Patents by Inventor David Lincoln
David Lincoln has filed for patents to protect the following inventions. This listing includes patent applications that are pending as well as patents that have already been granted by the United States Patent and Trademark Office (USPTO).
-
Patent number: 11924238Abstract: A cyber-defense appliance securely communicates and cooperates with a suite of different lightweight probes that can ingest onboard traffic from multiple different independent systems using protocols for at least one of a data link layer, a physical layer, and then one or more of an application layer, a transport layer, a network layer, and any combination of these layers when a protocol is used in that layer in the independent system. The lightweight probe ingests data and meta data with an independent system it resides within. The appliance has AI models to model a normal pattern of life in each of the independent systems using the data and/or meta data from protocols listed above. An analyzer module cooperates with the AI models that model a normal pattern of life in each of the independent systems to determine when abnormal behavior or suspicious activity is detected.Type: GrantFiled: July 29, 2020Date of Patent: March 5, 2024Assignee: Darktrace Holdings LimitedInventor: Simon David Lincoln Fellows
-
Publication number: 20230403294Abstract: A cyber security restoration engine prioritizes nodes in a graph of nodes in a computer network or system that are involved in a cyber attack for remediation actions. The cyber security restoration engine performs this prioritization by, for each node, determining one or more edges linking the node to other nodes in the graph, the edges representing interactions between two nodes; obtaining metadata indicative of a type of interaction between two nodes connected by the edge and the roles of the two nodes in that interaction; determining how severe the interaction represented by that edge is within the context of the cyber attack, based on the metadata of that edge; and determining a severity score for the node by combining the severity score for each of the one or more edges connected to the node. The cyber security restoration engine prioritizes nodes for remediation action based on the severity scores for the nodes.Type: ApplicationFiled: August 8, 2023Publication date: December 14, 2023Inventors: Timothy Owen Bazalgette, Dickon Murray Humphrey, Simon David Lincoln Fellows, Marko Marsenic, Phillip Sellars
-
Publication number: 20230105022Abstract: A multi-sensor mounting system and method includes a secondary pipe and an adapter. The secondary pipe comprises a fastening device configured to fix the secondary pipe to the process pipe, and a valve that is switchable between an open state and a closed state. The adapter detachably connects a sensor module to the secondary pipe. The valve allows a sensing probe of the sensor module being inserted into the process pipe in the open state, and to block a fluid flow in the secondary pipe in the closed state, for example, for times when the sensing probe is removed from the secondary pipe.Type: ApplicationFiled: December 9, 2022Publication date: April 6, 2023Applicant: ABB Schweiz AGInventors: David Lincoln, Paul Szasz, Sean Keeping, Andrew Holmes, Eric Yeatman, Chao Yuan, David Boyle, Samuel Yang, Daryl Williams
-
Publication number: 20230011004Abstract: A virtual computing environment cloning method is used to allow rapid repeatable testing of unsupervised machine learning (ML) architectures and algorithms. A virtual reference environment contains a set of virtual devices, user accounts and IP traffic as well as scripted activity and a cyber security appliance including unsupervised ML trained on the scripted activity. A clone creator makes a replica of the environment. Clones can be taken from the reference at any time and more than one can exist simultaneously. Testing that takes place within a clone environment has no effect on the reference environment, including having no effect on the unsupervised ML architectures and algorithms. Clones can be interacted with, and outcomes from testing a clone can be recorded. Clones can be discarded after tests are completed and tests are independent and repeatable.Type: ApplicationFiled: July 7, 2022Publication date: January 12, 2023Inventors: Simon David Lincoln Fellows, Frank Jasik
-
Publication number: 20220360597Abstract: An apparatus may include a set of modules and artificial intelligence models to detect a cyber incident, a simulator to simulate an actual cyber attack of the cyber incident on a network including physical devices being protected by the set of modules and artificial intelligence models; and a feedback loop between i) the set of modules and artificial intelligence models and ii) the simulator, during an ongoing detected cyber incident. An attack path modeling module is configured to feed details of the detected incident by a cyber threat module into an input module of the simulator, and to run one or more hypothetical simulations of that detected incident in order to predict and control an autonomous response to the detected incident. Any software instructions forming part of the set of modules, the artificial intelligence models, and the simulator are stored in an executable form in memories and executed by processors.Type: ApplicationFiled: July 7, 2022Publication date: November 10, 2022Inventors: Simon David Lincoln Fellows, Timothy Owen Bazalgette, Marko Marsenic, Dickon Murray Humphrey
-
Publication number: 20220225101Abstract: A coordinator module, a cyber threat analyst module, and AI models trained to model a normal pattern of life for entities in a wireless domain and a normal pattern of life for entities in a second domain cooperate with a combination of wireless sensors with RF protocol adapters to monitor and analyze wireless activity and probes to monitor activity in the second domain in order to analyze an anomaly of interest in a wider view of another domain's activity. These modules and models understand and assess the wireless activity and the activity from the second domain in light of the AI models modelling the pattern of life for entities in a wireless domain and/or a in the second domain in order to detect a cyber threat indicated by at least by the anomaly of interest. A formatting model generates an alert and/or a report.Type: ApplicationFiled: January 7, 2022Publication date: July 14, 2022Inventor: Simon David Lincoln Fellows
-
Publication number: 20210273953Abstract: Endpoint agent cSensors can be used to extend network visibility and enhance tracking capabilities for a cyber security and threat defense environment. The cSensor may comprise a network module to monitor network information coming into and out of the endpoint computing device to ingest a first set of traffic data from network connections. The cSensor may have a collation module to collect the first set of traffic data and obtain input data related to observed network events. An analyzer module can receive the input data and use an intelligent DPI engine to perform predetermined levels of DPI from two or more possible levels of DPI on the input data based on network parameters. The cSensor may have a communication module to transmit a second set of traffic data to a cyber security appliance based on the specified DPI performed. Furthermore, the cSensor may have an autonomous action module to perform autonomous action(s) in response to autonomous action(s) correlated to the received second set of traffic data.Type: ApplicationFiled: May 18, 2021Publication date: September 2, 2021Inventors: Simon David Lincoln Fellows, Jack Benjamin Stockdale, Thomas Alexander Chesney Jenkinson
-
Publication number: 20200358810Abstract: A cyber-defense appliance securely communicates and cooperates with a suite of different lightweight probes that can ingest onboard traffic from multiple different independent systems using protocols for at least one of a data link layer, a physical layer, and then one or more of an application layer, a transport layer, a network layer, and any combination of these layers when a protocol is used in that layer in the independent system. The lightweight probe ingests data and meta data with an independent system it resides within. The appliance has AI models to model a normal pattern of life in each of the independent systems using the data and/or meta data from protocols listed above. An analyzer module cooperates with the AI models that model a normal pattern of life in each of the independent systems to determine when abnormal behavior or suspicious activity is detected.Type: ApplicationFiled: July 29, 2020Publication date: November 12, 2020Inventor: Simon David Lincoln Fellows
-
Publication number: 20190369610Abstract: The present invention discloses a verification device for verifying a field device. The verification device comprises a repository and verification module. The repository comprises a plurality of verification definition data sets, each verification definition data set associated with a type of field device and comprises one or more sets of threshold values of one or more corresponding operational parameters for the corresponding type of field device. The verification module obtains a corresponding verification definition data set associated with the field device under verification; measures values of the operational parameters of the field device under verification in accordance with the corresponding verification definition data set and compares the measured values of the operational parameters with corresponding threshold values of the operational parameters from a set of threshold values of the operational parameters from the corresponding verification definition data set.Type: ApplicationFiled: September 28, 2017Publication date: December 5, 2019Inventors: Suhas CHAKRAVARTHY, Jutty Prakash DINESH, Shanthala KAMATH, David LINCOLN, Mini TT
-
Patent number: 9602327Abstract: A method of responding to an information request involved in an asynchronous data transaction is described. An information request is produced in a client device and then wrapped in one or more layers to produce a request package. The request package is transmitted over a distributed network comprising a plurality of processing nodes. Layers are added to and/or removed from the package at one or more of the nodes. The package is processed at its final destination, and a response package is generated for transmission back to the client device via the distributed network.Type: GrantFiled: May 14, 2001Date of Patent: March 21, 2017Assignee: VODAFONE LTD.Inventors: Adrian David Lincoln, Charlie William Debney
-
Patent number: 9532793Abstract: A disposable hygienic nostril cleansing tool is described that consists of a dual-purpose head (cotton swab and scraper tip), flexible shaft, and cotton debris cleaner in the tool body.Type: GrantFiled: July 22, 2014Date of Patent: January 3, 2017Inventor: Paul David Lincoln Wilson
-
Publication number: 20150039003Abstract: A disposable hygienic nostril cleansing tool is described that consists of a dual-purpose head (cotton swab and scraper tip), flexible shaft, and cotton debris cleaner in the tool body.Type: ApplicationFiled: July 22, 2014Publication date: February 5, 2015Inventor: Paul David Lincoln Wilson
-
Patent number: 8677467Abstract: A computer, such as a WINDOWS® operating system-based PC, has associated with it a Subscriber Identity Module (or SIM), such as of the type used in a GSM cellular telephone system. The SIM can be authenticated by the telephone network, in the same way as for authenticating SIMs of telephone handset users in the network, and can in this way authenticate the user of the PC or the PC itself. Such authentication can, for example, permit use of the PC in relation to a particular application which is released to the PC after the authentication is satisfactorily completed. The application may be released to the PC by a third party after and in response to the satisfactory completion of the authentication process. A charge for the session can be debited to the user by the telecommunications network and then passed on to the third party.Type: GrantFiled: December 10, 2010Date of Patent: March 18, 2014Assignee: Vodafone Group PLCInventors: Adrian David Lincoln, Charles William Debney, Ian Ronald Maxwell, Jonathan Lawrence Viney
-
Patent number: 7930816Abstract: A method of manufacturing an electromagnetic flow meter assembly is disclosed. The method comprises forming an insert from a deformable material, forming at least one reinforcing component; arranging the reinforcing component around a portion of the insert, and bonding the reinforcing component to the insert to reinforce the insert against deformation under the application of pressure. An electromagnetic flow meter assembly is also disclosed and comprises an insert for insertion into a flow conduit, wherein at least a portion of the insert is formed of a deformable non-ferromagnetic material, wherein the insert comprises an inlet section, a measuring section, and an outlet section. The assembly further comprises at least one reinforcing component surrounding the measuring section of the insert to reinforce the insert against deformation under the application of pressure.Type: GrantFiled: February 18, 2005Date of Patent: April 26, 2011Assignee: ABB LimitedInventors: David Lincoln, Michael Armitage, David Burton
-
Publication number: 20110083171Abstract: A computer, such as a WINDOWS® operating system-based PC, has associated with it a Subscriber Identity Module (or SIM), such as of the type used in a GSM cellular telephone system. The SIM can be authenticated by the telephone network, in the same way as for authenticating SIMs of telephone handset users in the network, and can in this way authenticate the user of the PC or the PC itself. Such authentication can, for example, permit use of the PC in relation to a particular application which is released to the PC after the authentication is satisfactorily completed. The application may be released to the PC by a third party after and in response to the satisfactory completion of the authentication process. A charge for the session can be debited to the user by the telecommunications network and then passed on to the third party.Type: ApplicationFiled: December 10, 2010Publication date: April 7, 2011Inventors: Adrian David Lincoln, Charles William Debney, Ian Ronald Maxwell, Jonathan Lawrence Viney
-
Patent number: 7866218Abstract: An electromagnetic flow meter is described having a pressure containing vessel or conduit through which the fluid to be metered is passed. The pressure containing vessel is formed of first and second sections which are made of respective materials having first and second magnetic permeabilities, such as stainless steel and carbon steel. A single magnetic field generating coil is provided adjacent the first section for generating a magnetic field across the pressure containing vessel.Type: GrantFiled: August 13, 2009Date of Patent: January 11, 2011Assignee: ABB LimitedInventors: David Lincoln, Michael Armitage
-
Publication number: 20100101331Abstract: An electromagnetic flow meter is described having a pressure containing vessel or conduit through which the fluid to be metered is passed. The pressure containing vessel is formed of first and second sections which are made of respective materials having first and second magnetic permeabilities, such as stainless steel and carbon steel. A single magnetic field generating coil is provided adjacent the first section for generating a magnetic field across the pressure containing vessel.Type: ApplicationFiled: August 13, 2009Publication date: April 29, 2010Inventors: David LINCOLN, Michael Armitage
-
Publication number: 20100062966Abstract: Compositions for various surfaces including glass, metals, ceramics, polymers, painted surfaces, and other durable non-porous materials clean surfaces while forming a durable, and long-lasting residual thin film. The thin film is self-cleaning, and can be self-disinfecting. The compositions include a combination of a surfactant and a nanoparticulate photocatalytic material (e.g.Type: ApplicationFiled: September 4, 2009Publication date: March 11, 2010Applicant: Novipella, Inc.Inventors: David Lincoln, Susan Lincoln
-
Patent number: 7665368Abstract: An electromagnetic flow meter for measuring flow rate of a fluid passing therethrough includes a conduit defining a fluid inlet, a fluid outlet and a measuring section positioned between the inlet and the outlet. The flow meter also includes a single coil for generating a magnetic field across the measuring section and electrodes for detecting induced electrical potential due to the fluid passage. The flow meter also includes means for conditioning the flow through the measuring section. The combination of the single coil and the flow conditioning means provides a flow meter with a desired level of accuracy. The single coil and the electrodes may be arranged so that the integral of a weight function, which defines the sensitivity of the flow meter to fluid velocity through different parts of the measuring section, over the first half of a measuring section closest to the coil is between 0.4 and 1.3 times the integral of the weight function over the other half of the measuring section.Type: GrantFiled: August 17, 2007Date of Patent: February 23, 2010Assignee: ABB LimitedInventors: David Lincoln, Michael Armitage
-
Patent number: 7621188Abstract: An electromagnetic flow meter for measuring flow rate of a fluid passing therethrough includes a conduit defining a fluid inlet, a fluid outlet and a measuring section positioned between the inlet and the outlet. The flow meter also includes a single coil for generating a magnetic field across the measuring section and electrodes for detecting induced electrical potential due to the fluid passage. The coil may be arranged to surround a section of the measuring section over a segment angle of between 140 and 180 degrees. The electrodes may be positioned so that they are offset from being opposite each other on the centerline of the measuring section, by an offset angle of between 5 degrees and 45 degrees.Type: GrantFiled: August 17, 2007Date of Patent: November 24, 2009Assignee: ABB LimitedInventors: David Lincoln, Michael Armitage