Patents by Inventor Timothy Sherwood
Timothy Sherwood has filed for patents to protect the following inventions. This listing includes patent applications that are pending as well as patents that have already been granted by the United States Patent and Trademark Office (USPTO).
-
Publication number: 20230142662Abstract: The steps of providing a cleaning device, a liquid proportioning device and a series of tanks filled with liquids. The cleaning device has a nozzle, a series of hoses and a pump. The liquid proportioning device includes a series of passageways, having three chambers and two valves, and a manifold for mixing the liquids to form a cleaning solution. The passageways include knobs to set the ratio of each liquid that the user desires to mix into a cleaning solution. Once the cleaning solution is mixed, it is fed through a pump to cleaning device for use. The proportioning device allows a user to easily, quickly and accurately mix liquids to form a cleaning solution.Type: ApplicationFiled: December 31, 2022Publication date: May 11, 2023Inventor: Timothy Sherwood Aselton, II
-
Patent number: 10289873Abstract: The present disclosure includes systems and techniques relating to information flow and hardware security for digital devices and microprocessor systems. In general, in one implementation, a technique includes: receiving a hardware design specifying an implementation for information flow in a hardware configuration; receiving one or more labels annotating the hardware design; receiving a security property specifying a restriction relating to the one or more labels for implementing a secure information flow in the hardware configuration; designating each of the one or more labels to a corresponding security level in accordance with the specified restriction; and automatically assigning a respective value to each of the one or more labels in the hardware design, wherein each respective value is determined in accordance with the corresponding security level designated for each of the one or more labels.Type: GrantFiled: April 28, 2016Date of Patent: May 14, 2019Assignee: Tortuga Logic Inc.Inventors: Jason K. Oberg, Jonathan Valamehr, Ryan Kastner, Timothy Sherwood
-
Patent number: 10083305Abstract: A preferred method for providing multi-level security to a gate level information flow receives or specifies a security lattice having more than two security levels. The security lattice defines how security levels relate to each other. A hardware design implementing information flows including flows having security levels specified by the security lattice is received. Logic is created for testing the hardware design in view of the security lattice. A logic function is created based upon the hardware design and the logic for testing to implement the security lattice. Another method receives a hardware design in a hardware description language. At least a portion of the hardware design is synthesized to gate level primitives. Functional component tracking logic supporting more than two-security levels is built from the gate level primitives. Functional components in the hardware design are simulated with the functional component tracking logic.Type: GrantFiled: March 14, 2014Date of Patent: September 25, 2018Assignee: The Regents of the University of CaliforniaInventors: Ryan Kastner, Jason Oberg, Wei Hu, Timothy Sherwood, Mohit Tiwari
-
Publication number: 20180221839Abstract: The steps of providing a cleaning device, a liquid proportioning device and a series of tanks filled with liquids. The cleaning device has a nozzle, a series of hoses and a pump. The liquid proportioning device includes a series of passageways, having three chambers and two valves, and a manifold for mixing the liquids to form a cleaning solution. The passageways include knobs to set the ratio of each liquid that the user desires to mix into a cleaning solution. Once the cleaning solution is mixed, it is fed through a pump to cleaning device for use. The proportioning device allows a user to easily, quickly and accurately mix liquids to form a cleaning solution.Type: ApplicationFiled: June 16, 2016Publication date: August 9, 2018Inventor: Timothy Sherwood Aselton, II
-
Publication number: 20170316227Abstract: The present disclosure includes systems and techniques relating to information flow and hardware security for digital devices and microprocessor systems. In general, in one implementation, a technique includes: receiving a hardware design specifying an implementation for information flow in a hardware configuration; receiving one or more labels annotating the hardware design; receiving a security property specifying a restriction relating to the one or more labels for implementing a secure information flow in the hardware configuration; designating each of the one or more labels to a corresponding security level in accordance with the specified restriction; and automatically assigning a respective value to each of the one or more labels in the hardware design, wherein each respective value is determined in accordance with the corresponding security level designated for each of the one or more labels.Type: ApplicationFiled: April 28, 2016Publication date: November 2, 2017Inventors: Jason K. Oberg, Jonathan Valamehr, Ryan Kastner, Timothy Sherwood
-
Patent number: 9305166Abstract: A method for detecting a timing channel in a hardware design includes synthesizing the hardware design to gate level. Gate level information flow tracing is applied to the gate level of the hardware design via a simulation to search for tainted flows. If a tainted flow is found, a limited number of traces are selected. An input on the limited number of traces is simulated to determine whether the traces are value preserving with respect to taint inputs, and to determine that a timing flow exists if the traces are value preserving with respect to the taint inputs.Type: GrantFiled: March 7, 2014Date of Patent: April 5, 2016Assignee: The Regents of the University of CaliforniaInventors: Ryan Kastner, Jason Oberg, Sarah Meiklejohn, Timothy Sherwood
-
Publication number: 20160026801Abstract: A preferred method for providing multi-level security to a gate level information flow receives or specifies a security lattice having more than two security levels. The security lattice defines how security levels relate to each other. A hardware design implementing information flows including flows having security levels specified by the security lattice is received. Logic is created for testing the hardware design in view of the security lattice. A logic function is created based upon the hardware design and the logic for testing to implement the security lattice. Another method receives a hardware design in a hardware description language. At least a portion of the hardware design is synthesized to gate level primitives. Functional component tracking logic supporting more than two-security levels is built from the gate level primitives. Functional components in the hardware design are simulated with the functional component tracking logic.Type: ApplicationFiled: March 14, 2014Publication date: January 28, 2016Inventors: Ryan Kastner, Jason Oberg, Wei Hu, Timothy Sherwood
-
Publication number: 20150178511Abstract: Methods and systems are disclosed herein for a media guidance application that responds to requests for biometric measurements of a user from various entities by referencing privacy settings associated with the various biometric measurements to determine whether or not to share a particular biometric measurement with each of the entities.Type: ApplicationFiled: December 20, 2013Publication date: June 25, 2015Applicant: UNITED VIDEO PROPERTIES, INC.Inventors: Walter R. Klappert, Rodney Gaidies, Mark Maslyn, Robert Brooks, Timothy Sherwood
-
Publication number: 20140259161Abstract: A method for detecting a timing channel in a hardware design includes synthesizing the hardware design to gate level. Gate level information flow tracing is applied to the gate level of the hardware design via a simulation to search for tainted flows. If a tainted flow is found, a limited number of traces are selected. An input on the limited number of traces is simulated to determine whether the traces are value preserving with respect to taint inputs, and to determine that a timing flow exists if the traces are value preserving with respect to the taint inputs.Type: ApplicationFiled: March 7, 2014Publication date: September 11, 2014Inventors: Ryan Kastner, Jason Oberg, Sarah Meiklejohn, Timothy Sherwood, Mohit Tiwari
-
Patent number: 8719537Abstract: Techniques are described for controlling availability of memory. As memory write operations are processed, the contents of memory targeted by the write operations are read and compared to the data to be written. The availability of the memory for subsequent write operations is controlled based on the outcomes of the comparing. How many concurrent write operations are being executed may vary according to the comparing. In one implementation, a pool of tokens is maintained based on the comparing. The tokens represent units of power. When write operations require more power, for example when they will alter the values of more cells in PCM memory, they draw (and eventually return) more tokens. The token pool can act as a memory-availability mechanism in that tokens must be obtained for a write operation to be executed. When and how many tokens are reserved or recycled can vary according to implementation.Type: GrantFiled: August 7, 2013Date of Patent: May 6, 2014Assignee: Microsoft CorporationInventors: Gabriel H. Loh, Douglas Burger, Timothy Sherwood, Karin Strauss
-
Publication number: 20130326185Abstract: Techniques are described for controlling availability of memory. As memory write operations are processed, the contents of memory targeted by the write operations are read and compared to the data to be written. The availability of the memory for subsequent write operations is controlled based on the outcomes of the comparing. How many concurrent write operations are being executed may vary according to the comparing. In one implementation, a pool of tokens is maintained based on the comparing. The tokens represent units of power. When write operations require more power, for example when they will alter the values of more cells in PCM memory, they draw (and eventually return) more tokens. The token pool can act as a memory-availability mechanism in that tokens must be obtained for a write operation to be executed. When and how many tokens are reserved or recycled can vary according to implementation.Type: ApplicationFiled: August 7, 2013Publication date: December 5, 2013Applicant: MICROSOFT CORPORATIONInventors: Gabriel H. Loh, Douglas Burger, Timothy Sherwood, Karin Strauss
-
Patent number: 8521981Abstract: Techniques are described for controlling availability of memory. As memory write operations are processed, the contents of memory targeted by the write operations are read and compared to the data to be written. The availability of the memory for subsequent write operations is controlled based on the outcomes of the comparing. How many concurrent write operations are being executed may vary according to the comparing. In one implementation, a pool of tokens is maintained based on the comparing. The tokens represent units of power. When write operations require more power, for example when they will alter the values of more cells in PCM memory, they draw (and eventually return) more tokens. The token pool can act as a memory-availability mechanism in that tokens must be obtained for a write operation to be executed. When and how many tokens are reserved or recycled can vary according to implementation.Type: GrantFiled: December 16, 2010Date of Patent: August 27, 2013Assignee: Microsoft CorporationInventors: Karin Strauss, Douglas Burger, Timothy Sherwood, Gabriel Loh
-
Publication number: 20120159057Abstract: Techniques are described for controlling availability of memory. As memory write operations are processed, the contents of memory targeted by the write operations are read and compared to the data to be written. The availability of the memory for subsequent write operations is controlled based on the outcomes of the comparing. How many concurrent write operations are being executed may vary according to the comparing. In one implementation, a pool of tokens is maintained based on the comparing. The tokens represent units of power. When write operations require more power, for example when they will alter the values of more cells in PCM memory, they draw (and eventually return) more tokens. The token pool can act as a memory-availability mechanism in that tokens must be obtained for a write operation to be executed. When and how many tokens are reserved or recycled can vary according to implementation.Type: ApplicationFiled: December 16, 2010Publication date: June 21, 2012Applicant: MICROSOFT CORPORATIONInventors: Gabriel H. Loh, Douglas Burger, Karin Strauss, Timothy Sherwood
-
Patent number: 7802236Abstract: A method and architecture for analyzing a computer program by finding similar sections of execution of the computer program. Code of the computer program is run over a plurality of intervals of execution, and during the execution of the program, a statistic is tracked for a component. Using the tracked statistic, behavior of the computer program is identified over each of the plurality of intervals of execution, and at least one identified behavior of at least one interval of execution is compared to the behavior of another interval of execution to find similar sections of behavior.Type: GrantFiled: September 9, 2003Date of Patent: September 21, 2010Assignee: The Regents of the University of CaliforniaInventors: Brad Calder, Timothy Sherwood, Erez Perelman, Gregory Hamerly
-
Patent number: 7475394Abstract: A method for analyzing the performance of a program when running in an interpreted environment. An interpreter is a program that translates and executes another program. To analyze a binary in an interpreted environment, a mechanism is used to indicate points in the program at source, intermediate, or binary showing where information about the system is to be tracked/profiled/analyzed. Once these analysis points are determined, triggers are created in a separate file or inserted via program instrumentation into the binary to indicate to the interpreter when the analysis triggers need to be processed. The system being analyzed is then run via an interpreter. When one of these triggers occurs during execution, the interpreter calls analysis code passing it the appropriate information so that it may track statistics, metrics, and information about the program corresponding to the trigger.Type: GrantFiled: December 5, 2003Date of Patent: January 6, 2009Assignee: ARM LimitedInventors: Brad Calder, Todd Austin, Don Yang, Timothy Sherwood
-
Publication number: 20080053469Abstract: A smoking article such as a cigarette comprises a tobacco rod and a filter component having a cavity filled with spherical beaded carbon. As mainstream tobacco smoke is drawn through the filter component, targeted gas phase smoke constituents are removed as the smoke passes through the carbon. During the filter manufacturing process the spherical beaded carbon flows like a liquid and substantially completely fills the cavity. Point-to-point contact between the spherical beads together with substantially complete filling of the cavity produces minimal channeling of ambulatory gas phase as well as maximum contact between the gas phase and the carbon surface of the spherical beads during smoking.Type: ApplicationFiled: October 31, 2007Publication date: March 6, 2008Applicant: Philip Morris USA Inc.Inventors: John Paine, Zuyin Yang, Kent Koller, Jay Fournier, Charles Thomas, Timothy Sherwood, Zhaohua Luan, Shuzhong Zhuang, Jose Nepomuceno, Diane Gee, Georgios Karles
-
Publication number: 20070233628Abstract: A pattern matching technique for high throughput network processing includes a simple yet powerful special purpose architecture and a set of novel string matching algorithms that can work in unison. The novel set of algorithms allow for bit-level partitioning of rules such that may be more easily implemented in hardware or software. The result is a device that maintains tight worst case bounds on performance, can be updated with new rules without interrupting operation, compiles in seconds instead of hours, and is ten times more efficient than the existing best known solutions in this area.Type: ApplicationFiled: March 7, 2007Publication date: October 4, 2007Inventors: Timothy Sherwood, Lin Tan
-
Publication number: 20070102017Abstract: A cigarette and cigarette paper have a plurality of multilayer bands formed by printing a highly viscous aqueous film-forming composition. After heating the composition to lower its viscosity, the bands are applied to the cigarette paper by gravure printing the composition. The composition is quenched and gelatinized by contact with the cool cigarette paper reducing absorption of water by the paper and reducing wrinkling, cockling, and waviness. Multiple gravure printed layers may be used to form the bands.Type: ApplicationFiled: August 9, 2006Publication date: May 10, 2007Inventors: Timothy Sherwood, Firooz Rasouli, Ping Li, Don Miser, Joe Mohajer, Bruce Waymack, Tony Phan, Tracy Madison, John Tilley, Yezdi Pithawalla
-
Publication number: 20060260626Abstract: A composite for use in smoking articles such as cigarettes is described comprising a zeolite membrane coated upon an activated carbon-containing substrate. The substrate may be a fiber, fabric, particle, granule or monolith. The composite is prepared by contacting zeolite precursors with the substrate and hydrothermally synthesizing the membrane upon the substrate. The substrate may be pretreated to provide activation sites for adhesion and growth of the membrane. By selection of the zeolite components, the composite may be tailored to selectively remove constituents of tobacco smoke while simultaneously controlling access to the substrate thereby prolonging the shelf life of the activated carbons.Type: ApplicationFiled: December 20, 2005Publication date: November 23, 2006Inventors: Zhaohua Luan, Jay Fournier, Shuzhong Zhuang, Timothy Sherwood, John Paine
-
Publication number: 20060180164Abstract: A smoking article such as a cigarette comprises a tobacco rod and a filter component having a cavity filled with spherical beaded carbon. As mainstream tobacco smoke is drawn through the filter component, targeted gas phase smoke constituents are removed as the smoke passes through the carbon. During the filter manufacturing process the spherical beaded carbon flows like a liquid and substantially completely fills the cavity. Point-to-point contact between the spherical beads together with substantially complete filling of the cavity produces minimal channeling of ambulatory gas phase as well as maximum contact between the gas phase and the carbon surface of the spherical beads during smoking.Type: ApplicationFiled: April 11, 2006Publication date: August 17, 2006Applicant: Philip Morris USA Inc.Inventors: John Paine, Zuyin Yang, Kent Koller, Jay Fournier, Charles Thomas, Timothy Sherwood, Zhaohua Luan, Shuzhong Zhuang, Jose Nepomuceno, Diane Gee, Georgios Karles