Bergerson, MN
Jennifer Bergerson, Mounds View, MN US
Patent application number | Description | Published |
---|---|---|
20130319467 | ACIDIC COMPOSITIONS INCLUDING REDUCING AGENTS FOR ELIMINATION OF HARD WATER SCALE AND DECOLORIZATION OF METAL STAINS - An acidic destaining composition for removing hard water and metal stains is disclosed. The composition comprises an acid in combination with a reducing agent and may preferably be formulated as a solid. | 12-05-2013 |
Robert Bergerson, Blaine, MN US
Patent application number | Description | Published |
---|---|---|
20110289304 | SYSTEMS, METHODS, AND COMPUTER PROGRAM PRODUCTS FOR CONFIGURING NETWORK SETTINGS - A computer program product having a computer readable medium tangibly recording computer program logic for managing configurations in a computer system is disclosed. The computer program product includes code to configure network information in a first Operating System (OS) environment, code to pass the network information to a second OS environment, and code to effectuate the network information in the first and second OS environments without rebooting the first and second OS environments. | 11-24-2011 |
20120102368 | COMMUNICATING ERRORS BETWEEN AN OPERATING SYSTEM AND INTERFACE LAYER - Error information may be made quickly and easily accessible to an administrator by logging communications attempts in the operating system of a server. When the interface processor resides outside of the operating system, the interface processor may provide indications to the operating system of communications attempts. Specifically, the interface processor may provide message packets to the pass-through communications processor of the operating system when SSL/TLS communications attempts fail to establish secure communications sessions. The message packets may include information useful for diagnosing errors in SSL/TLS communication failures such as errors in the creation and management of certificates, certificate trust, private and public keys, and/or cipher suites. The communications logs in the operating system may be reviewed and/or analyzed by an administrator with a log trace analysis application. | 04-26-2012 |
20130060558 | UPDATING OF INTERFACES IN NON-EMULATED ENVIRONMENTS BY PROGRAMS IN THE EMULATED ENVIRONMENT - Updates to components of an interface may be carried out from a program executed in an emulated environment. For example, an interface that provides communications for the program in the emulated environment to the host operating system may be updated from the program in the emulated environment. Centralizing updates through the program improves the likelihood that components, such as the interface, have compatible versions with the program executing in the emulated environment. Thus, as the program is updated other components are updated by the program. | 03-07-2013 |
20130166272 | NETWORK PACKET CAPTURE IN EMULATED ENVIRONMENTS - Communications between an application executing in an emulated environment in an operating system and a network stack in the operating system may be improved to allow the application access to additional information. The application may be able to access a network traffic log of the operating system, including contents of packets transmitted and received for the application. The network traffic log may be transmitted to the application by a non-emulated interface executing in the operating system. The application may merge the contents of the network traffic log with an internal application log based on matching similar events between the two logs. | 06-27-2013 |
20130326212 | HELPER APPLICATIONS FOR DATA TRANSFERS OVER SECURE DATA CONNECTIONS - Data rates in secure data communications may be improved by executing helper applications to assist a computer system in responding to requests for secure data. The computation-intensive calculations may be offloaded to helper applications executing on different central processor units (CPUs). When the helper applications execute on different CPUs, higher data rates are achievable because additional CPU time is available for handling the encryption and decryption processing. A main application receives the initial request for secure data connections and assigns tasks related to the connections to the helper applications. | 12-05-2013 |
Robert Bergerson, Roseville, MN US
Robert L. Bergerson, Blaine, MN US
Patent application number | Description | Published |
---|---|---|
20100146250 | DYNAMIC UPDATING OF TRUSTED CERTIFICATES AND CERTIFICATE REVOCATION LISTS IN A COMPUTING SYSTEM - This application generally describes techniques for dynamically updating trusted certificates and CRLs, generally referred to herein as certificate information. That is, techniques are described for updating trusted certificates and CRLs without terminating existing communication sessions. An exemplary method includes the steps of receiving an initial configuration that includes a trusted certificate authority, receiving certificate information that includes a certificate revocation list (CRL) and a first certificate from the trusted certificate authority, storing the certificate information in the configuration, initiating a communication session for an application, receiving an update to the certificate information, and updating the configuration to reflect the update to the certificate information without terminating the communication session. A computing device may receive the update to the certificate information from a user, as well as receiving a command from the user to apply the update to the certificate information to current communication sessions. | 06-10-2010 |
20100146588 | MAPPING PROPRIETARY SSL APIS ONTO OPENSSL APIS - Techniques are described for mapping an emulated SSL implementation to, for example, OpenSSL. An exemplary method includes receiving a request to initiate a communication session from an application, running in an emulation environment, with a first SSL API of an emulated SSL implementation running in the emulation environment, sending the request to a communication interface process that is running in a base computing environment, wherein the emulation environment is a process running on the base computing environment, extracting, with the communication interface process, communication session information from the request, calling, with the communication interface process, procedures provided by a second SSL API of an SSL implementation, in accordance with the request, to initiate a communication session with a computing device, wherein the SSL implementation is a program running in the base computing environment, initiating the communication session with the computing device, and transferring data to the computing device. | 06-10-2010 |
Robert L. Bergerson, Roseville, MN US
Patent application number | Description | Published |
---|---|---|
20140325232 | REQUESTING AND STORING CERTIFICATES FOR SECURE CONNECTION VALIDATION - A client system may be configured to request a certificate from a server system and store the certificate locally. The stored certificate may be used to later authenticate a secure connection between the client system and the server system. The secure connection validated by the stored certificate may be, for example, a secure sockets layer/transport layer security (SSL/TLS) connection. | 10-30-2014 |
20140380421 | Insecure Connection Prohibition - A server system may be configured to receive a request for a connection from a client application. The server system may also be configured to determine if the client application is permitted to connect with the server. The connection with the client application may be prohibited if the server determines that the client application is not permitted to connect with the server. A secure connection with the client application may be permitted if the server determines that the client application is permitted to connect with the server. The secure connection may be established with the security protocol settings specified by a process on the server or shared security protocol settings specified by on a server system-wide basis. | 12-25-2014 |
William Bergerson, Apple Valley, MN US
Patent application number | Description | Published |
---|---|---|
20150217549 | TRANSFER LAMINATION - In a method of laminating a transfer layer to a substrate, a transfer layer is provided on a carrier layer. Portions of the transfer layer are selectively removed from the carrier layer using an adhesive panel by heating portions of the adhesive panel corresponding to the portions of the transfer layer, and transferring the portions of the transfer layer from the carrier layer to the adhesive panel. A transfer section of the transfer layer is then transferred from the carrier layer to a surface of the substrate by fracturing the transfer layer along an edge of the transfer section. | 08-06-2015 |