Patents by Inventor Stefan Nusser
Stefan Nusser has filed for patents to protect the following inventions. This listing includes patent applications that are pending as well as patents that have already been granted by the United States Patent and Trademark Office (USPTO).
-
Patent number: 9457970Abstract: An example system includes a plurality of trailers arranged such that a given trailer of the plurality is connected to at least one other trailer of the plurality, where the plurality of trailers includes a plurality of respective conveyance systems to transport objects between connected trailers. The system further includes a control system configured to cause a conveyance system of a first trailer of the plurality to move at least one object to the first trailer from a first external trailer, cause respective conveyance systems of one or more trailers of the plurality to transport the at least one object from the first trailer of the plurality to a second trailer of the plurality that is connected to a second external trailer, and cause a conveyance system of the second trailer of the plurality to move the at least one object to the second external trailer.Type: GrantFiled: July 6, 2015Date of Patent: October 4, 2016Assignee: Google Inc.Inventors: John Zevenbergen, Stefan Nusser, Troy Straszheim
-
Publication number: 20160236344Abstract: An example modular reconfigurable workcell for quick connection of peripherals is described. In one example, a modular reconfigurable workcell comprises modular docking bays on a surface of the workcell that support attachment of docking modules in a fixed geometric configuration, and respective modular docking bays include electrical connections for a variety of power and communication busses of the docking modules to be attached. The workcell also includes an electrical subsystem for coupling the communication busses between the modular docking bays and providing power circuitry to the modular docking bays, and structural features in the modular docking bays to enable insertion of the docking modules in the fixed geometric configuration. The workcell also includes a processor for determining a geometric calibration of attached peripherals based on a location and the orientation of corresponding docking modules attached to the modular docking bays and based on an identification of the attached peripherals.Type: ApplicationFiled: April 21, 2016Publication date: August 18, 2016Inventors: Aaron Edsinger, Anthony Sean Jules, Stefan Nusser, Advait Jain, James Nicholas Vines
-
Patent number: 9346160Abstract: An example modular reconfigurable workcell for quick connection of peripherals is described. In one example, a modular reconfigurable workcell comprises modular docking bays on a surface of the workcell that support attachment of docking modules in a fixed geometric configuration, and respective modular docking bays include electrical connections for a variety of power and communication busses of the docking modules to be attached. The workcell also includes an electrical subsystem for coupling the communication busses between the modular docking bays and providing power circuitry to the modular docking bays, and structural features in the modular docking bays to enable insertion of the docking modules in the fixed geometric configuration. The workcell also includes a processor for determining a geometric calibration of attached peripherals based on a location and the orientation of corresponding docking modules attached to the modular docking bays and based on an identification of the attached peripherals.Type: GrantFiled: February 27, 2014Date of Patent: May 24, 2016Assignee: Redwood Robotics, Inc.Inventors: Aaron Edsinger, Anthony Sean Jules, Stefan Nusser, Advait Jain, James Nicholas Vines
-
Publication number: 20140379129Abstract: An example modular reconfigurable workcell for quick connection of peripherals is described. In one example, a modular reconfigurable workcell comprises modular docking bays on a surface of the workcell that support attachment of docking modules in a fixed geometric configuration, and respective modular docking bays include electrical connections for a variety of power and communication busses of the docking modules to be attached. The workcell also includes an electrical subsystem for coupling the communication busses between the modular docking bays and providing power circuitry to the modular docking bays, and structural features in the modular docking bays to enable insertion of the docking modules in the fixed geometric configuration. The workcell also includes a processor for determining a geometric calibration of attached peripherals based on a location and the orientation of corresponding docking modules attached to the modular docking bays and based on an identification of the attached peripherals.Type: ApplicationFiled: February 27, 2014Publication date: December 25, 2014Inventors: Aaron Edsinger, Anthony Sean Jules, Stefan Nusser, Advait Jain, James Nicholas Vines
-
Patent number: 8353017Abstract: A system and method are disclosed for protecting a password assigned to a user, the method comprising: providing a password entry screen having a virtual keyboard, the virtual keyboard including a plurality of character keys arranged in a non-QWERTY format; authenticating the user if a password submitted by the user accessing the password entry screen matches a user password retrieved from a password database; and denying access to the user if the submitted password does not match the retrieved user password. The system comprises a storage module and a computer program for performing the method.Type: GrantFiled: June 5, 2008Date of Patent: January 8, 2013Assignee: International Business Machines CorporationInventors: Julian A. Cerruti, Stefan Nusser, Jerald Thomas Schoudt, Gustavo Stefani, Eric Wilcox
-
Patent number: 7962413Abstract: An end-user system for the blocking of recording digital content at during the rendering of encrypted digital multimedia files. Before the process of rendering of encrypted digital multimedia can be started all rendered media stream during playback are opened to ensure that this multimedia content is not recorded. This blocks the usage of the multimedia interfaces including devices and/or ports that can be used to store un-encrypted content that has been decrypted for the purposes of playing or rendering. The method also includes an exception, which allows recording with permission from the present invention.Type: GrantFiled: April 7, 2008Date of Patent: June 14, 2011Assignee: International Business Machines CorporationInventors: Michael G. Lisanke, Kenneth L. Milsted, Stefan Nusser, Bruce A. Tantlinger, George W. Wilhelm, Jr.
-
Patent number: 7921454Abstract: A system and method are disclosed for protecting a password assigned to a user, the method comprising: providing a password entry screen having a virtual keyboard, the virtual keyboard including a plurality of character keys arranged in a non-QWERTY format; authenticating the user if a password submitted by the user accessing the password entry screen matches a user password retrieved from a password database; and denying access to the user if the submitted password does not match the retrieved user password. The system comprises a storage module and a computer program for performing the method.Type: GrantFiled: October 22, 2007Date of Patent: April 5, 2011Assignee: International Business Machines CorporationInventors: Julian A. Cerruti, Stefan Nusser, Jerald Thomas Schoudt, Gustavo Stefani, Eric Wilcox
-
Patent number: 7712146Abstract: A rights management module controls access to a data set by processing requests for flexibly defined types of access to the data set and determines if the requested access may be granted. The requester's right for the requested type of access is verified by a verification module that may be part of the rights management core or verified through expansion rights verification modules. Extension verification modules may be contained within the data set itself or obtained from a separate store. Extension verification modules are authenticated by the rights management core.Type: GrantFiled: August 15, 2006Date of Patent: May 4, 2010Assignee: International Business Machines CorporationInventors: Stefan Nusser, Eckhart Koeppen, James C. Mahlbacher, David Medina, Luca Contessa
-
Patent number: 7685636Abstract: A protected content distribution system utilizes media-based copy protection to support online distribution of protected content in a secure and legitimate fashion. Using a media-based copy protection scheme based on broadcast encryption, the protected content distribution system realizes online distribution of protected content such as, for example audio files, movies, etc, authorizing consumption of unlicensed content by transfer of a unique encrypted key to the protected media. This transaction is fast, involving the transfer of an encrypted binding key rather than the protected content. Content is enabled through a unique encrypted key on protected media accessed through a device separate from the media driver.Type: GrantFiled: March 7, 2005Date of Patent: March 23, 2010Assignee: International Business Machines CorporationInventors: Donald E. Leake, Jr., Jeffrey B. Lotspiech, Stefan Nusser
-
Publication number: 20100008500Abstract: An end-user system for the blocking of recording digital content at during the rendering of encrypted digital multimedia files. Before the process of rendering of encrypted digital multimedia can be started all rendered media stream during playback are opened to ensure that this multimedia content is not recorded. This blocks the usage of the multimedia interfaces including devices and/or ports that can be used to store un-encrypted content that has been decrypted for the purposes of playing or rendering. The method also includes an exception, which allows recording with permission from the present invention.Type: ApplicationFiled: April 7, 2008Publication date: January 14, 2010Applicant: International Business Machines Corp.Inventors: MICHAEL G. LISANKE, Kenneth L. Milsted, Stefan Nusser, Bruce A. Tantlinger, George W. Wilhelm, JR.
-
Patent number: 7614077Abstract: A system for providing persistent access control of protected content is disclosed. The method on a client system includes sending a first request for authentication of the client to a server system. Subsequently, the client is authenticated by the server. Next, a user on the client attempts to access a file comprising a trailer and content encrypted with an encrypting key. Then, a second request for access to the content is sent to the server by the client, wherein an identifier from the trailer is included in the second request. The identifier identifies the content or an access control policy of the content. The server determines that the second request is in accordance with an access control policy associated with the content, and grants access to the content. Lastly, the client accesses the content in accordance with the access control policy.Type: GrantFiled: April 10, 2002Date of Patent: November 3, 2009Assignee: International Business Machines CorporationInventors: Glenn E. Brew, Marco M. Hurtado, David Medina, Jonathan P. Munson, Stefan Nusser, Giovanni Pacifici, Alaa S. You{grave over (s)}sef
-
Patent number: 7530088Abstract: A system and method of controlling redistribution of broadcast content within a personal area network using TSID-DMA mapping to localize devices, wherein some location-aware devices have the capability to derive region identifiers whereas other location agnostic devices localize themselves by adopting the DMA of the first broadcast content received. Rules for redistribution of broadcast content between devices are also established.Type: GrantFiled: September 20, 2005Date of Patent: May 5, 2009Assignee: International Business Machines CorporationInventors: Scott Eric Hamilton, Stefan Nusser
-
Publication number: 20090106825Abstract: A system and method are disclosed for protecting a password assigned to a user, the method comprising: providing a password entry screen having a virtual keyboard, the virtual keyboard including a plurality of character keys arranged in a non-QWERTY format; authenticating the user if a password submitted by the user accessing the password entry screen matches a user password retrieved from a password database; and denying access to the user if the submitted password does not match the retrieved user password. The system comprises a storage module and a computer program for performing the method.Type: ApplicationFiled: October 22, 2007Publication date: April 23, 2009Inventors: Julian A. Cerruti, Stefan Nusser, Jerald Thomas Schoudt, Gustavo Stefani, Eric Wilcox
-
Publication number: 20090106827Abstract: A system and method are disclosed for protecting a password assigned to a user, the method comprising: providing a password entry screen having a virtual keyboard, the virtual keyboard including a plurality of character keys arranged in a non-QWERTY format; authenticating the user if a password submitted by the user accessing the password entry screen matches a user password retrieved from a password database; and denying access to the user if the submitted password does not match the retrieved user password. The system comprises a storage module and a computer program for performing the method.Type: ApplicationFiled: June 5, 2008Publication date: April 23, 2009Applicant: INTERNATIONAL BUSINESS MACHINES CORPORATIONInventors: Julian A. Cerruti, Stefan Nusser, Jerald Thomas Schoudt, Gustavo Stefani, Eric Wilcox
-
Patent number: 7500109Abstract: An external module loads into an entity's memory and is transformed by two functions. These are namely, the STOMP function and the UNSTOMP function. One or both of these functions is based on the actual code that is found in a legitimate version of the external module. The STOMP-UNSTOMP pair produces an external module that works differently if even a single byte of code in the external module has been changed by an attacker. The STOMP transforms the external module and makes it temporarily unusable whilst conversely, the UNSTOMP repairs the damage and makes it workable again. Thus, if the module is not authentic, the pairing between the STOMP and UNSTOMP is broken. Therefore, a patched module from a hacker remains unusable since the STOMP and UNSTOMP transformations do not produce a working external module. Because of the STOMP and UNSTOMP technique, an application is secure because if an external module is free from tampering then the application executes normally.Type: GrantFiled: May 6, 2005Date of Patent: March 3, 2009Assignee: International Business Machines CorporationInventors: Stefan Nusser, Jeffrey B. Lotspiech, Paul R. Rettig
-
Patent number: 7383228Abstract: A method, system and computer readable medium for the blocking of recording digital content at an end user multimedia end-user-system during the rendering of encrypted digital multimedia files. Before the process of rendering of encrypted digital multimedia can be started all rendered media stream during playback are opened to ensure that this multimedia content is not recorded. This blocks the usage of the multimedia interfaces including devices and/or ports that can be used to store un-encrypted content that has been decrypted for the purposes of playing or rendering. The method also includes an exception, which allows recording with permission from the present invention.Type: GrantFiled: August 11, 2005Date of Patent: June 3, 2008Assignee: International Business Machines CorporationInventors: Michael G. Lisanke, Kenneth L. Milsted, Stefan Nusser, Bruce A. Tantlinger, George W. Wilhelm, Jr.
-
Patent number: 7346580Abstract: A method, system and computer readable medium for the blocking of recording digital content at an end user multimedia end-user-system during the rendering of encrypted digital multimedia files. Before the process of rendering of encrypted digital multimedia can be started all rendered media stream during playback are opened to ensure that this multimedia content is not recorded. This blocks the usage of the devices and/or ports that can be used to store un-encrypted content that has been decrypted for the purposes of playing or rendering. The method also includes an exception, which allows recording with permission from the present invention.Type: GrantFiled: August 23, 2001Date of Patent: March 18, 2008Assignee: International Business Machines CorporationInventors: Michael G. Lisanke, Kenneth L. Milsted, Stefan Nusser, Bruce A. Tantlinger, George W. Wilhelm, Jr.
-
Publication number: 20070208742Abstract: A rights management module controls access to a data set by processing requests for flexibly defined types of access to the data set and determines if the requested access may be granted. The requester's right for the requested type of access is verified by a verification module that may be part of the rights management core or verified through expansion rights verification modules. Extension verification modules may be contained within the data set itself or obtained from a separate store. Extension verification modules are authenticated by the rights management core.Type: ApplicationFiled: August 15, 2006Publication date: September 6, 2007Applicant: International Business Machines CorporationInventors: Stefan Nusser, Eckhart Koeppen, James Mahlbacher, David Medina, Luca Contessa
-
Patent number: 7249264Abstract: A system, method and computer readable medium for providing secure IP-based streaming in a format independent manner is disclosed. The method on a content mastering system begins with an encoded media file consisting of content data and associated metadata. First, the metadata is read from the encoded media file. Next, the encoded media file including the content data and the associated metadata is encrypted. Then, in a streaming server system, the encoded/encrypted media file is divided into more than one data packet, streamed in accordance with one or more parameters in the metadata. Each data packet includes a portion of the encoded/encrypted media file and an offset value corresponding to a location within the encoded/encrypted media file. The data packets are then streamed to a client information processing system (i.e., the client) over a network.Type: GrantFiled: April 2, 2002Date of Patent: July 24, 2007Assignee: International Business Machines CorporationInventors: William R. Belknap, Glenn E. Brew, Jeffrey B. Lotspiech, Stefan Nusser, Peter Westerink
-
Publication number: 20070067817Abstract: A system and method of controlling redistribution of broadcast content within a personal area network using TSID-DMA mapping to localize devices, wherein some location-aware devices have the capability to derive region identifiers whereas other location agnostic devices localize themselves by adopting the DMA of the first broadcast content received. Rules for redistribution of broadcast content between devices are also established.Type: ApplicationFiled: September 20, 2005Publication date: March 22, 2007Applicant: INTERNATIONAL BUSINESS MACHINES CORPORATIONInventors: Scott Hamilton, Stefan Nusser