Patents by Inventor Richard Wray

Richard Wray has filed for patents to protect the following inventions. This listing includes patent applications that are pending as well as patents that have already been granted by the United States Patent and Trademark Office (USPTO).

  • Publication number: 20220358416
    Abstract: Data characterizing a set of models trained on a dataset using a set of resourcing levels can be received. The set of resourcing levels can specify a condition on outputs of models in the set of models. Performance of the set of models can be assessed using the set of resourcing levels. A feasible performance region can be determined using the assessment. The feasible performance region can associate each constraint in the set of resourcing levels with a model in the set of models. The feasible performance region can be displayed. Related apparatus, systems, articles, and techniques are also described.
    Type: Application
    Filed: July 18, 2022
    Publication date: November 10, 2022
    Inventors: Jonathan Richard Wray, Arijit Sengupta, Rodney Butters, James Zalman
  • Publication number: 20210375155
    Abstract: An example cooking system can include: a cooking surface; a cooking device positioned adjacent to or within the cooking surface; and a projector associated with the cooking device, the projector being configured to project cooking instructions from the cooking device on the cooking surface. An example method for preparing food can include: selecting a cooking surface; positioning a cooking device adjacent to or within the cooking surface; and allowing the cooking device to project cooking instructions from the cooking device on the cooking surface.
    Type: Application
    Filed: June 1, 2021
    Publication date: December 2, 2021
    Inventors: Sarah Beth S. Brust, Thomas Erik Brust, Connor Richard Wray
  • Publication number: 20210019662
    Abstract: Data characterizing a set of models trained on a dataset using a set of resourcing levels can be received. The set of resourcing levels can specify a condition on outputs of models in the set of models. Performance of the set of models can be assessed using the set of resourcing levels. A feasible performance region can be determined using the assessment. The feasible performance region can associate each constraint in the set of resourcing levels with a model in the set of models. The feasible performance region can be displayed. Related apparatus, systems, articles, and techniques are also described.
    Type: Application
    Filed: July 16, 2019
    Publication date: January 21, 2021
    Inventors: Jonathan Richard Wray, Arijit Sengupta, Rodney Butters, James Zalman
  • Patent number: 8826751
    Abstract: A circumferential sampling tool for obtaining a sample from an interior wall of a tube has a cylindrical body with an aperture therein. First and second cutters are operatively connected to a shaft for rotation therewith. The first and second cutter are each movable radially between a retracted position and an extended position. First and second actuators are operatively connected to the first and second cutters respectively for moving the first and second cutters between their respective retracted and extended positions as the shaft rotates. Rotating the shaft causes the first cutter to move to the extended position thereby cutting a portion of the interior wall and then causes the second cutter to move to the extended position thereby cutting the sample from the interior wall from a location in the tube revealed by cutting the portion of the interior wall.
    Type: Grant
    Filed: May 21, 2010
    Date of Patent: September 9, 2014
    Assignee: Atomic Energy of Canada Limited
    Inventors: Richard Wray, Greg Hersak
  • Patent number: 8782410
    Abstract: Information leakage prevention in a cryptographic protocol is implemented in a network device. The technique implements an error message processing strategy to mask information otherwise useful to an attacker and that has been generated (by decryption processes) as a consequence of an attacker's exploit. The technique avoids information leakage associated with a padding oracle attack. In one aspect each error message (irrespective of its content) is replaced with a generic error message so that the attacker does not obtain the specific error message content(s) that might otherwise provide useful information. In addition to masking the error message content, the technique preferably implements a “delay” policy that delays the transmission of particular error messages (or message types) to hide (from the attacker's point-of-view) whether a particular error message is relevant to (or a consequence of) the attacker's exploit.
    Type: Grant
    Filed: June 20, 2012
    Date of Patent: July 15, 2014
    Assignee: International Business Machines Corporation
    Inventors: John Clay Richard Wray, Peter James Argue, Krithika Prakash
  • Patent number: 8745389
    Abstract: A method to prevent information leakage in a cryptographic protocol is implemented in a network device. The method implements an error message processing strategy to mask information otherwise useful to an attacker and that has been generated (by decryption processes) as a consequence of an attacker's exploit. The technique avoids information leakage associated with a padding oracle attack. In one aspect each error message (irrespective of its content) is replaced with a generic error message so that the attacker does not obtain the specific error message content(s) that might otherwise provide useful information. In addition to masking the error message content, the technique preferably implements a “delay” policy that delays the transmission of particular error messages (or message types) to hide (from the attacker's point-of-view) whether a particular error message is relevant to (or a consequence of) the attacker's exploit.
    Type: Grant
    Filed: March 1, 2013
    Date of Patent: June 3, 2014
    Assignee: International Business Machines Corporation
    Inventors: John Clay Richard Wray, Peter James Argue, Krithika Prakash
  • Publication number: 20130346749
    Abstract: A method to prevent information leakage in a cryptographic protocol is implemented in a network device. The method implements an error message processing strategy to mask information otherwise useful to an attacker and that has been generated (by decryption processes) as a consequence of an attacker's exploit. The technique avoids information leakage associated with a padding oracle attack. In one aspect each error message (irrespective of its content) is replaced with a generic error message so that the attacker does not obtain the specific error message content(s) that might otherwise provide useful information. In addition to masking the error message content, the technique preferably implements a “delay” policy that delays the transmission of particular error messages (or message types) to hide (from the attacker's point-of-view) whether a particular error message is relevant to (or a consequence of) the attacker's exploit.
    Type: Application
    Filed: June 20, 2012
    Publication date: December 26, 2013
    Applicant: INTERNATIONAL BUSINESS MACHINES CORPORATION
    Inventors: John Clay Richard Wray, Peter James Argue, Krithika Prakash
  • Patent number: 8572268
    Abstract: The different illustrative embodiments provide a method, a computer program product, and an apparatus for managing secure sessions. An identity of a requestor is verified in response to receiving a request from the requestor to access a resource. The identity of the requestor comprises authentication information used to identify a number of privileges to the resource for the requestor. A session cookie is sent to the requestor by a first data processing system. The session cookie identifies the number of privileges for a session. A migration cookie is sent to the requestor by the first data processing system, wherein the migration cookie is used to recreate the session on a second data processing system.
    Type: Grant
    Filed: June 23, 2010
    Date of Patent: October 29, 2013
    Assignee: International Business Machines Corporation
    Inventor: John Clay Richard Wray
  • Publication number: 20130185947
    Abstract: A circular saw includes a footplate and an upper guard coupled to a saw blade. The footplate has a width between two lateral edges in a direction perpendicular to the saw blade. The upper guard has a radius extending from the axis of the blade to the outermost surface of the upper guard in the radial direction. A DC brushless motor is drivingly coupled to the saw blade and is disposed above the footplate. The motor has a rotational axis within forty five degrees of parallel to the width of the footplate, or within forty five degrees of parallel to the radius of the upper guard. The motor extends towards one of the lateral edges of the footplate in the width direction, or towards the outermost surface of the upper guard in the radial direction.
    Type: Application
    Filed: September 4, 2012
    Publication date: July 25, 2013
    Applicant: Robert Bosch GmbH
    Inventors: Andrew Stuart Barkley, Jonathan Richard Wray, James Earl Fleeger, Ernest John Fischer
  • Patent number: 8490165
    Abstract: The different illustrative embodiments provide a method, a computer program product, and an apparatus for restoring secure sessions. A determination is made whether cached information for a session for the requestor is stored at the data processing system using a session cookie responsive to receiving a request at a data processing system from a requestor to access a resource. Access to the resource is controlled using the cached information and a number of privileges for the requestor associated with the cached information responsive to a determination that the cached information for the session is stored at the data processing system. A migration cookie is requested from the requestor responsive to an absence of a determination that the cached information for the session is stored at the data processing system. The cached information is generated for the session using the migration cookie.
    Type: Grant
    Filed: June 23, 2010
    Date of Patent: July 16, 2013
    Assignee: International Business Machines Corporation
    Inventor: John Clay Richard Wray
  • Publication number: 20120090412
    Abstract: A circumferential sampling tool for obtaining a sample from an interior wall of a tube has a cylindrical body with an aperture therein. First and second cutters are operatively connected to a shaft for rotation therewith. The first and second cutter are each movable radially between a retracted position and an extended position. First and second actuators are operatively connected to the first and second cutters respectively for moving the first and second cutters between their respective retracted and extended positions as the shaft rotates. Rotating the shaft causes the first cutter to move to the extended position thereby cutting a portion of the interior wall and then causes the second cutter to move to the extended position thereby cutting the sample from the interior wall from a location in the tube revealed by cutting the portion of the interior wall.
    Type: Application
    Filed: May 21, 2010
    Publication date: April 19, 2012
    Applicant: ATOMIC ENERGY OF CANADA LIMITED (AECL)
    Inventors: Richard Wray, Greg Hersak
  • Publication number: 20060168444
    Abstract: The present invention is a generic public key infrastructure (PKI) framework. A generic PKI framework can include a PKI adapter coupled to a plurality of different PKI certificate authorities (CAs). The PKI adapter can include program code enabled to select a particular one of the different PKI CAs based upon provided request criteria. Also, the generic PKI framework can include a PKI connector coupled to the PKI adapter. The PKI connector can include program code enabled to process requests for certification from PKI clients for respective applications by providing request information from the requests to the PKI adapter.
    Type: Application
    Filed: December 30, 2005
    Publication date: July 27, 2006
    Applicant: International Business Machines Corporation
    Inventors: David Miller, Andrew Myers, John Richard Wray
  • Patent number: 6839437
    Abstract: A cryptographic system for use in a data processing system. The system includes a security layer and a plurality of cryptographic routines, wherein the plurality of cryptographic routines are accessed through the security layer. Also included is a keystore and a keystore application program interface layer coupled to the security layer. The keystore application program interface layer receives a call from an application to perform a cryptographic operation, identifies a routine, calls the routine to perform the cryptographic operation, receives a result from the routine, and returns the result to the application.
    Type: Grant
    Filed: January 31, 2000
    Date of Patent: January 4, 2005
    Assignee: International Business Machines Corporation
    Inventors: Michael A. Crane, Sohail H. Malik, John Clay Richard Wray
  • Patent number: 4103636
    Abstract: Apparatus for making a seam from two threads, each thread being formed into bridging loops and prone loops, each prone loop of one thread embracing a doubled portion between two bridging loops of the other thread, such doubled portions forming the prone loops. The apparatus has opposed sewing-machine-type needles which move together and apart, crossing a reference plane between the needles in a pattern whereby a loop between the eye of one needle and the previously made seam, is penetrated when the first needle starts to retreat from its furthermost excursion past the reference plane, by the other needle during its approach to the reference plane. The needles of a pair are slightly staggered laterally so that they pass one another, preferably with light contact, during loop penetration.The example relates to a seam which is made upon a base fabric and in which the bridging loops of both threads are held slack to form pile loops by means of loopers.
    Type: Grant
    Filed: March 18, 1977
    Date of Patent: August 1, 1978
    Assignee: National Research Development Corporation
    Inventors: Gerald Frank Ward, Gordon Richard Wray
  • Patent number: 4100814
    Abstract: A mechanism is described for effecting movement of an object, article or device in a closed loop planar path while maintaining the major axis of the object, article or device in substantially fixed attitude in the execution of at least an appreciable portion of the path, the mechanism comprising a six-bar linkage the dimensions of which are derived from a four-bar linkage to ensure the fixed attitude motion during motion through at least the appreciable portion of the closed loop path.
    Type: Grant
    Filed: September 21, 1977
    Date of Patent: July 18, 1978
    Assignee: National Research Development Corporation
    Inventors: Gordon Richard Wray, Ruth Mary Parry
  • Patent number: 4041884
    Abstract: Apparatus for making a seam from two threads, each thread being formed into bridging loops and prone loops, each prone loop of one thread embracing a double portion between two bridging loops of the other thread, such doubled portions forming the prone loops. The apparatus has opposed sewing-machine-type needles which move together and apart, crossing a reference plane between the needles in a pattern whereby a loop between the eye of one needle and the previously made seam, is penetrated when the first needle starts to retreat from its furthermost excursion past the reference plane, by the other needle during its approach to the reference plane. The needles of a pair are slightly staggered laterally so that they pass one another, preferably with light contact, during loop penetration.The example relates to a seam which is made upon a base fabric and in which the bridging loops of both threads are held slack to form pile loops by means of loopers.
    Type: Grant
    Filed: September 24, 1974
    Date of Patent: August 16, 1977
    Assignee: National Research Development Corporation
    Inventors: Gerald Frank Ward, Gordon Richard Wray