Patents by Inventor Paul Rettig

Paul Rettig has filed for patents to protect the following inventions. This listing includes patent applications that are pending as well as patents that have already been granted by the United States Patent and Trademark Office (USPTO).

  • Publication number: 20170227344
    Abstract: A welding gauge and method of use that allows a user to measure the difference in height between a first material surface with that of a second material surface when they are welded together along the same plane or at an angle. The gauge has a first plate with a foot portion and a bottom reference edge. The first plate is connected to a second plate at an axis of rotation corresponding to a circular measurement scale located on the first plate. The gauge also has a third plate that is attachable to the second and slidably connected through vertical slots located in said second and third plates. The third plate has a bottom contact edge and tolerance indicators along its left and right edges that can align with a tolerance measurement scale located on the second plate and along the vertical slot of the second plate.
    Type: Application
    Filed: August 19, 2015
    Publication date: August 10, 2017
    Inventor: Gary Paul Rettig
  • Publication number: 20060089912
    Abstract: A method on an end user system for creating additional copies onto at least one computer readable medium such as CDs, DVDs, ZipDisks™, tape, Flash memory, and RAM. The method comprising the steps of: receiving encrypted content with associated usage conditions and a first hash value; receiving a selection from an end user to create at least one copy of the-encrypted content onto at least one computer readable medium; sending a request to an online electronic store of the encrypted content selected to be copied; receiving from the electronic store a description of the content selected to be copied along with a second hash value; and determining if the first hash value received is identical to the second hash value and if the first hash and the second hash value is identical authorizing the creating additional copies onto at least one computer readable medium.
    Type: Application
    Filed: October 11, 2005
    Publication date: April 27, 2006
    Applicant: International Business Machines Corporation
    Inventors: Richard Spagna, Marco Hurtado, Paul Rettig, Ting Zhao
  • Publication number: 20050216422
    Abstract: An external module loads into an entity's memory and is transformed by two functions. These are namely, the STOMP function and the UNSTOMP function. One or both of these functions is based on the actual code that is found in a legitimate version of the external module. The STOMP-UNSTOMP pair produces an external module that works differently if even a single byte of code in the external module has been changed by an attacker. The STOMP transforms the external module and makes it temporarily unusable whilst conversely, the UNSTOMP repairs the damage and makes it workable again. Thus, if the module is not authentic, the pairing between the STOMP and UNSTOMP is broken. Therefore, a patched module from a hacker remains unusable since the STOMP and UNSTOMP transformations do not produce a working external module. Because of the STOMP and UNSTOMP technique, an application is secure because if an external module is free from tampering then the application executes normally.
    Type: Application
    Filed: May 6, 2005
    Publication date: September 29, 2005
    Applicant: International Business Machines Corporation.
    Inventors: Jeffrey Lotspiech, Stefan Nusser, Paul Rettig