Patents by Inventor John Peyton

John Peyton has filed for patents to protect the following inventions. This listing includes patent applications that are pending as well as patents that have already been granted by the United States Patent and Trademark Office (USPTO).

  • Patent number: 10871005
    Abstract: An inflatable apparatus is disclosed that includes an inflatable mattress with a tent coupled to the inflatable mattress. The inflatable mattress may include an inflatable mattress chamber with two elongated inflatable chambers attached to the inflatable mattress chamber. The two elongated inflatable chambers may provide support and stability for the inflatable mattress chamber. The tent may be a collapsible tent coupled to the inflatable mattress chamber. The inflatable mattress and the tent, when deflated and collapsed, respectively, may be rolled-up or folded-up into a compact state for transport and/or storage.
    Type: Grant
    Filed: January 4, 2018
    Date of Patent: December 22, 2020
    Inventors: Inger Olivo, John Peyton
  • Publication number: 20180195308
    Abstract: An inflatable apparatus is disclosed that includes an inflatable mattress with a tent coupled to the inflatable mattress. The inflatable mattress may include an inflatable mattress chamber with two elongated inflatable chambers attached to the inflatable mattress chamber. The two elongated inflatable chambers may provide support and stability for the inflatable mattress chamber. The tent may be a collapsible tent coupled to the inflatable mattress chamber. The inflatable mattress and the tent, when deflated and collapsed, respectively, may be rolled-up or folded-up into a compact state for transport and/or storage.
    Type: Application
    Filed: January 4, 2018
    Publication date: July 12, 2018
    Inventors: Inger Olivo, John Peyton
  • Patent number: 9913767
    Abstract: An inflatable mattress is placed in a deflated state at a location a human corpse departed from life. The inflatable mattress may include two elongated chambers and one rectangular mattress chamber that supports the human corpse. The inflatable mattress may include one or more devices for coupling the human corpse to a top surface of the inflatable mattress. An inflation device coupled to the inflatable mattress is used to inflate the inflatable mattress to a selected height in less than about 2 minutes with the human corpse coupled to the inflatable mattress. The inflatable mattress is movable, with the human corpse coupled to the inflatable mattress, from the location the human corpse departed from life to a secondary location.
    Type: Grant
    Filed: June 30, 2015
    Date of Patent: March 13, 2018
    Assignee: G2C Technologies
    Inventors: Inger Olivo, John Peyton
  • Patent number: 9599416
    Abstract: A device to aid in loading cartridges into a pistol magazine, comprised of an upper section having a top surface for applying downward force with the user's thumb and a roughly rectangular lower section for contact with the cartridges within the magazine. The rectangular lower section is divided into a forward “pushing” section and a rearward “retaining” section by a slot which slidingly engages the rear wall of the magazine, thus providing stability and requiring only downward force to operate. The device is fitted with a hole through the upper section through which a cord, cable, or chain may be affixed, allowing the device to be conveniently carried on a key ring or on an attachment point on a gear bag.
    Type: Grant
    Filed: July 8, 2015
    Date of Patent: March 21, 2017
    Inventor: John Peyton Slocum
  • Publication number: 20170000667
    Abstract: An inflatable mattress is placed in a deflated state at a location a human corpse departed from life. The inflatable mattress may include two elongated chambers and one rectangular mattress chamber that supports the human corpse. The inflatable mattress may include one or more devices for coupling the human corpse to a top surface of the inflatable mattress. An inflation device coupled to the inflatable mattress is used to inflate the inflatable mattress to a selected height in less than about 2 minutes with the human corpse coupled to the inflatable mattress. The inflatable mattress is movable, with the human corpse coupled to the inflatable mattress, from the location the human corpse departed from life to a secondary location.
    Type: Application
    Filed: June 30, 2015
    Publication date: January 5, 2017
    Inventors: Inger Olivo, John Peyton
  • Patent number: 9259187
    Abstract: A computerized method for monitoring cardiac output of a subject by a processor executing the method, the method comprising the steps of: determining first values of cardiac output of the subject for a first period of time using respective different cardiac output measurement methods having respective first measurement errors; and combining the determined first values of cardiac output to determine a second value of cardiac output of the subject for the first period of time, such that the second value of cardiac output has a second measurement error that is less than any of the first measurement errors; and at least one of storing, outputting, and displaying data representing the determined second value of cardiac output of the subject.
    Type: Grant
    Filed: January 30, 2014
    Date of Patent: February 16, 2016
    Assignee: AUSTIN HEALTH
    Inventor: Philip John Peyton
  • Publication number: 20160025437
    Abstract: A device to aid in loading cartridges into a pistol magazine, comprised of an upper section having a top surface for applying downward force with the user's thumb and a roughly rectangular lower section for contact with the cartridges within the magazine. The rectangular lower section is divided into a forward “pushing” section and a rearward “retaining” section by a slot which slidingly engages the rear wall of the magazine, thus providing stability and requiring only downward force to operate. The device is fitted with a hole through the upper section through which a cord, cable, or chain may be affixed, allowing the device to be conveniently carried on a key ring or on an attachment point on a gear bag.
    Type: Application
    Filed: July 8, 2015
    Publication date: January 28, 2016
    Inventor: John Peyton Slocum
  • Publication number: 20150220739
    Abstract: A method includes determining selected global variables in a program for which flow of the selected global variables through the program is to be tracked. The selected global variables are less than all the global variables in the program. The method includes using a static analysis performed on the program, tracking flow through the program for the selected global variables. In response to one or more of the selected global variables being used in security-sensitive operations in the flow, use is analyzed of each one of the selected global variables in a corresponding security-sensitive operation. In response to a determination the use may be a potential security violation, the potential security violation is reported. Apparatus and computer program products are also disclosed.
    Type: Application
    Filed: April 16, 2015
    Publication date: August 6, 2015
    Inventors: Shay Artzi, Ryan Berg, John Peyton, Marco Pistoia, Manu Sridharan, Takaaki Tateishi, Omer Tripp, Robert Weiner
  • Patent number: 9075997
    Abstract: A method includes determining selected global variables in a program for which flow of the selected global variables through the program is to be tracked. The selected global variables are less than all the global variables in the program. The method includes using a static analysis performed on the program, tracking flow through the program for the selected global variables. In response to one or more of the selected global variables being used in security-sensitive operations in the flow, use is analyzed of each one of the selected global variables in a corresponding security-sensitive operation. In response to a determination the use may be a potential security violation, the potential security violation is reported. Apparatus and computer program products are also disclosed.
    Type: Grant
    Filed: January 13, 2014
    Date of Patent: July 7, 2015
    Assignee: International Business Machines Corporation
    Inventors: Shay Artzi, Ryan Berg, John Peyton, Marco Pistoia, Manu Sridharan, Takaaki Tateishi, Omer Tripp, Robert Wiener
  • Publication number: 20140243696
    Abstract: A computerized method for monitoring cardiac output of a subject by a processor executing the method, the method comprising the steps of: determining first values of cardiac output of the subject for a first period of time using respective different cardiac output measurement methods having respective first measurement errors; and combining the determined first values of cardiac output to determine a second value of cardiac output of the subject for the first period of time, such that the second value of cardiac output has a second measurement error that is less than any of the first measurement errors; and at least one of storing, outputting, and displaying data representing the determined second value of cardiac output of the subject.
    Type: Application
    Filed: January 30, 2014
    Publication date: August 28, 2014
    Applicant: Austin Health
    Inventor: Philip John Peyton
  • Publication number: 20140143880
    Abstract: A method includes determining selected global variables in a program for which flow of the selected global variables through the program is to be tracked. The selected global variables are less than all the global variables in the program. The method includes using a static analysis performed on the program, tracking flow through the program for the selected global variables. In response to one or more of the selected global variables being used in security-sensitive operations in the flow, use is analyzed of each one of the selected global variables in a corresponding security-sensitive operation. In response to a determination the use may be a potential security violation, the potential security violation is reported. Apparatus and computer program products are also disclosed.
    Type: Application
    Filed: January 13, 2014
    Publication date: May 22, 2014
    Applicant: International Business Machines Corporation
    Inventors: Shay Artzi, Ryan Berg, John Peyton, Marco Pistoia, Manu Sridharan, Takaaki Tateishi, Omer Tripp, Robert Weiner
  • Patent number: 8656496
    Abstract: A method includes determining selected global variables in a program for which flow of the selected global variables through the program is to be tracked. The selected global variables are less than all the global variables in the program. The method includes using a static analysis performed on the program, tracking flow through the program for the selected global variables. In response to one or more of the selected global variables being used in security-sensitive operations in the flow, use is analyzed of each one of the selected global variables in a corresponding security-sensitive operation. In response to a determination the use may be a potential security violation, the potential security violation is reported. Apparatus and computer program products are also disclosed.
    Type: Grant
    Filed: November 22, 2010
    Date of Patent: February 18, 2014
    Assignee: International Business Machines Corporations
    Inventors: Shay Artzi, Ryan Berg, John Peyton, Marco Pistoia, Manu Sridharan, Takaaki Tateishi, Omer Tripp, Robert Wiener
  • Patent number: 8613707
    Abstract: A method for monitoring cardiac output (pulmonary blood flow) of a subject, the method including: measuring a first net pulmonary uptake or elimination of a breathed gas species by the subject and a first partial pressure of the gas species at a first time, and at a second time later than the first time, determining a first pulmonary blood flow of the patient at the first time, and determining a pulmonary blood flow of the subject at the second time on the basis of the first pulmonary blood flow, the first net pulmonary uptake or elimination, the second net pulmonary uptake or elimination, the first partial pressure, and the second partial pressure.
    Type: Grant
    Filed: November 14, 2008
    Date of Patent: December 24, 2013
    Assignee: Austin Health
    Inventor: Philip John Peyton
  • Patent number: 8429633
    Abstract: Embodiments of the invention describe systems and methods for application level management of virtual address space. A static analysis application can model and analyze a large and complex source code listing to determine whether it has vulnerabilities without exhausting the virtual memory resources provided to it by the operating system. In one embodiment of the invention, the method includes analyzing the source code listing to create a call graph model to represent the expected sequences of routine calls as a result of the inherent control flow of the source code listing. The method also includes monitoring the amount of virtual memory resources consumed by the dynamic state, and swapping out to a storage medium a portion of the dynamic state. The method includes reusing the virtual memory resources corresponding to the swapped out portion of the dynamic state to continue analyzing the source code listing.
    Type: Grant
    Filed: November 21, 2008
    Date of Patent: April 23, 2013
    Assignee: International Business Machines Corporation
    Inventors: Richard Title, Benjamin Greenwald, John Peyton
  • Publication number: 20120131670
    Abstract: A method includes determining selected global variables in a program for which flow of the selected global variables through the program is to be tracked. The selected global variables are less than all the global variables in the program. The method includes using a static analysis performed on the program, tracking flow through the program for the selected global variables. In response to one or more of the selected global variables being used in security-sensitive operations in the flow, use is analyzed of each one of the selected global variables in a corresponding security-sensitive operation. In response to a determination the use may be a potential security violation, the potential security violation is reported. Apparatus and computer program products are also disclosed.
    Type: Application
    Filed: November 22, 2010
    Publication date: May 24, 2012
    Applicant: International Business Machines Corporation
    Inventors: Shay Artzi, Ryan Berg, John Peyton, Marco Pistoia, Manu Sridharan, Takaaki Tateishi, Omer Tripp, Robert Wiener
  • Patent number: 8156483
    Abstract: A method and system of detecting vulnerabilities in source code. Source code is parsed into an intermediate representation. Models (e.g., in the form of lattices) are derived for the variables in the code and for the variables and/or expressions used in conjunction with routine calls. The models are then analyzed in conjunction with pre-specified rules about the routines to determine if the routine call posses one or more of pre-selected vulnerabilities.
    Type: Grant
    Filed: June 27, 2008
    Date of Patent: April 10, 2012
    Assignee: International Business Machines Corporation
    Inventors: Ryan J. Berg, Larry Rose, John Peyton, John J. Danahy, Robert Gottlieb, Chris Rehbein
  • Publication number: 20110004108
    Abstract: A method for monitoring cardiac output (pulmonary blood flow) of a subject, the method including: measuring a first net pulmonary uptake or elimination of a breathed gas species by the subject and a first partial pressure of the gas species at a first time, and at a second time later than the first time, determining a first pulmonary blood flow of the patient at the first time, and determining a pulmonary blood flow of the subject at the second time on the basis of the first pulmonary blood flow, the first net pulmonary uptake or elimination, the second net pulmonary uptake or elimination, the first partial pressure, and the second partial pressure.
    Type: Application
    Filed: November 14, 2008
    Publication date: January 6, 2011
    Inventor: Philip John Peyton
  • Publication number: 20100131721
    Abstract: Embodiments of the invention describe systems and methods for application level management of virtual address space. A static analysis application can model and analyze a large and complex source code listing to determine whether it has vulnerabilities without exhausting the virtual memory resources provided to it by the operating system. In one embodiment of the invention, the method includes analyzing the source code listing to create a call graph model to represent the expected sequences of routine calls as a result of the inherent control flow of the source code listing. The method also includes monitoring the amount of virtual memory resources consumed by the dynamic state, and swapping out to a storage medium a portion of the dynamic state. The method includes reusing the virtual memory resources corresponding to the swapped out portion of the dynamic state to continue analyzing the source code listing.
    Type: Application
    Filed: November 21, 2008
    Publication date: May 27, 2010
    Inventors: Richard Title, Benjamin Greenwald, John Peyton
  • Patent number: 7617489
    Abstract: Methods and systems of detecting vulnerabilities in source code using inter-procedural analysis of source code. Vulnerabilities in a pre-existing source code listing are detected. The variables in the source code listing are modeled in the context of at least one of the inherent control flow and inherent data flow. The variable models are used to create models of arguments to routine calls in the source code listing. The source code listing is modeled with a call graph to represent routine call interactions expressed in the source code listing. The arguments to routine calls are modeled to account for inter-procedural effects and dependencies on the arguments as expressed in the source code listing.
    Type: Grant
    Filed: September 15, 2006
    Date of Patent: November 10, 2009
    Assignee: Ounce Labs, Inc.
    Inventors: John Peyton, Robert Gottlieb
  • Publication number: 20080263525
    Abstract: A method and system of detecting vulnerabilities in source code. Source code is parsed into an intermediate representation. Models (e.g., in the form of lattices) are derived for the variables in the code and for the variables and/or expressions used in conjunction with routine calls. The models are then analyzed in conjunction with pre-specified rules about the routines to determine if the routine call posses one or more of pre-selected vulnerabilities.
    Type: Application
    Filed: June 27, 2008
    Publication date: October 23, 2008
    Inventors: Ryan James BERG, Larry ROSE, John PEYTON, John J. DANAHY, Robert GOTTLIEB, Chris REHBEIN