Slick, US
Brian Slick, Loveland, OH US
Patent application number | Description | Published |
---|---|---|
20090172883 | Electro-hydraulically powered lift ambulance cot - A collapsible hydraulically operated ambulance cot ( | 07-09-2009 |
Geoffrey W. Slick, Schwenksville, PA US
Patent application number | Description | Published |
---|---|---|
20110061512 | Hand-Mountable Noise Maker - A sound generating device for being removably securable to or directly about a person's hand or finger for producing sound when the hand is reciprocally moved. The device includes a sound generating portion secured or securable to an attachment portion, where the attachment portion is securable to or directly about the hand or finger. Preferably, the sound is percussive caused by components of the device striking each other upon rapid and repeated reciprocal hand movement. The device is light in weight, does not require striking the hand or finger or other portion of the body, and is shaped and contoured to conform to hand shape, and preferably includes an adjustable attachment portion to adapt to differing sizes and shapes of hands and fingers; the device also may be modular, wherein the attachment portion may comprise a plurality of differing sizes of mounting structures for the same sound generating portion. | 03-17-2011 |
George H. Slick, Glen Mills, PA US
Patent application number | Description | Published |
---|---|---|
20110061512 | Hand-Mountable Noise Maker - A sound generating device for being removably securable to or directly about a person's hand or finger for producing sound when the hand is reciprocally moved. The device includes a sound generating portion secured or securable to an attachment portion, where the attachment portion is securable to or directly about the hand or finger. Preferably, the sound is percussive caused by components of the device striking each other upon rapid and repeated reciprocal hand movement. The device is light in weight, does not require striking the hand or finger or other portion of the body, and is shaped and contoured to conform to hand shape, and preferably includes an adjustable attachment portion to adapt to differing sizes and shapes of hands and fingers; the device also may be modular, wherein the attachment portion may comprise a plurality of differing sizes of mounting structures for the same sound generating portion. | 03-17-2011 |
Gertrude M. Slick, Glen Mills, PA US
Patent application number | Description | Published |
---|---|---|
20110061512 | Hand-Mountable Noise Maker - A sound generating device for being removably securable to or directly about a person's hand or finger for producing sound when the hand is reciprocally moved. The device includes a sound generating portion secured or securable to an attachment portion, where the attachment portion is securable to or directly about the hand or finger. Preferably, the sound is percussive caused by components of the device striking each other upon rapid and repeated reciprocal hand movement. The device is light in weight, does not require striking the hand or finger or other portion of the body, and is shaped and contoured to conform to hand shape, and preferably includes an adjustable attachment portion to adapt to differing sizes and shapes of hands and fingers; the device also may be modular, wherein the attachment portion may comprise a plurality of differing sizes of mounting structures for the same sound generating portion. | 03-17-2011 |
Glen Slick, Bothell, WA US
Patent application number | Description | Published |
---|---|---|
20090313397 | Methods and Systems for Protecting Data in USB Systems - The various embodiments described below are directed to providing authenticated and confidential messaging from software executing on a host (e.g. a secure software application or security kernel) to and from I/O devices operating on a USB bus. The embodiments can protect against attacks that are levied by software executing on a host computer. In some embodiments, a secure functional component or module is provided and can use encryption techniques to provide protection against observation and manipulation of USB data. In other embodiments, USB data can be protected through techniques that do not utilized (or are not required to utilize) encryption techniques. In accordance with these embodiments, USB devices can be designated as “secure” and, hence, data sent over the USB to and from such designated devices can be provided into protected memory. Memory indirection techniques can be utilized to ensure that data to and from secure devices is protected. | 12-17-2009 |
20130282934 | Methods and Systems for Protecting Data in USB Systems - The various embodiments described below are directed to providing authenticated and confidential messaging from software executing on a host (e.g. a secure software application or security kernel) to and from I/O devices operating on a USB bus. The embodiments can protect against attacks that are levied by software executing on a host computer. In some embodiments, a secure functional component or module is provided and can use encryption techniques to provide protection against observation and manipulation of USB data. In other embodiments, USB data can be protected through techniques that do not utilized (or are not required to utilize) encryption techniques. In accordance with these embodiments, USB devices can be designated as “secure” and, hence, data sent over the USB to and from such designated devices can be provided into protected memory. Memory indirection techniques can be utilized to ensure that data to and from secure devices is protected. | 10-24-2013 |
Glen T. Slick, Redmond, WA US
Patent application number | Description | Published |
---|---|---|
20110231539 | Device Connection Routing for Controllers - Device connection routing for controllers is provided. A computing device is configured with multiple controllers that provide connections for peripheral devices. The controllers enable the peripheral devices to interact with the computing device through a bus. Each device connection is routed to one of the multiple controllers based on one or more pre-determined factors. These factors may include load-balancing, power saving, quality of service, data flow requirements, and the like. Device connection routing may be dynamically managed to respond to changing states of the peripheral devices and the controllers. The device connection routing may be performed for controllers associated with any type of wired or wireless buses, such as Universal Serial Bus (USB), IEEE 1394, Secure Digital Input/Output (SDIO), and the like. | 09-22-2011 |
Robert G. Slick, Georgetown, SC US
Patent application number | Description | Published |
---|---|---|
20110061512 | Hand-Mountable Noise Maker - A sound generating device for being removably securable to or directly about a person's hand or finger for producing sound when the hand is reciprocally moved. The device includes a sound generating portion secured or securable to an attachment portion, where the attachment portion is securable to or directly about the hand or finger. Preferably, the sound is percussive caused by components of the device striking each other upon rapid and repeated reciprocal hand movement. The device is light in weight, does not require striking the hand or finger or other portion of the body, and is shaped and contoured to conform to hand shape, and preferably includes an adjustable attachment portion to adapt to differing sizes and shapes of hands and fingers; the device also may be modular, wherein the attachment portion may comprise a plurality of differing sizes of mounting structures for the same sound generating portion. | 03-17-2011 |
Royce Slick, Mission Viejo, CA US
Patent application number | Description | Published |
---|---|---|
20100146275 | AUTHENTICATING A DEVICE WITH A SERVER OVER A NETWORK - The authentication of a device with a server over a network includes authenticating, by the device, the server so as to establish a secure connection with the server. The device communicates identification information of the device to the server, wherein the identification information uniquely identifies the device to the server. The server determines the credibility of the device using the identification information communicated by the device. In a case where the server determines that the device is credible, the server creates a first authentication token for the device, stores the first authentication token, and transfers the first authentication token to the device using the secure connection, and the device stores the first authentication token. The server authenticates the device using the first authentication token. | 06-10-2010 |
Royce E. Slick, Mission Viejo, CA US
Patent application number | Description | Published |
---|---|---|
20090133104 | Device Access Based on Centralized Authentication - Access control to a networked peripheral device by a walk-up user, wherein the networked peripheral device is accessible by both the walk-up user and a remote user, based on centralized access management information. Access control comprises receiving authenticated information for the walk-up user from the networked peripheral device at a centralized location, determining at the networked peripheral device a level of access to the networked peripheral device by the walk-up user based on received access management information for the walk-up user, and allowing the walk-up user to access the determined user-available features of the networked peripheral device based on the determined level of access. | 05-21-2009 |
20090240942 | LONG TERM KEY ESTABLISHMENT FOR EMBEDDED DEVICES - A secure communication session is established between a first device and a second device, by generating, in the first device, a first secret key to be utilized for communication sessions with other devices. The second device requests to establish a first communication session with the first device, and the second device generates a second secret key corresponding to the first secret key of the first device. The second device stores the generated second secret key in a non-volatile memory of the second device, the second secret key being stored in the non-volatile memory in association with an identifier of the first device. Finally, a secure communication session is established between the first and second devices utilizing the first and second secret keys. | 09-24-2009 |
20140245130 | DEVICES, SYSTEMS, AND METHODS FOR COMMUNICATING WITH AN IMAGE-FORMING DEVICE - Systems, devices, and methods for communicating with an image-forming device obtain a web page from a web server at a browser, wherein the web page includes an iframe; render the web page on the browser; populate the iframe with information received from the image-forming-apparatus-communication application; send first information from the web page to the iframe; and send the first information from the iframe to the image-forming-apparatus-communication application. | 08-28-2014 |
Royce Earle Slick, Mission Viejo, CA US
Patent application number | Description | Published |
---|---|---|
20130222835 | SYSTEMS AND METHODS FOR MANAGING USE OF AN IMAGING DEVICE - Systems and methods for managing access to a device configured to capture images store trust information that is generated in response to the creation of a trust relationship with an identity provider, capture an image of indicia on the device configured to capture images, wherein the indicia are provided to a user by the identity provider in response to a user authentication operation with the identity provider, determine if the indicia are valid based on the trust information, and allow operation of other functions of the device configured to capture images in response to determining that the indicia are valid or not allowing operation of the other functions of the device configured to capture images in response to determining that the indicia are invalid. | 08-29-2013 |