Patents by Inventor Stephen Carter

Stephen Carter has filed for patents to protect the following inventions. This listing includes patent applications that are pending as well as patents that have already been granted by the United States Patent and Trademark Office (USPTO).

  • Patent number: 8327738
    Abstract: A composite transmission housing includes resin transfer molding or vacuum assisted resin transfer molding manufacturing processes combined with discontinuous fiber preforms. The preforms are assembled in a prepared injection and cure mold with additional details and fillers. The preforms are constructed such that the preforms are assembled into the mold in a specific order to assure proper arrangement. Using a combination of vacuum and pressure, a resin is injected into the mold to completely infuse the assembled preforms. At completion, the mold is heated to the resin cure temperature and held at this temperature for sufficient time to insure complete cure.
    Type: Grant
    Filed: November 7, 2003
    Date of Patent: December 11, 2012
    Assignee: Sikorsky Aircraft Corporation
    Inventors: Geoffrey Clive Robert Davis, Thomas Arthur Carstensen, Stephen Carter Varanay
  • Publication number: 20110229239
    Abstract: Systems and techniques relating to printing include an apparatus including a base mounting a storage spool to store printing ribbon including a web carrying marking medium, the base mounting a ribbon take-up spool. A ribbon path from the storage to the take-up spool runs through a printing station where there is a print head, and printing is effected at the printing station when relatively moving the head and the substrate with the ribbon interposed between. The apparatus includes a movable ribbon guide member, a ribbon guide member drive device to move the ribbon guide member, and a controller which, during or in between at least some printing operations, controls drive of at least the take-up spool to advance ribbon through the printing station. The controller controls the ribbon guide member in response to an input signal representative of ribbon tension along the ribbon path to adjust the ribbon tension.
    Type: Application
    Filed: March 15, 2011
    Publication date: September 22, 2011
    Applicant: MARKEM-IMAJE CORPORATION
    Inventors: Phillip Lakin, Stephen Carter
  • Publication number: 20100160781
    Abstract: A noninvasive technique that can be used to deny blood flow to a particular region of tissue, without the inherent risks associated with invasive procedures such as surgery and minimally-invasive procedures such as embolization. Blood flow in selected portions of the vasculature can be occluded by selectively treating specific portions of the vasculature with high intensity focused ultrasound (HIFU), where the HIFU is targeted Doppler ultrasound data, and a duration of the therapy is automatically controlled using a negative feedback loop provided by Doppler ultrasound data collected during the HIFU therapy. A portion of the vasculature providing blood flow to the undesired tissue is selected by a clinician, or automatically selected based on Doppler data, and HIFU is administered to the selected portion of the vasculature to occlude blood flow through that portion of the vasculature.
    Type: Application
    Filed: December 9, 2009
    Publication date: June 24, 2010
    Applicant: University of Washington
    Inventors: Stephen Carter, Lawrence Crum, Peter Kaczkowski, John Kucewicz, Mike Bailey, Steve Langer
  • Patent number: 7603104
    Abstract: A system of operating a wireless handset capable of making clear and secure calls is claimed. A secure call may be made by pressing a key for a predetermined amount of time. The handset enters a secure mode if the key is held for a time period greater than the predetermined amount of time. The handset enters a clear mode if the key is held for a time period less than the predetermined amount of time.
    Type: Grant
    Filed: December 10, 2001
    Date of Patent: October 13, 2009
    Assignee: QUALCOMM Incorporated
    Inventors: Stephen Carter, Gene Pitkin, Henry Tong
  • Patent number: 7526706
    Abstract: A computer implemented method, apparatus, and computer usable program code to determine whether an acknowledgment packet from an end point acknowledges receipt of unsent data in response to receiving the acknowledgement packet over a connection with the end point. A determination is made as to whether acknowledgement packets for unsent data have been received sequentially a selected number of times over the connection in response to the acknowledgement packet being for unsent data. The acknowledgment packet is dropped if acknowledgement packets have been received sequentially the selected number of times over the connection.
    Type: Grant
    Filed: January 18, 2006
    Date of Patent: April 28, 2009
    Assignee: International Business Machines Corporation
    Inventors: William Stephen Carter, Herman Dietrich Dierks, Jr., Mallesh Lepakshaiah, Venkat Venkatsubra
  • Publication number: 20080091696
    Abstract: A schema identifies a field in a document as a key field. Using an XML schema, the key field can be identified by attaching a property to the element or attribute to be used as a key field (if the XML schema standard is modified to support properties). Otherwise, attributes can be used to identify the element or attribute that is to be a key field. Fields can be primary keys, secondary keys, or foreign keys, as supported by data stores. The data store can analyze the schema to determine which fields are key fields. The key fields can be duplicated in the native format of the data store for use in indexing, searching, and other data store functions on the documents. The documents themselves can be stored as objects, into which the data store cannot reach, or can be stored in the native format of the data store, as desired.
    Type: Application
    Filed: October 31, 2007
    Publication date: April 17, 2008
    Applicant: NOVELL, INC.
    Inventors: Mark ACKERMAN, Nadeem NAZEER, Stephen CARTER
  • Publication number: 20080059514
    Abstract: A schema identifies a field in a document as a key field. Using an XML schema, the key field can be identified by attaching a property to the element or attribute to be used as a key field (if the XML schema standard is modified to support properties). Otherwise, attributes can be used to identify the element or attribute that is to be a key field. Fields can be primary keys, secondary keys, or foreign keys, as supported by data stores. The data store can analyze the schema to determine which fields are key fields. The key fields can be duplicated in the native format of the data store for use in indexing, searching, and other data store functions on the documents. The documents themselves can be stored as objects, into which the data store cannot reach, or can be stored in the native format of the data store, as desired.
    Type: Application
    Filed: October 31, 2007
    Publication date: March 6, 2008
    Applicant: NOVELL, INC.
    Inventors: Mark ACKERMAN, Nadeem NAZEER, Stephen CARTER
  • Publication number: 20080052283
    Abstract: A directed set can be used to establish contexts for linguistic concepts: for example, to aid in answering a question, to refine a query, or even to determine what questions can be answered given certain knowledge. A directed set includes a plurality of elements and chains relating the concepts. One concept is identified as a maximal element. The chains connect the maximal element to each concept in the directed set, and more than one chain can connect the maximal element to any individual concept either directly or through one or more intermediate concepts. A subset of the chains is selected to form a basis for the directed set. Each concept in the directed set is measured to determine how concretely each chain in the basis represents it. These measurements for a single concept form a vector in Euclidean k-space. Distances between these vectors can be used to determine how closely related pairs of concepts are in the directed set.
    Type: Application
    Filed: October 30, 2007
    Publication date: February 28, 2008
    Applicant: Novell, Inc.
    Inventors: Delos Jensen, Stephen Carter
  • Publication number: 20080046377
    Abstract: An Internet Box Office (IBO) system and technique vends digital content via a computer network, such as the Internet. The IBO system comprises a viewing system that cooperates with a Digital Rights Management system and various deployment enhancements within the Internet to provide an infrastructure that facilitates access to digital content in a manner that comports with copyright law and the control of intellectual property by the copyright owner. The IBO system enables a content copyright owner to retain control of its intellectual property while allowing a consumer to have transparent access to the copyright-protected content via the network. To that end, the IBO system operates to download and stage the copyrighted digital content on the viewing system of a consumer.
    Type: Application
    Filed: September 10, 2007
    Publication date: February 21, 2008
    Inventors: Robert Major, Stephen Carter, Hilarie Orman
  • Publication number: 20070294750
    Abstract: Techniques are provided for dynamically establishing and managing authentication and trust relationships. An identity service acquires and evaluates contracts associated with relationships between principals. The contracts permit the identity service to assemble authentication information, aggregated attributes, and aggregated policies which will drive and define the various relationships. That assembled information is consumed by the principals during interactions with one another and constrains those interactions. In some embodiments, the constraints are dynamically modified during on-going interactions between the principals.
    Type: Application
    Filed: August 24, 2007
    Publication date: December 20, 2007
    Inventors: Lloyd Burch, Douglas Earl, Stephen Carter, Robert Ward
  • Patent number: 7309113
    Abstract: A fluid-flow control system for a valve comprises a valve body and a bi directional main flow passage between a first and second fluid areas. The shuttle piston having a first face in direct communication with the second area and a second face in communication therewith through a bleed orifice. The second face is alternately exposed to the first fluid area through a backpressure passage and second orifice which alters the pressure differential across the shuttle piston. A second valve such as a solenoid operates to either close the second orifice wherein the shuttle piston is operable under differential pressure between the first and second pressure areas, or to close the second orifice wherein the shuttle piston is operable under differential pressure between the second pressure area and the backpressure passage. Filters at the fluid inlet and outlets protect the sealing components therein.
    Type: Grant
    Filed: November 17, 2004
    Date of Patent: December 18, 2007
    Assignee: Dynetek Industries Ltd.
    Inventor: Stephen A. Carter
  • Publication number: 20070288652
    Abstract: Techniques for network application layer routing are provided. Requests for services are inspected at an application layer of a network. A priority for a requestor is obtained and in response to the priority the requests are routed to particular processing environments. Depending on the priority the processing environments may be high performing or low performing.
    Type: Application
    Filed: August 22, 2007
    Publication date: December 13, 2007
    Inventors: Stephen Carter, Ravishankar Krishnamurthy, Duraisamy Veeravadivel
  • Publication number: 20070234406
    Abstract: Techniques for the remote authorization of secure operations are provided. A secure security system restricts access to a secure operation via an access key. An authorization acquisition service obtains the access key on request from the secure security system when an attempt is made to initiate the secure operation. The authorization acquisition service gains access the access key from a secure store via a secret. That is, the secret store is accessible via the secret. The secret is obtained directly or indirectly from a remote authorization principal over a network.
    Type: Application
    Filed: March 29, 2006
    Publication date: October 4, 2007
    Inventors: Stephen Carter, Lloyd Burch
  • Publication number: 20070234408
    Abstract: In various embodiments of the invention, techniques are presented for providing multifactor authentication. A first set of credentials are received, which are associated with a first principal, and at least one identifier also associated with the first principal is obtained from a second principal. Next, the first principal's knowledge of the at least one identifier is verified and an authentication credential is generated for the first principal. The authentication credential permits the first principal to access the second principal.
    Type: Application
    Filed: March 31, 2006
    Publication date: October 4, 2007
    Inventors: Lloyd Burch, Stephen Carter
  • Publication number: 20070179834
    Abstract: Techniques for federating and for attesting to online reputations are provided. A variety of reputation sources supply portions of reputation information about a principal. The portions are aggregated and optionally weighted to form a summary of reputation information. The summary is then represented as an attestation and optionally signed by the service providing the attestation.
    Type: Application
    Filed: February 1, 2006
    Publication date: August 2, 2007
    Inventors: Stephen Carter, Lloyd Burch
  • Publication number: 20070179802
    Abstract: Policy enforcement via attestations is provided. A principal operates within an environment and assumes roles having certain access rights to resources and the principal takes actions while assuming those roles. The roles and actions are monitored and attestations are raised under the proper set of circumstances. The attestations trigger policy restrictions that are enforced against the principal. The policy restrictions circumscribe the access rights to the resources.
    Type: Application
    Filed: December 13, 2006
    Publication date: August 2, 2007
    Inventors: Duane Buss, Stephen Carter
  • Publication number: 20070174485
    Abstract: Techniques for distributing content over a network via keys are provided. A key is associated with a particular destination or with a particular piece of content. A path management service derives and selectively communicates portions of a network path for moving the content to a destination on the basis of a value for a key. Any intermediate processing resource receives a next location within the path for forwarding the content from the path management service in response to presenting the key.
    Type: Application
    Filed: January 24, 2006
    Publication date: July 26, 2007
    Inventors: Carolyn McClain, Stephen Carter
  • Publication number: 20070174406
    Abstract: Techniques for attesting to content received from an author (sender) are provided. A sender's content is represented by a message digest. The message digest is signed by an identity service. The signed message digest represents an attestation as to the authenticity of the content from the sender. The sender transmits the signed message digest and content in a message to a recipient. The recipient verifies the signature and message digest to authenticate the content from the sender.
    Type: Application
    Filed: January 24, 2006
    Publication date: July 26, 2007
    Inventors: Cameron Morris, Lloyd Burch, Stephen Carter, Stephen Kinser
  • Publication number: 20070124820
    Abstract: Techniques are provided for preserving and managing identities within an audit log. Initial entries into a log do not include an explicit and direct reference to an agent that performs a transaction; rather, the agent acquires a temporary transaction identity for the transaction and an indirect reference to the transaction identity is written to the log while the transaction is pending. Once the transaction completes a direct reference to the transaction identity is written to the log, the identity of agent remains transparent until the identity of the agent expires, if at all.
    Type: Application
    Filed: November 30, 2005
    Publication date: May 31, 2007
    Inventors: Lloyd Burch, Stephen Carter, Douglas Earl
  • Publication number: 20070121522
    Abstract: Techniques for modeling and evaluating protocol interactions are provided. A service is monitored for its interactions with one or more protocols. The protocols are semantically defined and reference behaviors are derived therefrom in response to the interactions. The reference behaviors are then compared to runtime activities observed for the service with respect to the one or more protocols. If the activities deviate beyond a threshold, then the activities are flagged as suspect or deviant behaviors for the service.
    Type: Application
    Filed: November 30, 2005
    Publication date: May 31, 2007
    Inventor: Stephen Carter