Patents by Inventor Stephen Jeffrey Morris
Stephen Jeffrey Morris has filed for patents to protect the following inventions. This listing includes patent applications that are pending as well as patents that have already been granted by the United States Patent and Trademark Office (USPTO).
-
Patent number: 9917827Abstract: This invention relates to methods for controlling and monitoring access to network servers. In particular, the process described in the invention includes client-server sessions over the Internet. In this environment, when the user attempts to access an access-controlled file, the server subjects the request to a secondary server which determines whether the client has an authorization or valid account. Upon such verification, the user is provided with a session identification which allows the user to access to the requested file as well as any other files within the present protection domain.Type: GrantFiled: January 9, 2008Date of Patent: March 13, 2018Assignee: Soverain IP, LLCInventors: Thomas Mark Levergood, Lawrence C. Stewart, Stephen Jeffrey Morris, Andrew C. Payne, George Winfield Treese
-
Patent number: 9900305Abstract: This invention relates to methods for controlling and monitoring access to network servers. In particular, the process described in the invention includes client-server sessions over the Internet. In this environment, when the user attempts to access an access-controlled file, the server subjects the request to a secondary server which determines whether the client has an authorization or valid account. Upon such verification, the user is provided with a session identification which allows the user to access to the requested file as well as any other files within the present protection domain.Type: GrantFiled: December 13, 2005Date of Patent: February 20, 2018Assignee: Soverain IP, LLCInventors: Thomas Mark Levergood, Lawrence C. Stewart, Stephen Jeffrey Morris, Andrew C. Payne, George Winfield Treese
-
Patent number: 9087386Abstract: Tracking a target across a region is disclosed. A graphical user interface is provided that displays, in a first region, video from a field of view of a main video device, and, in a plurality of second regions, video from a field of view of each of a plurality of perimeter video devices (PVDs). The field of view of each PVD is proximate to the main video device's field of view. A selection of one of the plurality of PVDs is received. In response, video from a field of view of the selected PVD is displayed in the first region, and a plurality of candidate PVDs is identified. Each candidate PVD has a field of view proximate to the field of view of the selected PVD. The plurality of second regions is then repopulated with video from a field of view of each of the plurality of identified candidate PVDs.Type: GrantFiled: November 30, 2012Date of Patent: July 21, 2015Assignee: Vidsys, Inc.Inventors: Stephen Jeffrey Morris, Richard Casey Clarkson, Louis M. Colon, Jr.
-
Patent number: 9071626Abstract: A security installation positions a peering ability with a peer installation by establishing a peering agreement to define the conditions constituting a situation for which peering applies, and identifies the resources and assets which will be shared, as well as the duration of the peering, typically until the resolution of the exigent situation or circumstances that prompted the peering. Peering selectively couples security installations for monitoring a particular upon determining that a situation responsive to mediation has occurred within an area monitored by the security installation for monitoring an area. The security installation initiates a peering invitation to a peer installation, in which the peer installation is configured to share resources with the security installation for mitigating the cause of the situation.Type: GrantFiled: October 16, 2012Date of Patent: June 30, 2015Assignee: VIDSYS, INC.Inventors: Stephen Jeffrey Morris, Steven Arnold Bolton, Donald Campbell
-
Publication number: 20140152836Abstract: Tracking a target across a region is disclosed. A graphical user interface is provided that displays, in a first region, video from a field of view of a main video device, and, in a plurality of second regions, video from a field of view of each of a plurality of perimeter video devices (PVDs). The field of view of each PVD is proximate to the main video device's field of view. A selection of one of the plurality of PVDs is received. In response, video from a field of view of the selected PVD is displayed in the first region, and a plurality of candidate PVDs is identified. Each candidate PVD has a field of view proximate to the field of view of the selected PVD. The plurality of second regions is then repopulated with video from a field of view of each of the plurality of identified candidate PVDs.Type: ApplicationFiled: November 30, 2012Publication date: June 5, 2014Inventors: Stephen Jeffrey Morris, Richard Casey Clarkson, Louis M. Colon, JR.
-
Patent number: 8606900Abstract: Service requests from a client to a server system through a network are processed. A session identifier is appended to requests for information. The server responds to the requests from the client by returning the requested information to the client. Requests to particular information are counted, exclusive of repeated requests from a common client.Type: GrantFiled: April 12, 2000Date of Patent: December 10, 2013Assignee: Soverain Software LLCInventors: Thomas Mark Levergood, Lawrence C. Stewart, Stephen Jeffrey Morris, Andrew C. Payne, George Winfield Treese
-
Patent number: 8527655Abstract: Effecting the transmission of video data across a network of resources that includes incompatible resources is disclosed. Information indicating a source device and a destination device is received. The source device originates the video data and the destination device is to receive the video data. A plurality of paths between the source device and the destination device is identified. Each path is defined by a set of resources, the set of resources including resources needed to transmit the video data across any incompatible resources in the path. From the plurality of paths, a best path for transmission of the video data is determined based on the set of resources for that path, a distance between the source device and the destination device along that path, and a quality of the video data maintained by that path. The transmission of the video data is then effected across the determined best path.Type: GrantFiled: May 22, 2008Date of Patent: September 3, 2013Assignee: VIDSYS, Inc.Inventors: Stephen Jeffrey Morris, David Emmanuel Bartolini, Jason John Perreault, Richard Casey Clarkson, Victoria Diane Staubly
-
Patent number: 8356249Abstract: Intelligently crafting a dynamic video tour using a plurality of video devices selected in real time is provided. A list of attributes is received, the list of attributes describing at least one characteristic of a video device. A list of factors is continuously received, the list of factors describing one or more events, an event occurring at a point in time. A subset of the plurality of video devices is selected, based upon the received list of attributes and the received list of factors. The subset changes over time due to one or more changes in the list of factors. Video is displayed from the selected subset of the plurality of video devices as a tour, the displayed video changing over time as the selected subset changes over time.Type: GrantFiled: May 22, 2008Date of Patent: January 15, 2013Assignee: Vidsys, Inc.Inventors: Stephen Jeffrey Morris, David Emmanuel Bartolini, Victoria Diane Staubly
-
Patent number: 8350908Abstract: Tracking a target across a region is disclosed. A graphical user interface is provided that displays, in a first region, video from a field of view of a main video device, and, in a plurality of second regions, video from a field of view of each of a plurality of perimeter video devices (PVDs). The field of view of each PVD is proximate to the main video device's field of view. A selection of one of the plurality of PVDs is received. In response, video from a field of view of the selected PVD is displayed in the first region, and a plurality of candidate PVDs is identified. Each candidate PVD has a field of view proximate to the field of view of the selected PVD. The plurality of second regions is then repopulated with video from a field of view of each of the plurality of identified candidate PVDs.Type: GrantFiled: May 22, 2008Date of Patent: January 8, 2013Assignee: VIDSYS, Inc.Inventors: Stephen Jeffrey Morris, Richard Casey Clarkson
-
Patent number: 8305211Abstract: A security installation positions a peering ability with a peer installation by establishing a peering agreement to define the conditions constituting a situation for which peering applies, and identifies the resources and assets which will be shared, as well as the duration of the peering, typically until the resolution of the exigent situation or circumstances that prompted the peering. Peering selectively couples security installations for monitoring a particular upon determining that a situation responsive to mediation has occurred within an area monitored by the security installation for monitoring an area. The security installation initiates a peering invitation to a peer installation, in which the peer installation is configured to share resources with the security installation for mitigating the cause of the situation.Type: GrantFiled: October 1, 2009Date of Patent: November 6, 2012Assignee: VidSys, Inc.Inventors: Stephen Jeffrey Morris, Steven Arnold Bolton
-
Publication number: 20120179835Abstract: Effecting the transmission of video data across a network of resources that includes incompatible resources is disclosed. Information indicating a source device and a destination device is received. The source device originates the video data and the destination device is to receive the video data. A plurality of paths between the source device and the destination device is identified. Each path is defined by a set of resources, the set of resources including resources needed to transmit the video data across any incompatible resources in the path. From the plurality of paths, a best path for transmission of the video data is determined based on the set of resources for that path, a distance between the source device and the destination device along that path, and a quality of the video data maintained by that path. The transmission of the video data is then effected across the determined best path.Type: ApplicationFiled: May 22, 2008Publication date: July 12, 2012Inventors: Stephen Jeffrey Morris, David Emmanuel Bartolini, Jason John Perreault, Richard Casey Clarkson, Victoria Diane Staubly
-
Publication number: 20080294588Abstract: Correlating security event data according to one or more rules to initiate one or more actions is disclosed. Security event data is received, via an event pipeline, that defines an occurrence of an event. Each type of source of event data may have its own pipeline. Event objects are created from the received security event data, and are gathered into a rules engine. The rules engine includes a plurality of rules. Each rule defines one or more conditions to be met and one or more actions to be taken in response. A rule is evaluated at a frequency over a period of time using data contained within event objects, so to determine whether the one or more conditions defined within the evaluated rule are met. The one or more actions defined by the evaluated rule are initiated whenever the one or more conditions defined by that rule are met.Type: ApplicationFiled: May 22, 2008Publication date: November 27, 2008Inventors: Stephen Jeffrey Morris, Richard Casey Clarkson, Steven Arnold Bolton, Robert Leo MacDonald, JR., Gregory Wayne Barrett
-
Publication number: 20080294990Abstract: Intelligently crafting a dynamic video tour using a plurality of video devices selected in real time is provided. A list of attributes is received, the list of attributes describing at least one characteristic of a video device. A list of factors is continuously received, the list of factors describing one or more events, an event occurring at a point in time. A subset of the plurality of video devices is selected, based upon the received list of attributes and the received list of factors. The subset changes over time due to one or more changes in the list of factors. Video is displayed from the selected subset of the plurality of video devices as a tour, the displayed video changing over time as the selected subset changes over time.Type: ApplicationFiled: May 22, 2008Publication date: November 27, 2008Inventors: Stephen Jeffrey Morris, David Emmanuel Bartolini, Victoria Diane Staubly
-
Publication number: 20080292140Abstract: Tracking a target across a region is disclosed. A graphical user interface is provided that displays, in a first region, video from a field of view of a main video device, and, in a plurality of second regions, video from a field of view of each of a plurality of perimeter video devices (PVDs). The field of view of each PVD is proximate to the main video device's field of view. A selection of one of the plurality of PVDs is received. In response, video from a field of view of the selected PVD is displayed in the first region, and a plurality of candidate PVDs is identified. Each candidate PVD has a field of view proximate to the field of view of the selected PVD. The plurality of second regions is then repopulated with video from a field of view of each of the plurality of identified candidate PVDs.Type: ApplicationFiled: May 22, 2008Publication date: November 27, 2008Inventors: Stephen Jeffrey Morris, Richard Casey Clarkson
-
Publication number: 20080201344Abstract: This invention relates to methods for controlling and monitoring access to network servers. In particular, the process described in the invention includes client-server sessions over the Internet. In this environment, when the user attempts to access an access-controlled file, the server subjects the request to a secondary server which determines whether the client has an authorization or valid account. Upon such verification, the user is provided with a session identification which allows the user to access to the requested file as well as any other files within the present protection domain.Type: ApplicationFiled: April 25, 2008Publication date: August 21, 2008Inventors: Thomas Mark Levergood, Lawrence C. Stewart, Stephen Jeffrey Morris, Andrew C. Payne, George Winfield Treese
-
Patent number: 7340510Abstract: Conventional replication status reporting techniques in a Content Delivery Network (CDN) tend to produce large, unwieldy reports which are difficult to transmit, consume large amounts of bandwidth, and require a large share of CPU resources to process. A replication status reporter which identifies an ordered list of events corresponding to content items (files) for replication (pre-positioning) in a content delivery network, and determines a point of progression along a sequence represented by the ordered list of files, allows a management server to avoid computationally expensive endeavors which itemize and transmit lists of every replicated file in the CDN. The servers in a CDN channel receive files as a series of ordered events. Origin servers deliver the files generally according the event. A replication status report indicates the progression in the list, rather than enumerating the entire list, avoids cumbersome and unnecessary processing and delays in reporting replication status.Type: GrantFiled: November 18, 2003Date of Patent: March 4, 2008Assignee: Cisco Technology, Inc.Inventors: Barbara Liskov, Dmitry Stavisky, Stephen Jeffrey Morris
-
Patent number: 7272639Abstract: This invention relates to methods for controlling and monitoring access to network servers. In particular, the process described in the invention includes client-server sessions over the Internet. In this environment, when the user attempts to access an access-controlled file, the server subjects the request to a secondary server which determines whether the client has an authorization or valid account. Upon such verification, the user is provided with a session identification which allows the user to access to the requested file as well as any other files within the present protection domain.Type: GrantFiled: January 12, 1998Date of Patent: September 18, 2007Assignee: Soverain Software LLCInventors: Thomas Mark Levergood, Lawrence C. Stewart, Stephen Jeffrey Morris, Andrew C. Payne, George Winfield Treese
-
Patent number: 7257628Abstract: Mechanisms and techniques provide a system that operates in a computerized device(s) to establish a data distribution path for content within a content distribution network by receiving a network topology definition defining at least one hierarchical interconnection of network groups. Each network group comprises at least one content engine. The system also receives a channel definition comprising a selection of a plurality of content engines that are to distribute content within the content distribution network. The plurality of content engines in the channel definition is selected from content engines within the network groups defined within the network topology definition.Type: GrantFiled: June 23, 2003Date of Patent: August 14, 2007Assignee: Cisco Technology, Inc.Inventors: Barbara Liskov, Dmitry Stavisky, Stephen Jeffrey Morris, Dan Li
-
Patent number: 7228337Abstract: In a computational device, a technique provides network communications to a virtual machine. In particular, the technique includes receiving a first communications signal having a first address and data from an external device, performing a network address translation operation based on the first communications signal to obtain a second address that identifies the virtual machine and providing a second communications signal having the second address and the data, to the virtual machine. The technique may further include using an external network Internet Protocol address and port identifier and to translate the first communications signal into an internal network Internet Protocol address by accessing an entry of a network address translation table.Type: GrantFiled: September 11, 2001Date of Patent: June 5, 2007Assignee: Cisco Technology, Inc.Inventors: David M. Bornstein, Stephen Jeffrey Morris, James W. O'Toole, Jr.
-
Patent number: 5708780Abstract: This invention relates to methods for controlling and monitoring access to network servers. In particular, the process described in the invention includes client-server sessions over the Internet involving hypertext files. In the hypertext environment, a client views a document transmitted by a content server with a standard program known as the browser. Each hypertext document or page contains links to other hypertext pages which the user may select to traverse. When the user selects a link that is directed to an access-controlled file, the server subjects the request to a secondary server which determines whether the client has an authorization or valid account. Upon such verification, the user is provided with a session identification which allows the user to access to the requested file as well as any other files within the present protection domain.Type: GrantFiled: June 7, 1995Date of Patent: January 13, 1998Assignee: Open Market, Inc.Inventors: Thomas Mark Levergood, Lawrence C. Stewart, Stephen Jeffrey Morris, Andrew C. Payne, George Winfield Treese