Patents by Inventor Myron Smith
Myron Smith has filed for patents to protect the following inventions. This listing includes patent applications that are pending as well as patents that have already been granted by the United States Patent and Trademark Office (USPTO).
-
Publication number: 20220298051Abstract: A glass manufacturing apparatus includes a delivery tube terminating at a lower end in a delivery slot. A stream of molten material is delivered along a travel plane in a travel direction. A first plate is positioned adjacent the lower end of the delivery tube on a first side of the travel plane. The first plate includes a first edge extending adjacent the travel plane and a first thermal expansion slot extending from the first edge to a first interior. A second plate is positioned adjacent the lower end of the delivery tube on a second side of the travel plane. The second plate includes a second edge extending adjacent the travel plane and a second thermal expansion slot extending from the second edge to a second interior. The second edge is spaced apart from the first edge to define a delivery opening through which the delivery tube extends.Type: ApplicationFiled: June 10, 2020Publication date: September 22, 2022Inventors: Kathryn Jean Russell Bourlotos, Gilbert De Angelis, Dale Madard Fisher, Jr., Chunhong Chelsie He, Timothy Joseph Helmers, Benjamin Pelham Schrock, Christopher Myron Smith
-
Patent number: 9430135Abstract: Certain exemplary embodiments disclosed herein relate to paging systems and methods that help users navigate through large or small datasets. For example, in certain exemplary embodiments, paging control elements are provided according to either a binary subdivision approach or a serial progressive approach. Paging control elements are displayed according to either the binary subdivision approach or the serial progressive approach in dependence on a determination as to which approach is more advantageous based at least in part on factors such as, for example, total number of pages, current page location, distance to end points, screen size, etc.Type: GrantFiled: October 1, 2012Date of Patent: August 30, 2016Assignee: e2interactive, Inc.Inventor: James Myron Smith
-
Patent number: 8712036Abstract: The described system and method provide for an encryption and authentication technique that achieves enhanced integrity verification through assured error-propagation using a multistage sequence of pseudorandom permutations. The method generates intermediate data-dependent cryptographic variables at each stage, which are systematically combined into feedback loops. The encryption technique also generates an authentication tag with minimal post processing that is the size of the state. The size of the state is dependent on the number of pseudorandom permutations and the size of the LFSR. The authentication tag provides a unique mapping to the plaintext for any number of plaintext blocks that is less than or equal the size of the state. In addition to being a stand alone encryption algorithm, the disclosed technique is applicable to any mode that uses pseudorandom permutations such as, key dependent lookup tables, S-Boxes, and block ciphers such as RC5, TEA, and AES.Type: GrantFiled: December 28, 2010Date of Patent: April 29, 2014Inventors: Eric Myron Smith, Daniel Jason Williams, Troy Allan Schultz, Peter Schweitzer
-
Patent number: 8515059Abstract: An efficient implementation of a cryptographic processor that dynamically updates the encryption state is described. The cryptographic processor can be implemented with a minimal number of gates, yet still perform cryptographic operations quickly. The cryptographic processor has an interface, a memory, a pseudorandom permutation block and control logic. The interface receives input data blocks and returns cryptographically processed data blocks. The memory is used to store an encryption state of the cryptographic processor. The pseudorandom permutation block transforms a portion of the encryption state that is modified for each input data block by at least the input data block and a previously transformed data block. The control logic routes data in the cryptographic processor to return cryptographically processed data blocks at the interface and update dynamically the encryption state stored in memory using the transformed data blocks from the pseudorandom permutation block.Type: GrantFiled: March 30, 2011Date of Patent: August 20, 2013Inventors: Daniel W. Engels, Kenneth Alan Lauffenburger, Eric Myron Smith, Troy Hicks
-
Patent number: 8509427Abstract: An encryption and authentication technique that achieves enhanced integrity verification through assured error-propagation using a multistage sequence of pseudorandom permutations. The method generates intermediate data-dependent cryptographic variables at each stage, which are systematically combined into feedback loops. The encryption technique also generates an authentication tag with minimal post processing that is the size of the state.Type: GrantFiled: May 5, 2011Date of Patent: August 13, 2013Inventors: Eric Myron Smith, Daniel W. Engels, Peter Schweitzer, Troy A. Schultz
-
Patent number: 8357130Abstract: Disclosed is an apparatus for the treatment of a wound on a patient. The apparatus is capable of administering localized negative pressure therapy to the wound using a hospital wall vacuum source and a drain line for removing exudate from the wound. The apparatus may also be capable of administering localized hyperbaric oxygen therapy to the wound using a hospital wall oxygen source and a supply line for supplying oxygen to the wound. The apparatus includes at least one regulator to control the application of negative pressure therapy and hyperbaric oxygen therapy.Type: GrantFiled: February 19, 2008Date of Patent: January 22, 2013Inventors: Joshua David Smith, David Myron Smith
-
Patent number: 8302024Abstract: Certain exemplary embodiments disclosed herein relate to paging systems and methods that help users navigate through large or small datasets. For example, in certain exemplary embodiments, paging control elements are provided according to either a binary subdivision approach or a serial progressive approach. Paging control elements are displayed according to either the binary subdivision approach or the serial progressive approach in dependence on a determination as to which approach is more advantageous based at least in part on factors such as, for example, total number of pages, current page location, distance to end points, screen size, etc.Type: GrantFiled: September 11, 2009Date of Patent: October 30, 2012Assignee: Nintendo of America Inc.Inventor: James Myron Smith
-
Patent number: 8184691Abstract: An encryption and authentication technique that achieves enhanced integrity verification through assured error-propagation using a multistage sequence of pseudorandom permutations. The present invention generates intermediate data-dependent cryptographic variables at each stage, which are systematically combined into feedback loops. The encryption technique also generates an authentication tag without any further steps that is N times longer than the block size where N is the number of pseudorandom permutations used in the encipherment of each block. The authentication tag provides a unique mapping to the plaintext for any number of plaintext blocks that is less than or equal to N. In addition to being a stand alone encryption algorithm, the disclosed technique is applicable to any mode that uses pseudorandom permutations such as, key dependent lookup tables, S-Boxes, and block ciphers such as RC5, TEA, and AES.Type: GrantFiled: July 31, 2006Date of Patent: May 22, 2012Inventors: Kevin Martin Henson, Eric Myron Smith
-
Publication number: 20120087488Abstract: An efficient implementation of a cryptographic processor that dynamically updates the encryption state is described. The cryptographic processor can be implemented with a minimal number of gates, yet still perform cryptographic operations quickly. The cryptographic processor has an interface, a memory, a pseudorandom permutation block and control logic. The interface receives input data blocks and returns cryptographically processed data blocks. The memory is used to store an encryption state of the cryptographic processor. The pseudorandom permutation block transforms a portion of the encryption state that is modified for each input data block by at least the input data block and a previously transformed data block. The control logic routes data in the cryptographic processor to return cryptographically processed data blocks at the interface and update dynamically the encryption state stored in memory using the transformed data blocks from the pseudorandom permutation block.Type: ApplicationFiled: March 30, 2011Publication date: April 12, 2012Inventors: Daniel W. ENGELS, Kenneth Alan Lauffenburger, Eric Myron Smith, Troy Hicks
-
Publication number: 20120076293Abstract: An encryption and authentication technique that achieves enhanced integrity verification through assured error-propagation using a multistage sequence of pseudorandom permutations. The method generates intermediate data-dependent cryptographic variables at each stage, which are systematically combined into feedback loops. The encryption technique also generates an authentication tag with minimal post processing that is the size of the state.Type: ApplicationFiled: May 5, 2011Publication date: March 29, 2012Inventors: Eric Myron Smith, Daniel W. Engels, Peter Schweitzer, Troy A. Schultz
-
Publication number: 20120008767Abstract: The described system and method provide for an encryption and authentication technique that achieves enhanced integrity verification through assured error-propagation using a multistage sequence of pseudorandom permutations. The method generates intermediate data-dependent cryptographic variables at each stage, which are systematically combined into feedback loops. The encryption technique also generates an authentication tag with minimal post processing that is the size of the state. The size of the state is dependent on the number of pseudorandom permutations and the size of the LFSR. The authentication tag provides a unique mapping to the plaintext for any number of plaintext blocks that is less than or equal the size of the state. In addition to being a stand alone encryption algorithm, the disclosed technique is applicable to any mode that uses pseudorandom permutations such as, key dependent lookup tables, S-Boxes, and block ciphers such as RC5, TEA, and AES.Type: ApplicationFiled: December 28, 2010Publication date: January 12, 2012Inventors: Eric Myron Smith, Daniel Jason Williams, Troy Allan Schultz, Peter Schweitzer
-
Publication number: 20110066853Abstract: The present invention describes a system and method for securely identifying and authenticating devices in a symmetric encryption system. An RFID tag can generate indicators using encryption state variables and a symmetric key. An RFID reader, after receiving the encryption state variables from the tag, may identify the tag by performing an exhaustive key search in a key database. Each key in the database may be tested by using the key and encryption state variables to perform an encryption operation similar to that performed by the tag. The result is then compared with the received tag indicators to determine if the tag has been identified. A rotor-based encryption scheme provides for a low cost key search while providing resilience against cloning, tracking, tampering and replay attacks.Type: ApplicationFiled: May 13, 2010Publication date: March 17, 2011Inventors: Daniel Wayne Engels, Eric Myron Smith, Troy Allan Schultz
-
Patent number: 7844813Abstract: A system, process and method for data encryption and transmission are disclosed. By adopting the paradigm of a pre-paid self addressed express envelope end-users will interact with this invention in much the same way they interact with traditional delivery systems. They simply provide the content, and delivery takes place without any further user intervention. The encryption is a “software appliance”. This software already knows the identity of the sender and the receiver and the encryption key that is to be used; all it needs from the user is the information which is to be securely transported.Type: GrantFiled: July 15, 2002Date of Patent: November 30, 2010Inventors: Kevin M. Henson, Eric Myron Smith
-
Publication number: 20100257486Abstract: Certain exemplary embodiments disclosed herein relate to paging systems and methods that help users navigate through large or small datasets. For example, in certain exemplary embodiments, paging control elements are provided according to either a binary subdivision approach or a serial progressive approach. Paging control elements are displayed according to either the binary subdivision approach or the serial progressive approach in dependence on a determination as to which approach is more advantageous based at least in part on factors such as, for example, total number of pages, current page location, distance to end points, screen size, etc.Type: ApplicationFiled: September 11, 2009Publication date: October 7, 2010Applicant: Nintendo of America Inc.Inventor: James Myron Smith
-
Publication number: 20100172494Abstract: An encryption and authentication technique that achieves enhanced integrity verification through assured error-propagation using a multistage sequence of pseudorandom permutations. The present invention generates intermediate data-dependent cryptographic variables at each stage, which are systematically combined into feedback loops. The encryption technique also generates an authentication tag without any further steps that is N times longer than the block size where N is the number of pseudorandom permutations used in the encipherment of each block. The authentication tag provides a unique mapping to the plaintext for any number of plaintext blocks that is less than or equal to N. In addition to being a stand alone encryption algorithm, the disclosed technique is applicable to any mode that uses pseudorandom permutations such as, key dependent lookup tables, S-Boxes, and block ciphers such as RC5, TEA, and AES.Type: ApplicationFiled: March 19, 2010Publication date: July 8, 2010Inventors: Kevin Martin Henson, ERIC MYRON SMITH, Daniel Jason Williams, Peter Schweitzer
-
Publication number: 20100121287Abstract: Disclosed is an apparatus for the treatment of a wound on a patient. The apparatus is capable of administering localized negative pressure therapy to the wound using a negative pressure source and a drain line for removing exudate from the wound. The apparatus is also capable of administering localized hyperbaric fluid therapy to the wound using a fluid source and a supply line for supplying fluid to the wound.Type: ApplicationFiled: January 15, 2010Publication date: May 13, 2010Applicant: Pioneer Technology LLCInventors: Joshua David Smith, David Myron Smith, Thomas G. Andrews, Jack Fisher, David P. Bohman, Robert Stephen Porter
-
Patent number: 7715553Abstract: An encryption and authentication technique that achieves enhanced integrity verification through assured error-propagation using a multistage sequence of pseudorandom permutations. The present invention generates intermediate data-dependent cryptographic variables at each stage, which are systematically combined into feedback loops. The encryption technique also generates an authentication tag without any further steps that is N times longer than the block size where N is the number of pseudorandom permutations used in the encipherment of each block. The authentication tag provides a unique mapping to the plaintext for any number of plaintext blocks that is less than or equal to N. In addition to being a stand alone encryption algorithm, the disclosed technique is applicable to any mode that uses pseudorandom permutations such as, key dependent lookup tables, S-Boxes, and block ciphers such as RC5, TEA, and AES.Type: GrantFiled: July 31, 2006Date of Patent: May 11, 2010Inventors: Eric Myron Smith, Kevin Martin Henson, Daniel Jason Williams, Peter Schweitzer
-
Patent number: 7648488Abstract: Disclosed is an apparatus for the treatment of a wound on a patient. The apparatus is capable of administering localized negative pressure therapy to the wound using a negative pressure source and a drain line for removing exudate from the wound. The apparatus is also capable of administering localized hyperbaric fluid therapy to the wound using a fluid source and a supply line for supplying fluid to the wound.Type: GrantFiled: November 21, 2006Date of Patent: January 19, 2010Assignee: Pioneer Technology, LLCInventors: Joshua David Smith, David Myron Smith, Thomas G. Andrews, Jack Fisher, David P. Bohman, Robert Stephen Porter
-
Publication number: 20080140029Abstract: Disclosed is an apparatus for the treatment of a wound on a patient. The apparatus is capable of administering localized negative pressure therapy to the wound using a hospital wall vacuum source and a drain line for removing exudate from the wound. The apparatus may also be capable of administering localized hyperbaric oxygen therapy to the wound using a hospital wall oxygen source and a supply line for supplying oxygen to the wound. The apparatus includes at least one regulator to control the application of negative pressure therapy and hyperbaric oxygen therapy.Type: ApplicationFiled: February 19, 2008Publication date: June 12, 2008Inventors: Joshua David Smith, David Myron Smith
-
Publication number: 20080025496Abstract: An encryption and authentication technique that achieves enhanced integrity verification through assured error-propagation using a multistage sequence of pseudorandom permutations. The present invention generates intermediate data-dependent cryptographic variables at each stage, which are systematically combined into feedback loops. The encryption technique also generates an authentication tag without any further steps that is N times longer than the block size where N is the number of pseudorandom permutations used in the encipherment of each block. The authentication tag provides a unique mapping to the plaintext for any number of plaintext blocks that is less than or equal to N. In addition to being a stand alone encryption algorithm, the disclosed technique is applicable to any mode that uses pseudorandom permutations such as, key dependent lookup tables, S-Boxes, and block ciphers such as RC5, TEA, and AES.Type: ApplicationFiled: July 31, 2006Publication date: January 31, 2008Applicant: Asier Technology Corporation, A Delaware corporationInventors: Eric Myron Smith, Kevin Martin Henson, Daniel Jason Williams, Peter Schweitzer