Patents by Inventor Timothy Simon
Timothy Simon has filed for patents to protect the following inventions. This listing includes patent applications that are pending as well as patents that have already been granted by the United States Patent and Trademark Office (USPTO).
-
Publication number: 20120124217Abstract: An approach is provided that responds to a connection request to connect to an external network entity using a connection from a managed connection pool. The connection pool is managed by selecting connections from the connection pool that includes one or more currently unused connections with the external network entity. One of the selected connections is validated by comparing an idle time associated with each of the selected connections to a maximum idle time value corresponding to the external network entity. The maximum idle time value being previously identified at the information handling system. The validated connection is then used to connect to the external network entity to satisfy the connection request.Type: ApplicationFiled: November 17, 2010Publication date: May 17, 2012Applicant: INTERNATIONAL BUSINESS MACHINES CORPORATIONInventors: Timothy Simon Bartley, Scott Anthony Exton
-
Patent number: 8074336Abstract: A method of forming a torsional vibration damping disk, including the steps of: stamping a concave surface at a periphery of a disk; heat treating the stamped disk; placing at least one forming element at least partially in contact with at least a portion of the concave surface; and curling the periphery to partially surround the at least one forming element so that the at least one forming element is removable from the disk. In a second embodiment, the method includes the step of removing the at least one forming element after curling the periphery and includes the step of replacing the at least one forming element with at least one spring element.Type: GrantFiled: October 27, 2008Date of Patent: December 13, 2011Assignee: Schaeffler Technologies GmbH & Co., KGInventor: Timothy Simon
-
Patent number: 8065724Abstract: An unattended computer-based machine is authenticated by the present invention method, system or apparatus. The subject machine may be an auto-restarted machine or similar machine configured to be unattended. Upon receipt of initializing input from a user at a subject computer-based machine, a working process authenticates the user and generates resulting credentials. The working process stores the generated credentials in a memory area of the subject machine. Separate from and independent of the working process is a security monitor of the present invention. A monitoring module of the present invention monitors user activity on the subject machine and upon detecting suspect activity destroys the stored credentials of the working process. Suspect activity includes any activity raising a suspicion of compromise.Type: GrantFiled: December 14, 2007Date of Patent: November 22, 2011Assignee: International Business Machines CorporationInventors: Peter Theodore Waltenberg, Kenneth Stephen, Timothy Simon Bartley
-
Publication number: 20110146455Abstract: A fastener positioning device for a die block including a punch tube arranged to receive the fastener, at least one aperture extending radially out from the tube, at least one displaceable retainer disposed in the at least one aperture, and a resilient ring urging the at least one retainer towards an axis of the punch tube. In an example embodiment of the invention, the aperture includes a first diameter proximate the punch tube and a second, larger diameter radially outside of the first diameter. The retainer may be a ball, the resilient ring may be an O-ring, and the fastener may be a stud or nut.Type: ApplicationFiled: December 17, 2010Publication date: June 23, 2011Applicant: SCHAEFFLER TECHNOLOGIES GMBH & CO. KGInventors: Timothy SIMON, Raymond IMARS, Kenneth GLOECKNER
-
Publication number: 20100249820Abstract: A lancet holder 30 for use in a lancing device releasably to hold a lancet 32 includes a generally cylindrical sleeve 44 from the inner surface of which project three equi-spaced guide ribs/deflectors 50. Upon introducing a lancet 32 into the lancet holder the guide ribs/deflectors 50 nudge the lancet angularly to ensure that the ribs 36 on the lancet are slidably received in the gaps between the guide ribs/deflectors.Type: ApplicationFiled: June 20, 2008Publication date: September 30, 2010Applicant: OWEN MUMFORD LIMITEDInventor: Timothy Simon Evans
-
Publication number: 20100011932Abstract: A cutting punch sleeve including a bore with a first diameter at a first end and a second diameter, larger than the first diameter, at a second end, opposite the first end, and an outer surface with an indent. The bore is for receiving a cutting punch, the sleeve is locatable in a ball-lock assembly, and the indent is for engaging a ball in a ball-lock assembly to fix the sleeve in the ball-lock assembly. In one embodiment, at least a portion of the outer surface is matingly engageable with a surface for a recess in the ball-lock assembly. In another embodiment, a portion of the bore proximate the second end is shaped to matingly engage a head for the cutting punch.Type: ApplicationFiled: June 10, 2009Publication date: January 21, 2010Applicant: LuK Lamellen und Kupplungsbau Beteiligungs KGInventor: Timothy SIMON
-
Publication number: 20100011438Abstract: In one embodiment, a computer implemented method for role-based privilege management is provided. The computer implemented method receives a transformation request from a requester to form a received request, and identifies a target environment of the received request. The computer implemented method determines whether the target environment matches a predefined environment in a set of role-based privileges and, responsive to a determination that the target environment matches a predefined environment in the set of role-based privileges, maps the parameterized privileges from the set of role-based privileges to the target environment and performs the request.Type: ApplicationFiled: July 11, 2008Publication date: January 14, 2010Applicant: INTERNATIONAL BUSINESS MACHINES CORPORATIONInventors: Timothy Simon Bartley, Peter T. Cogill, Elizabeth M. Hughes, Philip A. J. Nye, Michael Andrew Powell
-
Publication number: 20090158389Abstract: An unattended computer-based machine is authenticated by the present invention method, system or apparatus. The subject machine may be an auto-restarted machine or similar machine configured to be unattended. Upon receipt of initializing input from a user at a subject computer-based machine, a working process authenticates the user and generates resulting credentials. The working process stores the generated credentials in a memory area of the subject machine. Separate from and independent of the working process is a security monitor of the present invention. A monitoring module of the present invention monitors user activity on the subject machine and upon detecting suspect activity destroys the stored credentials of the working process. Suspect activity includes any activity raising a suspicion of compromise.Type: ApplicationFiled: December 14, 2007Publication date: June 18, 2009Inventors: Peter Theodore Waltenberg, Kenneth Stephen, Timothy Simon Bartley
-
Publication number: 20090124981Abstract: An injection device comprises a housing (101) to (104) containing a syringe (24). The contents of the syringe (24) are viewable through a window (14) in the mid-section (102) of the housing. The window (14) is concealed by a slideable shutter (12). The slideable shutter (12) is biased by a bias spring (22) which also biases an internal syringe carrier. Also disclosed is a reversible needle cap which operates initially to cap the front end of the housing and, upon removal thereof, pulls a needle sheath (30) off the syringe needle (26). The cap is designed to be reversible so that, after use, it can be reversed and reconnected to the housing to cover the exposed needle.Type: ApplicationFiled: May 10, 2007Publication date: May 14, 2009Applicant: OWEN MUMFORD LIMITEDInventor: Timothy Simon Evans
-
Publication number: 20090107793Abstract: A method of forming a torsional vibration damping disk, including the steps of: stamping a concave surface at a periphery of a disk; heat treating the stamped disk; placing at least one forming element at least partially in contact with at least a portion of the concave surface; and curling the periphery to partially surround the at least one forming element so that the at least one forming element is removable from the disk. In a second embodiment, the method includes the step of removing the at least one forming element after curling the periphery and includes the step of replacing the at least one forming element with at least one spring element.Type: ApplicationFiled: October 27, 2008Publication date: April 30, 2009Applicant: LuK Lamellen und Kupplungsbau Beteiligungs KGInventor: Timothy Simon
-
Publication number: 20090056323Abstract: A ring portion of a torque converter shell having a first segment at a distal end of the ring portion, a second segment at a second end of the ring portion adjacent an annular portion of the shell, and a ribbed portion located axially between the first segment and the second segment, and extending in a radial direction beyond the first and second segments.Type: ApplicationFiled: August 21, 2008Publication date: March 5, 2009Applicant: LuK Lamellen and Kupplungsbau Beteiligungs KGInventors: Herbert Wolf, Timothy Simon, Mark Kollert
-
Patent number: 7454788Abstract: In this invention, when security policy is attached to a file, a device protection manager is given the protected file's name. If the file is a special device file, then the device manager records the device specification in a device database. When a device access occurs, the device specification is extracted from the special device file used in the access. This extracted device specification is then used to search the device database. If a matching device specification is found in the database and the accessed device file has the same name as the protected resource, then authorization policy rules on that resource determine the access. If the match is a different device file name from the protected file name for the same device, then the search continues until the exact accessed device is found or until all device specification matches are found.Type: GrantFiled: April 26, 2001Date of Patent: November 18, 2008Assignee: International Business Machines CorporationInventors: Rodney Carlton Burnett, Timothy Simon Bartley, Michael Powell
-
Publication number: 20070221744Abstract: A water timer user interface has display areas for display of water timer status information, including watering zone and watering duration indicators, user input areas, and a touch-sensitive screen. At least one of the display areas may display a graphical representation of the watering duration indicators for the watering zone identifiers. All of the display and input areas may be single-function areas and may be simultaneously visible to and accessible by a user. The display areas may simultaneously display both graphical and numeric representations of the watering duration indicators. An ambient temperature sensor may be used to sense the ambient temperature and humidity and provide corresponding signals to the controller to permit the controller to modify the amount of water supplied.Type: ApplicationFiled: May 23, 2007Publication date: September 27, 2007Applicant: Tim Simon, Inc.Inventors: Timothy Simon, Matthew Fisher, Blaine Smith
-
Patent number: 7260718Abstract: The method of the invention assumes there is a security manager and mechanism present for defining, attaching, and evaluating external authorization policy to file resources based on the file's path name. In this invention, protected symbolic links and the resources that the link points to are stored in a protected object database. When a system access attempt occurs, the file attribute is extracted from the file used in the access. The file attribute is then used to search the protected object database. If a matching system resource is found, and that resource is protected but does not have independent security policy on it, then the resource will have the security policy of a symbolic link that points to it. In this case, the security of each protected symbolic link pointing to the system resource has to grant access in order for allowance of the access attempt. This approach insures that the most restrictive outcome prevails.Type: GrantFiled: April 26, 2001Date of Patent: August 21, 2007Assignee: International Business Machines CorporationInventors: Rodney Carlton Burnett, Timothy Simon Bartley, Michael Powell
-
Patent number: 7226849Abstract: There is provided a method of producing multiple semiconductor components on a substrate, said method comprising the steps of: forming a predetermined relief pattern on a surface of said substrate; and epitaxially depositing a layer formed of a mixture of two or more Group III elements and two or more Group V elements on said surface; wherein said relief pattern results in said layer deposited in a single step forming with a different ratio between said Group V elements within areas having different relief pattern characteristics so as to provide different band gaps within said different areas.Type: GrantFiled: November 26, 2002Date of Patent: June 5, 2007Assignee: EPIIC LimitedInventors: Paul Nicholas Stavrinou, Timothy Simon Jones, Gareth Parry
-
Patent number: 7191337Abstract: An apparatus and method for wildcarded security policy are implemented. These include associating wildcarded resource identifiers with a corresponding security policy. A resource identifier received in an access request is matched to one of a list of said wildcarded resource identifiers, Matching is determined in accordance with a predetermined set of precedence values, each precedence value of the set corresponding to a predetermined wildcard element.Type: GrantFiled: June 30, 2001Date of Patent: March 13, 2007Assignee: International Business Machines CorporationInventor: Timothy Simon Bartley
-
Publication number: 20060217845Abstract: A water timer user interface has display areas for display of water timer status information, including watering zone and watering duration indicators, user input areas, and a touch-sensitive screen. At least one of the display areas may display a graphical representation of the watering duration indicators for the watering zone identifiers. All of the display and input areas may be single-function areas and may be simultaneously visible to and accessible by a user. The display areas may simultaneously display both graphical and numeric representations of the watering duration indicators. An ambient temperature sensor may be used to sense the ambient temperature and humidity and provide corresponding signals to the controller to permit the controller to modify the amount of water supplied.Type: ApplicationFiled: January 5, 2006Publication date: September 28, 2006Applicant: Tim Simon, Inc.Inventors: Timothy Simon, Matthew Fisher, Blaine Smith
-
Publication number: 20060196953Abstract: At least first and second thermostats may be operably coupled to one another and are capable of sharing their target temperatures and their temperature signals. The first thermostat may provide a thermostatic control signal to the air temperature control system. In some embodiments at least one thermostat further comprises a target-temperature-modifying occupant presence detector. Some embodiments further comprise first and second air movement control devices operably coupled to and controlled by the first and second thermostats, respectively. The operation of the stages of a multistage air temperature control system may be controlled.Type: ApplicationFiled: January 19, 2006Publication date: September 7, 2006Applicant: Tim Simon, Inc.Inventors: Timothy Simon, Blaine Smith, Matthew Fisher
-
Publication number: 20060186214Abstract: A thermostat may be placed in a heating mode when the sensed temperature is less than the lowest of the heating and cooling target temperatures by a first amount and may be placed in a cooling mode when the sensed temperature is greater than the highest of the heating and cooling target temperatures by a second amount. The presence or absence of a user may be monitored. If the thermostat is in a user absent mode, a cool setback amount may be added to the cooling target temperature and a heat setback amount may be subtracted from the heating target temperature to arrive at setback cooling and setback heating target temperatures, respectively. The thermostat may comprise a touch-sensitive screen having various display areas.Type: ApplicationFiled: January 19, 2006Publication date: August 24, 2006Applicant: Tim Simon, Inc.Inventors: Timothy Simon, Blaine Smith, Matthew Fisher
-
Publication number: 20060178781Abstract: A water timer comprises a user interface, having a user input region, and a controller, coupled to the user interface and programmed to provide flow control device control signals. The controller is programmed to permit the following steps by a user: (a) selecting a zone; (b) selecting a first watering duration for the zone; (c) selecting a first start time for the zone and the first watering duration; and (d) selecting a first day of the week for the first start time. The controller is also programmed to permit the above selecting steps (a), (b), (c) and (d) by a user in any order. The invention includes other aspects.Type: ApplicationFiled: January 5, 2006Publication date: August 10, 2006Applicant: Tim Simon, Inc.Inventors: Timothy Simon, Matthew Fisher, Blaine Smith