseudorandom permutations such as, key dependent lookup tables, S-Boxes, and block ciphers such as RC5, TEA, and AES.
    Type: Grant
    Filed: July 31, 2006
    Date of Patent: May 11, 2010
    Inventors: Eric Myron Smith, Kevin Martin Henson, Daniel Jason Williams, Peter Schweitzer
  • Patent number: 7648488
    Abstract: Disclosed is an apparatus for the treatment of a wound on a patient. The apparatus is capable of administering localized negative pressure therapy to the wound using a negative pressure source and a drain line for removing exudate from the wound. The apparatus is also capable of administering localized hyperbaric fluid therapy to the wound using a fluid source and a supply line for supplying fluid to the wound.
    Type: Grant
    Filed: November 21, 2006
    Date of Patent: January 19, 2010
    Assignee: Pioneer Technology, LLC
    Inventors: Joshua David Smith, David Myron Smith, Thomas G. Andrews, Jack Fisher, David P. Bohman, Robert Stephen Porter
  • Publication number: 20080140029
    Abstract: Disclosed is an apparatus for the treatment of a wound on a patient. The apparatus is capable of administering localized negative pressure therapy to the wound using a hospital wall vacuum source and a drain line for removing exudate from the wound. The apparatus may also be capable of administering localized hyperbaric oxygen therapy to the wound using a hospital wall oxygen source and a supply line for supplying oxygen to the wound. The apparatus includes at least one regulator to control the application of negative pressure therapy and hyperbaric oxygen therapy.
    Type: Application
    Filed: February 19, 2008
    Publication date: June 12, 2008
    Inventors: Joshua David Smith, David Myron Smith
  • Publication number: 20080025496
    Abstract: An encryption and authentication technique that achieves enhanced integrity verification through assured error-propagation using a multistage sequence of pseudorandom permutations. The present invention generates intermediate data-dependent cryptographic variables at each stage, which are systematically combined into feedback loops. The encryption technique also generates an authentication tag without any further steps that is N times longer than the block size where N is the number of pseudorandom permutations used in the encipherment of each block. The authentication tag provides a unique mapping to the plaintext for any number of plaintext blocks that is less than or equal to N. In addition to being a stand alone encryption algorithm, the disclosed technique is applicable to any mode that uses pseudorandom permutations such as, key dependent lookup tables, S-Boxes, and block ciphers such as RC5, TEA, and AES.
    Type: Application
    Filed: July 31, 2006
    Publication date: January 31, 2008
    Applicant: Asier Technology Corporation, A Delaware corporation
    Inventors: Eric Myron Smith, Kevin Martin Henson, Daniel Jason Williams, Peter Schweitzer