Patents by Inventor William D. Burns

William D. Burns has filed for patents to protect the following inventions. This listing includes patent applications that are pending as well as patents that have already been granted by the United States Patent and Trademark Office (USPTO).

  • Patent number: 11927164
    Abstract: A throttle body assembly for a combustion engine includes a throttle body having a pressure chamber including a supply of liquid fuel, and a throttle bore with an inlet through which air is received. A throttle valve is carried by the throttle body with a valve head movable relative to the throttle bore. A metering valve is coupled to the throttle body, and has a valve element that is movable between open and closed positions. A boost venturi is located in the throttle bore and has an inner passage that is open at both ends to the throttle bore. The boost venturi has an opening through which fuel flows into the inner passage when the valve element is in the open position, wherein fuel flows from the pressure chamber to the metering valve under the force of gravity or under a pressure of less than 6 psi.
    Type: Grant
    Filed: November 17, 2022
    Date of Patent: March 12, 2024
    Assignee: Walbro LLC
    Inventors: Gary J. Burns, Andreas D. M. Dixon, Eric G. Zbytowski, Albert L Sayers, Justin T. Dolane, David L Speirs, William E. Galka, Duried F. Rabban, Bradley J. Roche
  • Patent number: 10511623
    Abstract: A data processing method comprising obtaining a plurality of computer network security threat feeds from two or more computer threat detection systems; based upon computer network attack information in the computer network security threat feeds, determining a threat score that represents a severity of an actual or suspected attack on a particular host in a computer network; obtaining an asset value for the particular host that indicates a worth of the particular host, and updating the threat score based upon the asset value; mapping the updated threat score to one of a plurality of remediation actions, wherein a first remediation action is mapped when the updated threat score is low and a second, different remediation action is mapped when the updated threat score is high; based upon the updated threat score and the mapping, selecting and automatically performing one of the plurality of remediation actions on the particular host; wherein the method is performed by one or more special-purpose computing devices
    Type: Grant
    Filed: May 4, 2016
    Date of Patent: December 17, 2019
    Assignee: NETFLIX, INC.
    Inventors: William D. Burns, Robert Fry
  • Publication number: 20160248805
    Abstract: A data processing method comprising obtaining a plurality of computer network security threat feeds from two or more computer threat detection systems; based upon computer network attack information in the computer network security threat feeds, determining a threat score that represents a severity of an actual or suspected attack on a particular host in a computer network; obtaining an asset value for the particular host that indicates a worth of the particular host, and updating the threat score based upon the asset value; mapping the updated threat score to one of a plurality of remediation actions, wherein a first remediation action is mapped when the updated threat score is low and a second, different remediation action is mapped when the updated threat score is high; based upon the updated threat score and the mapping, selecting and automatically performing one of the plurality of remediation actions on the particular host; wherein the method is performed by one or more special-purpose computing devices
    Type: Application
    Filed: May 4, 2016
    Publication date: August 25, 2016
    Inventors: WILLIAM D. BURNS, ROB FRY
  • Patent number: 9338181
    Abstract: A data processing method comprising obtaining a plurality of computer network security threat feeds from two or more computer threat detection systems; based upon computer network attack information in the computer network security threat feeds, determining a threat score that represents a severity of an actual or suspected attack on a particular host in a computer network; obtaining an asset value for the particular host that indicates a worth of the particular host, and updating the threat score based upon the asset value; mapping the updated threat score to one of a plurality of remediation actions, wherein a first remediation action is mapped when the updated threat score is low and a second, different remediation action is mapped when the updated threat score is high; based upon the updated threat score and the mapping, selecting and automatically performing one of the plurality of remediation actions on the particular host; wherein the method is performed by one or more special-purpose computing devices
    Type: Grant
    Filed: March 5, 2014
    Date of Patent: May 10, 2016
    Assignee: Netflix, Inc.
    Inventors: William D. Burns, Rob Fry
  • Patent number: 7653701
    Abstract: A network device configured to be coupled to a network includes a plurality of input/output ports configured to be coupled to a plurality of input sources and receive a plurality of input data items. The network device includes an input device for entering destination information and output format information for each of the plurality of input data items. An interface bridge coupled to the plurality of input/output ports receives the plurality of input data items from the plurality of input/output ports and outputs the plurality of input data items using a single output protocol. A controller coupled to the interface bridges receives the plurality of input data items. The controller automatically converts each of the input data items to an output data item based on the entered destination and output format information, and automatically outputs the output data items to the network.
    Type: Grant
    Filed: February 23, 2001
    Date of Patent: January 26, 2010
    Assignee: Hewlett-Packard Development Company, L.P.
    Inventors: William D. Burns, Michael W. Jensen, Loren R. Mart
  • Publication number: 20040103317
    Abstract: The invention comprises a technique in which a desired computer security policy, e.g. member or corporate security policy, can be enforced by performing a host computer security assessment at the time of user authentication by means of a system configuration that comprises a managed and trusted device. In this way, a company can extend their corporate security policy to the user's desktop and verify an untrusted host, e.g. a PC, by means of a trustworthy technology, e.g. a hardened smartcard. Because the smartcard is relatively tamperproof, operations performed on the card are considered more trustworthy than those running solely on the PC.
    Type: Application
    Filed: March 6, 2003
    Publication date: May 27, 2004
    Inventor: William D. Burns
  • Publication number: 20020120777
    Abstract: A network device configured to be coupled to a network having an e-mail server receives a plurality of input data items from a plurality of input sources in a plurality of input formats. The network device outputs a plurality of output data items in a plurality of output formats to the network. The network device includes a plurality of input/output ports configured to be coupled to the plurality of input sources. The plurality of input data items are received by the network device through the plurality of input/output ports. The network device includes an input device for entering destination information and output format information for each of the plurality of input data items. An interface bridge is coupled to the plurality of input/output ports. The interface bridge receives the plurality of input data items from the plurality of input/output ports and outputs the plurality of input data items using a single output protocol. A controller is coupled to the interface bridge.
    Type: Application
    Filed: February 23, 2001
    Publication date: August 29, 2002
    Inventors: William D. Burns, Michael W. Jensen, Loren R. Mart