Patents by Inventor Ryan Berg

Ryan Berg has filed for patents to protect the following inventions. This listing includes patent applications that are pending as well as patents that have already been granted by the United States Patent and Trademark Office (USPTO).

  • Publication number: 20210298859
    Abstract: A device and methods for making and using an oral procedure apparatus include a tubular member and a flange. The tubular member forms a lumen extending from a first end of the tubular member to a second end of the tubular member, the lumen having a lumen cross-section sized to admit a human finger extending through the lumen, the tubular member having a tubular cross-section sized to be admitted into a mouth of a patient, the tubular member formed from a material substantially resilient against a bite from the mouth of the patient. The flange is coupled to the first end of the tubular member, the flange having a flange cross-section sized larger than the mouth of the patient.
    Type: Application
    Filed: June 11, 2021
    Publication date: September 30, 2021
    Inventors: Cyrus Buhari, Ryan Berg
  • Patent number: 11033349
    Abstract: A device and methods for making and using an oral procedure apparatus include a tubular member and a flange. The tubular member forms a lumen extending from a first end of the tubular member to a second end of the tubular member, the lumen having a lumen cross-section sized to admit a human finger extending through the lumen, the tubular member having a tubular cross-section sized to be admitted into a mouth of a patient, the tubular member formed from a material substantially resilient against a bite from the mouth of the patient. The flange is coupled to the first end of the tubular member, the flange having a flange cross-section sized larger than the mouth of the patient.
    Type: Grant
    Filed: December 30, 2015
    Date of Patent: June 15, 2021
    Inventors: Cyrus Buhari, Ryan Berg
  • Patent number: 10877081
    Abstract: A system and method used to detect voltage by an electric field detector on equipment is provided. The equipment includes a component which is configured to come into direct contact with, or come into proximity of, a conductor of electricity, and a control system which is in operative communication with the component. An electric field detector is provided on the equipment. The detector includes field detection circuitry configured to detect a voltage in an electric field in the environment which meets or exceeds a voltage threshold. When an overvoltage is detected by the electric field detector, the control system of the equipment is configured to act by performing one of 1) activating a warning module on the equipment and 2) causing the component of the equipment to act.
    Type: Grant
    Filed: April 26, 2018
    Date of Patent: December 29, 2020
    Assignee: GREENLEE TOOLS, INC.
    Inventors: William J. McNulty, Michael Z. Standiford, Ryan Berg, Eli Alexander Johnson
  • Publication number: 20180313882
    Abstract: A system and method used to detect voltage by an electric field detector on equipment is provided. The equipment includes a component which is configured to come into direct contact with, or come into proximity of, a conductor of electricity, and a control system which is in operative communication with the component. An electric field detector is provided on the equipment. The detector includes field detection circuitry configured to detect a voltage in an electric field in the environment which meets or exceeds a voltage threshold. When an overvoltage is detected by the electric field detector, the control system of the equipment is configured to act by performing one of 1) activating a warning module on the equipment and 2) causing the component of the equipment to act.
    Type: Application
    Filed: April 26, 2018
    Publication date: November 1, 2018
    Inventors: William J. McNulty, Michael Z. Standiford, Ryan Berg, Eli Alexander Johnson
  • Publication number: 20170109843
    Abstract: Aspects of the disclosure provide a mobile-assisted digital waiter service implemented via a communication network. In some aspects of the disclosure, a mobile device may be configured with a mobile-assisted digital water application, which when executed by the mobile device, may assist a user/customer with the process of dining at a restaurant or ordering items for take-out from a restaurant. For example, the digital waiter application may enable a user/customer to view menus, place orders and pay their bill from their mobile device. In an aspect, the digital waiter application may enhance the dining experience for the user/customer by providing a customized digital menu to the user/customer, which includes at least one customized menu item generated based on a prior order history of the customer.
    Type: Application
    Filed: December 17, 2015
    Publication date: April 20, 2017
    Inventors: Jeffrey Ryan Berg, Ronald Peter Taliancich, JR., Meade Monger
  • Publication number: 20160184042
    Abstract: A device and methods for making and using an oral procedure apparatus include a tubular member and a flange. The tubular member forms a lumen extending from a first end of the tubular member to a second end of the tubular member, the lumen having a lumen cross-section sized to admit a human finger extending through the lumen, the tubular member having a tubular cross-section sized to be admitted into a mouth of a patient, the tubular member formed from a material substantially resilient against a bite from the mouth of the patient. The flange is coupled to the first end of the tubular member, the flange having a flange cross-section sized larger than the mouth of the patient.
    Type: Application
    Filed: December 30, 2015
    Publication date: June 30, 2016
    Inventors: Cyrus Buhari, Ryan Berg
  • Publication number: 20150220739
    Abstract: A method includes determining selected global variables in a program for which flow of the selected global variables through the program is to be tracked. The selected global variables are less than all the global variables in the program. The method includes using a static analysis performed on the program, tracking flow through the program for the selected global variables. In response to one or more of the selected global variables being used in security-sensitive operations in the flow, use is analyzed of each one of the selected global variables in a corresponding security-sensitive operation. In response to a determination the use may be a potential security violation, the potential security violation is reported. Apparatus and computer program products are also disclosed.
    Type: Application
    Filed: April 16, 2015
    Publication date: August 6, 2015
    Inventors: Shay Artzi, Ryan Berg, John Peyton, Marco Pistoia, Manu Sridharan, Takaaki Tateishi, Omer Tripp, Robert Weiner
  • Patent number: 9098623
    Abstract: A method includes accessing a validator routine having an input string and one or more return points, each return point returning a return value having two possible values; finding the return points in the validator routine; for each of the return points, performing a backwards traversal from a return point through a code section and determining constraints on the input string based at least on one or both of the two possible return values for the return point; using the determined constraints for the input string, determining whether all of the return values returned from the one or more return points meet validation constraints; and outputting one or more indications of whether all of the returned values returned from the return points meet the validation constraints for the one or both of the two possible return values. Apparatus and computer program products are also disclosed.
    Type: Grant
    Filed: October 28, 2013
    Date of Patent: August 4, 2015
    Assignee: International Business Machines Corporation
    Inventors: Ryan Berg, Marco Pistoia, Takaaki Tateishi, Omer Tripp
  • Patent number: 9075997
    Abstract: A method includes determining selected global variables in a program for which flow of the selected global variables through the program is to be tracked. The selected global variables are less than all the global variables in the program. The method includes using a static analysis performed on the program, tracking flow through the program for the selected global variables. In response to one or more of the selected global variables being used in security-sensitive operations in the flow, use is analyzed of each one of the selected global variables in a corresponding security-sensitive operation. In response to a determination the use may be a potential security violation, the potential security violation is reported. Apparatus and computer program products are also disclosed.
    Type: Grant
    Filed: January 13, 2014
    Date of Patent: July 7, 2015
    Assignee: International Business Machines Corporation
    Inventors: Shay Artzi, Ryan Berg, John Peyton, Marco Pistoia, Manu Sridharan, Takaaki Tateishi, Omer Tripp, Robert Wiener
  • Patent number: 8793800
    Abstract: Computer program products and apparatus are disclosed. Using a static analysis, a software program is analyzed to determine whether the software program accesses a secure resource for a computer system without verification that the secure resource can be accessed by the software program. In response to an access by the software program to the secure resource without verification that the secure resource can be accessed by the software program, a result is output indicative of the analyzing. An apparatus is disclosed that includes a user interface providing a security report to a user, the security report indicating a result of an analysis of whether or not a software program accesses a secure resource for a computer system without verification that the secure resource can be accessed by the software program.
    Type: Grant
    Filed: October 5, 2012
    Date of Patent: July 29, 2014
    Assignee: International Business Machines Corporation
    Inventors: Ryan Berg, Paolina Centonze, Marco Pistoia, Omer Tripp
  • Publication number: 20140143880
    Abstract: A method includes determining selected global variables in a program for which flow of the selected global variables through the program is to be tracked. The selected global variables are less than all the global variables in the program. The method includes using a static analysis performed on the program, tracking flow through the program for the selected global variables. In response to one or more of the selected global variables being used in security-sensitive operations in the flow, use is analyzed of each one of the selected global variables in a corresponding security-sensitive operation. In response to a determination the use may be a potential security violation, the potential security violation is reported. Apparatus and computer program products are also disclosed.
    Type: Application
    Filed: January 13, 2014
    Publication date: May 22, 2014
    Applicant: International Business Machines Corporation
    Inventors: Shay Artzi, Ryan Berg, John Peyton, Marco Pistoia, Manu Sridharan, Takaaki Tateishi, Omer Tripp, Robert Weiner
  • Patent number: 8726246
    Abstract: A method includes accessing a validator routine having an input string and one or more return points, each return point returning a return value having two possible values; finding the return points in the validator routine; for each of the return points, performing a backwards traversal from a return point through a code section and determining constraints on the input string based at least on one or both of the two possible return values for the return point; using the determined constraints for the input string, determining whether all of the return values returned from the one or more return points meet validation constraints; and outputting one or more indications of whether all of the returned values returned from the return points meet the validation constraints for the one or both of the two possible return values. Apparatus and computer program products are also disclosed.
    Type: Grant
    Filed: May 17, 2011
    Date of Patent: May 13, 2014
    Assignee: International Business Machines Corporation
    Inventors: Ryan Berg, Marco Pistoia, Takaaki Tateishi, Omer Tripp
  • Patent number: 8683599
    Abstract: Computer program products and apparatus are disclosed. Using a static analysis, a software program is analyzed to determine whether the software program accesses a secure resource for a computer system without verification that the secure resource can be accessed by the software program. In response to an access by the software program to the secure resource without verification that the secure resource can be accessed by the software program, a result is output indicative of the analyzing. An apparatus is disclosed that includes a user interface providing a security report to a user, the security report indicating a result of an analysis of whether or not a software program accesses a secure resource for a computer system without verification that the secure resource can be accessed by the software program.
    Type: Grant
    Filed: September 4, 2012
    Date of Patent: March 25, 2014
    Assignee: International Business Machines Corporation
    Inventors: Ryan Berg, Paolina Centonze, Marco Pistoia, Omer Tripp
  • Publication number: 20140053140
    Abstract: A method includes accessing a validator routine having an input string and one or more return points, each return point returning a return value having two possible values; finding the return points in the validator routine; for each of the return points, performing a backwards traversal from a return point through a code section and determining constraints on the input string based at least on one or both of the two possible return values for the return point; using the determined constraints for the input string, determining whether all of the return values returned from the one or more return points meet validation constraints; and outputting one or more indications of whether all of the returned values returned from the return points meet the validation constraints for the one or both of the two possible return values. Apparatus and computer program products are also disclosed.
    Type: Application
    Filed: October 28, 2013
    Publication date: February 20, 2014
    Applicant: International Business Machines Corporation
    Inventors: Ryan Berg, Marco Pistoia, Takaaki Tateishi, Omer Tripp
  • Patent number: 8656496
    Abstract: A method includes determining selected global variables in a program for which flow of the selected global variables through the program is to be tracked. The selected global variables are less than all the global variables in the program. The method includes using a static analysis performed on the program, tracking flow through the program for the selected global variables. In response to one or more of the selected global variables being used in security-sensitive operations in the flow, use is analyzed of each one of the selected global variables in a corresponding security-sensitive operation. In response to a determination the use may be a potential security violation, the potential security violation is reported. Apparatus and computer program products are also disclosed.
    Type: Grant
    Filed: November 22, 2010
    Date of Patent: February 18, 2014
    Assignee: International Business Machines Corporations
    Inventors: Shay Artzi, Ryan Berg, John Peyton, Marco Pistoia, Manu Sridharan, Takaaki Tateishi, Omer Tripp, Robert Wiener
  • Patent number: 8572747
    Abstract: A method includes performing a static analysis on a program having sources and sinks to track string flow from the sources to the sinks. The static analysis includes, for string variables in the program that begin at sources, computing grammar of all possible string values for each of the string variables and, for methods in the program operating on any of the string variables, computing grammar of string variables returned by the methods. The static analysis also includes, in response to one of the string variables reaching a sink that performs a security-sensitive operation, comparing current grammar of the one string variable with a policy corresponding to the security-sensitive operation, and performing a reporting operation based on the comparing. Apparatus and computer program products are also disclosed.
    Type: Grant
    Filed: November 19, 2010
    Date of Patent: October 29, 2013
    Assignee: International Business Machines Corporation
    Inventors: Ryan Berg, Marco Pistoia, Takaaki Tateishi, Omer Tripp
  • Patent number: 8434070
    Abstract: Systems and methods are provided for creating a data structure associated with a software application that is based on at least one framework. According to the method, source code and at least one configuration file of the software application is analyzed by at least one framework-specific processor so as to determine entry point information indicating entry points in the source code, request attribute access information indicating where attributes attached to a request data structure are read and written, and forward information indicating forwards performed by the software application. A data structure for a static analysis engine is created based on this information. The data structure includes a list of synthetic methods that model framework-related behavior of the software application, and a list of entry points indicating the synthetic methods and/or application methods of the software application that can be invoked by the framework.
    Type: Grant
    Filed: October 26, 2010
    Date of Patent: April 30, 2013
    Assignee: International Business Machines Corporation
    Inventors: Shay Artzi, Ryan Berg, John T. Peyton, Jr., Marco Pistoia, Manu Sridharan, Robert Wiener
  • Patent number: 8381242
    Abstract: A method includes, using a static analysis, analyzing a software program to determine whether the software program accesses a secure resource for a computer system without verification that the secure resource can be accessed by the software program. The method also includes, in response to an access by the software program to the secure resource without verification that the secure resource can be accessed by the software program, outputting a result indicative of the analyzing. Computer program products and apparatus are also disclosed. An apparatus is disclosed that includes a user interface providing a security report to a user, the security report indicating a result of an analysis of whether or not a software program accesses a secure resource for a computer system without verification that the secure resource can be accessed by the software program.
    Type: Grant
    Filed: July 20, 2010
    Date of Patent: February 19, 2013
    Assignee: International Business Machines Corporation
    Inventors: Ryan Berg, Paolina Centonze, Marco Pistoia, Omer Tripp
  • Patent number: 8365281
    Abstract: An illegal pattern and a computer program having a method are received. The method has one or more return statements, and a number of basic blocks. The method is normalized so that each return statement of the target method relating to the illegal pattern returns a constant Boolean value. A first path condition and a second path condition for one or more corresponding paths is determined such that one or more corresponding basic blocks return a constant Boolean value of true for the first path condition and a constant Boolean value of false for the second path condition. An unsatisfiability of each path condition is determined using a monadic second-order logic (M2L) technique. Where the unsatisfiability of either path condition is false, the method is reported as not being a validator. Where the unsatisfiability of either path condition is true, the method is reported as being a validator.
    Type: Grant
    Filed: November 19, 2010
    Date of Patent: January 29, 2013
    Assignee: International Business Machines Corporation
    Inventors: Takaaki Tateishi, Marco Pistoia, Omer Tripp, Ryan Berg, Robert Wiener
  • Patent number: D844228
    Type: Grant
    Filed: May 25, 2017
    Date of Patent: March 26, 2019
    Assignee: Do More Dealie, LLC
    Inventor: Ryan Berg