Patents by Inventor Steven Pettit

Steven Pettit has filed for patents to protect the following inventions. This listing includes patent applications that are pending as well as patents that have already been granted by the United States Patent and Trademark Office (USPTO).

  • Patent number: 9366047
    Abstract: A pool skimmer basket is provided and includes a top member having an opening for receiving and capturing debris into the pool skimmer basket and a base member having a plurality of apertures. It also includes a collapsible basket portion couples between the top member and the base member and an emptying device operatively coupled between the base member and the top member. The pool skimmer basket is moveable between an extended and collapsed position in response to operation of the emptying device. It also includes a handle coupled to the emptying device and a locking device operatively coupled to the handle, wherein the locking device is moveable between and locked and an unlocked position. The pool skimmer basket is moveable into the collapsed position when the locking device is in the unlocked position and retained in the extended position when the locking device is moved into the locked position.
    Type: Grant
    Filed: June 5, 2014
    Date of Patent: June 14, 2016
    Inventor: Steven Pettit
  • Publication number: 20150354241
    Abstract: A pool skimmer basket is provided and includes a top member having an opening for receiving and capturing debris into the pool skimmer basket and a base member having a plurality of apertures. It also includes a collapsible basket portion couples between the top member and the base member and an emptying device operatively coupled between the base member and the top member. The pool skimmer basket is moveable between an extended and collapsed position in response to operation of the emptying device. It also includes a handle coupled to the emptying device and a locking device operatively coupled to the handle, wherein the locking device is moveable between and locked and an unlocked position. The pool skimmer basket is moveable into the collapsed position when the locking device is in the unlocked position and retained in the extended position when the locking device is moved into the locked position.
    Type: Application
    Filed: June 5, 2014
    Publication date: December 10, 2015
    Inventor: Steven Pettit
  • Patent number: 7855972
    Abstract: The present invention provides a method and system for controlling usage of network resources on a communications network. The method comprising acts of: (a) creating one or more packet rules for analyzing packets received at one or more devices of the communications network, each rule including a condition and action to be taken if a packet received at a device satisfies the condition; and (b) creating one or more service abstractions associated with a user of the communication network, each service abstraction representing a named set of one or more of the packet rules. In some embodiments one or more role abstractions may be created, each role abstraction representing a role of a user with respect to the communications network, and each role abstraction including a set of one or more packet rules, and possibly one or more service abstractions.
    Type: Grant
    Filed: February 8, 2002
    Date of Patent: December 21, 2010
    Assignee: Enterasys Networks, Inc.
    Inventors: Steven A. Pettit, John Roese, Paula Jane Dunigan, James Richmond
  • Patent number: 7581249
    Abstract: A system and method to respond to intrusions detected on a network system including attached functions and a network infrastructure. The system includes means for receiving from an intrusion detection function information about intrusions, a directory service function for gathering and reporting at least the physical and logical addresses of devices of the network infrastructure associated with the detected intrusions, and a plurality of distributed enforcement devices of the network infrastructure for enforcing policies responsive to the detected intrusions. A policy decision function evaluates the reported detected intrusions and makes a determination whether one or more policy changes are required on the enforcement devices in response to a detected intrusion. A policy manager function configures the distributed enforcement devices with the responsive changed policy or policies.
    Type: Grant
    Filed: November 14, 2003
    Date of Patent: August 25, 2009
    Assignee: Enterasys Networks, Inc.
    Inventors: Richard Bussiere, Mark Townsend, Steven Pettit, David Harrington, John Roese, Richard Graham
  • Publication number: 20050233313
    Abstract: The present invention provides reagents and methods for identifying inhibitors of retrovirus protease activity. In particular embodiments, the retrovirus is HIV. Also provided are kits, nucleic acids and proteins for carrying out the methods of the invention.
    Type: Application
    Filed: July 30, 2003
    Publication date: October 20, 2005
    Inventors: Andrew Kaplan, Steven Pettit
  • Publication number: 20050108568
    Abstract: A system and method to respond to intrusions detected on a network system including attached functions and a network infrastructure. The system includes means for receiving from an intrusion detection function information about intrusions, a directory service function for gathering and reporting at least the physical and logical addresses of devices of the network infrastructure associated with the detected intrusions, and a plurality of distributed enforcement devices of the network infrastructure for enforcing policies responsive to the detected intrusions. A policy decision function evaluates the reported detected intrusions and makes a determination whether one or more policy changes are required on the enforcement devices in response to a detected intrusion. A policy manager function configures the distributed enforcement devices with the responsive changed policy or policies.
    Type: Application
    Filed: November 14, 2003
    Publication date: May 19, 2005
    Applicant: Enterasys Networks, Inc.
    Inventors: Richard Bussiere, Mark Townsend, Steven Pettit, David Harrington, John Roese, Richard Graham
  • Patent number: 6892309
    Abstract: A user's usage of network resources is controlled, after the user has been authenticated, without using any network resources beyond the user's entry point to the network. Packet rules may be provisioned to the user's entry point to the network, and the packet rules may be applied to each packet received from the user before any network resources beyond the entry point are used. These packet rules may be associated with an identity of the user and then provisioned to the user's entry point in response to the user being authenticated. Usage of network resources of a communications network by a user beyond a network device of the communications network that serves as the user's entry point to the communications network is controlled. The port module of the network device is configured with one or more packet rules corresponding to an identity of the user.
    Type: Grant
    Filed: February 8, 2002
    Date of Patent: May 10, 2005
    Assignee: Enterasys Networks, Inc.
    Inventors: James Richmond, Paula Jane Dunigan, David L. Kjendal, Steven A. Pettit
  • Publication number: 20030152035
    Abstract: Usage of network resources on a communications network is controlled by creating one or more packet rules for analyzing packets received at one or more devices of the communications network, each rule including a condition and action to be taken if a packet received at a device satisfies the condition, and creating one or more service abstractions, each service abstraction representing a named set of one or more of the packet rules. Further, one or more role abstractions may be created, each role abstraction representing a role of a user with respect to the communications network, and each role abstraction including a set of one more packet rules, and possibly one or more service abstractions. These role abstractions and service abstractions may be stored and distributed to network devices on the communications network.
    Type: Application
    Filed: February 8, 2002
    Publication date: August 14, 2003
    Inventors: Steven A. Pettit, John Roese, Paul Jane Dunigan, James Richmond
  • Publication number: 20030154380
    Abstract: A user's usage of network resources is controlled, after the user has been authenticated, without using any network resources beyond the user's entry point to the network. Packet rules may be provisioned to the user's entry point to the network, and the packet rules may be applied to each packet received from the user before any network resources beyond the entry point are used. These packet rules may be associated with an identity of the user and then provisioned to the user's entry point in response to the user being authenticated. Usage of network resources of a communications network by a user beyond a network device of the communications network that serves as the user's entry point to the communications network is controlled. The port module of the network device is configured with one or more packet rules corresponding to an identity of the user.
    Type: Application
    Filed: February 8, 2002
    Publication date: August 14, 2003
    Inventors: James Richmond, Paula Jane Dunigan, David L. Kjendal, Steven A. Pettit