Patents by Inventor Stephen Gordy

Stephen Gordy has filed for patents to protect the following inventions. This listing includes patent applications that are pending as well as patents that have already been granted by the United States Patent and Trademark Office (USPTO).

  • Patent number: 8387034
    Abstract: A Veil program analyzes the source code and/or data of an existing sequential target program without user interaction and determines how best to distribute the target program and data among the processing elements of a multi-processing element computing system. The Veil program analyzes source code loops, data sizes and types to prepare a set of distribution attempts or strategies, whereby each strategy is run under a run-time evaluation system and evaluated to determine the optimal decomposition and distribution across the available processing elements.
    Type: Grant
    Filed: June 14, 2010
    Date of Patent: February 26, 2013
    Assignee: Management Services Group, Inc.
    Inventors: Robert Stephen Gordy, Terry Spitzer
  • Patent number: 8387033
    Abstract: A Veil program analyzes the source code and/or data of an existing sequential target program and determines how best to distribute the target program and data among the processing elements of a multi-processing element computing system. The Veil program analyzes source code loops, data sizes and types to prepare a set of distribution attempts, whereby each distribution is run under a run-time evaluation wrapper and evaluated to determine the optimal distribution across the available processing elements.
    Type: Grant
    Filed: July 3, 2009
    Date of Patent: February 26, 2013
    Assignee: Management Services Group, Inc.
    Inventors: Robert Stephen Gordy, Terry Spitzer
  • Publication number: 20100251223
    Abstract: A Veil program analyzes the source code and/or data of an existing sequential target program without user interaction and determines how best to distribute the target program and data among the processing elements of a multi-processing element computing system. The Veil program analyzes source code loops, data sizes and types to prepare a set of distribution attempts or strategies, whereby each strategy is run under a run-time evaluation system and evaluated to determine the optimal decomposition and distribution across the available processing elements.
    Type: Application
    Filed: June 14, 2010
    Publication date: September 30, 2010
    Applicant: MANAGEMENT SERVICES GROUP, INC. d/b/a Global Technical Systems
    Inventors: Robert Stephen Gordy, Terry Spitzer
  • Patent number: 7765536
    Abstract: A Veil program analyzes the source code and data of a target program and determines how best to distribute the target program and data among the processors of a multi-processor computing system. The Veil program analyzes source code loops, data sizes and types to prepare a set of distribution attempts, whereby each distribution is run under a run-time evaluation wrapper and evaluated to determine the optimal distribution.
    Type: Grant
    Filed: December 21, 2005
    Date of Patent: July 27, 2010
    Assignee: Management Services Group, Inc.
    Inventors: Robert Stephen Gordy, Terry Spitzer
  • Publication number: 20090271774
    Abstract: A Veil program analyzes the source code and/or data of an existing sequential target program and determines how best to distribute the target program and data among the processing elements of a multi-processing element computing system. The Veil program analyzes source code loops, data sizes and types to prepare a set of distribution attempts, whereby each distribution is run under a run-time evaluation wrapper and evaluated to determine the optimal distribution across the available processing elements.
    Type: Application
    Filed: July 3, 2009
    Publication date: October 29, 2009
    Applicant: MANAGEMENT SERVICES GROUP, INC. d/b/a Global Technical Systems
    Inventors: Robert Stephen Gordy, Terry Spitzer
  • Publication number: 20050273837
    Abstract: An optical signal return path system analog RF signals are sampled using a master clock frequency, and combined with digital data such as Ethernet data at a cable node. The cable node sends the combined signals on a return path over a fiber optic medium to the cable hub. The cable hub extracts an approximate in-frequency replicate of a master clock signal, and can use the replicate master clock signal to desample the digitized RF signals back to analog. The cable hub can further use the replicate of the master clock signal to serialize Ethernet data, and send the Ethernet data back to the cable node via an optical cable in the forward direction. Accordingly, a single master clock signal can be used on a CATV network for encoding/decoding, and transmitting a variety of data signals, which enhances the integrity and reliability of the data signals.
    Type: Application
    Filed: August 2, 2004
    Publication date: December 8, 2005
    Inventors: Randy Oyadomari, Arthur Lawson, Stephen Gordy
  • Publication number: 20050273836
    Abstract: A cable node and a cable hub that communicate on a CATV network are configured to switch communication modes without signal loss or degradation due to delays in switching communication modes. In particular, a cable node sends one or more mute commands in an outgoing data stream to the cable hub, causing the cable hub to disable the RF outputs. Afterward, or along with the one or more mute commands, the cable node can send a switch mode command, thereby causing the cable hub to switch to the appropriate next communication mode, such as a communication mode using a new compression rate. When the cable hub has switched to the appropriate next communication mode, the cable hub can then properly receive and decode a corresponding data stream using the next communication mode.
    Type: Application
    Filed: May 12, 2004
    Publication date: December 8, 2005
    Inventors: Randy Oyadomari, Arthur Lawson, Stephen Gordy
  • Publication number: 20050254523
    Abstract: A cable node and a cable hub that communicate on a CATV network are configured to switch compression modes without signal noise or degradation due to excessive delays in switching compression modes. In particular, a cable node sends one or more mute commands in an outgoing data stream to the cable hub, causing the cable hub to disable the RF outputs. Afterward, or along with the one or more mute commands, the cable node can send a switch mode command, thereby causing the cable hub to switch to the appropriate next communication mode, such as a communication mode using a new compression rate. When the cable node and the cable hub have switched to the appropriate next communication mode, the cable hub can then properly receive a corresponding data stream from the cable node using the next communication mode.
    Type: Application
    Filed: May 12, 2004
    Publication date: November 17, 2005
    Inventors: Randy Oyadomari, Arthur Lawson, Stephen Gordy
  • Publication number: 20050168963
    Abstract: An optical transceiver module that includes an enclosure within which are disposed a transmitter module and a receiver module. A primary and secondary board are disposed as well in the enclosure, and the transmitter module and the receiver module are each connected with one of the boards. The primary and secondary boards each have a ground plane, and a third ground plane is provided by a ground signal plate that disposed within the enclosure and electrically coupled with the primary board and the secondary board.
    Type: Application
    Filed: March 30, 2005
    Publication date: August 4, 2005
    Inventors: Chris Togami, Stephan Burdick, Stephen Gordy
  • Publication number: 20050129033
    Abstract: A network tap for enabling attached devices, such as an intrusion detection system, to transmit information into a communication line of the network without disrupting the network traffic on the communication line. When the attached device is an intrusion detection device, the network tap is connected to a firewall. An Ethernet switch or field programmable gate array (FPGA) is incorporated in the network tap to coordinate the transmission of device data to avoid data collisions with data transmissions already existing in the communication line. The network tap may be operated in various modes to accommodate different capabilities of attached devices. In addition, the network tap has various port configurations to allow a user to connect various attached devices through a single cable or dual cables and to connect various combinations of attached devices.
    Type: Application
    Filed: December 13, 2003
    Publication date: June 16, 2005
    Inventors: Stephen Gordy, Henry Poelstra, Robert Otis, Thomas Gallatin
  • Publication number: 20050114697
    Abstract: Secure point to point network connections. Secure communications are accomplished between connection points. The first partner sends authentication information to a second partner. The second partner authenticates the authentication information from the first partner to verify the identity of the first partner. If the identity of the first partner is verified, high-speed data maybe streamed to the first partner. A connection between the first and second partners is policed to discover unauthorized devices connected to the connection or to discover the disconnection of a partner from the connection. If an unauthorized device is discovered or if a partner is removed, high-speed data is no longer sent on the connection.
    Type: Application
    Filed: November 9, 2004
    Publication date: May 26, 2005
    Inventors: Kevin Cornell, Paul Gentieu, Arthur Lawson, Stephen Gordy, Lucy Hosking
  • Publication number: 20050114663
    Abstract: Secure point to point network communications. Secure point to point network communications are accomplished by sending data across a secure link. Trusted partners at the link are matched to each other. To ensure that no un-trusted partners are on the link, authentication is performed. One of the points may be a secure tap. The secure tap authenticates a trusted partner by receiving a hardware embedded encryption key or value derived from the hardware embedded encryption key from the trusted partner. Data sent on the trusted link is encrypted to prevent interception of the data. The secure tap polices the link to ensure that no un-trusted partners are attached to the link and that the trusted partner is not removed from the link. If un-trusted partners are added to the link or trusted partners removed from the link, the secure tap ceases sending data.
    Type: Application
    Filed: October 28, 2004
    Publication date: May 26, 2005
    Inventors: Kevin Cornell, Paul Gentieu, Arthur Lawson, Stephen Gordy, Lucy Hosking
  • Publication number: 20050114710
    Abstract: A host bus adapter for use in secure network devices. The host bus adapter includes a network connector for connecting to a network such as a fiber-optic or Ethernet network. The network connector may connect to a physical layer device where the physical layer device is configured to receive high-speed network communications from the network connector. A decryption module is connected to the physical layer device for the decrypting high-speed encrypted network traffic received from the physical layer device. The host bus adapter includes an interface that is configured to connect to the host device. Authentication logic is included in the host bus adapter to authenticate and/or authenticate to a trusted partner.
    Type: Application
    Filed: October 28, 2004
    Publication date: May 26, 2005
    Inventors: Kevin Cornell, Paul Gentieu, Arthur Lawson, Stephen Gordy, Lucy Hosking
  • Publication number: 20050050205
    Abstract: The present invention provides for network taps capable of connecting to a plurality of communication cables. The network taps provide one or more levels of multiplexers which allow network data signals from a particular communication cable to be delivered to an attached device in order to monitor the activity of the communication cable. The network taps also include integrated circuitry which control the various functions and components of the network tap.
    Type: Application
    Filed: December 19, 2003
    Publication date: March 3, 2005
    Inventors: Stephen Gordy, Arthur Michael Lawson, Timothy Beyers
  • Publication number: 20050005031
    Abstract: A system and method is presented for analyzing information in a communication line for unwanted intrusions and for allowing information to be transmitted back into the communication line without disrupting the communication traffic when an intrusion is detected. The system and method includes a security tap connected to a firewall. The security tap is also connected to an intrusion detection device. The intrusion detection device analyzes the information in the communication line for indicia of attempts to compromise the network. When such indicia is detected, the intrusion detection device sends a “kill” data packet back through the security tap and directed back to the communication line to the firewall to instruct the firewall to prevent further communications into the network by the intrusive source.
    Type: Application
    Filed: April 7, 2003
    Publication date: January 6, 2005
    Inventors: Stephen Gordy, Henry Poelstra, Robert Otis, Tom Gallatin