Patents by Inventor Timothy C. Williams
Timothy C. Williams has filed for patents to protect the following inventions. This listing includes patent applications that are pending as well as patents that have already been granted by the United States Patent and Trademark Office (USPTO).
-
Patent number: 11931275Abstract: A convertible nephroureteral catheter is used in the treatment of urinary system complications, particularly on the need for a single surgically delivered device to treat patients who must be seen by an interventional radiologist (IR). In many current procedures, patients need to return to the operating room to remove a previously delivered nephroureteral catheter to exchange this catheter with a fully implanted ureteral stent delivered though the same access site at the flank. The present convertible nephroureteral catheter reduces the need to return for a second surgical procedure. Two weeks after initial implantation, the proximal portion of the convertible nephroureteral catheter extending out from the body may simply be removed. A simple action at the catheter hub allows this proximal portion to be removed, leaving behind the implanted ureteral stent within the patient's urinary system. Other medical procedures, devices, and technologies may benefit from the described convertible catheter.Type: GrantFiled: July 23, 2020Date of Patent: March 19, 2024Assignee: Merit Medical Systems, Inc.Inventors: Harry R. Smouse, Kent C. B. Stalker, Timothy H. Williams, Eugene R. Serina
-
Publication number: 20210081957Abstract: A system includes buyer portal logic enabling a buyer to specify security requirements for attestation by a supplier. The system includes attestation program logic enabling the supplier to define a continuous attestation program for the security requirements through a supplier interface provided by supplier portal logic. The continuation attestation program includes an annual attestation program and a sub-annual attestation program. The system receives compliance attestation responses from the supplier for the security requirements and correlates the compliance attestation responses to the continuous attestation program for the supplier. The system enables the supplier to specify an access privilege for the buyer with regard to the supplier's sub-annual continuous attestation program data and/or annual attestation program data.Type: ApplicationFiled: September 13, 2019Publication date: March 18, 2021Inventors: Timothy C. Williams, Nelson T. Kanemoto
-
Patent number: 8689292Abstract: A method and system provide dynamic communities of interest on an end user workstation utilizing commercial off the shelf products, with central management and the ability for a users to log on only once (also known as “single sign on” or “SSO”). The software images that make up the virtual machine can be patched and updated with other required changes from a central storage area where the image can be administratively updated just once. A digital signature can be applied to the software images to ensure authenticity and integrity, along with determining whether a software image is up to date.Type: GrantFiled: April 21, 2008Date of Patent: April 1, 2014Assignee: API Technologies Corp.Inventors: Timothy C. Williams, Randall Breeden, Richard Holtslander, Edward Browdy
-
Patent number: 7990884Abstract: An inter-networking system and method that provides for access control identifier (ACI) metadata utilization for the life of a session even on unknown networks being traversed, allowing for ACI metadata utilization, reutilization, and modification in both the send and receive paths (bi-directional), and allowing for metadata transport over network segments requiring that ACIs be embedded at different layers of the communications stack.Type: GrantFiled: July 13, 2009Date of Patent: August 2, 2011Assignee: API Cryptek Inc.Inventors: David Gross, Timothy C. Williams, Robert Babiskin, Randall E. Breeden
-
Publication number: 20100074260Abstract: An inter-networking system and method that provides for access control identifier (ACI) metadata utilization for the life of a session even on unknown networks being traversed, allowing for ACI metadata utilization, reutilization, and modification in both the send and receive paths (bi-directional), and allowing for metadata transport over network segments requiring that ACIs be embedded at different layers of the communications stack.Type: ApplicationFiled: July 13, 2009Publication date: March 25, 2010Inventors: David Gross, Timothy C. Williams, Robert Babiskin, Randall E. Breeden
-
Publication number: 20090328170Abstract: A method and system provide dynamic communities of interest on an end user workstation utilizing commercial off the shelf products, with central management and the ability for a users to log on only once (also known as “single sign on” or “SSO”). The software images that make up the virtual machine can be patched and updated with other required changes from a central storage area where the image can be administratively updated just once. A digital signature can be applied to the software images to ensure authenticity and integrity, along with determining whether a software image is up to date.Type: ApplicationFiled: April 21, 2008Publication date: December 31, 2009Applicant: CRYPTEK, INC.Inventors: Timothy C. Williams, Randall Breeden, Richard Holtslander, Edward Browdy
-
Patent number: 7561578Abstract: An inter-networking system and method that provides for access control identifier (ACI) metadata utilization for the life of a session even on unknown networks being traversed, allowing for ACI metadata utilization, reutilization, and modification in both the send and receive paths (bi-directional), and allowing for metadata transport over network segments requiring that ACIs be embedded at different layers of the communications stack.Type: GrantFiled: November 15, 2004Date of Patent: July 14, 2009Assignee: Cryptek, Inc.Inventors: David Gross, Timothy C. Williams, Robert Babiskin, Randall E. Breeden
-
Patent number: 7069437Abstract: A network prevents unauthorized users from gaining access to confidential information. The network has various workstations and servers connected by a common medium and through a router to the Internet. The network has two major components, a Network Security Center (NSC) and security network interface cards or devices. The NSC is an administrative workstation through which the network security officer manages the network as a whole as well as the individual security devices. The security devices are interposed between each of workstation, including the NSC, and the common medium and operate at a network layer (layer 3) of the protocol hierarchy. The network allows trusted users to access outside information, including the Internet, while stopping outside attackers at their point of entry. At the same time, the network limits an unauthorized insider to information defined in their particular security profile. The user may select which virtual network to access at any given time.Type: GrantFiled: August 22, 2001Date of Patent: June 27, 2006Assignee: Cryptek, Inc.Inventor: Timothy C. Williams
-
Patent number: 6950824Abstract: A mandatory access control system and method that employs a policy manager subsystem with virtual data labeling (VDL) on the communications channel to allow aspects about the data to determine by whom and where such data can be accessed. When combined with a secure network system, the VDL system is able to base delivery decisions not only on destination address but also on the type of data that is to be delivered.Type: GrantFiled: May 30, 2002Date of Patent: September 27, 2005Assignee: Cryptek, Inc.Inventors: Robert Babiskin, Timothy C. Williams, Randall E. Breeden
-
Patent number: 6931411Abstract: A mandatory access control system and method that employs virtual data labeling (VDL) on the communications channel to allow aspects about the data to determine by whom and where such data can be accessed. When combined with a secure network system, the VDL system is able to base delivery decisions not only on destination address but also on the type of data that is to be delivered.Type: GrantFiled: May 30, 2002Date of Patent: August 16, 2005Assignee: Cryptek, Inc.Inventors: Robert Babiskin, Timothy C. Williams
-
Publication number: 20030005331Abstract: A network prevents unauthorized users from gaining access to confidential information. The network has various workstations and servers connected by a common medium and through a router to the Internet. The network has two major components, a Network Security Center (NSC) and security network interface cards or devices. The NSC is an administrative workstation through which the network security officer manages the network as a whole as well as the individual security devices. The security devices are interposed between each of workstation, including the NSC, and the common medium and operate at a network layer (layer 3) of the protocol hierarchy. The network allows trusted users to access outside information, including the Internet, while stopping outside attackers at their point of entry. At the same time, the network limits an unauthorized insider to information defined in their particular security profile. The user may select which virtual network to access at any given time.Type: ApplicationFiled: August 22, 2001Publication date: January 2, 2003Applicant: Cryptek Secure Communications, LLCInventor: Timothy C. Williams
-
Patent number: 6304973Abstract: A network prevents unauthorized users from gaining access to confidential information. The network has various workstations and servers connected by a common medium and through a router to the Internet. The network has two major components, a Network Security Center (NSC) and security network interface cards or devices. The NSC is an administrative workstation through which the network security officer manages the network as a whole as well as the individual security devices. The security devices are interposed, between each of workstation, including the NSC, and the common medium and operate at a network layer (layer 3) of the protocol hierarchy. The network allows trusted users to access outside information, including the Internet, while stopping outside attackers at their point of entry. At the same time, the network limits an unauthorized insider to information defined in their particular security profile. The user may select which virtual network to access at any given time.Type: GrantFiled: August 6, 1998Date of Patent: October 16, 2001Assignee: Cryptek Secure Communications, LLCInventor: Timothy C. Williams