Patents by Inventor Steven T. Baker
Steven T. Baker has filed for patents to protect the following inventions. This listing includes patent applications that are pending as well as patents that have already been granted by the United States Patent and Trademark Office (USPTO).
-
Patent number: 11975420Abstract: Method and apparatus for sharpening a cutting edge of a cutting tool, such as a kitchen knife. In some embodiments, an abrasive assembly has a frame, a handle, and a cartridge that supports a plurality of abrasive members each having an associated abrasive surface. A rod affixes the abrasive assembly to a base assembly to facilitate movement of the abrasive assembly along the cutting edge of the tool responsive to engagement, by a user, of the user handle. Each abrasive member is configured to be moved, by the user, with respect to the handle to present each abrasive surface in turn. In some cases, the cartridge is rotatable about a cartridge axis that may be parallel or non-parallel to a central axis of the rod.Type: GrantFiled: December 6, 2022Date of Patent: May 7, 2024Assignee: Darex, LLCInventors: Steven L. Baker, Conner S. MacFarlane, Joseph T. Zachariasen, Daniel T. Dovel, Travis Campbell
-
Patent number: 8176543Abstract: Network communications are secured on clients that do not have a user properly logged in and authenticated. The clients have transmit and/or receive functionality disabled. When a user logs into the client and is properly authenticated, the transmit and/or receive functionality is enabled. In some embodiments, the client can then download firewall policy information to prevent the client from communicating on certain ports or with certain clients. The firewall policy information may be specific to a role that a user logged into the client has. For example, administrators, executives and employee roles may each use different firewall policy information.Type: GrantFiled: December 17, 2009Date of Patent: May 8, 2012Assignee: Hewlett-Packard Development Company, L.P.Inventor: Steven T. Baker
-
Publication number: 20100095366Abstract: Network communications are secured on clients that do not have a user properly logged in and authenticated. The clients have transmit and/or receive functionality disabled. When a user logs into the client and is properly authenticated, the transmit and/or receive functionality is enabled. In some embodiments, the client can then download firewall policy information to prevent the client from communicating on certain ports or with certain clients. The firewall policy information may be specific to a role that a user logged into the client has. For example, administrators, executives and employee roles may each use different firewall policy information.Type: ApplicationFiled: December 17, 2009Publication date: April 15, 2010Inventor: Steven T. Baker
-
Patent number: 7657926Abstract: Network communications are secured on clients that do not have a user properly logged in and authenticated. The clients have transmit and/or receive functionality disabled. When a user logs into the client and is properly authenticated, the transmit and/or receive functionality is enabled. In some embodiments, the client can then download firewall policy information to prevent the client from communicating on certain ports or with certain clients. The firewall policy information may be specific to a role that a user logged into the client has. For example, administrators, executives and employee roles may each use different firewall policy information.Type: GrantFiled: March 19, 2004Date of Patent: February 2, 2010Assignee: 3Com CorporationInventor: Steven T. Baker
-
Publication number: 20080134319Abstract: Verifying licenses to enable functionality. A method is performed in a manufacturing environment. The method includes acts for enabling device functionality on devices to ensure that at least one of appropriate licensing, royalty or authorization requirements are met. The method includes receiving authentication information for a device. The authentication information is authenticated to ensure that the device is an authorized device. If authentication succeeds, then additional manufacturing tasks are performed.Type: ApplicationFiled: November 30, 2006Publication date: June 5, 2008Applicant: KESTRELINK CORPORATIONInventors: Steven T. Baker, Douglas J. Kogan, R. Douglas Jones
-
Publication number: 20080133974Abstract: Testing media player devices. A method may be practiced, for example, in an automated testing environment. The method includes sending a media oriented command to the media player. The command directs the media player to perform a media function. A trace is received in response to the command. The trace may be generated by a media player as part of the process of attempting to perform functionality related to the command. The trace includes media player information. The information occurs as a result of sending the command to the media player. In response to receiving a trace, a new media oriented command is sent automatically and without human intervention directing the media player to perform a media function. The new media oriented command is dependent on the trace.Type: ApplicationFiled: November 30, 2006Publication date: June 5, 2008Applicant: KESTRELINK CORPORATIONInventors: Douglas J. Kogan, Steven T. Baker
-
Publication number: 20080126752Abstract: A method for dual-processor communication. In one example embodiment, a method includes indicating to a master processor that data is available to transfer to the master processor; receiving a request for the data from the master processor over a storage-based channel; and sending the data to the master processor over the storage-based channel. In another embodiment a method includes determining that data is available for transfer from a slave processor; sending a request for the data to the slave processor over a storage-based channel; and receiving the data from the slave processor over the storage-based channel. In another embodiment a method includes detecting an event on a master processor and writing data corresponding to the event to a slave processor over a storage-based channel.Type: ApplicationFiled: August 2, 2006Publication date: May 29, 2008Inventors: Steven T. Baker, Douglas J. Kogan, Benjamin A. Kendall, Jason D. Carnahan
-
Publication number: 20080052699Abstract: A method for synchronized dual-processor firmware updates. In one example embodiment, a method includes receiving a combined firmware update file, verifying the source of the combined firmware update file, extracting a master firmware image and a slave firmware image from the combined firmware update file, verifying the data integrity of the master firmware image, sending the slave firmware image to the slave processor, receiving a signal from the slave processor indicating that the slave firmware image has been installed, and installing the master firmware image. In another embodiment, a method includes receiving a slave firmware image from the master processor, verifying the data integrity of the slave firmware image, installing the slave firmware image, and sending a signal to the master processor indicating that the slave firmware image has been installed.Type: ApplicationFiled: August 2, 2006Publication date: February 28, 2008Inventors: Steven T. Baker, Douglas J. Kogan
-
Publication number: 20080027892Abstract: Accessing data from large, unknown size, or streaming files. A method includes acts for accessing files. A request is received to read at a virtual address corresponding to an identifier for a file or directory. The virtual address is read to read a shared address range from the virtual address. The shared address range can be used for a number of files or directories. One of the files or directories may be selected for use at a given time based on the identifier for the file or directory. The shared address range is returned in response to the request. File or directory content data is accessed by means of a read request, received for an address in the shared address range, wherein the shared address range comprises a finite address range, and wherein the shared address range is circular such that if a file or directory exceeds the size of the finite address range, portions exceeding the finite address range can be addressed starting at the beginning of the shared address range.Type: ApplicationFiled: July 27, 2006Publication date: January 31, 2008Applicant: KESTRELINK CORPORATIONInventors: Jason D. Carnahan, Steven T. Baker, Benjamin A. Kendall
-
Publication number: 20080005257Abstract: A system for accessing data across a network. The system includes a first processor configured to consume data. A second processor is connected to the first processor via a physical media storage interface. As such, the first processor interfaces with the second processor as if the second processor were a physical media storage device. The second processor is connectable via a network interface to a physical media storage device so as to be able to provide data from the physical media storage device to the first processor. The system includes a computer readable medium including computer executable instructions configured to compensate for at least one of time latencies or network connection problems caused by the network interface between the second processor and the physical media storage device.Type: ApplicationFiled: June 29, 2006Publication date: January 3, 2008Applicant: KESTRELINK CORPORATIONInventors: Jason D. Carnahan, Steven T. Baker, Benjamin A. Kendall