Patents by Inventor Andrew Byrne

Andrew Byrne has filed for patents to protect the following inventions. This listing includes patent applications that are pending as well as patents that have already been granted by the United States Patent and Trademark Office (USPTO).

  • Publication number: 20240066619
    Abstract: Methods and apparatus to communicate via a weld cable are disclosed. An example welding accessory includes a first port to receive input power via a first weld cable, a power converter to convert the input power to output power, a second port to output the input power via a second weld cable, and one or more output switches to selectively divert the input power from the power converter to the second port.
    Type: Application
    Filed: November 2, 2023
    Publication date: February 29, 2024
    Inventors: Joseph Robert Ryan, James Andrew Byrne, Richard Mark Achtner, Anthony Van Bergen Salsich
  • Patent number: 11819960
    Abstract: Methods and apparatus to communicate via a weld cable are disclosed. An example welding accessory includes a first port to receive input power via a first weld cable, a power converter to convert the input power to output power, a second port to output the input power via a second weld cable, and one or more output switches to selectively divert the input power from the power converter to the second port.
    Type: Grant
    Filed: September 9, 2019
    Date of Patent: November 21, 2023
    Assignee: ILLINOIS TOOL WORKS INC.
    Inventors: Joseph Robert Ryan, James Andrew Byrne, Richard Mark Achtner, Anthony Van Bergen Salsich
  • Patent number: 11675672
    Abstract: In the face of ransomware attacks, which can be increasingly difficult to effectively prevent, a solution can be considered to be the minimization of the cost and time taken to recover data and, hence business activities. Embodiments perform a restore operation that include automatically identifying the most recent healthy backup, from which data should be restored, and the prioritizing of the order in which data should be restored.
    Type: Grant
    Filed: September 18, 2020
    Date of Patent: June 13, 2023
    Assignee: EMC IP HOLDING COMPANY LLC
    Inventors: Niamh O'Mahony, Andrew Byrne, Regis Wenner, Celine Brandy
  • Patent number: 11537478
    Abstract: In the face of ransomware attacks, which can be increasingly difficult to effectively prevent, a solution can be considered to be the minimization of the cost and time taken to recover data and, hence business activities. Embodiments perform a restore operation that include automatically identifying the most recent healthy backup, from which data should be restored, and the prioritizing of the order in which data should be restored.
    Type: Grant
    Filed: August 21, 2020
    Date of Patent: December 27, 2022
    Assignee: EMC IP HOLDING COMPANY LLC
    Inventors: Niamh O'Mahony, Andrew Byrne, Regis Wenner, Celine Brandy
  • Publication number: 20220335938
    Abstract: Techniques are disclosed for coordinating interactions between a user device and a plurality of accessory devices. In one example, a user device receives information identifying one or more accessory devices in communication with the user device. The user device may implement accessory interaction instances for each of the identified accessories. A first accessory interaction instance can be associated with a first accessory among the identified accessories and receive a first audio input from the first accessory corresponding to a user request. The first accessory interaction instance can process a portion of the received audio input and receive a first response from a server computer. The user device may then transmit the first response to the first accessory device.
    Type: Application
    Filed: April 12, 2022
    Publication date: October 20, 2022
    Applicant: Apple Inc.
    Inventors: Jared S. GRUBB, Robert M. STEWART, Gabriel SANCHEZ, Anshul JAIN, Zaka ur Rehman ASHRAF, David J. CHANDLER, Andrew BYRNE, Anumita BISWAS, Minsub LEE, Mahesh SHANBHAG
  • Publication number: 20210004303
    Abstract: In the face of ransomware attacks, which can be increasingly difficult to effectively prevent, a solution can be considered to be the minimization of the cost and time taken to recover data and, hence business activities. Embodiments perform a restore operation that include automatically identifying the most recent healthy backup, from which data should be restored, and the prioritizing of the order in which data should be restored.
    Type: Application
    Filed: September 18, 2020
    Publication date: January 7, 2021
    Inventors: Niamh O'Mahony, Andrew Byrne, Regis Wenner, Celine Brandy
  • Publication number: 20200379855
    Abstract: In the face of ransomware attacks, which can be increasingly difficult to effectively prevent, a solution can be considered to be the minimization of the cost and time taken to recover data and, hence business activities. Embodiments perform a restore operation that include automatically identifying the most recent healthy backup, from which data should be restored, and the prioritizing of the order in which data should be restored.
    Type: Application
    Filed: August 21, 2020
    Publication date: December 3, 2020
    Inventors: Niamh O'Mahony, Andrew Byrne, Regis Wenner, Celine Brandy
  • Patent number: 10783043
    Abstract: In the face of ransomware attacks, which can be increasingly difficult to effectively prevent, a solution can be considered to be the minimization of the cost and time taken to recover data and, hence business activities. Embodiments perform a restore operation that include automatically identifying the most recent healthy backup, from which data should be restored, and the prioritizing of the order in which data should be restored.
    Type: Grant
    Filed: July 13, 2018
    Date of Patent: September 22, 2020
    Assignee: EMC IP HOLDING COMPANY LLC
    Inventors: Niamh O'Mahony, Andrew Byrne, Regis Wenner, Celine Brandy
  • Patent number: 10769032
    Abstract: In the face of ransomware attacks, which can be increasingly difficult to effectively prevent, a solution can be considered to be the minimization of the cost and time taken to recover data and, hence business activities. Embodiments perform a restore operation that include automatically identifying the most recent healthy backup, from which data should be restored, and the prioritizing of the order in which data should be restored.
    Type: Grant
    Filed: July 13, 2018
    Date of Patent: September 8, 2020
    Assignee: EMC IP HOLDING COMPANY LLC
    Inventors: Niamh O'Mahony, Andrew Byrne, Regis Wenner, Celine Brandy
  • Patent number: 10664536
    Abstract: Various techniques for consumption of user-filtered data on a client device are described herein. In one example, a method includes storing a detected filter corresponding to an object list and generating a data request based on the stored filter, wherein the data request can populate the object list. The method can also include retrieving data from a data repository based on the data request in response to a detected action, the retrieved data comprising a subset of fields corresponding to at least one object to be retrieved. Additionally, the method can include updating the object list based on the retrieved data and displaying the subset of fields of the at least one object in the object list.
    Type: Grant
    Filed: December 18, 2015
    Date of Patent: May 26, 2020
    Assignee: Microsoft Technology Licensing, LLC
    Inventors: Uma Subramanian, Andrew Byrne
  • Patent number: 10615968
    Abstract: A method includes receiving, at a key management system from one or more client devices, one or more requests for cryptographic keys stored in respective clouds of a plurality of cloud service providers in a multi-cloud environment, the cryptographic keys being distributed across different ones of the respective clouds of the plurality of cloud service providers in the multi-cloud environment. The method also includes determining a location of a given one of the requested cryptographic keys on one or more of the clouds of the cloud service providers in the multi-cloud environment, retrieving the given cryptographic key from the determined location in the multi-cloud environment, providing the given cryptographic key to a given one of the client devices, and shuffling the distribution of the cryptographic keys across the clouds of the plurality of cloud service providers in the multi-cloud environment.
    Type: Grant
    Filed: February 2, 2018
    Date of Patent: April 7, 2020
    Assignee: EMC IP Holding Company LLC
    Inventors: Andrew Byrne, Donagh A. Buckley
  • Publication number: 20200001389
    Abstract: Methods and apparatus to communicate via a weld cable are disclosed. An example welding accessory includes a first port to receive input power via a first weld cable, a power converter to convert the input power to output power, a second port to output the input power via a second weld cable, and one or more output switches to selectively divert the input power from the power converter to the second port.
    Type: Application
    Filed: September 9, 2019
    Publication date: January 2, 2020
    Inventors: Joseph Robert Ryan, James Andrew Byrne, Richard Mark Achtner, Anthony Van Bergen Salsich
  • Publication number: 20190286534
    Abstract: In the face of ransomware attacks, which can be increasingly difficult to effectively prevent, a solution can be considered to be the minimization of the cost and time taken to recover data and, hence business activities. Embodiments perform a restore operation that include automatically identifying the most recent healthy backup, from which data should be restored, and the prioritizing of the order in which data should be restored.
    Type: Application
    Filed: July 13, 2018
    Publication date: September 19, 2019
    Inventors: Niamh O'Mahony, Andrew Byrne, Regis Wenner, Celine Brandy
  • Publication number: 20190286533
    Abstract: In the face of ransomware attacks, which can be increasingly difficult to effectively prevent, a solution can be considered to be the minimization of the cost and time taken to recover data and, hence business activities. Embodiments perform a restore operation that include automatically identifying the most recent healthy backup, from which data should be restored, and the prioritizing of the order in which data should be restored.
    Type: Application
    Filed: July 13, 2018
    Publication date: September 19, 2019
    Inventors: Niamh O'Mahony, Andrew Byrne, Regis Wenner, Celine Brandy
  • Patent number: 10406624
    Abstract: Methods and apparatus to communicate via a weld cable are disclosed. An example welding accessory includes a first port to receive input power via a first weld cable, a power converter to convert the input power to output power, a second port to output the input power via a second weld cable, and one or more output switches to selectively divert the input power from the power converter to the second port.
    Type: Grant
    Filed: March 7, 2016
    Date of Patent: September 10, 2019
    Assignee: Illinois Tool Works Inc.
    Inventors: Joseph Robert Ryan, James Andrew Byrne, Richard Mark Achtner, Anthony Van Bergen Salsich
  • Publication number: 20170252849
    Abstract: Methods and apparatus to communicate via a weld cable are disclosed. An example welding accessory includes a first port to receive input power via a first weld cable, a power converter to convert the input power to output power, a second port to output the input power via a second weld cable, and one or more output switches to selectively divert the input power from the power converter to the second port.
    Type: Application
    Filed: March 7, 2016
    Publication date: September 7, 2017
    Inventors: Joseph Robert Ryan, James Andrew Byrne, Richard Mark Achtner, Anthony Van Bergen Salsich
  • Patent number: 9736139
    Abstract: The claimed subject matter includes techniques for storing sensitive data. An example system includes a processor and a computer-readable memory storage device storing executable instructions that can be executed by the processor to cause the processor to send authentication credentials to a service to request authorization to store sensitive data with the service. The example system also includes instructions that can be executed by the processor to cause the processor to capture sensitive data from a sensor on a device. The example system also includes instructions that can be executed by the processor to cause the processor to bypass storing the captured sensitive data in any non-volatile memory in the device and stream the captured sensitive data to the service from the sensor.
    Type: Grant
    Filed: August 13, 2015
    Date of Patent: August 15, 2017
    Assignee: Microsoft Technology Licensing, LLC
    Inventors: B. James Melton, Andrew Byrne
  • Publication number: 20170177726
    Abstract: Various techniques for consumption of user-filtered data on a client device are described herein. In one example, a method includes storing a detected filter corresponding to an object list and generating a data request based on the stored filter, wherein the data request can populate the object list. The method can also include retrieving data from a data repository based on the data request in response to a detected action, the retrieved data comprising a subset of fields corresponding to at least one object to be retrieved. Additionally, the method can include updating the object list based on the retrieved data and displaying the subset of fields of the at least one object in the object list.
    Type: Application
    Filed: December 18, 2015
    Publication date: June 22, 2017
    Applicant: Microsoft Technology Licensing, LLC
    Inventors: Uma Subramanian, Andrew Byrne
  • Publication number: 20170048221
    Abstract: The claimed subject matter includes techniques for storing sensitive data. An example system includes a processor and a computer-readable memory storage device storing executable instructions that can be executed by the processor to cause the processor to send authentication credentials to a service to request authorization to store sensitive data with the service. The example system also includes instructions that can be executed by the processor to cause the processor to capture sensitive data from a sensor on a device. The example system also includes instructions that can be executed by the processor to cause the processor to bypass storing the captured sensitive data in any non-volatile memory in the device and stream the captured sensitive data to the service from the sensor.
    Type: Application
    Filed: August 13, 2015
    Publication date: February 16, 2017
    Applicant: Microsoft Technology Licensing, LLC
    Inventors: B. James Melton, Andrew Byrne
  • Patent number: 8954925
    Abstract: Disclosed herein is user augmented reverse engineering, where, in one embodiment, during the generation of a graphical representation of a codebase, database, binary and the like, users may be provided with an option to ‘focus’. For example, during the graphical generation of a large codebase, a user may select one or things to limit the extent of the graphical representation generation. In another embodiment, a graphical generation may encounter one or more pre-defined boundary conditions. Upon encountering a boundary condition, the generation of the graphical representation may determine that it is unable to complete the graphical generation within a pre-defined set of requirements without additional instructions. Thus, the graphical generation may complete and then prompt a user for solutions to any boundary conditions it has encountered, or the generation may pause at each boundary condition it encounters and prompt a user for a solution to the boundary condition.
    Type: Grant
    Filed: June 18, 2010
    Date of Patent: February 10, 2015
    Assignee: Microsoft Technology Licensing, LLC
    Inventors: Suhail Dutta, Tracey Trewin, Andrew Byrne