1
Kathryn A Bohrer, Catherine A Chess, Robert L Hoch, John Karat, Dogan Kesdogan, Xuan Liu, Edith G Schonberg, Moninder Singh: System, method, and business methods for enforcing privacy preferences on personal-data exchanges across a network. International Business Machines Corporation, F Chau & Associates, January 13, 2009: US07478157 (82 worldwide citation)

An exemplary embodiment of the present invention includes a method to enforce privacy preferences on exchanges of personal data of a data-subject. The method comprises the steps of: specifying data-subject authorization rule sets having subject constraints, receiving a request message from a request ...


2
John M Allred, Bernard VANZyl, Robert L Hoch: Aimed quadrant warhead. The United States of America represented by the Secretary, E J Brower, A L Branning, T O Watson Jr, February 23, 1971: US3565009 (26 worldwide citation)

A cylindrical warhead having four separate explosive quadrant sections which contain destructive fragments. Any one quadrant section can be ejected to expose the destructive fragments and the opposite quadrant section detonated to propel the fragments in a selectable direction.


3
Robert L Hoch, James J Kessler, Thomas J Long: Mechanical launch sequencer for a missile. McDonnell Douglas Corporation, James M Skorich, George W Finch, John P Scholl, January 5, 1988: US04716808 (4 worldwide citation)

Apparatus for sequencing the release of a missile from its launch apparatus, the unlocking of the missile's warhead fuze pre-launch safety lock, and the ignition of the missile's rocket motor. A cylindrical block having a radial passageway is situated between the warhead and the rocket motor of a mi ...


4
Wim De Pauw, Robert L Hoch, Yi Huang: Semantic correlation for flow analysis in messaging systems. International Business Machines Corporation, Anne V Dougherty Esq, Ryan Mason & Lewis, March 8, 2011: US07904457

Improved techniques for flow analysis in messaging systems are disclosed. For example, a method for finding correlations between messages of a system based on content includes the following steps. For one or more executions of the system, obtaining the messages of the system, wherein each message ha ...


5
Kathryn A Bohrer, Catherine A Chess, Robert L Hoch, John Karat, Dogan Kesdogan, Xuan Liu, Edith G Schonberg, Moninder Singh: System, method, and business methods for enforcing privacy preferences on personal-data exchanges across a network. International Business Machines Corporation, Louis J Percello, Intellectual Property Law Dept, May 8, 2003: US20030088520-A1

A system, method, and business method is used to enforce privacy preferences on exchanges of personal data over a computer network. There are one or more data-subject (subject) rule sets that have one or more subject constraints on one or more private, subject data releases. A receiving process rece ...


6
Wim De Pauw, Robert L Hoch, Yi Huang: Semantic Correlation for Flow Analysis in Messaging Systems. Ryan Mason & Lewis, December 4, 2008: US20080301136-A1

Improved techniques for flow analysis in messaging systems are disclosed. For example, a method for finding correlations between messages of a system based on content includes the following steps. For one or more executions of the system, obtaining the messages of the system, wherein each message ha ...


7
Sophia Krasikov, Robert L Hoch, John F Morar, Senthil Velayudham: Aggregation of document elements into runtime code. Ido Tuchman, April 14, 2005: US20050081189-A1

A method, system, and computer program for creating a minimum executable unit. Generating the minimum executable unit includes receiving at least one block of source code and at least one document element associated with the source code, validating consistency between the source code and the documen ...