Patents by Inventor Samuel Fleming

Samuel Fleming has filed for patents to protect the following inventions. This listing includes patent applications that are pending as well as patents that have already been granted by the United States Patent and Trademark Office (USPTO).

  • Patent number: 10565367
    Abstract: Techniques for selectively filtering data are discussed herein. For example, a request to include data in an electronic message or a request to copy the data to a portable storage device may be received. If the data is sensitive data, the techniques may determine a software application that was opened or closed prior to receiving the request, or information that was accessed prior to receiving the request. The techniques may determine if including the data in the electronic message or copying the data to the portable storage device poses a security risk. If a security risk is identified, a task may be performed, such as alerting a network administrator, providing a notification to a user regarding the data, or preventing copying or transmission of the data.
    Type: Grant
    Filed: November 14, 2017
    Date of Patent: February 18, 2020
    Assignee: Verint Americas Inc.
    Inventors: Samuel Fleming, Richard T Weeks
  • Publication number: 20190147488
    Abstract: A novel software based communication system is described allowing multiple people to queue activities, or communications, to a particular contact and for the highest value communication pattern to be calculated. The method includes assigning a reward, interrupt and signal value to each activity. The result is that a contact receives the communication pattern that maximizes reward potential while maintaining a consumer interruption value less than a maximum and greater than a minimum.
    Type: Application
    Filed: November 14, 2018
    Publication date: May 16, 2019
    Applicant: Dark Capital, Inc.
    Inventors: Paul Knight, Samuel Fleming, Kelly Douglas Birr, Christopher A Mirabzadeh, Marissa Baylee King
  • Publication number: 20180082055
    Abstract: Techniques for selectively filtering data are discussed herein. For example, a request to include data in an electronic message or a request to copy the data to a portable storage device may be received. If the data is sensitive data, the techniques may determine a software application that was opened or closed prior to receiving the request, or information that was accessed prior to receiving the request. The techniques may determine if including the data in the electronic message or copying the data to the portable storage device poses a security risk. If a security risk is identified, a task may be performed, such as alerting a network administrator, providing a notification to a user regarding the data, or preventing copying or transmission of the data.
    Type: Application
    Filed: November 14, 2017
    Publication date: March 22, 2018
    Inventors: Samuel Fleming, Richard T. Weeks
  • Publication number: 20160052440
    Abstract: The present teaching provides a three wheel zero emission dumper vehicle, the vehicle comprising a chassis, the chassis supporting: two fixed front wheels, a single steering rear wheel, and a load carrying assembly, wherein the vehicle is configured such that a distribution of weight supported by the chassis is such that a centre of gravity of the vehicle is maintained within a triangle formed by the contact of the wheels on the ground in both loaded and unloaded states of the load carrying assembly.
    Type: Application
    Filed: April 3, 2014
    Publication date: February 25, 2016
    Inventors: Paul Samuel Fleming Young, Francis Anthony Byrne, Alexander Philip Murphy, Sean Breen
  • Patent number: 8321958
    Abstract: A software-based security agent that hooks into the operating system of a computer device in order to continuously audit the behavior and conduct of the end user of the computer device. The detected actions of the end user can be stored in a queue or log file that can be continuously monitored to detect patterns of behavior that may constitute a policy violation and/or security risk. When a pattern of behavior that may constitute a policy violation and/or security risk is detected, an event may be triggered. A frequency vector string matching algorithm also is disclosed. The frequency vector string matching algorithm may be used to detect the presence or partial presence of subject strings within a target string of alphanumeric characters. The frequency vector string matching algorithm could be used to detect typos in stored computer records or to search for records based on partial information.
    Type: Grant
    Filed: July 29, 2009
    Date of Patent: November 27, 2012
    Assignee: Next IT Corporation
    Inventors: Samuel Fleming, Richard T. Weeks
  • Patent number: 7032100
    Abstract: A processor architecture and instruction set is provided that is particularly well suited for cryptographic processing. A variety of techniques are employed to minimize the complexity of the design and to minimize the complexity of the interconnections within the device, thereby reducing the surface area required, and associated costs. A variety of techniques are also employed to ease the task of programming the processor for cryptographic processes, and to optimize the efficiency of instructions that are expected to be commonly used in the programming of such processes. In a preferred low-cost embodiment, a single-port random-access memory (RAM) is used for operand storage, few data busses and registers are used in the data-path, and the instruction set is optimized for parallel operations within instructions.
    Type: Grant
    Filed: December 17, 1999
    Date of Patent: April 18, 2006
    Assignee: Koninklijke Philips Electronics N.V.
    Inventors: George Samuel Fleming, Farrell L. Ostler, Antoine Farid Dagher