Patents by Inventor Steven T. Baker

Steven T. Baker has filed for patents to protect the following inventions. This listing includes patent applications that are pending as well as patents that have already been granted by the United States Patent and Trademark Office (USPTO).

  • Patent number: 11975420
    Abstract: Method and apparatus for sharpening a cutting edge of a cutting tool, such as a kitchen knife. In some embodiments, an abrasive assembly has a frame, a handle, and a cartridge that supports a plurality of abrasive members each having an associated abrasive surface. A rod affixes the abrasive assembly to a base assembly to facilitate movement of the abrasive assembly along the cutting edge of the tool responsive to engagement, by a user, of the user handle. Each abrasive member is configured to be moved, by the user, with respect to the handle to present each abrasive surface in turn. In some cases, the cartridge is rotatable about a cartridge axis that may be parallel or non-parallel to a central axis of the rod.
    Type: Grant
    Filed: December 6, 2022
    Date of Patent: May 7, 2024
    Assignee: Darex, LLC
    Inventors: Steven L. Baker, Conner S. MacFarlane, Joseph T. Zachariasen, Daniel T. Dovel, Travis Campbell
  • Patent number: 8176543
    Abstract: Network communications are secured on clients that do not have a user properly logged in and authenticated. The clients have transmit and/or receive functionality disabled. When a user logs into the client and is properly authenticated, the transmit and/or receive functionality is enabled. In some embodiments, the client can then download firewall policy information to prevent the client from communicating on certain ports or with certain clients. The firewall policy information may be specific to a role that a user logged into the client has. For example, administrators, executives and employee roles may each use different firewall policy information.
    Type: Grant
    Filed: December 17, 2009
    Date of Patent: May 8, 2012
    Assignee: Hewlett-Packard Development Company, L.P.
    Inventor: Steven T. Baker
  • Publication number: 20100095366
    Abstract: Network communications are secured on clients that do not have a user properly logged in and authenticated. The clients have transmit and/or receive functionality disabled. When a user logs into the client and is properly authenticated, the transmit and/or receive functionality is enabled. In some embodiments, the client can then download firewall policy information to prevent the client from communicating on certain ports or with certain clients. The firewall policy information may be specific to a role that a user logged into the client has. For example, administrators, executives and employee roles may each use different firewall policy information.
    Type: Application
    Filed: December 17, 2009
    Publication date: April 15, 2010
    Inventor: Steven T. Baker
  • Patent number: 7657926
    Abstract: Network communications are secured on clients that do not have a user properly logged in and authenticated. The clients have transmit and/or receive functionality disabled. When a user logs into the client and is properly authenticated, the transmit and/or receive functionality is enabled. In some embodiments, the client can then download firewall policy information to prevent the client from communicating on certain ports or with certain clients. The firewall policy information may be specific to a role that a user logged into the client has. For example, administrators, executives and employee roles may each use different firewall policy information.
    Type: Grant
    Filed: March 19, 2004
    Date of Patent: February 2, 2010
    Assignee: 3Com Corporation
    Inventor: Steven T. Baker
  • Publication number: 20080134319
    Abstract: Verifying licenses to enable functionality. A method is performed in a manufacturing environment. The method includes acts for enabling device functionality on devices to ensure that at least one of appropriate licensing, royalty or authorization requirements are met. The method includes receiving authentication information for a device. The authentication information is authenticated to ensure that the device is an authorized device. If authentication succeeds, then additional manufacturing tasks are performed.
    Type: Application
    Filed: November 30, 2006
    Publication date: June 5, 2008
    Applicant: KESTRELINK CORPORATION
    Inventors: Steven T. Baker, Douglas J. Kogan, R. Douglas Jones
  • Publication number: 20080133974
    Abstract: Testing media player devices. A method may be practiced, for example, in an automated testing environment. The method includes sending a media oriented command to the media player. The command directs the media player to perform a media function. A trace is received in response to the command. The trace may be generated by a media player as part of the process of attempting to perform functionality related to the command. The trace includes media player information. The information occurs as a result of sending the command to the media player. In response to receiving a trace, a new media oriented command is sent automatically and without human intervention directing the media player to perform a media function. The new media oriented command is dependent on the trace.
    Type: Application
    Filed: November 30, 2006
    Publication date: June 5, 2008
    Applicant: KESTRELINK CORPORATION
    Inventors: Douglas J. Kogan, Steven T. Baker
  • Publication number: 20080126752
    Abstract: A method for dual-processor communication. In one example embodiment, a method includes indicating to a master processor that data is available to transfer to the master processor; receiving a request for the data from the master processor over a storage-based channel; and sending the data to the master processor over the storage-based channel. In another embodiment a method includes determining that data is available for transfer from a slave processor; sending a request for the data to the slave processor over a storage-based channel; and receiving the data from the slave processor over the storage-based channel. In another embodiment a method includes detecting an event on a master processor and writing data corresponding to the event to a slave processor over a storage-based channel.
    Type: Application
    Filed: August 2, 2006
    Publication date: May 29, 2008
    Inventors: Steven T. Baker, Douglas J. Kogan, Benjamin A. Kendall, Jason D. Carnahan
  • Publication number: 20080052699
    Abstract: A method for synchronized dual-processor firmware updates. In one example embodiment, a method includes receiving a combined firmware update file, verifying the source of the combined firmware update file, extracting a master firmware image and a slave firmware image from the combined firmware update file, verifying the data integrity of the master firmware image, sending the slave firmware image to the slave processor, receiving a signal from the slave processor indicating that the slave firmware image has been installed, and installing the master firmware image. In another embodiment, a method includes receiving a slave firmware image from the master processor, verifying the data integrity of the slave firmware image, installing the slave firmware image, and sending a signal to the master processor indicating that the slave firmware image has been installed.
    Type: Application
    Filed: August 2, 2006
    Publication date: February 28, 2008
    Inventors: Steven T. Baker, Douglas J. Kogan
  • Publication number: 20080027892
    Abstract: Accessing data from large, unknown size, or streaming files. A method includes acts for accessing files. A request is received to read at a virtual address corresponding to an identifier for a file or directory. The virtual address is read to read a shared address range from the virtual address. The shared address range can be used for a number of files or directories. One of the files or directories may be selected for use at a given time based on the identifier for the file or directory. The shared address range is returned in response to the request. File or directory content data is accessed by means of a read request, received for an address in the shared address range, wherein the shared address range comprises a finite address range, and wherein the shared address range is circular such that if a file or directory exceeds the size of the finite address range, portions exceeding the finite address range can be addressed starting at the beginning of the shared address range.
    Type: Application
    Filed: July 27, 2006
    Publication date: January 31, 2008
    Applicant: KESTRELINK CORPORATION
    Inventors: Jason D. Carnahan, Steven T. Baker, Benjamin A. Kendall
  • Publication number: 20080005257
    Abstract: A system for accessing data across a network. The system includes a first processor configured to consume data. A second processor is connected to the first processor via a physical media storage interface. As such, the first processor interfaces with the second processor as if the second processor were a physical media storage device. The second processor is connectable via a network interface to a physical media storage device so as to be able to provide data from the physical media storage device to the first processor. The system includes a computer readable medium including computer executable instructions configured to compensate for at least one of time latencies or network connection problems caused by the network interface between the second processor and the physical media storage device.
    Type: Application
    Filed: June 29, 2006
    Publication date: January 3, 2008
    Applicant: KESTRELINK CORPORATION
    Inventors: Jason D. Carnahan, Steven T. Baker, Benjamin A. Kendall