Patents by Inventor Aaron Campbell

Aaron Campbell has filed for patents to protect the following inventions. This listing includes patent applications that are pending as well as patents that have already been granted by the United States Patent and Trademark Office (USPTO).

  • Publication number: 20200102133
    Abstract: A packaging backer card has features running along at least one edge thereof to create rigidity in the card. The features imparting rigidity may be integral with the backer card and may lie flat, in the same plane as the backer card, in a flattened configuration. The features imparting rigidity may be formed by folding at least a portion of the backer card along at least one side, where one or more tabs may be used to retain and lock the folds in the folded configuration. The folded configuration may create one or more longitudinal fold lines that contribute to reducing the likelihood of flexing, bending or drooping of the backer card. The backer card may be used to secure an item, such as a medical device, thereto.
    Type: Application
    Filed: October 25, 2018
    Publication date: April 2, 2020
    Inventors: Tyler BELL, Alfredo PINEDA, Job YEO, Alex SOLANO, Paul LACANLALE, Andrew KIM, Aaron CAMPBELL, Edward A. GENTILE
  • Patent number: 10542969
    Abstract: According to an aspect, a device includes an elongate member, a suture, and a needle. The elongate member has a first end portion and a second end portion. The elongate member defines a lumen and a slot. The lumen extends from the first end portion to the second end portion. The slot extends from the first end portion to the second end portion. A portion of the suture is wrapped around the elongate member. The needle is coupled to the suture.
    Type: Grant
    Filed: September 20, 2016
    Date of Patent: January 28, 2020
    Assignee: Boston Scientific Scimed, Inc.
    Inventors: Peter J. Pereira, Aaron Campbell, Joseph Gordon, William J. Kane, Shane Siwinski, Ayan A. Bhandari
  • Patent number: 10243971
    Abstract: A method is provided to monitor network traffic, including reserving a portion of a system memory for short-term storage of copied network traffic, wherein the system memory is volatile, receiving copied packets of intercepted network traffic traversing a network, wherein the packets are associated with a plurality of respective traffic streams included in the network traffic, storing the copied packets in the portion of the system memory, maintaining an ordered list per traffic stream of copied packets that are stored, removing copied packets selected, based on their positions in their respective ordered lists, from the portion of the system memory based on a storage constraint, receiving an attack alert identifying a packet that is involved in a network attack, identifying the traffic stream that includes the packet identified, and transferring stored copied packets that are included in the identified traffic stream from the portion of the system memory to a long-term storage device.
    Type: Grant
    Filed: March 25, 2016
    Date of Patent: March 26, 2019
    Assignee: Arbor Networks, Inc.
    Inventors: Aaron Campbell, Christopher R. Hand, Frank Murphy
  • Publication number: 20170279817
    Abstract: A method is provided to monitor network traffic, including reserving a portion of a system memory for short-term storage of copied network traffic, wherein the system memory is volatile, receiving copied packets of intercepted network traffic traversing a network, wherein the packets are associated with a plurality of respective traffic streams included in the network traffic, storing the copied packets in the portion of the system memory, maintaining an ordered list per traffic stream of copied packets that are stored, removing copied packets selected, based on their positions in their respective ordered lists, from the portion of the system memory based on a storage constraint, receiving an attack alert identifying a packet that is involved in a network attack, identifying the traffic stream that includes the packet identified, and transferring stored copied packets that are included in the identified traffic stream from the portion of the system memory to a long-term storage device.
    Type: Application
    Filed: March 25, 2016
    Publication date: September 28, 2017
    Applicant: Arbor Networks, Inc.
    Inventors: Aaron Campbell, Christopher R. Hand, Frank Murphy
  • Publication number: 20170079638
    Abstract: According to an aspect, a device includes an elongate member, a suture, and a needle. The elongate member has a first end portion and a second end portion. The elongate member defines a lumen and a slot. The lumen extends from the first end portion to the second end portion. The slot extends from the first end portion to the second end portion. A portion of the suture is wrapped around the elongate member. The needle is coupled to the suture.
    Type: Application
    Filed: September 20, 2016
    Publication date: March 23, 2017
    Inventors: Peter J. Pereira, Aaron Campbell, Joseph Gordon, William J. Kane, Shane Siwinski, Ayan A. Bhandari
  • Patent number: 9426174
    Abstract: A method and system for managing data traffic and protecting computing assets. The method and system includes analyzing HTTP requests to determine if the HTTP requests are overly segmented, and, if the HTTP request is overly segmented, blocking and/or black-listing the malevolent communications and computing device. The analysis to determine if an HTTP request is overly segmented includes comparing the packet's size to a threshold, identifying the packet's content or lack thereof, identifying whether the packet is the last packet in a communication, and identifying whether the packet ends with the ā€œ\nā€ ASCII character.
    Type: Grant
    Filed: December 5, 2013
    Date of Patent: August 23, 2016
    Assignee: Arbor Networks, Inc.
    Inventor: Aaron Campbell
  • Patent number: 9060020
    Abstract: A system, method and computer readable storage medium that receives traffic/packets from external devices attempting to access protected devices in a protected network. A determination is made to whether a received packet belongs to one of a plurality of packet classifications. Each packet classification indicative of different classes of IP traffic. Countermeasures are applied to a received packet to prevent attack upon the protected devices. Applying a countermeasure to a received packet determined to belong to one of the plurality of packet classifications includes countermeasure modification/selection contingent upon the determined packet classification for the received packet.
    Type: Grant
    Filed: April 24, 2013
    Date of Patent: June 16, 2015
    Assignee: Arbor Networks, Inc.
    Inventors: Scott Iekel-Johnson, Aaron Campbell, Lawrence Bruce Huston, III, Brian Moran, Jeff Edwards, Marc Eisenbarth, Jose Oscar Nazario
  • Publication number: 20150163241
    Abstract: A method and system for managing data traffic and protecting computing assets. The method and system includes analyzing HTTP requests to determine if the HTTP requests are overly segmented, and, if the HTTP request is overly segmented, blocking and/or black-listing the malevolent communications and computing device. The analysis to determine if an HTTP request is overly segmented includes comparing the packet's size to a threshold, identifying the packet's content or lack thereof, identifying whether the packet is the last packet in a communication, and identifying whether the packet ends with the ā€œ\nā€ ASCII character.
    Type: Application
    Filed: December 5, 2013
    Publication date: June 11, 2015
    Applicant: ARBOR NETWORKS, INC.
    Inventor: Aaron Campbell
  • Patent number: 8990938
    Abstract: A system and method are provided to receive mirrored versions of transmissions sent by a node in response to initiating transmissions received by the node over a network. At least one mirrored response transmission sent from the node in response to at least one corresponding initiating transmission is analyzed to determine whether or not the corresponding at least one initiating transmission is malicious.
    Type: Grant
    Filed: May 16, 2013
    Date of Patent: March 24, 2015
    Assignee: Arbor Networks, Inc.
    Inventors: Lawrence Bruce Huston, III, Aaron Campbell
  • Publication number: 20140325634
    Abstract: A system, method and computer readable storage medium that receives traffic/packets from external devices attempting to access protected devices in a protected network. A determination is made to whether a received packet belongs to one of a plurality of packet classifications. Each packet classification indicative of different classes of IP traffic. Countermeasures are applied to a received packet to prevent attack upon the protected devices. Applying a countermeasure to a received packet determined to belong to one of the plurality of packet classifications includes countermeasure modification/selection contingent upon the determined packet classification for the received packet.
    Type: Application
    Filed: April 24, 2013
    Publication date: October 30, 2014
    Inventors: Scott Iekel-Johnson, Aaron Campbell, Lawrence Bruce Huston, III, Brian Moran, Jeff Edwards, Marc Eisenbarth, Jose Oscar Nazario
  • Patent number: 8661522
    Abstract: A system and method to track external devices attempting to connect to a protected network using probabilistic filters. When a connection from a new external device attempts to access the protected network, the memory of a protection system, which is organized as a probabilistic filter, is searched to determine if the IP address already exists in the memory of protection system. If the search locates the IP address, the protection system terminates the connection to the external device. If the search is negative, then protection device begins the authentication process for the external device.
    Type: Grant
    Filed: July 28, 2011
    Date of Patent: February 25, 2014
    Assignee: Arbor Networks, Inc.
    Inventors: Lawrence Bruce Huston, III, Matthew Richardson, Aaron Campbell
  • Publication number: 20130263259
    Abstract: A system and method are provided to receive mirrored versions of transmissions sent by a node in response to initiating transmissions received by the node over a network. At least one mirrored response transmission sent from the node in response to at least one corresponding initiating transmission is analyzed to determine whether or not the corresponding at least one initiating transmission is malicious.
    Type: Application
    Filed: May 16, 2013
    Publication date: October 3, 2013
    Inventors: Lawrence Bruce Huston, III, Aaron Campbell
  • Publication number: 20130055255
    Abstract: Systems and methods are disclosed that include a common application platform including a set of shared services that can be utilized by applications executing on top the application platform. One embodiment of the invention includes a user device including a processor configured by an operating system, where the processor is further configured by an application platform including a natively implemented virtual. machine configured to execute non-natively implemented applications; a services container, including at least one natively implemented service configured for utilization by an application executing within the virtual machine, wherein the at least one natively implemented service is a shared service that can be utilized by a plurality of different applications; and at least one handler configured to handle communication via at least one socket between an application executing within the virtual machine and the at least one natively implemented service in the services container.
    Type: Application
    Filed: August 31, 2011
    Publication date: February 28, 2013
    Applicant: Rovi Technologies Corporation
    Inventors: Bill Wagner, Frederick F. Hermanson, Louis Battista, Aaron Campbell
  • Publication number: 20130031605
    Abstract: A system and method to track external devices attempting to connect to a protected network using probabilistic filters. When a connection from a new external device attempts to access the protected network, the memory of a protection system, which is organized as a probabilistic filter, is searched to determine if the IP address already exists in the memory of protection system. If the search locates the IP address, the protection system terminates the connection to the external device. If the search is negative, then protection device begins the authentication process for the external device.
    Type: Application
    Filed: July 28, 2011
    Publication date: January 31, 2013
    Applicant: ARBOR NETWORKS, INC.
    Inventors: Lawrence Bruce Huston III, Matthew Richardson, Aaron Campbell
  • Patent number: D378358
    Type: Grant
    Filed: March 4, 1996
    Date of Patent: March 11, 1997
    Assignee: Turf Rhino, Inc.
    Inventor: Aaron Campbell