Patents by Inventor Stephen Carter

Stephen Carter has filed for patents to protect the following inventions. This listing includes patent applications that are pending as well as patents that have already been granted by the United States Patent and Trademark Office (USPTO).

  • Publication number: 20070118733
    Abstract: Techniques are provided for secure synchronization and sharing of secrets. A first principal acquires an encrypted access key to a secret store of a second principal. The first principal contacts an identity manager and supplies a decrypted version of the access key. One or more secrets of the second principal may be acquired or modified by the first principal while accessing the secret store.
    Type: Application
    Filed: November 21, 2005
    Publication date: May 24, 2007
    Inventors: Kevin Boogert, Stephen Carter
  • Publication number: 20070106491
    Abstract: Codifying the “most prominent measurement points” of a document can be used to measure semantic distances given an area of study (e.g., white papers on some subject area). A semantic abstract is created for each document. The semantic abstract is a semantic measure of the subject or theme of the document providing a new and unique mechanism for characterizing content. The semantic abstract includes state vectors in the topological vector space, each state vector representing one lexeme or lexeme phrase about the document. The state vectors can be dominant phrase vectors in the topological vector space mapped from dominant phrases extracted from the document. The state vectors can also correspond to words in the document that are most significant to the document's meaning (the state vectors are called dominant vectors in this case). One semantic abstract can be directly compared with another semantic abstract, resulting in a numeric semantic distance between the semantic abstracts being compared.
    Type: Application
    Filed: November 27, 2006
    Publication date: May 10, 2007
    Applicant: NOVELL, INC.
    Inventors: Stephen Carter, Delos Jensen, Ronald Millett
  • Publication number: 20070100835
    Abstract: Semantic identities are provided. A semantic identity is created for an agent. The semantic identity is associated with one or more categories and the categories are associated with interests. The semantic identity mines a network for information that relates to the one or more categories or the interests and packages the information for the agent's subsequent review and consumption.
    Type: Application
    Filed: October 28, 2005
    Publication date: May 3, 2007
    Inventor: Stephen Carter
  • Publication number: 20070093790
    Abstract: A laparoscopic surgical instrument configured to be ergonomic and anthropometrically correct, the laparoscopic surgical instrument comprising: (a) an ergonomic handle configured to orient a hand of a surgeon in a functional position, the handle comprising a handle grip; (b) an actuating mechanism actuatable by a finger and supported by the handle, the actuating mechanism comprising an actuator shaft and a gearing assembly operable to displace the actuator shaft with a mechanical advantage upon actuation of a trigger by the surgeon; (c) a locking mechanism configured to lock the actuating mechanism in one of a plurality of positions, the locking mechanism comprising a release located in an anthropometrically correct position; and (d) a working shaft having a proximal end coupled to and operable with the actuator shaft, the working shaft having an elongate configuration and a distal working end configured to couple a surgical tool to be manipulated by the surgeon via the handle and the actuating mechanism to pe
    Type: Application
    Filed: October 26, 2005
    Publication date: April 26, 2007
    Inventors: Earl Downey, Stephen Carter, Kenneth Gross, Darrin Schmuckle, Robson Splane
  • Publication number: 20070094738
    Abstract: Techniques to pollute electronic profiling are provided. A cloned identity is created for a principal. Areas of interest are assigned to the cloned identity, where a number of the areas of interest are divergent from true interests of the principal. One or more actions are automatically processed in response to the assigned areas of interest. The actions appear to network eavesdroppers to be associated with the principal and not with the cloned identity.
    Type: Application
    Filed: October 25, 2005
    Publication date: April 26, 2007
    Inventor: Stephen Carter
  • Publication number: 20070078870
    Abstract: A directed set can be used to establish contexts for linguistic concepts: for example, to aid in answering a question, to refine a query, or even to determine what questions can be answered given certain knowledge. A directed set includes a plurality of elements and chains relating the concepts. One concept is identified as a maximal element. The chains connect the maximal element to each concept in the directed set, and more than one chain can connect the maximal element to any individual concept either directly or through one or more intermediate concepts. A subset of the chains is selected to form a basis for the directed set. Each concept in the directed set is measured to determine how concretely each chain in the basis represents it. These measurements for a single concept form a vector in Euclidean k-space. Distances between these vectors can be used to determine how closely related pairs of concepts are in the directed set.
    Type: Application
    Filed: November 21, 2006
    Publication date: April 5, 2007
    Applicant: NOVELL, INC.
    Inventors: Delos Jensen, Stephen Carter
  • Publication number: 20070073531
    Abstract: Starting with a dictionary including concepts and chains, a subset of the chains is selected as intentional stance basis chains (ISBCs). Concepts in the dictionary are chosen and mapped to state vectors using the ISBCs. The state vectors are assembled into a template, and an action and threshold distance are assigned to the template. When an impact summary is generated for a content source, the distance between the impact summary and the template is measured. If the distance is less than the threshold distance associated with the action for the template, the action is performed.
    Type: Application
    Filed: October 30, 2006
    Publication date: March 29, 2007
    Applicant: Novell, Inc.
    Inventors: Stephen Carter, Delos Jensen
  • Publication number: 20070061263
    Abstract: Crafted identities are provided. A statement is provided to the principal for using a crafted identity. The statement includes an identifier that provides access to a resource when presented by the principal to the resource. The statement also includes one or more roles and permissions for the crafted identity when accessing the resource.
    Type: Application
    Filed: September 14, 2005
    Publication date: March 15, 2007
    Inventors: Stephen Carter, Lloyd Burch, Dale Olds
  • Publication number: 20070061872
    Abstract: Attested identities are provided. An applicant requests an attested identity. Attesting resources provide assertions that include roles, rights, and privileges for the attested identity. The collection of assertions from each of the attesting resources represents the attested identity.
    Type: Application
    Filed: September 14, 2005
    Publication date: March 15, 2007
    Inventor: Stephen Carter
  • Publication number: 20070050064
    Abstract: A method for fabricating a component using a tool includes determining an actual property of a region of the component, comparing the actual property of the region of the component with an expected property of the region to determine a difference between the actual property and the expected property, and updating a path of the tool that is electronically stored in a memory and executable by a processor for fabricating the component based on the difference between the actual property and the expected property of the region.
    Type: Application
    Filed: September 1, 2005
    Publication date: March 1, 2007
    Inventors: Steven Burgess, Larisa Elman, John Graham, Michael Keating, Stephen Carter, Michael Martini
  • Publication number: 20070039562
    Abstract: A shock absorber leash incorporates grasping, attaching and elongated strap assemblies. The latter incorporates a strap subassembly, having a strap of non elastic, continuous structure for connecting the grasping and attaching assemblies, and a resilient, adjustable in length subassembly including an elastic strip having its ends attached to a cam-buckle for adjusting a length of the elastic strip. The resilient, adjustable in length subassembly is interposed laterally between the ends of a segment of the strap. The segment is provided adjacent to its ends with a first and second rings and forms a loop when the resilient, adjustable in length subassembly is not completely stretched. The latter is detachable from a remaining of the shock absorber leash by means of the cam-buckle and a free passage of the elastic strip through the first and second rings.
    Type: Application
    Filed: August 17, 2005
    Publication date: February 22, 2007
    Inventor: Stephen Carter
  • Publication number: 20060277595
    Abstract: Techniques for providing role-based security with instance-level granularity are provided. A security service detects a request made by a principal for access to a resource. Access to the resource is conditioned on a status of a role. The role is associated with the request, the principal, and the resource. The security service evaluates a constraint associated with the role to determine the status. The status is subsequently consumed to determine whether access to the resource for the purposes of satisfying the request is permissible.
    Type: Application
    Filed: June 6, 2005
    Publication date: December 7, 2006
    Inventors: Stephen Kinser, Lloyd Burch, Stephen Carter
  • Publication number: 20060259899
    Abstract: Techniques for debugging applications are provided. Access to an application is controlled by a wrapper. The wrapper intercepts calls to the application and records the calls. The calls are then passed to the application for processing. The recorded calls form a log which may be analyzed or mined to detect error conditions or undesirable performance characteristics associated with the application independent of source associated with the application.
    Type: Application
    Filed: May 10, 2005
    Publication date: November 16, 2006
    Inventors: Brian Cooper, Stephen Carter
  • Publication number: 20060253575
    Abstract: Techniques for the transparent takeover of network connections are presented. A first server is engaged in a connection with a client. The transactions of the connection and the traffic are monitored by a traffic cache manager. The first server records sequence numbers for the transactions with a synchronization store. If the first server fails, a last recorded sequence number is updated by the traffic cache manager within the synchronization store on behalf of a second server, which is to takeover the connection for the unresponsive first server.
    Type: Application
    Filed: July 10, 2006
    Publication date: November 9, 2006
    Inventors: Stephen Carter, Howard Davis
  • Publication number: 20060222687
    Abstract: A formulation and method for the preparation of topical anesthetics formulations, containing one or more anesthetics, in a delivery vehicle designed to promote penetration of the anesthetics into the skin and underlying tissue and to facilitate the speed of action and prolonged response. The stratum corneum layer of the skin at the application site is at least partially removed by an abrading substance, such as pumice, preferably incorporated into the formulation, or by a step that uses a mechanical abrasion of the outer layer of skin, such as a rotating or vibrating brush. The enhanced penetration into the live skin tissue is achieved by removing the outer layer of stratum corneum skin tissue by including an abrading substance in a formulation containing the anesthetics, then rubbing the formulation into the skin, or the use of a brush-like device to assist in the removal of the skin layer.
    Type: Application
    Filed: April 1, 2005
    Publication date: October 5, 2006
    Inventors: Stephen Carter, Zhen Zhu, Kanu Patel
  • Publication number: 20060195347
    Abstract: Techniques for distributed workflow processing are presented. A first workflow system and a second workflow system process actions of a workflow. The workflow is coordinated through one or more identity services. The identity services also establish trusted and secure communications between the first and second workflow systems.
    Type: Application
    Filed: February 25, 2005
    Publication date: August 31, 2006
    Inventors: Jonathan Bultmeyer, Stephen Carter, Howard Melman, Bjarne Rasmussen, Kasman Thomas
  • Patent number: 7065351
    Abstract: A method of obtaining data useful for one or more network applications is described. The method is performed responsive to a triggering event, such as a dropped call, a position fix, or even expiration of a timer. A position estimate for a subscriber station is obtained responsive to the event. A record is then formed associating the position estimate for the subscriber station with an identifier of the triggering event and/or data measured or obtained responsive to the event, such as the strength of one or more pilots visible to the subscriber station. The record is either stored locally or transmitted to a remote location. In one implementation, the record is transmitted to a remote location, and stored in a database holding like records relating to other subscriber stations.
    Type: Grant
    Filed: August 4, 2003
    Date of Patent: June 20, 2006
    Assignee: Qualcomm Incorporated
    Inventors: Stephen Carter, Mark Moeglein, James D. DeLoach, Jr., Wyatt T. Riley, Daniel H. Agre, Leonid Sheynblat
  • Publication number: 20060115089
    Abstract: Methods and systems are provided for trusted key distribution. A key distribution or an identity service acts as an intermediary between participants to a secure network. The service provisions and manages the distribution of keys. The keys are used for encrypting communications occurring within the secure network.
    Type: Application
    Filed: November 30, 2004
    Publication date: June 1, 2006
    Inventors: Stephen Carter, Carolyn McClain
  • Publication number: 20060062836
    Abstract: This invention describes the simultaneous or sequential administration of therapeutic or diagnostic agents using different devices in combination with a chemical formulation that incorporates or uses vasomodulatory chemical agents as part of the drug delivery vehicle. Methods include the addition of various vasodilatory and vasoconstrictive agents to enhance the systemic or localized tissue delivery of therapeutic or diagnostic agents delivered into a body through the use of an apparatus or device.
    Type: Application
    Filed: September 21, 2004
    Publication date: March 23, 2006
    Inventors: Stephen Carter, Zhen Zhu, Kanu Patel
  • Publication number: 20060059098
    Abstract: An Internet Box Office (IBO) system and technique vends digital content via a computer network, such as the Internet. The IBO system comprises a viewing system that cooperates with a Digital Rights Management system and various deployment enhancements within the Internet to provide an infrastructure that facilitates access to digital content in a manner that comports with copyright law and the control of intellectual property by the copyright owner. The IBO system enables a content copyright owner to retain control of its intellectual property while allowing a consumer to have transparent access to the copyright-protected content via the network. To that end, the IBO system operates to download and stage the copyrighted digital content on the viewing system of a consumer.
    Type: Application
    Filed: November 4, 2005
    Publication date: March 16, 2006
    Inventors: Robert Major, Stephen Carter, Hilarie Orman