Sherman, WA
Jeffrey Sherman, Duvall, WA US
Patent application number | Description | Published |
---|---|---|
20130254710 | STACKS FOR CONTENT ORGANIZATION - Stacks that associate different electronic content are created using tags that are associated with electronic content. Stacks may be personal, organizational and/or shared. A tag may be associated with different types of electronic content (e.g. documents, people, contacts, meetings, emails, . . . ) that may be stored in different locations. The tag acts as an identifier that travels with the content as the electronic content is used. Content may be automatically/manually tagged. As the tagged content is used, the different applications that interact with the content (e.g. a messaging application, a content application) can use the tag to perform different actions. Changes to content with a tag may be aggregated such that users looking at the “consolidated” view can see all changes made to content or activity related to that content. | 09-26-2013 |
Joseph Sherman, Redmond, WA US
Patent application number | Description | Published |
---|---|---|
20130124797 | VIRTUAL DISKS CONSTRUCTED FROM UNUSED DISTRIBUTED STORAGE - A virtual disk is comprised of segments of unused capacity of physical computer-readable storage media co-located with computing devices that are communicationally coupled to one another through network communications. The computing devices execute one or more of a client process, a storage process and a controller process. The controller processes manage the metadata of the virtual disk, including a virtual disk topology that defines the relationships between certain ones of the physical computer-readable storage media and a particular virtual disk. The client process provide data for storage to certain ones of the computing devices executing the storage processes, as defined by a virtual disk topology, and also read data from storage from those computing devices. The client process additionally expose the virtual disk in the same manner as any other computer-readable medium. | 05-16-2013 |
Joseph M. Sherman, Redmond, WA US
Patent application number | Description | Published |
---|---|---|
20130086404 | POWER REGULATION OF POWER GRID VIA DATACENTER - One or more techniques and/or systems are provided for regulating an amount of power on a power grid using a datacenter. This allows demand to be more closely brought into alignment with supply. For example, when supply exceeds demand by a predetermined level, the datacenter may increase consumption, causing demand to increase, and when demand exceeds supply and/or comes within a predetermined threshold of supply, the datacenter may decrease consumption, causing demand to decrease. In this way, the datacenter can be utilized as a regulatory tool on the grid. It may be appreciated that given the technology used by and/or operations performed by datacenters, datacenters are uniquely situated to achieve these ends as compared to other (large) energy consumers, such as manufacturing facilities that cannot shift around and/or shut-down operations swiftly. | 04-04-2013 |
Lawrence D. Sherman, Bellevue, WA US
Patent application number | Description | Published |
---|---|---|
20090069856 | DEVICES, SYSTEMS AND METHODS FOR CHARACTERIZATION OF VENTRICULAR FIBRILLATION AND FOR TREATMENT OF VENTRICULAR FIBRILLATION - A defibrillation system for use in treatment of ventricular fibrillation includes at least one sensor to measure heart rhythm; at least one applicator to apply a defibrillation pulse to a patient; and at least one processor in communication with the sensor and the applicator to determine a first value related to the rate of change of a leading edge of a lagged phase space reconstruction of ventricular fibrillation heart rhythm measured over a period of time. | 03-12-2009 |
20140066799 | SCHEMA FOR USING DYNAMIC COLOR AND PATTERN BACKGROUNDS FOR ELECTROCARDIOGRAM DISPLAYS AND ASSOCIATED SYSTEMS AND METHODS - The present technology is generally directed to schemas for using dynamic color and pattern backgrounds for electrocardiogram display and associated systems and methods. In a particular embodiment, a method of displaying an electrocardiogram rhythm can include receiving an electrocardiogram signal and applying an algorithm to the signal to determine a rhythm diagnosis or recommended therapy. The method can further include displaying a color and/or a pattern corresponding to the rhythm diagnosis or recommended therapy. In various embodiments, the method can be performed in real time or on a pre-recorded signal for post-event analysis. | 03-06-2014 |
Lawrence Duane Sherman, Bellevue, WA US
Patent application number | Description | Published |
---|---|---|
20140207012 | SYSTEMS AND METHODS FOR ANALYZING ELECTROCARDIOGRAMS TO DETECT VENTRICULAR FIBRILLATION - The present technology describes various embodiments of systems and methods for analyzing electrocardiograms to detect ventricular fibrillation. In several embodiments, systems for detecting ventricular fibrillation can be implemented without interrupting cardiopulmonary resuscitation. In one embodiment, a method of identifying a cardiac rhythm in a person includes recording an electrocardiogram signal of the person and stratifying the signal. A signal having a parameter value within a pre-determined range is categorized as a shockable ventricular fibrillation signal while a signal having a parameter value outside the pre-determined range is categorized as a non-shockable signal. | 07-24-2014 |
Nathan C. Sherman, Sammamish, WA US
Patent application number | Description | Published |
---|---|---|
20100002884 | Optical Out-Of-Band Key Distribution - One aspect of the disclosure relates to an out-of-band communication system and associated process. The out-of-band communication system includes an encrypted data path that is configured to convey encrypted data. The out-of-band communication system includes an optical out-of-band channel that is physically distinct from the encrypted data path. The encrypted data path extends between an optical transmitter and an optical receiver. The optical out-of-band channel is configured to transmit key information from the optical transmitter to the optical receiver. | 01-07-2010 |
20140354550 | RECEIVING CONTEXTUAL INFORMATION FROM KEYBOARDS - Disclosed are techniques and systems for obtaining contextual information at least in part from a keyboard, to improve typing efficiencies and user experience. The contextual information may include keyboard attributes, typing metadata, user actions, and the like. The keyboard may be configured to detect an input event at the keyboard. A human interface device (HID) stack is configured to receive the contextual information, and a keyboard manager is configured to determine an output based at least in part on the input event and the contextual information. The output may be a most probable function (non-text-based output), or character or word (text-based output) that can be suggested or used to auto-correct application data. In some embodiments, the user action received in the contextual information may be translated to a gesture to manipulate application data. | 12-04-2014 |
Nathan C. Sherman, Bellevue, WA US
Patent application number | Description | Published |
---|---|---|
20090096640 | KEYBOARD WITH PLURAL KEY SWITCH MATRICES TO DETECT GHOSTING - Keyboard apparatus and methods for processing keyboard depressions are disclosed. One disclosed keyboard apparatus includes a keyboard having a plurality of keys configured to be depressed in a concurrent depression state, and a plurality of key switch matrices. Each key switch of the plurality of key switch matrices may be configured to be actuated by a corresponding key of the keyboard. The keyboard apparatus may further include a keyboard controller configured to determine whether a sensed key depression in the concurrent depression state is a ghost key depression, based on sensed key switch states of respective key switches in each of the plurality of key switch matrices which correspond to the sensed key depression. | 04-16-2009 |
20090260077 | SECURITY-ENHANCED LOG IN - A security-enhanced login technique that provides a convenient and easy-to-use two factor technique to enhance the security of passwords without requiring any changes on the server side of a client-server network. The technique employs a convenient and easy-to-use two-factor technique to generate strong passwords for Web and other applications. In this technique, a convenient or personal device such as a mouse is used as the other factor besides a user password. A secret stored in the mouse or other personal device is hashed together with the password entered by a user and the server ID, to generate a strong, server-specific password which is used to authenticate the user to the server. This password enhancement operation is carried out inside the personal device. | 10-15-2009 |
20100031320 | USER INDICATOR SIGNIFYING A SECURE MODE - Computer-readable media, computerized methods, and computer systems for alerting a user that an operating system has entered a secure mode is provided. Initially, inputs are received at an operating system residing in a default mode. Typically, the default mode allows applications running on the operating system to access the inputs. If the inputs are identified as a call to perform a protected operation, the operating system is transitioned from the default mode to the secure mode. Typically, the secure mode restricts the applications from intercepting the inputs. The transition to the secure mode is automatically communicated to the user via an indicator device. Generally, automatic communication includes providing a message from the operating system to the indicator device over a secure pathway that triggers the indicator device to generate a user-perceivable output. Accordingly, the operating system exerts exclusive control over the operation of the indicator device. | 02-04-2010 |
20100045490 | CONTINUOUS AUTOMATIC KEY CONTROL - Architecture for enabling continuous operation of a control command issued by a control input (e.g., a control key on a computer keyboard or game controller). For example, for a user of a software application (e.g., a gaming application), an activation modifier is used for enabling continuous operation of the control command. The activation modifier can be a lock key or other type of input used in combination with the control key. During continuous operation of the control command, one or more alternate control inputs (e.g., from alternate control keys) are enabled to concurrently issue alternate control commands to the software application. | 02-25-2010 |
20100242102 | Biometric credential verification framework - Use of a biometric identification device in a client computer system to subsequently access an authentication system includes receiving biometric sample data which is digitally signed and combining the data with a user ID and PIN. This package of data is then securely transmitted to a biometric matching server to validate the user and the biometric sample. Once validated, the biometric matching server return the data package plus a temporary certificate and a public/private key pair to the client computer. The client computer may then use this information to access an authentication system to subsequently gain access to a secure resource. | 09-23-2010 |
20110231585 | METHOD AND APPARATUS FOR DETECTING THE TYPE OF INTERFACE TO WHICH A PERIPHERAL DEVICE IS CONNECTED - A peripheral device is connectable to a computer having one of a first interface and a second interface. The first interface communicates with the peripheral device over a differential data connection having a first data conductor and a second data conductor. The second interface communicates with the peripheral device over a clock conductor and a single ended data connection which includes a data conductor. The peripheral device has first and second communication conductors configured for connection to the first and second data conductors in the differential data connection when the computer includes the first interface and is configured for connection to the first data conductor in the single ended data connection and the clock conductor when the computer is provided with the second interface. The peripheral device includes an interface detection component coupled to the first and second communication conductors and configured to detect which of the first and second interfaces the peripheral device is connected to. The peripheral device also includes a controller component configured to communicate between the peripheral device according to a protocol corresponding to the detected interface. | 09-22-2011 |
20120124247 | METHOD AND APPARATUS FOR DETECTING THE TYPE OF INTERFACE TO WHICH A PERIPHERAL DEVICE IS CONNECTED - A peripheral device is connectable to a computer having one of a first interface and a second interface. The first interface communicates with the peripheral device over a differential data connection having a first data conductor and a second data conductor. The second interface communicates with the peripheral device over a clock conductor and a single ended data connection which includes a data conductor. The peripheral device has first and second communication conductors. The peripheral device includes an interface detection component coupled to the first and second communication conductors and configured to detect which of the first and second interfaces the peripheral device is connected to. | 05-17-2012 |
20120295711 | CONTINUOUS AUTOMATIC KEY CONTROL - Architecture for enabling continuous operation of a control command issued by a control input (e.g., a control key on a computer keyboard or game controller). For example, for a user of a software application (e.g., a gaming application), an activation modifier is used for enabling continuous operation of the control command. The activation modifier can be a lock key or other type of input used in combination with the control key. During continuous operation of the control command, one or more alternate control inputs (e.g., from alternate control keys) are enabled to concurrently issue alternate control commands to the software application. | 11-22-2012 |
20130232350 | Accessory Device Authentication - Accessory device authentication techniques are described. In one or more embodiments, connection of an accessory device to a host computing device is detected. Responsive to the detection, an authentication sequence may occur to verify an identity and/or capabilities of the accessory device. Upon successful authentication of the accessory device, the host device may authorize the accessory device for power exchange interactions with the host device. The host device may then draw supplemental power from a power source associated with the authorized accessory device, such as a battery or power adapter. The host device may also enable the accessory device to obtain and use power supplied by the host device in some scenarios. Power exchange between a host device and an authorized accessory may be managed in accordance with capabilities of the accessory device that are identified during authentication. | 09-05-2013 |
20130232571 | Accessory Device Authentication - Accessory device authentication techniques are described. In one or more embodiments, connection of an accessory device to a host computing device is detected. Responsive to the detection, an authentication sequence may occur to verify an identity and/or capabilities of the accessory device. Upon successful authentication of the accessory device, the host device may authorize the accessory device for power exchange interactions with the host device. The host device may then draw supplemental power from a power source associated with the authorized accessory device, such as a battery or power adapter. The host device may also enable the accessory device to obtain and use power supplied by the host device in some scenarios. Power exchange between a host device and an authorized accessory may be managed in accordance with capabilities of the accessory device that are identified during authentication. | 09-05-2013 |
Paul Sherman, Seattle, WA US
Patent application number | Description | Published |
---|---|---|
20090011394 | LIMB HEMORRHAGE TRAUMA SIMULATOR - A limb hemorrhage trauma simulator provides didactic and hands-on training for the prehospital treatment of a limb trauma victim. The simulator realistically simulates a wounded limb, providing simulated pulse and hemorrhage blood flow. The simulator provides a simulated scenario in which the wound occurred. The student then responds to the scenario by treating the limb via direct pressure, tourniquet, and/or wound analysis. The simulator modifies hemorrhage blood flow and pulse in response to direct or tourniquet pressure applied to the limb. The simulator records the student's actions to provide feedback and grade the student's response. | 01-08-2009 |
20140222458 | METHOD AND APPRATUS FOR COLLECTING AND ANALYZING SURFACE WOUND DATA - A computer-implemented method of analyzing damage to personal protective equipment (PPE) uses a processor connected to a memory device. A plurality of location informations are stored in the memory device. Each location information relates to a respective damage sustained by a respective PPE and comprises a size, shape, and location of the respective damage on the respective PPE. The method includes aggregating and analyzing the location informations from a plurality of the plurality of location informations. At least two of said plurality of the plurality of location informations relate to respective damages sustained by different respective personal protective equipment. The analysis may include displaying the damage from a plurality of the location informations as a function of location on a personal protective equipment model. The analysis may involve filtering the information to isolate criteria of interest. The analysis may be used to improve PPE design and/or tactical training. | 08-07-2014 |
Paul S. Sherman, Seattle, WA US
Patent application number | Description | Published |
---|---|---|
20100178644 | INTERACTIVE SIMULATION OF BIOLOGICAL TISSUE - A simulator simulates interaction between a surgical tool and biological tissue, providing real time visual and/or haptic feedback. The simulator receives tool input device information representative of a user's movement of a physical tool. The simulator simulates, based on the tool input device information, an interaction between the simulated tool and simulated biological tissue. The simulator uses multiple computational threads, some of which provide their calculations to interrelated threads for use. The simulator displays a visual representation of the simulated interaction between the simulated tool and the simulated biological tissue and provides haptic feedback to the user. The threads may operate asynchronously and have different spatial and/or temporal resolutions. Threads may be selectively activated and deactivated. Threads may move their spatial coverage. | 07-15-2010 |
Raymond C. Sherman, Camas, WA US
Patent application number | Description | Published |
---|---|---|
20080265486 | MECHANICALLY TRIGGERED NIP DRIVE SHAFT - Various embodiments and methods relating to a mechanically triggered nip drive shaft are disclosed. | 10-30-2008 |
20140205354 | PRINT MEDIA TRAY - A printer including a printer housing further including a cavity and a print media tray arranged to fit within the cavity. The print media tray further comprises a plurality of walls at least partially defining a receptacle a first roller support member disposed on one of the walls, outside of the receptacle; and a first roller disposed on the first roller support member | 07-24-2014 |
Raymond C. Sherman, Vancouver, WA US
Patent application number | Description | Published |
---|---|---|
20140210886 | SENSOR POSITIONING SYSTEM - A sensor positioning system including a moveable sensor holder having a following surface, the sensor holder configured to hold an optical sensor at a selected distance from the following surface, a biasing system configured to bias the following surface against a surface of a sheet of print medium, and a drive system configured to move the sensor holder across the sheet of print medium with the following surface biased against and sliding on the surface of the sheet of print medium to maintain the optical sensor at substantially the selected distance from the surface of the sheet of print medium. | 07-31-2014 |
Ryan T. Sherman, Seattle, WA US
Patent application number | Description | Published |
---|---|---|
20080285260 | SHELF LIGHT ASSEMBLY - The present disclosure provides a light assembly ( | 11-20-2008 |
Scott A. Sherman, Seattle, WA US
Patent application number | Description | Published |
---|---|---|
20090119580 | Scalable Display of Internet Content on Mobile Devices - Mobile devices enabled to support resolution-independent scalable display of Internet (Web) content to allow Web pages to be scaled (zoomed) and panned for better viewing on smaller screen sizes. The mobile devices employ software-based processing of original Web content, including HTML-based content, XML, cascade style sheets, etc. to enable Web page content to be rapidly rendered, zoomed, and panned. Moreover, the rendered displays provide substantially the same or identical layout as the original Web page, enabling users to easily navigate to selected content and features on literally Billions of Web pages. User input schemes include tap-based context zooming that enables users to selectively zoom in on objects including columns, images, and paragraphs by simply tapping on them. Display lists may also be employed to provide further enhancements in rendering speed. Additionally, hardware-based programmed logic may be employed to facilitate various operations. | 05-07-2009 |
20110231746 | SCALABLE DISPLAY OF INTERNET CONTENT ON MOBILE DEVICES - Mobile devices enabled to support resolution-independent scalable display of Internet (Web) content to allow Web pages to be scaled (zoomed) and panned for better viewing on smaller screen sizes. The mobile devices employ software-based processing of original Web content, including HTML-based content, XML, cascade style sheets, etc. to generate scalable content. The scalable content and/or data derived therefrom are then employed to enable the Web content to be rapidly rendered, zoomed, and panned. Display lists may also be employed to provide further enhancements in rendering speed. Context zooms, including tap-based zooms on columns, images, and paragraphs are also enabled. | 09-22-2011 |
20110231782 | Scalable Display of Internet Content on Mobile Devices - Apparatus, methods and software for creating resolution-independent vector display of Internet (Web) content to allow Web pages to be scaled (zoomed) and panned for better viewing and/or to fit any resolution or screen size. According to one aspect, novel client-side processing of markup language-based Web content is provided that translates employs a rendering engine to interpret original page layout information into scalable page layout information. The scalable page layout information is then scaled and employed to enable the Web content to be rapidly rendered, zoomed, and panned. According to another aspect, display lists are generated to provide further enhancements in rendering speed. According to other aspects, bounding boxes are generated and scaled to lay out text and/or images on scaled Web content that is used to facilitate browsing of Web pages with zooming and panning. | 09-22-2011 |
20120127178 | MAINTAINING GRAPHICAL PRESENTATIONS BASED ON USER CUSTOMIZATIONS - A method and system for rendering graphics based on user customizations in a computer graphics application are disclosed. The customizations relate to various properties of one or more graphical elements in the graphic. Such properties include positioning, size, formatting and other visual attributes associated with the graphical elements. These properties may be defined as either semantic properties or presentation properties. Semantic properties are persistent across all graphic definitions. Presentation properties are specific to the graphic definition to which each particular graphic belongs. Thus, a customization to a semantic property of a displayed graphic is preserved in memory for application not only to the currently displayed graphic, but also to all other graphic definitions that may be displayed in the future. In contrast, a customization to a presentation property is only preserved for the currently displayed graphic, and thus not preserved for all other graphic definitions. | 05-24-2012 |
20130024791 | MAINTAINING GRAPHICAL PRESENTATIONS BASED ON USER CUSTOMIZATIONS - A method and system for rendering graphics based on user customizations in a computer graphics application are disclosed. The customizations relate to various properties of one or more graphical elements in the graphic. Such properties include positioning, size, formatting and other visual attributes associated with the graphical elements. These properties may be defined as either semantic properties or presentation properties. Semantic properties are persistent across all graphic definitions. Presentation properties are specific to the graphic definition to which each particular graphic belongs. Thus, a customization to a semantic property of a displayed graphic is preserved in memory for application not only to the currently displayed graphic, but also to all other graphic definitions that may be displayed in the future. In contrast, a customization to a presentation property is only preserved for the currently displayed graphic, and thus not preserved for all other graphic definitions. | 01-24-2013 |
20140292767 | METHOD, SYSTEM, AND COMPUTER-READABLE MEDIUM FOR CREATING AND LAYING OUT A GRAPHIC WITHIN AN APPLICATION PROGRAM - A method, apparatus, and computer-readable medium are provided for creating and laying out a graphic within a drawing application program. The method includes receiving a data model defining a set of data and data relationships to be represented in the graphic, receiving a graphic definition describing the mapping of the data from the data model to a set of algorithms, algorithm parameters, constraints, constraint rules, and shape properties, determining a shape size and position for the layout nodes utilizing the set of algorithms, constraints, and constraint rules from the graphic definition, and creating a list of shapes and shape properties for the graphic, including size and position. The method further includes determining if the graphic fits a given layout into a specific area based on the set of constraint values and if the graphic does not fit the specific area, then modifying the set of constraint values using the constraint rules. | 10-02-2014 |
William D. Sherman, Seatac, WA US
Patent application number | Description | Published |
---|---|---|
20130201052 | Object Detection System for Mobile Platforms - A method and apparatus comprising a group of passive sensor systems, an active sensor system, and a processor unit. The group of passive sensor systems is configured to generate first sensor information from light in an environment around the group of passive sensor systems. The active sensor system is configured to send signals, receive responses from the signals, and generate second sensor information from the responses. The processor unit is configured to control the active sensor system to send the signals in a direction toward an object using the first sensor information and generate information about the object using the second sensor information. | 08-08-2013 |
William D. Sherman, Renton, WA US
Patent application number | Description | Published |
---|---|---|
20080315075 | METHOD FOR OPTICALLY DETECTING AND IDENTIFYING A THREAT - An optical detection apparatus includes a housing having a circumferential opening therein. A primary mirror reflects light rays to form a first set of light rays to a secondary mirror that has a generally concave shape coupled to the housing. A tertiary mirror having a generally concave shape coupled to the housing spaced apart from the secondary mirror directs light to detection optics that form an image using the third set of light rays. The detection optics include a micro-mirror array that redirect the image to a detector. A controller controls the micro-mirror array and determines an event characteristic based upon the image thereon. | 12-25-2008 |
20100141932 | Controlling A Projected Pattern - Systems and methods to control projection of a pattern are provided. A particular method includes receiving first three-dimensional coordinates that specify one or more locations on a surface of a workpiece where the one or more locations correspond to a part definition to be projected onto the surface. The method also includes computing scan angles for a scanning system based on the first three-dimensional coordinates. The scan angles specify angles used by the scanning system to direct a beam of light to project the part definition onto the surface. The method also includes sending control signals to the scanning system based on the scan angles. | 06-10-2010 |
William D. Sherman, Lacey, WA US
Patent application number | Description | Published |
---|---|---|
20140293023 | LASER VIDEOGRAMMETRY - Systems and methods for measuring a surface of an object. The system, in one embodiment, includes a laser projector device mounted at a fixed location relative to an object being formed by a fabrication process, and a videogrammetry device mounted at another fixed location relative to the object. The laser projector device includes a laser element mounted on a two-axis gimbal assembly, and the gimbal assembly directs laser beams from the laser element onto target points on a surface of the object. The laser projector device measures angles of the laser beams to the target points, while the videogrammetry device simultaneously performs measurements of the target points by capturing video images of the laser beams reflecting off of the target points. A controller processes the measurements from the laser projector device and the videogrammetry device to calculate x, y, z coordinates of the target points in a 3D coordinate system. | 10-02-2014 |
William D. Sherman, Kent, WA US
Patent application number | Description | Published |
---|---|---|
20080204752 | SYSTEM AND METHOD FOR REMOTE, FREE-SPACE OPTICAL DETECTION OF POTENTIAL THREAT AGENT - A system and method for free space, optical remote sensing of a potential threat agent using spectrally responsive sensor material. In one example the sensor material is formed by particles, which in one particular form are porous photonic crystals. The particles are dispersed into an area being monitored for the presence of the potential threat agent. A pair of lasers is used to generate optical light beams that are directed at the sensor particles after the particles have been dispersed. The light reflected by the sensor particles is then analyzed. The presence of the potential threat agent causes a shift in the spectral peak of light reflected from the sensor particles that can be sensed using photo detectors and a processing subsystem. The system can be tuned to remotely detect for specific chemical, biological or environmental agents that may be present within a given area. | 08-28-2008 |