Patents by Inventor A. Michael Kinsley
A. Michael Kinsley has filed for patents to protect the following inventions. This listing includes patent applications that are pending as well as patents that have already been granted by the United States Patent and Trademark Office (USPTO).
-
Patent number: 11134094Abstract: A metric value is determined for each event in a set of events that characterizes a computational communication or object. For example, a metric value could include a length of a URL or agent string in the event. A subset criterion is generated, such that metric values within the subset are relatively separated from a population's center (e.g., within a distribution tail). Application of the criterion to metric values produces a subset. A representation of the subset is presented in an interactive dashboard. The representation can include unique values in the subset and counts of corresponding event occurrences. Clients can select particular elements in the representation to cause more detail to be presented with respect to individual events corresponding to specific values in the subset. Thus, clients can use their knowledge system operations and observance of value frequencies and underlying events to identify anomalous metric values and potential security threats.Type: GrantFiled: January 30, 2020Date of Patent: September 28, 2021Assignee: SPLUNK INC.Inventors: Munawar Monzy Merza, John Coates, James M Hansen, Lucas Murphey, David Hazekamp, Michael Kinsley, Alexander Raitz
-
Publication number: 20200169579Abstract: A metric value is determined for each event in a set of events that characterizes a computational communication or object. For example, a metric value could include a length of a URL or agent string in the event. A subset criterion is generated, such that metric values within the subset are relatively separated from a population's center (e.g., within a distribution tail). Application of the criterion to metric values produces a subset. A representation of the subset is presented in an interactive dashboard. The representation can include unique values in the subset and counts of corresponding event occurrences. Clients can select particular elements in the representation to cause more detail to be presented with respect to individual events corresponding to specific values in the subset. Thus, clients can use their knowledge system operations and observance of value frequencies and underlying events to identify anomalous metric values and potential security threats.Type: ApplicationFiled: January 30, 2020Publication date: May 28, 2020Inventors: Munawar Monzy Merza, John Coates, James M. Hansen, Lucas Murphey, David Hazekamp, Michael Kinsley, Alexander Raitz
-
Patent number: 10567412Abstract: A metric value is determined for each event in a set of events that characterizes a computational communication or object. For example, a metric value could include a length of a URL or agent string in the event. A subset criterion is generated, such that metric values within the subset are relatively separated from a population's center (e.g., within a distribution tail). Application of the criterion to metric values produces a subset. A representation of the subset is presented in an interactive dashboard. The representation can include unique values in the subset and counts of corresponding event occurrences. Clients can select particular elements in the representation to cause more detail to be presented with respect to individual events corresponding to specific values in the subset. Thus, clients can use their knowledge system operations and observance of value frequencies and underlying events to identify anomalous metric values and potential security threats.Type: GrantFiled: August 9, 2018Date of Patent: February 18, 2020Assignee: SPLUNK INC.Inventors: Munawar Monzy Merza, John Coates, James M Hansen, Lucas Murphey, David Hazekamp, Michael Kinsley, Alexander Raitz
-
Patent number: 10091227Abstract: A metric value is determined for each event in a set of events that characterizes a computational communication or object. For example, a metric value could include a length of a URL or agent string in the event. A subset criterion is generated, such that metric values within the subset are relatively separated from a population's center (e.g., within a distribution tail). Application of the criterion to metric values produces a subset. A representation of the subset is presented in an interactive dashboard. The representation can include unique values in the subset and counts of corresponding event occurrences. Clients can select particular elements in the representation to cause more detail to be presented with respect to individual events corresponding to specific values in the subset. Thus, clients can use their knowledge system operations and observance of value frequencies and underlying events to identify anomalous metric values and potential security threats.Type: GrantFiled: November 1, 2016Date of Patent: October 2, 2018Assignee: SPLUNK INC.Inventors: Munawar Monzy Merza, John Coates, James M Hansen, Lucas Murphey, David Hazekamp, Michael Kinsley, Alexander Raitz
-
Patent number: 9633179Abstract: Methods and devices are provided for central management of licenses, particularly those relating to wagering games. A license proxy deployed in and/or dedicated to a gaming establishment may operate under the control of a central licensing manager controlled by another entity, e.g., by a game provider. The license proxy may receive requests to enable features of an electronic gaming machine of the gaming establishment (e.g., game themes, player tracking features and/or peripheral device features) and determine, based on information provided by the central licensing manager, whether to grant such requests. The license proxy may also process requests to enable features of other devices in a gaming establishment, such as server-based features.Type: GrantFiled: September 10, 2012Date of Patent: April 25, 2017Assignee: IGTInventor: Michael Kinsley
-
Publication number: 20170048265Abstract: A metric value is determined for each event in a set of events that characterizes a computational communication or object. For example, a metric value could include a length of a URL or agent string in the event. A subset criterion is generated, such that metric values within the subset are relatively separated from a population's center (e.g., within a distribution tail). Application of the criterion to metric values produces a subset. A representation of the subset is presented in an interactive dashboard. The representation can include unique values in the subset and counts of corresponding event occurrences. Clients can select particular elements in the representation to cause more detail to be presented with respect to individual events corresponding to specific values in the subset. Thus, clients can use their knowledge system operations and observance of value frequencies and underlying events to identify anomalous metric values and potential security threats.Type: ApplicationFiled: November 1, 2016Publication date: February 16, 2017Inventors: Munawar Monzy Merza, John Coates, James M. Hansen, Lucas Murphey, David Hazekamp, Michael Kinsley, Alexander Raitz
-
Patent number: 9516046Abstract: A metric value is determined for each event in a set of events that characterizes a computational communication or object. For example, a metric value could include a length of a URL or agent string in the event. A subset criterion is generated, such that metric values within the subset are relatively separated from a population's center (e.g., within a distribution tail). Application of the criterion to metric values produces a subset. A representation of the subset is presented in an interactive dashboard. The representation can include unique values in the subset and counts of corresponding event occurrences. Clients can select particular elements in the representation to cause more detail to be presented with respect to individual events corresponding to specific values in the subset. Thus, clients can use their knowledge system operations and observance of value frequencies and underlying events to identify anomalous metric values and potential security threats.Type: GrantFiled: October 31, 2015Date of Patent: December 6, 2016Assignee: Splunk Inc.Inventors: Munawar Monzy Merza, John Coates, James M Hansen, Lucas Murphey, David Hazekamp, Michael Kinsley, Alexander Raitz
-
Publication number: 20160057162Abstract: A metric value is determined for each event in a set of events that characterizes a computational communication or object. For example, a metric value could include a length of a URL or agent string in the event. A subset criterion is generated, such that metric values within the subset are relatively separated from a population's center (e.g., within a distribution tail). Application of the criterion to metric values produces a subset. A representation of the subset is presented in an interactive dashboard. The representation can include unique values in the subset and counts of corresponding event occurrences. Clients can select particular elements in the representation to cause more detail to be presented with respect to individual events corresponding to specific values in the subset. Thus, clients can use their knowledge system operations and observance of value frequencies and underlying events to identify anomalous metric values and potential security threats.Type: ApplicationFiled: October 31, 2015Publication date: February 25, 2016Inventors: Munawar Monzy Merza, John Coates, James M Hansen, Lucas Murphey, David Hazekamp, Michael Kinsley, Alexander Raitz
-
Patent number: 9215240Abstract: A metric value is determined for each event in a set of events that characterizes a computational communication or object. For example, a metric value could include a length of a URL or agent string in the event. A subset criterion is generated, such that metric values within the subset are relatively separated from a population's center (e.g., within a distribution tail). Application of the criterion to metric values produces a subset. A representation of the subset is presented in an interactive dashboard. The representation can include unique values in the subset and counts of corresponding event occurrences. Clients can select particular elements in the representation to cause more detail to be presented with respect to individual events corresponding to specific values in the subset. Thus, clients can use their knowledge system operations and observance of value frequencies and underlying events to identify anomalous metric values and potential security threats.Type: GrantFiled: July 31, 2013Date of Patent: December 15, 2015Assignee: Splunk Inc.Inventors: Munawar Monzy Merza, John Coates, James Hansen, Lucas Murphey, David Hazekamp, Michael Kinsley, Alexander Raitz
-
Patent number: 9142096Abstract: Methods and devices are provided for managing licenses in gaming networks. Some aspects of the invention are provided as a license manager module that operates as part of a server-based system for provisioning and configuring gaming machines. Security and authentication techniques are provided to prevent unauthorized gaming software usage. Such gaming software may be, for example, downloaded to gaming machines in the network under the control of a gaming establishment's game management server that is in communication with a license manager device. In preferred implementations, a gaming machine is prevented from executing software for a game of chance unless the license for that game is valid and has not expired.Type: GrantFiled: March 2, 2012Date of Patent: September 22, 2015Assignee: IGTInventors: Michael Kinsley, Steven LeMay, Lance Orner
-
Patent number: 8713308Abstract: Methods and systems for creating and managing certificates for gaming machines in a gaming network using a portable memory device. A gaming machine creates a certificate signing request which is stored on a portable memory device at the machine. Then, the memory device is coupled with an appropriate CA server. A certificate batch utility program on the server downloads and processes the CSRs. A certificate services program on the server issues gaming machine certificates according to the CSRs. In one embodiment, the certificates are uploaded onto the memory device, along with copies of certificate authority server certificates, including a root CA certificate. Then, the memory device is coupled with the gaming machine and software on the machine identifies and downloads its certificate based on the certificate file name.Type: GrantFiled: January 22, 2013Date of Patent: April 29, 2014Assignee: IGTInventors: John H. Kim, Matthew D. Kerr, Nicholas M. Hansen-Hiraki, William M. Salivar, Warner R. Cockerille, IV, A. Michael Kinsley, Regan J. Snyder
-
Publication number: 20130326620Abstract: A metric value is determined for each event in a set of events that characterizes a computational communication or object. For example, a metric value could include a length of a URL or agent string in the event. A subset criterion is generated, such that metric values within the subset are relatively separated from a population's center (e.g., within a distribution tail). Application of the criterion to metric values produces a subset. A representation of the subset is presented in an interactive dashboard. The representation can include unique values in the subset and counts of corresponding event occurrences. Clients can select particular elements in the representation to cause more detail to be presented with respect to individual events corresponding to specific values in the subset. Thus, clients can use their knowledge system operations and observance of value frequencies and underlying events to identify anomalous metric values and potential security threats.Type: ApplicationFiled: July 31, 2013Publication date: December 5, 2013Applicant: Splunk Inc.Inventors: Munawar Monzy Merza, John Coates, James Hansen, Lucas Murphey, David Hazekamp, Michael Kinsley, Alexander Raitz
-
Publication number: 20130145154Abstract: Methods and systems for creating and managing certificates for gaming machines in a gaming network using a portable memory device. A gaming machine creates a certificate signing request which is stored on a portable memory device at the machine. Then, the memory device is coupled with an appropriate CA server. A certificate batch utility program on the server downloads and processes the CSRs. A certificate services program on the server issues gaming machine certificates according to the CSRs. In one embodiment, the certificates are uploaded onto the memory device, along with copies of certificate authority server certificates, including a root CA certificate. Then, the memory device is coupled with the gaming machine and software on the machine identifies and downloads its certificate based on the certificate file name.Type: ApplicationFiled: January 22, 2013Publication date: June 6, 2013Applicant: IGTInventors: John H. Kim, Matthew D. Kerr, Nicholas M. Hansen-Hiraki, William M. Salivar, Warner R. Cockerille, IV, A. Michael Kinsley, Regan J. Snyder
-
Patent number: 8388448Abstract: The present invention provides methods, devices and systems for downloading gaming software. According to some implementations of the invention, gaming software is continuously transmitted on a plurality of channels, e.g., by one or more servers. In some such implementations, each channel is dedicated to software for a different wagering game. In other implementations, gaming software components are transmitted on a plurality of channels, with each channel dedicated to a particular gaming software component. Some implementations provide gaming software in response to a request from a gaming machine. Implementations over dedicated and/or public networks are provided. Preferred implementations of the invention allow gaming software to be downloaded to gaming machines in a secure manner that automatically ensures that licensing and regulatory requirements are satisfied. Some such implementations determine whether payment is required for gaming software and provide for automated payment, if so required.Type: GrantFiled: May 5, 2011Date of Patent: March 5, 2013Assignee: IGTInventors: Michael Kinsley, Binh T. Nguyen, Jamal Benbrahim
-
Patent number: 8386785Abstract: Methods and systems for creating and managing certificates for gaming machines in a gaming network using a portable memory device are described. A gaming machine creates a certificate signing request which is stored on a portable memory device at the machine by an operator. The memory device is handed over to a certificate authority (CA) security officer at the casino and is coupled with an appropriate CA server. A certificate batch utility program on the server downloads and processes the CSRs. A certificate services program on the server issues gaming machine certificates according to the CSRs. In one embodiment, the certificates are uploaded onto the memory device, along with copies of certificate authority server certificates, including a root CA certificate. The CA security officer hands the memory device to the casino floor operator. At the machine, the operator inserts or couples the device and software on the machine identifies and downloads its certificate based on the certificate file name.Type: GrantFiled: June 18, 2008Date of Patent: February 26, 2013Assignee: IGTInventors: John H. Kim, Matthew D. Kerr, Nicholas M. Hansen-Hiraki, William M. Salivar, Warner R. Cockerille, IV, A. Michael Kinsley, Regan J. Snyder
-
Publication number: 20130012308Abstract: Methods and devices are provided for central management of licenses, particularly those relating to wagering games. A license proxy deployed in and/or dedicated to a gaming establishment may operate under the control of a central licensing manager controlled by another entity, e.g., by a game provider. The license proxy may receive requests to enable features of an electronic gaming machine of the gaming establishment (e.g., game themes, player tracking features and/or peripheral device features) and determine, based on information provided by the central licensing manager, whether to grant such requests. The license proxy may also process requests to enable features of other devices in a gaming establishment, such as server-based features.Type: ApplicationFiled: September 10, 2012Publication date: January 10, 2013Applicant: IGTInventor: Michael Kinsley
-
Publication number: 20130005451Abstract: Methods and devices are provided for central management of licenses, particularly those relating to wagering games. A license proxy deployed in and/or dedicated to a gaming establishment may operate under the control of a central licensing manager controlled by another entity, e.g., by a game provider. The license proxy may receive requests to enable features of an electronic gaming machine of the gaming establishment (e.g., game themes, player tracking features and/or peripheral device features) and determine, based on information provided by the central licensing manager, whether to grant such requests. The license proxy may also process requests to enable features of other devices in a gaming establishment, such as server-based features.Type: ApplicationFiled: September 10, 2012Publication date: January 3, 2013Applicant: IGTInventor: Michael Kinsley
-
Publication number: 20130007878Abstract: Methods and devices are provided for central management of licenses, particularly those relating to wagering games. A license proxy deployed in and/or dedicated to a gaming establishment may operate under the control of a central licensing manager controlled by another entity, e.g., by a game provider. The license proxy may receive requests to enable features of an electronic gaming machine of the gaming establishment (e.g., game themes, player tracking features and/or peripheral device features) and determine, based on information provided by the central licensing manager, whether to grant such requests. The license proxy may also process requests to enable features of other devices in a gaming establishment, such as server-based features.Type: ApplicationFiled: September 10, 2012Publication date: January 3, 2013Applicant: IGTInventor: Michael Kinsley
-
Patent number: 8285646Abstract: Methods and devices are provided for central management of licenses, particularly those relating to wagering games. A license proxy deployed in and/or dedicated to a gaming establishment may operate under the control of a central licensing manager controlled by another entity, e.g., by a game provider. The license proxy may receive requests to enable features of an electronic gaming machine of the gaming establishment (e.g., game themes, player tracking features and/or peripheral device features) and determine, based on information provided by the central licensing manager, whether to grant such requests. The license proxy may also process requests to enable features of other devices in a gaming establishment, such as server-based features.Type: GrantFiled: March 19, 2007Date of Patent: October 9, 2012Assignee: IGTInventor: Michael Kinsley
-
Publication number: 20120165094Abstract: Methods and devices are provided for managing licenses in gaming networks. Some aspects of the invention are provided as a license manager module that operates as part of a server-based system for provisioning and configuring gaming machines. Security and authentication techniques are provided to prevent unauthorized gaming software usage. Such gaming software may be, for example, downloaded to gaming machines in the network under the control of a gaming establishment's game management server that is in communication with a license manager device. In preferred implementations, a gaming machine is prevented from executing software for a game of chance unless the license for that game is valid and has not expired.Type: ApplicationFiled: March 2, 2012Publication date: June 28, 2012Applicant: IGTInventors: Michael Kinsley, Steven LeMay, Lance Orner