Patents by Inventor Alexander Main

Alexander Main has filed for patents to protect the following inventions. This listing includes patent applications that are pending as well as patents that have already been granted by the United States Patent and Trademark Office (USPTO).

  • Publication number: 20230418575
    Abstract: An embodiment of a method can create a directed acyclic graph (DAG) from a programmer specified set of computation units to solve, in a computer program, physics based simulations of physical systems, and the DAG can be used to analyze and debug the computer program. In this method, the computer program can be created by automatically determining dependency relationships in the set of computation units and automatically schedule their execution. The method can also automatically allocate memory for the computation units.
    Type: Application
    Filed: May 24, 2023
    Publication date: December 28, 2023
    Inventors: Geoffrey Alexander MAIN, Raunak Deepak BORKER
  • Patent number: 11698779
    Abstract: An embodiment of a method can create a directed acyclic graph (DAG) from a programmer specified set of computation units to solve, in a computer program, physics based simulations of physical systems, and the DAG can be used to analyze and debug the computer program. In this method, the computer program can be created by automatically determining dependency relationships in the set of computation units and automatically schedule their execution. The method can also automatically allocate memory for the computation units.
    Type: Grant
    Filed: September 1, 2020
    Date of Patent: July 11, 2023
    Assignee: ANSYS, INC.
    Inventors: Geoffrey Alexander Main, Raunak Deepak Borker
  • Publication number: 20220066755
    Abstract: An embodiment of a method can create a directed acyclic graph (DAG) from a programmer specified set of computation units to solve, in a computer program, physics based simulations of physical systems, and the DAG can be used to analyze and debug the computer program. In this method, the computer program can be created by automatically determining dependency relationships in the set of computation units and automatically schedule their execution. The method can also automatically allocate memory for the computation units.
    Type: Application
    Filed: September 1, 2020
    Publication date: March 3, 2022
    Inventors: Geoffrey Alexander Main, Raunak Deepak Borker
  • Patent number: 10228302
    Abstract: An apparatus for testing a mooring bollard is disclosed. The apparatus has first and second connector ropes for attaching the apparatus to a pair of bollards. There is also a pulling device (such as a hydraulic ram) for applying a pulling force to the bollards via the connector ropes. The device further includes a pulling force measuring device connected between the ram and one of the connector ropes, for measuring the pulling force being applied between the bollards. Finally there is a computer system for controlling the hydraulic ram and for gathering data from the data measuring device.
    Type: Grant
    Filed: February 2, 2015
    Date of Patent: March 12, 2019
    Assignee: BOLLARD LOAD TESTING LIMITED
    Inventors: Jeffrey Alexander Main, John Robert Cramman
  • Publication number: 20170176284
    Abstract: An apparatus for testing a mooring bollard is disclosed. The apparatus has first and second connector ropes for attaching the apparatus to a pair of bollards. There is also a pulling device (such as a hydraulic ram) for applying a pulling force to the bollards via the connector ropes. The device further includes a pulling force measuring device connected between the ram and one of the connector ropes, for measuring the pulling force being applied between the bollards. Finally there is a computer system for controlling the hydraulic ram and for gathering data from the data measuring device.
    Type: Application
    Filed: February 2, 2015
    Publication date: June 22, 2017
    Inventors: Jeffrey Alexander Main, John Robert Cramman
  • Publication number: 20140115626
    Abstract: A method and a system for recognizing, by a broadcasting platform, content sequences of an input linear content stream by retrieving content information determined by small fingerprints of portions of the linear content and comparing the small fingerprint with reference fingerprints stored in a database. The output stream transmitted to the user units is modified by the addition of a synchronization stream including at least identifiers of the content sequences and associated temporal information determined on the basis of the reference fingerprints. The content information is exploited by the broadcasting platform or the users units for replacing a sequence by anther one, removing predefined sequences, skipping or forcing viewing content sequences, The initial linear content stream is thus enriched with accurate content information allowing the viewer to navigate and select the content to play either in live or replay mode.
    Type: Application
    Filed: September 25, 2013
    Publication date: April 24, 2014
    Applicant: NAGRAVISION S.A.
    Inventors: Pierre SARDA, Yann BODO, Alexander MAIN
  • Patent number: 8458792
    Abstract: Attacks by computer viruses, worm programs, and other hostile software (‘malware’), have become very serious problems for computer systems connected to large communication networks such as the Internet. One potential defense against such attacks is to employ diversity—that is, making each copy of the attacked software different. However, existing diversity techniques do not offer sufficient levels of protection. The invention provides an effective diversity solution by applying tamper resistant software (TRS) encoding techniques, to the communications that take place between software components, with corresponding changes to the code handling those communications. These communications may include, for example, data passed between software routines via parameters or mutually accessible variables, light-weight messages, signals and semaphores passed between threads, and messages passed between software processes. Effective TRS encoding techniques include data-flow encoding and mass-data encoding techniques.
    Type: Grant
    Filed: May 12, 2011
    Date of Patent: June 4, 2013
    Assignee: Irdeto Canada Corporation
    Inventors: Stanley T. Chow, Harold T. Johnson, Alexander Main, Yuan Xiang Gu
  • Publication number: 20110214179
    Abstract: Attacks by computer viruses, worm programs, and other hostile software (‘malware’), have become very serious problems for computer systems connected to large communication networks such as the Internet. One potential defence against such attacks is to employ diversity—that is, making each copy of the attacked software different. However, existing diversity techniques do not offer sufficient levels of protection. The invention provides an effective diversity solution by applying tamper resistant software (TRS) encoding techniques, to the communications that take place between software components, with corresponding changes to the code handling those communications. These communications may include, for example, data passed between software routines via parameters or mutually accessible variables, light-weight messages, signals and semaphores passed between threads, and messages passed between software processes. Effective TRS encoding techniques include data-flow encoding and mass-data encoding techniques.
    Type: Application
    Filed: May 12, 2011
    Publication date: September 1, 2011
    Applicant: IRDETO CANADA CORPORATION
    Inventors: Stanley T. CHOW, Harold T. JOHNSON, Alexander MAIN, Yuan GU
  • Patent number: 7958554
    Abstract: Attacks by computer viruses, worm programs, and other hostile software (‘malware’), have become very serious problems for computer systems connected to large communication networks such as the Internet. One potential defence against such attacks is to employ diversity—that is, making each copy of the attacked software different. However, existing diversity techniques do not offer sufficient levels of protection. The invention provides an effective diversity solution by applying tamper resistant software (TRS) encoding techniques, to the communications that take place between software components, with corresponding changes to the code handling those communications. These communications may include, for example, data passed between software routines via parameters or mutually accessible variables, light-weight messages, signals and semaphores passed between threads, and messages passed between software processes. Effective TRS encoding techniques include data-flow encoding and mass-data encoding techniques.
    Type: Grant
    Filed: May 24, 2004
    Date of Patent: June 7, 2011
    Assignee: Irdeto Canada Corporation
    Inventors: Stanley T. Chow, Harold J. Johnson, Alexander Main, Yuan Gu
  • Patent number: 7900041
    Abstract: Systems and methods which may be implemented as software to control access to content streams transmitted from a service provider's server. A software solution forces each set top box (STB) to periodically uplink to the server and to receive authentication from that server. To prevent spoofing, the server periodically loads to each STB at least one unique key that is required to access the content stream or that is required for authentication. The key or keys may be periodically revoked and/or replaced by the server. The frequency of the revocation and/or replacement of the key is ideally not fixed. Also, the server may periodically upgrade the decoding and/or authentication software on the STBs via the uplink.
    Type: Grant
    Filed: July 22, 2004
    Date of Patent: March 1, 2011
    Assignee: Irdeto Canada Corporation
    Inventors: Alexander Main, Harold J. Johnson
  • Patent number: 7730322
    Abstract: The present invention relates generally to computer software, and more specifically, to a system and method of foiling buffer-overflow and alien-code attacks. The invention protects computers from such attacks by encoding data placed in storage, and varying the encodings used in different storage areas. When the data is needed by a software application, the data is simply decoded in a complementary manner. This prevents storage areas written according to one usage from being used effectively for some other purpose. The method of the invention can be done in a number of ways. For example, a “protector” engine can be placed between a software application and memory, or the function calls in the software application itself, could be amended to include encoding and decoding. Other embodiments and alternatives are also described.
    Type: Grant
    Filed: February 14, 2003
    Date of Patent: June 1, 2010
    Assignee: Cloakware Corporation
    Inventors: Harold J. Johnson, Stanley T. Chow, Alexander Main
  • Publication number: 20070055668
    Abstract: An online customer support system (20) automates access for a user to a variety of types of information (24-31) maintained within a database (22). In a disclosed example, a dynamic user profile management module (50) automatically establishes a user profile including entitlements to sets of information within the database (22) each time a user accesses the system. A disclosed entitlement inference module (54) recognizes explicit entitlements based on accessibility indicators or infers entitlements based on various disclosed factors or relationships. A disclosed linking module (52) automatically determines a probability that a user can be granted another entitlement that was not granted by the entitlement inference module (54). An example process of registering a user includes requiring only a single piece of information from the user to automatically establish access for that user to an associated portion of the database (22) and any other portions of the database (22) that user should be able to access.
    Type: Application
    Filed: August 24, 2005
    Publication date: March 8, 2007
    Inventor: Alexander Main
  • Publication number: 20050039025
    Abstract: Systems and methods which may be implemented as software to control access to content streams transmitted from a service provider's server. A software solution forces each set top box (STB) to periodically uplink to the server and to receive authentication from that server. To prevent spoofing, the server periodically loads to each STB at least one unique key that is required to access the content stream or that is required for authentication. The key or keys may be periodically revoked and/or replaced by the server. The frequency of the revocation and/or replacement of the key is ideally not fixed. Also, the server may periodically upgrade the decoding and/or authentication software on the STBs via the uplink.
    Type: Application
    Filed: July 22, 2004
    Publication date: February 17, 2005
    Inventors: Alexander Main, Harold Johnson
  • Publication number: 20040268322
    Abstract: Attacks by computer viruses, worm programs, and other hostile software (‘malware’), have become very serious problems for computer systems connected to large communication networks such as the Internet. One potential defence against such attacks is to employ diversity—that is, making each copy of the attacked software different. However, existing diversity techniques do not offer sufficient levels of protection. The invention provides an effective diversity solution by applying tamper resistant software (TRS) encoding techniques, to the communications that take place between software components, with corresponding changes to the code handling those communications. These communications may include, for example, data passed between software routines via parameters or mutually accessible variables, light-weight messages, signals and semaphores passed between threads, and messages passed between software processes.
    Type: Application
    Filed: May 24, 2004
    Publication date: December 30, 2004
    Inventors: Stanley T. Chow, Harold J. Johnson, Alexander Main, Yuan Gu
  • Publication number: 20030172293
    Abstract: The present invention relates generally to computer software, and more specifically, to a system and method of foiling buffer-overflow and alien-code attacks. The invention protects computers from such attacks by encoding data placed in storage, and varying the encodings used in different storage areas. When the data is needed by a software application, the data is simply decoded in a complementary manner. This prevents storage areas written according to one usage from being used effectively for some other purpose. The method of the invention can be done in a number of ways. For example, a “protector” engine can be placed between a software application and memory, or the function calls in the software application itself, could be amended to include encoding and decoding. Other embodiments and alternatives are also described.
    Type: Application
    Filed: February 14, 2003
    Publication date: September 11, 2003
    Inventors: Harold J. Johnson, Stanley T. Chow, Alexander Main