Patents by Inventor Ryan Berg
Ryan Berg has filed for patents to protect the following inventions. This listing includes patent applications that are pending as well as patents that have already been granted by the United States Patent and Trademark Office (USPTO).
-
Publication number: 20210298859Abstract: A device and methods for making and using an oral procedure apparatus include a tubular member and a flange. The tubular member forms a lumen extending from a first end of the tubular member to a second end of the tubular member, the lumen having a lumen cross-section sized to admit a human finger extending through the lumen, the tubular member having a tubular cross-section sized to be admitted into a mouth of a patient, the tubular member formed from a material substantially resilient against a bite from the mouth of the patient. The flange is coupled to the first end of the tubular member, the flange having a flange cross-section sized larger than the mouth of the patient.Type: ApplicationFiled: June 11, 2021Publication date: September 30, 2021Inventors: Cyrus Buhari, Ryan Berg
-
Patent number: 11033349Abstract: A device and methods for making and using an oral procedure apparatus include a tubular member and a flange. The tubular member forms a lumen extending from a first end of the tubular member to a second end of the tubular member, the lumen having a lumen cross-section sized to admit a human finger extending through the lumen, the tubular member having a tubular cross-section sized to be admitted into a mouth of a patient, the tubular member formed from a material substantially resilient against a bite from the mouth of the patient. The flange is coupled to the first end of the tubular member, the flange having a flange cross-section sized larger than the mouth of the patient.Type: GrantFiled: December 30, 2015Date of Patent: June 15, 2021Inventors: Cyrus Buhari, Ryan Berg
-
Patent number: 10877081Abstract: A system and method used to detect voltage by an electric field detector on equipment is provided. The equipment includes a component which is configured to come into direct contact with, or come into proximity of, a conductor of electricity, and a control system which is in operative communication with the component. An electric field detector is provided on the equipment. The detector includes field detection circuitry configured to detect a voltage in an electric field in the environment which meets or exceeds a voltage threshold. When an overvoltage is detected by the electric field detector, the control system of the equipment is configured to act by performing one of 1) activating a warning module on the equipment and 2) causing the component of the equipment to act.Type: GrantFiled: April 26, 2018Date of Patent: December 29, 2020Assignee: GREENLEE TOOLS, INC.Inventors: William J. McNulty, Michael Z. Standiford, Ryan Berg, Eli Alexander Johnson
-
Publication number: 20180313882Abstract: A system and method used to detect voltage by an electric field detector on equipment is provided. The equipment includes a component which is configured to come into direct contact with, or come into proximity of, a conductor of electricity, and a control system which is in operative communication with the component. An electric field detector is provided on the equipment. The detector includes field detection circuitry configured to detect a voltage in an electric field in the environment which meets or exceeds a voltage threshold. When an overvoltage is detected by the electric field detector, the control system of the equipment is configured to act by performing one of 1) activating a warning module on the equipment and 2) causing the component of the equipment to act.Type: ApplicationFiled: April 26, 2018Publication date: November 1, 2018Inventors: William J. McNulty, Michael Z. Standiford, Ryan Berg, Eli Alexander Johnson
-
Publication number: 20170109843Abstract: Aspects of the disclosure provide a mobile-assisted digital waiter service implemented via a communication network. In some aspects of the disclosure, a mobile device may be configured with a mobile-assisted digital water application, which when executed by the mobile device, may assist a user/customer with the process of dining at a restaurant or ordering items for take-out from a restaurant. For example, the digital waiter application may enable a user/customer to view menus, place orders and pay their bill from their mobile device. In an aspect, the digital waiter application may enhance the dining experience for the user/customer by providing a customized digital menu to the user/customer, which includes at least one customized menu item generated based on a prior order history of the customer.Type: ApplicationFiled: December 17, 2015Publication date: April 20, 2017Inventors: Jeffrey Ryan Berg, Ronald Peter Taliancich, JR., Meade Monger
-
Publication number: 20160184042Abstract: A device and methods for making and using an oral procedure apparatus include a tubular member and a flange. The tubular member forms a lumen extending from a first end of the tubular member to a second end of the tubular member, the lumen having a lumen cross-section sized to admit a human finger extending through the lumen, the tubular member having a tubular cross-section sized to be admitted into a mouth of a patient, the tubular member formed from a material substantially resilient against a bite from the mouth of the patient. The flange is coupled to the first end of the tubular member, the flange having a flange cross-section sized larger than the mouth of the patient.Type: ApplicationFiled: December 30, 2015Publication date: June 30, 2016Inventors: Cyrus Buhari, Ryan Berg
-
Publication number: 20150220739Abstract: A method includes determining selected global variables in a program for which flow of the selected global variables through the program is to be tracked. The selected global variables are less than all the global variables in the program. The method includes using a static analysis performed on the program, tracking flow through the program for the selected global variables. In response to one or more of the selected global variables being used in security-sensitive operations in the flow, use is analyzed of each one of the selected global variables in a corresponding security-sensitive operation. In response to a determination the use may be a potential security violation, the potential security violation is reported. Apparatus and computer program products are also disclosed.Type: ApplicationFiled: April 16, 2015Publication date: August 6, 2015Inventors: Shay Artzi, Ryan Berg, John Peyton, Marco Pistoia, Manu Sridharan, Takaaki Tateishi, Omer Tripp, Robert Weiner
-
Patent number: 9098623Abstract: A method includes accessing a validator routine having an input string and one or more return points, each return point returning a return value having two possible values; finding the return points in the validator routine; for each of the return points, performing a backwards traversal from a return point through a code section and determining constraints on the input string based at least on one or both of the two possible return values for the return point; using the determined constraints for the input string, determining whether all of the return values returned from the one or more return points meet validation constraints; and outputting one or more indications of whether all of the returned values returned from the return points meet the validation constraints for the one or both of the two possible return values. Apparatus and computer program products are also disclosed.Type: GrantFiled: October 28, 2013Date of Patent: August 4, 2015Assignee: International Business Machines CorporationInventors: Ryan Berg, Marco Pistoia, Takaaki Tateishi, Omer Tripp
-
Patent number: 9075997Abstract: A method includes determining selected global variables in a program for which flow of the selected global variables through the program is to be tracked. The selected global variables are less than all the global variables in the program. The method includes using a static analysis performed on the program, tracking flow through the program for the selected global variables. In response to one or more of the selected global variables being used in security-sensitive operations in the flow, use is analyzed of each one of the selected global variables in a corresponding security-sensitive operation. In response to a determination the use may be a potential security violation, the potential security violation is reported. Apparatus and computer program products are also disclosed.Type: GrantFiled: January 13, 2014Date of Patent: July 7, 2015Assignee: International Business Machines CorporationInventors: Shay Artzi, Ryan Berg, John Peyton, Marco Pistoia, Manu Sridharan, Takaaki Tateishi, Omer Tripp, Robert Wiener
-
Static analysis for verification of software program access to secure resources for computer systems
Patent number: 8793800Abstract: Computer program products and apparatus are disclosed. Using a static analysis, a software program is analyzed to determine whether the software program accesses a secure resource for a computer system without verification that the secure resource can be accessed by the software program. In response to an access by the software program to the secure resource without verification that the secure resource can be accessed by the software program, a result is output indicative of the analyzing. An apparatus is disclosed that includes a user interface providing a security report to a user, the security report indicating a result of an analysis of whether or not a software program accesses a secure resource for a computer system without verification that the secure resource can be accessed by the software program.Type: GrantFiled: October 5, 2012Date of Patent: July 29, 2014Assignee: International Business Machines CorporationInventors: Ryan Berg, Paolina Centonze, Marco Pistoia, Omer Tripp -
Publication number: 20140143880Abstract: A method includes determining selected global variables in a program for which flow of the selected global variables through the program is to be tracked. The selected global variables are less than all the global variables in the program. The method includes using a static analysis performed on the program, tracking flow through the program for the selected global variables. In response to one or more of the selected global variables being used in security-sensitive operations in the flow, use is analyzed of each one of the selected global variables in a corresponding security-sensitive operation. In response to a determination the use may be a potential security violation, the potential security violation is reported. Apparatus and computer program products are also disclosed.Type: ApplicationFiled: January 13, 2014Publication date: May 22, 2014Applicant: International Business Machines CorporationInventors: Shay Artzi, Ryan Berg, John Peyton, Marco Pistoia, Manu Sridharan, Takaaki Tateishi, Omer Tripp, Robert Weiner
-
Patent number: 8726246Abstract: A method includes accessing a validator routine having an input string and one or more return points, each return point returning a return value having two possible values; finding the return points in the validator routine; for each of the return points, performing a backwards traversal from a return point through a code section and determining constraints on the input string based at least on one or both of the two possible return values for the return point; using the determined constraints for the input string, determining whether all of the return values returned from the one or more return points meet validation constraints; and outputting one or more indications of whether all of the returned values returned from the return points meet the validation constraints for the one or both of the two possible return values. Apparatus and computer program products are also disclosed.Type: GrantFiled: May 17, 2011Date of Patent: May 13, 2014Assignee: International Business Machines CorporationInventors: Ryan Berg, Marco Pistoia, Takaaki Tateishi, Omer Tripp
-
Static analysis for verification of software program access to secure resources for computer systems
Patent number: 8683599Abstract: Computer program products and apparatus are disclosed. Using a static analysis, a software program is analyzed to determine whether the software program accesses a secure resource for a computer system without verification that the secure resource can be accessed by the software program. In response to an access by the software program to the secure resource without verification that the secure resource can be accessed by the software program, a result is output indicative of the analyzing. An apparatus is disclosed that includes a user interface providing a security report to a user, the security report indicating a result of an analysis of whether or not a software program accesses a secure resource for a computer system without verification that the secure resource can be accessed by the software program.Type: GrantFiled: September 4, 2012Date of Patent: March 25, 2014Assignee: International Business Machines CorporationInventors: Ryan Berg, Paolina Centonze, Marco Pistoia, Omer Tripp -
Publication number: 20140053140Abstract: A method includes accessing a validator routine having an input string and one or more return points, each return point returning a return value having two possible values; finding the return points in the validator routine; for each of the return points, performing a backwards traversal from a return point through a code section and determining constraints on the input string based at least on one or both of the two possible return values for the return point; using the determined constraints for the input string, determining whether all of the return values returned from the one or more return points meet validation constraints; and outputting one or more indications of whether all of the returned values returned from the return points meet the validation constraints for the one or both of the two possible return values. Apparatus and computer program products are also disclosed.Type: ApplicationFiled: October 28, 2013Publication date: February 20, 2014Applicant: International Business Machines CorporationInventors: Ryan Berg, Marco Pistoia, Takaaki Tateishi, Omer Tripp
-
Patent number: 8656496Abstract: A method includes determining selected global variables in a program for which flow of the selected global variables through the program is to be tracked. The selected global variables are less than all the global variables in the program. The method includes using a static analysis performed on the program, tracking flow through the program for the selected global variables. In response to one or more of the selected global variables being used in security-sensitive operations in the flow, use is analyzed of each one of the selected global variables in a corresponding security-sensitive operation. In response to a determination the use may be a potential security violation, the potential security violation is reported. Apparatus and computer program products are also disclosed.Type: GrantFiled: November 22, 2010Date of Patent: February 18, 2014Assignee: International Business Machines CorporationsInventors: Shay Artzi, Ryan Berg, John Peyton, Marco Pistoia, Manu Sridharan, Takaaki Tateishi, Omer Tripp, Robert Wiener
-
Patent number: 8572747Abstract: A method includes performing a static analysis on a program having sources and sinks to track string flow from the sources to the sinks. The static analysis includes, for string variables in the program that begin at sources, computing grammar of all possible string values for each of the string variables and, for methods in the program operating on any of the string variables, computing grammar of string variables returned by the methods. The static analysis also includes, in response to one of the string variables reaching a sink that performs a security-sensitive operation, comparing current grammar of the one string variable with a policy corresponding to the security-sensitive operation, and performing a reporting operation based on the comparing. Apparatus and computer program products are also disclosed.Type: GrantFiled: November 19, 2010Date of Patent: October 29, 2013Assignee: International Business Machines CorporationInventors: Ryan Berg, Marco Pistoia, Takaaki Tateishi, Omer Tripp
-
Patent number: 8434070Abstract: Systems and methods are provided for creating a data structure associated with a software application that is based on at least one framework. According to the method, source code and at least one configuration file of the software application is analyzed by at least one framework-specific processor so as to determine entry point information indicating entry points in the source code, request attribute access information indicating where attributes attached to a request data structure are read and written, and forward information indicating forwards performed by the software application. A data structure for a static analysis engine is created based on this information. The data structure includes a list of synthetic methods that model framework-related behavior of the software application, and a list of entry points indicating the synthetic methods and/or application methods of the software application that can be invoked by the framework.Type: GrantFiled: October 26, 2010Date of Patent: April 30, 2013Assignee: International Business Machines CorporationInventors: Shay Artzi, Ryan Berg, John T. Peyton, Jr., Marco Pistoia, Manu Sridharan, Robert Wiener
-
Static analysis for verification of software program access to secure resources for computer systems
Patent number: 8381242Abstract: A method includes, using a static analysis, analyzing a software program to determine whether the software program accesses a secure resource for a computer system without verification that the secure resource can be accessed by the software program. The method also includes, in response to an access by the software program to the secure resource without verification that the secure resource can be accessed by the software program, outputting a result indicative of the analyzing. Computer program products and apparatus are also disclosed. An apparatus is disclosed that includes a user interface providing a security report to a user, the security report indicating a result of an analysis of whether or not a software program accesses a secure resource for a computer system without verification that the secure resource can be accessed by the software program.Type: GrantFiled: July 20, 2010Date of Patent: February 19, 2013Assignee: International Business Machines CorporationInventors: Ryan Berg, Paolina Centonze, Marco Pistoia, Omer Tripp -
Patent number: 8365281Abstract: An illegal pattern and a computer program having a method are received. The method has one or more return statements, and a number of basic blocks. The method is normalized so that each return statement of the target method relating to the illegal pattern returns a constant Boolean value. A first path condition and a second path condition for one or more corresponding paths is determined such that one or more corresponding basic blocks return a constant Boolean value of true for the first path condition and a constant Boolean value of false for the second path condition. An unsatisfiability of each path condition is determined using a monadic second-order logic (M2L) technique. Where the unsatisfiability of either path condition is false, the method is reported as not being a validator. Where the unsatisfiability of either path condition is true, the method is reported as being a validator.Type: GrantFiled: November 19, 2010Date of Patent: January 29, 2013Assignee: International Business Machines CorporationInventors: Takaaki Tateishi, Marco Pistoia, Omer Tripp, Ryan Berg, Robert Wiener
-
Patent number: D844228Type: GrantFiled: May 25, 2017Date of Patent: March 26, 2019Assignee: Do More Dealie, LLCInventor: Ryan Berg