Patents by Inventor Paul Elliott

Paul Elliott has filed for patents to protect the following inventions. This listing includes patent applications that are pending as well as patents that have already been granted by the United States Patent and Trademark Office (USPTO).

  • Patent number: 8223967
    Abstract: A semiconductor integrated circuit for the processing of conditional access television signals that includes an input interface for receiving encrypted television signals and an output interface for output of decrypted television signals. The semiconductor integrated circuit is provided with some functionality restricted in some way by preventing one or more hardware circuit elements from operating, such as an MPEG decoder, display engine, IO ports or main CPU. To enable the functionality, a subscriber must pay for a service and then receives an encrypted message broadcast to the semiconductor integrated circuit that is decrypted and instructs functionality to be turned on or off.
    Type: Grant
    Filed: October 16, 2003
    Date of Patent: July 17, 2012
    Assignee: STMicroelectronics Limited
    Inventors: Peter Bennett, Paul Elliott, Andrew Dellow
  • Patent number: 8201245
    Abstract: Detecting obfuscated attacks on a computer. A first program function is invoked to render static components of a web page and identify program code within the web page or associated file. In response, before executing the identified program code, a malicious-code detector is invoked to scan the identified program code for malicious code. If the malicious-code detector identifies malicious code in the identified program code, the identified program code is not executed. If no malicious code is detected, a second program function generates revised program code from execution of the identified, program code. In response, before executing the revised program code, the malicious-code detector is invoked to scan the revised program code for malicious code. If the malicious-code detector identifies malicious code in the revised program code, the revised program code is not executed.
    Type: Grant
    Filed: December 5, 2007
    Date of Patent: June 12, 2012
    Assignee: International Business Machines Corporation
    Inventors: David Bryan Dewey, Robert G. Freeman, Paul Elliott Griswold
  • Patent number: 8189277
    Abstract: An optics block includes a substrate having first and second opposing surfaces, the substrate being a first material, a plurality of through holes extending in the substrate between the first and second opposing surface, a second material, different than the first material, filling a portion of the through holes and extending on a portion of the first surface of the substrate outside the through holes, and a first lens structure in the second material and corresponding to each of the through holes.
    Type: Grant
    Filed: March 17, 2011
    Date of Patent: May 29, 2012
    Assignee: Digitaloptics Corporation East
    Inventors: Gregory J. Kintz, Michael R. Feldman, James E. Morris, Paul Elliott, David Keller, W. Hudson Welch, David Ovrutsky, Jeremy Huddleston, Mark Hiatt
  • Publication number: 20120099848
    Abstract: A camera system includes an optical assembly including a folded optic, the folded optic including a transparent support substrate, a first lens surface on a first surface of the transparent support substrate, and a second lens surface on the first surface of the transparent support substrate, at least one of the first and second lens surfaces including a replication material, and a sensor configured to receive light from the optical assembly that has been incident on both the first and second lens surfaces sequentially.
    Type: Application
    Filed: November 3, 2011
    Publication date: April 26, 2012
    Inventors: GAL SHABTAY, Pavel Reshidko, Ephraim Goldenberg, Paul Elliott
  • Publication number: 20110222171
    Abstract: An optics block includes a substrate having first and second opposing surfaces, the substrate being a first material, a plurality of through holes extending in the substrate between the first and second opposing surface, a second material, different than the first material, filling a portion of the through holes and extending on a portion of the first surface of the substrate outside the through holes, and a first lens structure in the second material and corresponding to each of the through holes.
    Type: Application
    Filed: March 17, 2011
    Publication date: September 15, 2011
    Inventors: Gregory J. KINTZ, Michael R. Feldman, James E. Morris, Paul Elliott, David Keller, W. Hudson Welch, David Ovrutsky, Jeremy Huddleston, Mark Hiatt
  • Publication number: 20110191371
    Abstract: Social network search techniques are described. In an implementation, one or more search criteria are stored that are usable to search for users of a social network service. Responsive to a new user joining the social network service, a search of data associated with the new user is performed using the stored one or more search criteria to determine whether the one or more search criteria are met by the new user.
    Type: Application
    Filed: February 1, 2010
    Publication date: August 4, 2011
    Applicant: MICROSOFT CORPORATION
    Inventor: Paul A. Elliott
  • Publication number: 20110010305
    Abstract: Information aggregation techniques are described. In an implementation, a communication is received that includes an indication of a source of information associated with a non-member of the social network. Information associated with the non-member is aggregated from the source. The aggregation may be performed in response to receipt of a selection by a member of the social network service to interact with the information from the source. The aggregated information may then be presented to a member in conjunction with webpages output for interaction with the social network.
    Type: Application
    Filed: July 7, 2009
    Publication date: January 13, 2011
    Applicant: Microsoft Corporation
    Inventors: Michelle M. Aleong, Omar H. Shahine, Paul A. Elliott, Jeffrey Craig Kunins, Oludare V. Obasanjo, Bhupinder S. Sethi
  • Publication number: 20110004519
    Abstract: Techniques are described to establish one-way public relationships. In an implementation, a control is exposed that is operable to become a fan of an object within a social networking page. Responsive to operation of the control, data may be stored to establish a one-way public relationship between a user and the selected object. By establishing a one-way public relationship rather than a mutual friend relationship, the object and/or a corresponding owner of the object is not included in the user's social network and is not provided access to the user's profile, status, or other personal information. The one-way public relationship may be employed by a service provider to serve content related to the object to the user. The one-way public relationships may also be employed by the service provider to push status updates regarding the object to “fans” of the object.
    Type: Application
    Filed: July 6, 2009
    Publication date: January 6, 2011
    Applicant: Microsoft Corporation
    Inventors: Michelle M. Aleong, Paul A. Elliott, Bhupinder S. Sethi, Eric J. Zappa
  • Publication number: 20110004561
    Abstract: Techniques are described to aggregate contact information. In an implementation, contact information that is associated with a single user and that is obtained from a plurality of services via a network is aggregated. A least one of the services is configured as a social networking service. A user interface is configured to include at least a portion of the aggregated contact information such that the single user is represented above the portion of the aggregated contact information in the user interface.
    Type: Application
    Filed: July 1, 2009
    Publication date: January 6, 2011
    Applicant: Microsoft Corporation
    Inventors: Omar H. Shahine, Ann M. Hudspeth, Paul A. Elliott, Peter Bergler, Jennifer Shen, Thomas Stovicek
  • Publication number: 20110004922
    Abstract: Customized content sharing techniques are described. In an implementation, an input is accepted that describes a particular type of content. The input is provided via selection of one or more privacy settings for a user of a social network service. The input is also used to control which other users of the social network service are permitted to communicate content to the user.
    Type: Application
    Filed: July 1, 2009
    Publication date: January 6, 2011
    Applicant: Microsoft Corporation
    Inventors: Joseph Andrew Bono, Omar H. Shahine, Paul A. Elliott, Ann M. Hudspeth, Tyler J. Schnoebelen
  • Publication number: 20100318925
    Abstract: Embodiments of the present invention relate to systems, methods, and computer readable media for providing to a first user of a first social-networking site information associated with a second user of a second social-networking site, where the second user is not registered at the first social-networking site. In some embodiments, the first user registered at the first social-networking site requests information associated with the second user at the second social-networking site to be added to the presentation feed of the first user on the first social-networking site. After the first user is authenticated by a second social-networking site to receive information associated with the second user, the information associated with the second user is displayed to the first user on the first social-networking site.
    Type: Application
    Filed: June 12, 2009
    Publication date: December 16, 2010
    Applicant: MICROSOFT CORPORATION
    Inventors: Bhupinder Singh Sethi, Paul Elliott, Dare Obasanjo, Omar Shahine
  • Patent number: 7837694
    Abstract: Systems and methods for identifying surgical instruments by use of radio-frequency identification tags (RFID) are disclosed. In the systems and methods, each of a plurality of surgical instruments is provided with at least one RFID transponder tag storing identification information associated with the corresponding instrument. The tag may be adhered to, embedded, or potted within a portion of the instrument. Using an RFID reading device, a user may interrogate the tag, thereby identifying the particular instrument. This identification information may be used to index a database and retrieve a data record unique to that instrument. The systems and methods allow a user to track, inspect, and verify inbound and outbound surgical instruments, to assess, for example, the surgical instruments' duty life cycle usage.
    Type: Grant
    Filed: April 28, 2005
    Date of Patent: November 23, 2010
    Assignee: Warsaw Orthopedic, Inc.
    Inventors: Steven M. Tethrake, Paul Elliott, Jeffrey H. Nycz, Robert Varner, Mark Pelo
  • Publication number: 20100176925
    Abstract: Systems and methods for identifying surgical instruments by use of radio-frequency identification tags (RFID) are disclosed. In the systems and methods, each of a plurality of surgical instruments is provided with at least one RFID transponder tag storing identification information associated with the corresponding instrument. The tag may be adhered to, embedded, or potted within a portion of the instrument. Using an RFID reading device, a user may interrogate the tag, thereby identifying the particular instrument. This identification information may be used to index a database and retrieve a data record unique to that instrument. The systems and methods allow a user to track, inspect, and verify inbound and outbound surgical instruments, to assess, for example, the surgical instruments' duty life cycle usage.
    Type: Application
    Filed: March 23, 2010
    Publication date: July 15, 2010
    Applicant: Warsaw Orthopedic, Inc.
    Inventors: Steven Tethrake, Paul Elliott, Jeffrey Nycz, Robert Varner, Mark Pelo
  • Patent number: 7623445
    Abstract: A network element receives frames from multiple ring networks. Each ring network linked to the network element is supported by a designated support program. The received frames are monitored for conditions indicative of a failure in one of the ring networks. Upon detection of a failure condition, the designated support program for the failing ring network is determined and notified. The designated support program then addresses the failure condition by, for example, switching to a backup link. In one example, the multiple ring networks are SONET BLSR networks.
    Type: Grant
    Filed: August 3, 2005
    Date of Patent: November 24, 2009
    Assignee: Cisco Technology, Inc.
    Inventors: Philippe Daniel, Paul Elliott, Keith Neuendorff, Phu Le, Xiaopin Nie, Brian Rushka
  • Publication number: 20090175673
    Abstract: In the field of binders for laminar objects there is a need for a binder which is able to offer a distinctive and unusual appearance, A binder (10), for holding laminar objects (46), comprises a support member (12) which includes at least one binder element (18; 50) to hold one or more laminar objects (46) via respective edges thereof. The support member (12) also includes first and second support elements (34, 36) which are couplable to one another to secure a cover body (25; 100) therebetween. The cover body (28; 100) includes first and second cover elements (14, 16) which extend from either side of the support member (12).
    Type: Application
    Filed: July 3, 2008
    Publication date: July 9, 2009
    Inventors: Paul Elliott, David King, David Harbinson
  • Publication number: 20090150999
    Abstract: Detecting obfuscated attacks on a computer. A first program function is invoked to render static components of a web page and identify program code within the web page or associated file. In response, before executing the identified program code, a malicious-code detector is invoked to scan the identified program code for malicious code. If the malicious-code detector identifies malicious code in the identified program code, the identified program code is not executed. If no malicious code is detected, a second program function generates revised program code from execution of the identified, program code. In response, before executing the revised program code, the malicious-code detector is invoked to scan the revised program code for malicious code. If the malicious-code detector identifies malicious code in the revised program code, the revised program code is not executed.
    Type: Application
    Filed: December 5, 2007
    Publication date: June 11, 2009
    Applicant: INTERNATIONAL BUSINESS MACHINES CORPORATION
    Inventors: David Bryan Dewey, Robert G. Freeman, Paul Elliott Griswold
  • Patent number: 7546297
    Abstract: Systems, methods, apparatus, data structures, and computer-readable media are described which provide techniques for managing data storage. In an implementation, a method includes examining a role map to determine which of a plurality of roles are applicable to a request to interact with at least one of a plurality of items. The request is received via an application programming interface (API) that is available over a network and one or more of the items reference a respective item of data. Access to the at least one item is permitted based on a role definition which describes differing access rights available for the item based on which of the roles is applicable to the request.
    Type: Grant
    Filed: March 14, 2005
    Date of Patent: June 9, 2009
    Assignee: Microsoft Corporation
    Inventors: Patrick E. Moulhaud, Suresh Kannan, Pak H Ko, Paul A. Elliott, Stephen P Rosato
  • Publication number: 20090034088
    Abstract: A micro-optical element includes a support substrate, a micro-optical lens in a cured replication material on a first surface of the support substrate, and an opaque material aligned with and overlapping the micro-optical lens along a vertical direction.
    Type: Application
    Filed: April 22, 2008
    Publication date: February 5, 2009
    Inventors: William Delaney, Paul Elliott, David Keller, William Hudson Welch, Greg Kintz, Frolian Pobre
  • Patent number: 7474223
    Abstract: A method and apparatus for automatically identifying surgical implants by use of a radio-frequency tag (RFID) is disclosed. The method, apparatus, and system enable a radio-frequency tagged implant to receive an interrogation signal from a reader and to respond to the interrogation signal with identifying information about the tagged implants. The interrogation signal interrogates the implant to ascertain its information, and the RFID tag affixed on the implant in turn transmits a signal back to the reader. The method, apparatus, and system can track, inspect, and verify surgical implants, to assess, for example, any wear and tear on implants, and/or positional displacement of components of the implant.
    Type: Grant
    Filed: April 18, 2005
    Date of Patent: January 6, 2009
    Assignee: Warsaw Orthopedic, Inc.
    Inventors: Jeffrey H. Nycz, Steven M. Tethrake, Mark Pelo, Robert Varner, Paul Elliott
  • Publication number: 20080250228
    Abstract: A semiconductor integrated circuit includes a hardware mechanism arranged to ensure that associations between instructions and data are enforced so that a processor cannot fetch data from an instruction that is not authorised to do so. A Memory Protection Unit stores entries comprising instructions and associated data memory ranges. A hardware arrangement impairs the operation of the circuit if the CPU attempts to make a data fetch from an instruction that is outside the range associated with data in a Memory Protection Unit. Such functioning may be by issuing a chip reset. The Memory Protection Unit may be implemented in a Memory Management Unit having an extension so as to store a validity flag. The validity flag may only be set by a secure process such as the CPU well entrusted code or by a separate trusted hardware source. In this way, an operating system may function as normal referring to the Memory Management Unit as necessary, but security may be enforced through hardware.
    Type: Application
    Filed: April 7, 2008
    Publication date: October 9, 2008
    Applicant: STMicroelectronics Limited
    Inventors: Paul Elliott, Tariq Kurd