Patents by Inventor David Lincoln

David Lincoln has filed for patents to protect the following inventions. This listing includes patent applications that are pending as well as patents that have already been granted by the United States Patent and Trademark Office (USPTO).

  • Patent number: 11924238
    Abstract: A cyber-defense appliance securely communicates and cooperates with a suite of different lightweight probes that can ingest onboard traffic from multiple different independent systems using protocols for at least one of a data link layer, a physical layer, and then one or more of an application layer, a transport layer, a network layer, and any combination of these layers when a protocol is used in that layer in the independent system. The lightweight probe ingests data and meta data with an independent system it resides within. The appliance has AI models to model a normal pattern of life in each of the independent systems using the data and/or meta data from protocols listed above. An analyzer module cooperates with the AI models that model a normal pattern of life in each of the independent systems to determine when abnormal behavior or suspicious activity is detected.
    Type: Grant
    Filed: July 29, 2020
    Date of Patent: March 5, 2024
    Assignee: Darktrace Holdings Limited
    Inventor: Simon David Lincoln Fellows
  • Publication number: 20230403294
    Abstract: A cyber security restoration engine prioritizes nodes in a graph of nodes in a computer network or system that are involved in a cyber attack for remediation actions. The cyber security restoration engine performs this prioritization by, for each node, determining one or more edges linking the node to other nodes in the graph, the edges representing interactions between two nodes; obtaining metadata indicative of a type of interaction between two nodes connected by the edge and the roles of the two nodes in that interaction; determining how severe the interaction represented by that edge is within the context of the cyber attack, based on the metadata of that edge; and determining a severity score for the node by combining the severity score for each of the one or more edges connected to the node. The cyber security restoration engine prioritizes nodes for remediation action based on the severity scores for the nodes.
    Type: Application
    Filed: August 8, 2023
    Publication date: December 14, 2023
    Inventors: Timothy Owen Bazalgette, Dickon Murray Humphrey, Simon David Lincoln Fellows, Marko Marsenic, Phillip Sellars
  • Publication number: 20230105022
    Abstract: A multi-sensor mounting system and method includes a secondary pipe and an adapter. The secondary pipe comprises a fastening device configured to fix the secondary pipe to the process pipe, and a valve that is switchable between an open state and a closed state. The adapter detachably connects a sensor module to the secondary pipe. The valve allows a sensing probe of the sensor module being inserted into the process pipe in the open state, and to block a fluid flow in the secondary pipe in the closed state, for example, for times when the sensing probe is removed from the secondary pipe.
    Type: Application
    Filed: December 9, 2022
    Publication date: April 6, 2023
    Applicant: ABB Schweiz AG
    Inventors: David Lincoln, Paul Szasz, Sean Keeping, Andrew Holmes, Eric Yeatman, Chao Yuan, David Boyle, Samuel Yang, Daryl Williams
  • Publication number: 20230011004
    Abstract: A virtual computing environment cloning method is used to allow rapid repeatable testing of unsupervised machine learning (ML) architectures and algorithms. A virtual reference environment contains a set of virtual devices, user accounts and IP traffic as well as scripted activity and a cyber security appliance including unsupervised ML trained on the scripted activity. A clone creator makes a replica of the environment. Clones can be taken from the reference at any time and more than one can exist simultaneously. Testing that takes place within a clone environment has no effect on the reference environment, including having no effect on the unsupervised ML architectures and algorithms. Clones can be interacted with, and outcomes from testing a clone can be recorded. Clones can be discarded after tests are completed and tests are independent and repeatable.
    Type: Application
    Filed: July 7, 2022
    Publication date: January 12, 2023
    Inventors: Simon David Lincoln Fellows, Frank Jasik
  • Publication number: 20220360597
    Abstract: An apparatus may include a set of modules and artificial intelligence models to detect a cyber incident, a simulator to simulate an actual cyber attack of the cyber incident on a network including physical devices being protected by the set of modules and artificial intelligence models; and a feedback loop between i) the set of modules and artificial intelligence models and ii) the simulator, during an ongoing detected cyber incident. An attack path modeling module is configured to feed details of the detected incident by a cyber threat module into an input module of the simulator, and to run one or more hypothetical simulations of that detected incident in order to predict and control an autonomous response to the detected incident. Any software instructions forming part of the set of modules, the artificial intelligence models, and the simulator are stored in an executable form in memories and executed by processors.
    Type: Application
    Filed: July 7, 2022
    Publication date: November 10, 2022
    Inventors: Simon David Lincoln Fellows, Timothy Owen Bazalgette, Marko Marsenic, Dickon Murray Humphrey
  • Publication number: 20220225101
    Abstract: A coordinator module, a cyber threat analyst module, and AI models trained to model a normal pattern of life for entities in a wireless domain and a normal pattern of life for entities in a second domain cooperate with a combination of wireless sensors with RF protocol adapters to monitor and analyze wireless activity and probes to monitor activity in the second domain in order to analyze an anomaly of interest in a wider view of another domain's activity. These modules and models understand and assess the wireless activity and the activity from the second domain in light of the AI models modelling the pattern of life for entities in a wireless domain and/or a in the second domain in order to detect a cyber threat indicated by at least by the anomaly of interest. A formatting model generates an alert and/or a report.
    Type: Application
    Filed: January 7, 2022
    Publication date: July 14, 2022
    Inventor: Simon David Lincoln Fellows
  • Publication number: 20210273953
    Abstract: Endpoint agent cSensors can be used to extend network visibility and enhance tracking capabilities for a cyber security and threat defense environment. The cSensor may comprise a network module to monitor network information coming into and out of the endpoint computing device to ingest a first set of traffic data from network connections. The cSensor may have a collation module to collect the first set of traffic data and obtain input data related to observed network events. An analyzer module can receive the input data and use an intelligent DPI engine to perform predetermined levels of DPI from two or more possible levels of DPI on the input data based on network parameters. The cSensor may have a communication module to transmit a second set of traffic data to a cyber security appliance based on the specified DPI performed. Furthermore, the cSensor may have an autonomous action module to perform autonomous action(s) in response to autonomous action(s) correlated to the received second set of traffic data.
    Type: Application
    Filed: May 18, 2021
    Publication date: September 2, 2021
    Inventors: Simon David Lincoln Fellows, Jack Benjamin Stockdale, Thomas Alexander Chesney Jenkinson
  • Publication number: 20200358810
    Abstract: A cyber-defense appliance securely communicates and cooperates with a suite of different lightweight probes that can ingest onboard traffic from multiple different independent systems using protocols for at least one of a data link layer, a physical layer, and then one or more of an application layer, a transport layer, a network layer, and any combination of these layers when a protocol is used in that layer in the independent system. The lightweight probe ingests data and meta data with an independent system it resides within. The appliance has AI models to model a normal pattern of life in each of the independent systems using the data and/or meta data from protocols listed above. An analyzer module cooperates with the AI models that model a normal pattern of life in each of the independent systems to determine when abnormal behavior or suspicious activity is detected.
    Type: Application
    Filed: July 29, 2020
    Publication date: November 12, 2020
    Inventor: Simon David Lincoln Fellows
  • Publication number: 20190369610
    Abstract: The present invention discloses a verification device for verifying a field device. The verification device comprises a repository and verification module. The repository comprises a plurality of verification definition data sets, each verification definition data set associated with a type of field device and comprises one or more sets of threshold values of one or more corresponding operational parameters for the corresponding type of field device. The verification module obtains a corresponding verification definition data set associated with the field device under verification; measures values of the operational parameters of the field device under verification in accordance with the corresponding verification definition data set and compares the measured values of the operational parameters with corresponding threshold values of the operational parameters from a set of threshold values of the operational parameters from the corresponding verification definition data set.
    Type: Application
    Filed: September 28, 2017
    Publication date: December 5, 2019
    Inventors: Suhas CHAKRAVARTHY, Jutty Prakash DINESH, Shanthala KAMATH, David LINCOLN, Mini TT
  • Patent number: 9602327
    Abstract: A method of responding to an information request involved in an asynchronous data transaction is described. An information request is produced in a client device and then wrapped in one or more layers to produce a request package. The request package is transmitted over a distributed network comprising a plurality of processing nodes. Layers are added to and/or removed from the package at one or more of the nodes. The package is processed at its final destination, and a response package is generated for transmission back to the client device via the distributed network.
    Type: Grant
    Filed: May 14, 2001
    Date of Patent: March 21, 2017
    Assignee: VODAFONE LTD.
    Inventors: Adrian David Lincoln, Charlie William Debney
  • Patent number: 9532793
    Abstract: A disposable hygienic nostril cleansing tool is described that consists of a dual-purpose head (cotton swab and scraper tip), flexible shaft, and cotton debris cleaner in the tool body.
    Type: Grant
    Filed: July 22, 2014
    Date of Patent: January 3, 2017
    Inventor: Paul David Lincoln Wilson
  • Publication number: 20150039003
    Abstract: A disposable hygienic nostril cleansing tool is described that consists of a dual-purpose head (cotton swab and scraper tip), flexible shaft, and cotton debris cleaner in the tool body.
    Type: Application
    Filed: July 22, 2014
    Publication date: February 5, 2015
    Inventor: Paul David Lincoln Wilson
  • Patent number: 8677467
    Abstract: A computer, such as a WINDOWS® operating system-based PC, has associated with it a Subscriber Identity Module (or SIM), such as of the type used in a GSM cellular telephone system. The SIM can be authenticated by the telephone network, in the same way as for authenticating SIMs of telephone handset users in the network, and can in this way authenticate the user of the PC or the PC itself. Such authentication can, for example, permit use of the PC in relation to a particular application which is released to the PC after the authentication is satisfactorily completed. The application may be released to the PC by a third party after and in response to the satisfactory completion of the authentication process. A charge for the session can be debited to the user by the telecommunications network and then passed on to the third party.
    Type: Grant
    Filed: December 10, 2010
    Date of Patent: March 18, 2014
    Assignee: Vodafone Group PLC
    Inventors: Adrian David Lincoln, Charles William Debney, Ian Ronald Maxwell, Jonathan Lawrence Viney
  • Patent number: 7930816
    Abstract: A method of manufacturing an electromagnetic flow meter assembly is disclosed. The method comprises forming an insert from a deformable material, forming at least one reinforcing component; arranging the reinforcing component around a portion of the insert, and bonding the reinforcing component to the insert to reinforce the insert against deformation under the application of pressure. An electromagnetic flow meter assembly is also disclosed and comprises an insert for insertion into a flow conduit, wherein at least a portion of the insert is formed of a deformable non-ferromagnetic material, wherein the insert comprises an inlet section, a measuring section, and an outlet section. The assembly further comprises at least one reinforcing component surrounding the measuring section of the insert to reinforce the insert against deformation under the application of pressure.
    Type: Grant
    Filed: February 18, 2005
    Date of Patent: April 26, 2011
    Assignee: ABB Limited
    Inventors: David Lincoln, Michael Armitage, David Burton
  • Publication number: 20110083171
    Abstract: A computer, such as a WINDOWS® operating system-based PC, has associated with it a Subscriber Identity Module (or SIM), such as of the type used in a GSM cellular telephone system. The SIM can be authenticated by the telephone network, in the same way as for authenticating SIMs of telephone handset users in the network, and can in this way authenticate the user of the PC or the PC itself. Such authentication can, for example, permit use of the PC in relation to a particular application which is released to the PC after the authentication is satisfactorily completed. The application may be released to the PC by a third party after and in response to the satisfactory completion of the authentication process. A charge for the session can be debited to the user by the telecommunications network and then passed on to the third party.
    Type: Application
    Filed: December 10, 2010
    Publication date: April 7, 2011
    Inventors: Adrian David Lincoln, Charles William Debney, Ian Ronald Maxwell, Jonathan Lawrence Viney
  • Patent number: 7866218
    Abstract: An electromagnetic flow meter is described having a pressure containing vessel or conduit through which the fluid to be metered is passed. The pressure containing vessel is formed of first and second sections which are made of respective materials having first and second magnetic permeabilities, such as stainless steel and carbon steel. A single magnetic field generating coil is provided adjacent the first section for generating a magnetic field across the pressure containing vessel.
    Type: Grant
    Filed: August 13, 2009
    Date of Patent: January 11, 2011
    Assignee: ABB Limited
    Inventors: David Lincoln, Michael Armitage
  • Publication number: 20100101331
    Abstract: An electromagnetic flow meter is described having a pressure containing vessel or conduit through which the fluid to be metered is passed. The pressure containing vessel is formed of first and second sections which are made of respective materials having first and second magnetic permeabilities, such as stainless steel and carbon steel. A single magnetic field generating coil is provided adjacent the first section for generating a magnetic field across the pressure containing vessel.
    Type: Application
    Filed: August 13, 2009
    Publication date: April 29, 2010
    Inventors: David LINCOLN, Michael Armitage
  • Publication number: 20100062966
    Abstract: Compositions for various surfaces including glass, metals, ceramics, polymers, painted surfaces, and other durable non-porous materials clean surfaces while forming a durable, and long-lasting residual thin film. The thin film is self-cleaning, and can be self-disinfecting. The compositions include a combination of a surfactant and a nanoparticulate photocatalytic material (e.g.
    Type: Application
    Filed: September 4, 2009
    Publication date: March 11, 2010
    Applicant: Novipella, Inc.
    Inventors: David Lincoln, Susan Lincoln
  • Patent number: 7665368
    Abstract: An electromagnetic flow meter for measuring flow rate of a fluid passing therethrough includes a conduit defining a fluid inlet, a fluid outlet and a measuring section positioned between the inlet and the outlet. The flow meter also includes a single coil for generating a magnetic field across the measuring section and electrodes for detecting induced electrical potential due to the fluid passage. The flow meter also includes means for conditioning the flow through the measuring section. The combination of the single coil and the flow conditioning means provides a flow meter with a desired level of accuracy. The single coil and the electrodes may be arranged so that the integral of a weight function, which defines the sensitivity of the flow meter to fluid velocity through different parts of the measuring section, over the first half of a measuring section closest to the coil is between 0.4 and 1.3 times the integral of the weight function over the other half of the measuring section.
    Type: Grant
    Filed: August 17, 2007
    Date of Patent: February 23, 2010
    Assignee: ABB Limited
    Inventors: David Lincoln, Michael Armitage
  • Patent number: 7621188
    Abstract: An electromagnetic flow meter for measuring flow rate of a fluid passing therethrough includes a conduit defining a fluid inlet, a fluid outlet and a measuring section positioned between the inlet and the outlet. The flow meter also includes a single coil for generating a magnetic field across the measuring section and electrodes for detecting induced electrical potential due to the fluid passage. The coil may be arranged to surround a section of the measuring section over a segment angle of between 140 and 180 degrees. The electrodes may be positioned so that they are offset from being opposite each other on the centerline of the measuring section, by an offset angle of between 5 degrees and 45 degrees.
    Type: Grant
    Filed: August 17, 2007
    Date of Patent: November 24, 2009
    Assignee: ABB Limited
    Inventors: David Lincoln, Michael Armitage