Patents by Inventor Robert Bell

Robert Bell has filed for patents to protect the following inventions. This listing includes patent applications that are pending as well as patents that have already been granted by the United States Patent and Trademark Office (USPTO).

  • Publication number: 20060280126
    Abstract: A method and system for logging voice quality issues for a communication connection includes receiving a signal for logging quality information for a voice connection at an endpoint of the voice connection. Voice samples are collected from the voice connection at the endpoint. The voice samples are stored in an error log at the endpoint.
    Type: Application
    Filed: August 23, 2006
    Publication date: December 14, 2006
    Applicant: Cisco Technology, Inc.
    Inventors: Shmuel Shaffer, Joseph Khouri, Michael Knappe, Robert Bell
  • Publication number: 20060245595
    Abstract: Intercepting a secure communication session includes distributing a key from a key distribution point to establish a secure communication session between a first endpoint and a second endpoint. A secure channel is established between the key distribution point and an intercepting point. The intercepting endpoint may be determined to be authorized to intercept the secure communication session. The key is provided to the intercepting endpoint only if the intercepting endpoint is authorized to intercept the secure communication session, where the key provides the intercepting endpoint with access to intercept the secure communication session.
    Type: Application
    Filed: April 28, 2005
    Publication date: November 2, 2006
    Inventors: Robert Bell, Subbiah Kandasamy, Daniel Wing
  • Publication number: 20060239261
    Abstract: Selecting a transport address for a call session between a first endpoint of a first region and a second endpoint of a second region includes determining that the call session is being initiated. A relationship between the first region and the second region is determined. One or more transport addresses of the first endpoint are identified in accordance with the relationship to yield one or more selected transport addresses.
    Type: Application
    Filed: April 22, 2005
    Publication date: October 26, 2006
    Inventor: Robert Bell
  • Patent number: 7111181
    Abstract: The invention is directed to techniques for discovering a powerability condition of a computer network such as the existence of a remotely powerable device attached to a connecting medium of the computer network. Such detection can then control whether a remote power source (e.g., a data communications device such as a switch) provides remote power (e.g., phantom power) to the computer network. One arrangement of the invention is directed to an apparatus for discovering a powerability condition of a computer network. The apparatus includes a signal generator, a detector and a controller which is coupled to the signal generator and the detector. The controller configures the signal generator to provide a test signal to a connecting medium of the computer network, and configures the detector to measure a response signal from the connecting medium of the computer network.
    Type: Grant
    Filed: January 14, 2004
    Date of Patent: September 19, 2006
    Assignee: Cisco Technology, Inc.
    Inventor: Robert Bell
  • Publication number: 20060179235
    Abstract: A method, apparatus, and computer for identifying selection of a bad victim during victim selection at a cache and recovering from such bad victim selection without causing the system to crash or suspend forward progress of the victim selection process. Among the bad victim selection addressed are recovery from selection of a deleted member and recovery from use of LRU state bits that do not map to a member within the congruence class. When LRU victim selection logic generates an output vector identifying a victim, the output vector is checked to ensure that it is a valid vector (non-null) and that it is not pointing to a deleted member. When the output vector is not valid or points to a deleted member, the LRU victim selection logic is triggered to re-start the victim selection process.
    Type: Application
    Filed: February 9, 2005
    Publication date: August 10, 2006
    Applicant: International Business Machines Corporation
    Inventors: Robert Bell, Guy Guthrie, William Starke
  • Publication number: 20060179232
    Abstract: A method and apparatus for preventing selection of Deleted (D) members as an LRU victim during LRU victim selection. During each cache access targeting the particular congruence class, the deleted cache line is identified from information in the cache directory. A location of a deleted cache line is pipelined through the cache architecture during LRU victim selection. The information is latched and then passed to MRU vector generation logic. An MRU vector is generated and passed to the MRU update logic, which is selects/tags the deleted member as a MRU member. The make MRU operation affects only the lower level LRU state bits arranged in a tree-based structure state bits so that the make MRU operation only negates selection of the specific member in the D state, without affecting LRU victim selection of the other members.
    Type: Application
    Filed: February 9, 2005
    Publication date: August 10, 2006
    Inventors: Robert Bell, Guy Guthrie, William Starke, Jeffrey Stuecheli
  • Publication number: 20060179234
    Abstract: A method and apparatus for enabling protection of a particular member of a cache during LRU victim selection. LRU state array includes additional “protection” bits in addition to the state bits. The protection bits serve as a pointer to identify the location of the member of the congruence class that is to be protected. A protected member is not removed from the cache during standard LRU victim selection, unless that member is invalid. The protection bits are pipelined to MRU update logic, where they are used to generate an MRU vector. The particular member identified by the MRU vector (and pointer) is protected from selection as the next LRU victim, unless the member is Invalid. The make MRU operation affects only the lower level LRU state bits arranged a tree-based structure and thus only negates the selection of the protected member, without affecting LRU victim selection of the other members.
    Type: Application
    Filed: February 9, 2005
    Publication date: August 10, 2006
    Inventors: Robert Bell, Guy Guthrie, William Starke, Jeffrey Stuecheli
  • Publication number: 20060174106
    Abstract: According to one embodiment of the present invention, a method of establishing a digital certificate on an endpoint includes establishing a connection between a proxy function module and the endpoint. The proxy function module is remotely located from the endpoint and operable to communicate with the endpoint and a certificate authority. Authentication information is generated at the endpoint. A portion of the authentication information is transmitted to the proxy function module. The proxy function module obtains a digital certificate based on the portion of the authentication information. The digital certificate is received at the endpoint from the proxy function module.
    Type: Application
    Filed: January 25, 2005
    Publication date: August 3, 2006
    Inventors: Robert Bell, Douglas Dexter
  • Publication number: 20060174124
    Abstract: According to one embodiment of the present invention, a method of updating a certificate trust list on a first endpoint includes receiving an initial certificate trust list at the first endpoint. The initial certificate trust list includes authentication data for at least a second endpoint. Digitally signed information is received at the first endpoint and authentication is initiated against the authentication data for the at least a second endpoint. The authentication occurs only if the digital signature is complementary to the authentication data for the at least a second endpoint. After successful authentication, the initial certificate trust list is updated with the information to yield an updated certificate trust list.
    Type: Application
    Filed: January 25, 2005
    Publication date: August 3, 2006
    Inventors: Robert Bell, Douglas Dexter
  • Publication number: 20060114839
    Abstract: The present invention is contemplates an automatic, secure AP configuration protocol. Public/private keys and public key (PK) methods are used to automatically establish a mutual trust relationship and a secure channel between an AP and at least one configuration server. An AP automatically forwards a location identifier to the configuration server, and the configuration server delivers common, AP specific, and location specific configuration parameters to the AP.
    Type: Application
    Filed: December 1, 2004
    Publication date: June 1, 2006
    Inventors: Robert Meier, Nancy Cam Winget, Robert Bell
  • Publication number: 20060100722
    Abstract: A technique and associated software for spatially coordinating, storing, and manipulating computer aided Design (CAD) files with a master dimensional plan (MDP) file (FIG. 1, MPD File, Plan, Electrical, Structural, etc.). The plan, elevation, section, and other related files are coordinated to a single unified spatial layout referenced to the MDP file. Special “tools” are used to design, manipulate and present the information as two-dimensional drawings referenced in the working space to the MDF file. Moving between the CAD drawing files coordinated to the MDP is facilitated by using icons corresponding to standard architectural graphic symbols as switch file icons that switch the user to other view files of the displayed object based on the selected graphic symbol. The technique allows the user who is familiar with standard architectural nomenclature to move through CAD drawing files without needing to know the underlying CAD file structure.
    Type: Application
    Filed: June 21, 2002
    Publication date: May 11, 2006
    Inventor: Robert Bell
  • Publication number: 20060095772
    Abstract: An apparatus is provided that includes a dedicated appliance operable to interface with a computing platform. A provisioning process may be initiated such that the dedicated appliance responds by monitoring a port for a connection request from the computing platform. Upon receiving the connection request the dedicated appliance completing a connection and generates a random numeric or an alphanumeric string, the dedicated appliance calculating a key derived from the random numeric string or the alphanumeric string using a key derivation process. The dedicated appliance waits for the credential packet from the computing platform before establishing a secure connection between the dedicated appliance and the computing platform.
    Type: Application
    Filed: November 3, 2004
    Publication date: May 4, 2006
    Inventors: Robert Bell, Graham Gudgin
  • Publication number: 20060095691
    Abstract: A processor includes at least one instruction execution unit that executes store instructions to obtain store operations and a store queue coupled to the instruction execution unit. The store queue includes a queue entry in which the store queue gathers multiple store operations during a store gathering window to obtain a data portion of a write transaction directed to lower level memory. In addition, the store queue includes dispatch logic that varies a size of the store gathering window to optimize store performance for different store behaviors and workloads.
    Type: Application
    Filed: August 19, 2004
    Publication date: May 4, 2006
    Applicant: International Business Machines Corporation
    Inventors: Robert Bell, Hugh Shen, Jeffrey Stuecheli, Derek Williams
  • Publication number: 20060047841
    Abstract: A method and apparatus for wireless networking employs a wireless protocol module and a wireless interface module for controlling a remote terminal unit, whereby the modules integrate the remote terminal unit software and wireless networking application software.
    Type: Application
    Filed: August 19, 2005
    Publication date: March 2, 2006
    Inventors: William Brown, Robert Bell
  • Patent number: 7000927
    Abstract: This invention consists of a Level Sensing Device and Hydraulic Control Valve, which, when, as a team, is applied to a system with a Hydraulic Pump W/Oil Reservoir, three or four Hydraulic Jacks, three or four Normally-Open Solenoid-Operated In-Line Hydraulic Valves, and piped and wired as described in this document, will provide a completely automatic leveling system for Recreational Vehicles, such as, Motorhomes, Pick-up Campers, and Camping Trailers. This Leveling Sensor/Switch and Hydraulic Control Valve can also be retro-fit into any exsisting manually-operated or semi-automatic hydraulic leveling system and, as a team, make it a completely automatic leveling system.
    Type: Grant
    Filed: November 12, 2002
    Date of Patent: February 21, 2006
    Inventor: James Robert Bell
  • Publication number: 20060023743
    Abstract: A method and apparatus for wireless networking employs a wireless protocol module and a wireless interface module for controlling a remote terminal unit, whereby the modules integrate the remote terminal unit software and wireless networking application software.
    Type: Application
    Filed: January 24, 2005
    Publication date: February 2, 2006
    Inventors: William Brown, Robert Bell
  • Publication number: 20050283762
    Abstract: A synthetic benchmark for a computer program and a method and computer program product for creating a synthetic benchmark for a computer program. The synthetic benchmark is created using statistical information that is collected about an executing program, and some hints about the machine on which the benchmark will be run. When executed, the synthetic benchmark exhibits behavior similar to the computer program to permit computer performance to be accurately measured.
    Type: Application
    Filed: June 17, 2004
    Publication date: December 22, 2005
    Applicant: International Business Machines Corporation
    Inventor: Robert Bell
  • Publication number: 20050251660
    Abstract: A method and processor chip design for enabling a processor core to continue sending store operations speculatively to the store queue after the core receives indication that the store queue is full. The processor core is configured with speculative store logic that enables the processor core to continue issuing store operations while the store queue full signal is asserted. A copy of the speculatively issued store operation is placed within a speculative store buffer. The core waits for a signal from the store queue indicating the store operation was accepted into the store queue. When the speculatively-issued store operation is accepted within the store queue, the copy is discarded from the buffer. However, when the store operation is rejected, the speculative store logic re-issues the store operation ahead of normal store operations.
    Type: Application
    Filed: May 6, 2004
    Publication date: November 10, 2005
    Applicant: International Business Machines Corp.
    Inventors: Robert Bell, Thomas Capasso, Guy Guthrie, Hugh Shen, Jeffrey Stuecheli
  • Publication number: 20050218895
    Abstract: An interface that couples a surface coil array having N receiving elements to an NMR scanner having M preamplifier inputs. The interface includes an RF switch array and a transmit/receive bias circuit. The RF switch array and the transmit/receive bias circuit are controlled by a control logic circuit. In response to a predetermined input, the control logic circuit causes a predetermined subset of the N receiving elements to be couple to the preamplifier inputs of the NMR scanner. Preferably, N may be larger than M.
    Type: Application
    Filed: November 19, 2004
    Publication date: October 6, 2005
    Inventors: Kenneth Belt, Michael Reichel, J. Watral, Stanley Lewandowski, Bradley Adams, Lisa Augustine, Robert Bell
  • Publication number: 20050189016
    Abstract: A system for receiving effluent from an apparatus, for example, a sterilizer, sterilizer unit or sterilizer system, or other device(s), that initially determines the temperature of the effluent. If the effluent temperature is such that the effluent is “hot”, the effluent it is not suitable for reuse, and the effluent is sent to be tempered, such that it cold enough to be released into a drain, whereby it will not damage the drain. If the effluent temperature is such that the effluent is “cold”, the effluent is suitable for reuse and therefore, will be recirculated to the device. The effluent moves into a holding tank, where it combines with water, and is pumped to the apparatus.
    Type: Application
    Filed: February 28, 2005
    Publication date: September 1, 2005
    Inventors: James Bell, Robert Bell