Patents by Inventor Peter Ladow

Peter Ladow has filed for patents to protect the following inventions. This listing includes patent applications that are pending as well as patents that have already been granted by the United States Patent and Trademark Office (USPTO).

  • Publication number: 20080101251
    Abstract: Provided is a system, apparatus, and method for evaluating a variety of protocols on a computer network which includes a plurality of network devices. The network devices are adapted to communicate messages on the computer network using their respective protocols. The present invention system, apparatus and method are associated with one of the network devices. The present invention system, apparatus and method are further adapted to identify the various protocols on the network and analyze each message on the network to determine the protocol associated with the message. In another aspect of the present invention, the system and apparatus are adapted to determine whether to communicate a message to the associated network device based on this identification and analysis the message. The present invention embodiments allow for mixed mode communication on a single network.
    Type: Application
    Filed: October 30, 2006
    Publication date: May 1, 2008
    Inventors: David J. Casebolt, Peter LaDow
  • Publication number: 20060269066
    Abstract: Provided is a system and method for converting serial data associated with an IED into secure data packets configured for transmission during an IED maintenance session; preferably wireless transmission. The system includes a first intelligent assembly operatively coupled to the IED, and a second intelligent assembly operatively coupled to the first intelligent device via a wireless communication link. Each of the first and second intelligent assemblies includes a microcontroller adapted to apply two independent security algorithms to the serial data to form the secure data packets, and vice versa. The second intelligent assembly further includes a plurality of legacy software applications executable to enable the IED maintenance session to be conducted by an operator from a location of the second intelligent assembly. The security algorithms preferably include an AES encryption/decryption function and a HMAC authentication function.
    Type: Application
    Filed: December 21, 2005
    Publication date: November 30, 2006
    Inventors: David Whitehead, Peter LaDow
  • Publication number: 20060212781
    Abstract: A method and apparatus for decoding a linear block encoded string of information bits comprising: converting the string into a plurality of codewords. Performing hard and soft decisions on each codeword to generate a hard and soft decision vector. Computing the syndrome and finding the location of the two minimum values by Galois Field Arithmetic. Designating these values LOW1 and LOW2 and xoring with a Nc1, thus generating Nc2. Swapping Nc1 with Nc2 and determining the lowest soft decision value, Min1 and a next lowest value, Min2. The two bit locations creating Min1 are designated as MinA and MinB. MinA being replaced with Min2 minus the value MinA. MinB being replaced with Min2 minus the value at MinB. Generating an output codeword by subtracting Min1 from all other bit locations values and 2's complementing all soft values with 0 in their location. Creating the new soft value vector.
    Type: Application
    Filed: January 10, 2006
    Publication date: September 21, 2006
    Inventors: Eric Hewitt, Alan Danielson, Peter Ladow, Tom Hansen