Patents by Inventor Ben A. Adams
Ben A. Adams has filed for patents to protect the following inventions. This listing includes patent applications that are pending as well as patents that have already been granted by the United States Patent and Trademark Office (USPTO).
-
Patent number: 11890017Abstract: Methods and medical apparatus for deployment within an anatomical blood vessel. The medical apparatuses comprising: a first tubular wall, a second tubular wall, within the first tubular wall, and a constricting element configured to constrict a circumference of a portion of the second tubular wall; the combination of the first tubular wall, the second tubular wall and the constricting element forms a diametrical reducer.Type: GrantFiled: August 4, 2020Date of Patent: February 6, 2024Assignee: Restore Medical Ltd.Inventors: Stephen F. Bellomo, Ben Adam Friesem
-
Patent number: 11771434Abstract: Methods and medical apparatus for deployment within an anatomical blood vessel. The medical apparatuses comprising: a first tubular wall, a second tubular wall, within the first tubular wall, and a constricting element configured to constrict a circumference of a portion of the second tubular wall; the combination of the first tubular wall, the second tubular wall and the constricting element forms a diametrical reducer.Type: GrantFiled: September 27, 2017Date of Patent: October 3, 2023Assignee: Restore Medical Ltd.Inventors: Stephen F. Bellomo, Ben Adam Friesem
-
Publication number: 20230000515Abstract: Apparatus for passing a blocked vein, including: (a) an intravascular catheter body defining at least one lumen; (b) a radially expandable anchor at a distal end of said catheter; and (c) a penetration tool sized and shaped to be delivered by the lumen to a point distal of the expandable anchor, the penetration tool including a tip and configured for being pushed through venous blockage more than one week old and present with a young's modulus greater than 1 MPa. Optionally, the penetration tool tip comprises a sharpened tip. Optionally or additionally, the penetration tool tip is controllably bendable.Type: ApplicationFiled: August 1, 2022Publication date: January 5, 2023Applicant: VeinWay Ltd.Inventors: Jordan POLLACK, Gal ATAROT, Tanhum FELD, Ben Adam FRIESEM
-
Patent number: 11364132Abstract: A new medical apparatus for deployment within an anatomical blood vessel and methods of use thereof. The apparatus comprising: a first tubular wall; and a second tubular wall, placed within the first tubular wall; wherein the first and second tubular walls are firmly connected at their edges, therefore restricted to have same overall longitudinal length; and wherein the second tubular wall is configured to be partially constricted towards its inner radial axis, while maintaining its overall longitudinal length.Type: GrantFiled: June 4, 2018Date of Patent: June 21, 2022Assignee: Restore Medical Ltd.Inventors: Stephen F. Bellomo, Ben Adam Friesem, Tanhum Feld
-
Patent number: 11310132Abstract: A method includes receiving a seed at a computing device. The method further includes identifying, based on first domain name system (DNS) data, first border gateway protocol (BGP) data, first whois data, or a combination thereof, a plurality of first internet-facing assets related to the seed. The method further includes identifying, based on second DNS data, second BGP data, second whois data, or a combination thereof, a plurality of second internet-facing assets related to at least one of the first internet-facing assets. The method further includes generating a graphical user interface (GUI) that includes a list of internet-facing assets related to the seed, where the list includes the plurality of first internet-facing assets and the plurality of second internet-facing assets.Type: GrantFiled: November 24, 2020Date of Patent: April 19, 2022Assignee: Microsoft Technology Licensing, LLCInventors: David K. Pon, Elias Manousos, Chris Kiernan, Ben Adams, Megan Chiu, Jonas Edgeworth
-
Patent number: 11165822Abstract: Embodiments of the present invention are directed to identifying phishing websites by rendering and analyzing document object model (DOM) objects associated with a website for features that indicate phishing behavior. Embodiments analyze the full scope and functionality associated with a website by executing functions embedded in a DOM object before analyzing the website for phishing activity. Accordingly, embodiments render and analyze a fully executed DOM object for phishing behavior. Embodiments may then perform steps to mediate a website that is classified as performing phishing. Thus, embodiments are configured to (1) collect website information from a variety of websites and web servers connected to the internet, (2) analyze the collected data to determine whether the website information is performing phishing, and (3) mediate websites and other actors that are determined to be performing phishing based on the results of the phishing analysis.Type: GrantFiled: March 3, 2020Date of Patent: November 2, 2021Assignee: Microsoft Technology Licensing, LLCInventors: Adam Hunt, David Pon, Chris Kiernan, Ben Adams, Jonas Edgeworth, Elias Manousos
-
Publication number: 20210083953Abstract: A method includes receiving a seed at a computing device. The method further includes identifying, based on first domain name system (DNS) data, first border gateway protocol (BGP) data, first whois data, or a combination thereof, a plurality of first internet-facing assets related to the seed. The method further includes identifying, based on second DNS data, second BGP data, second whois data, or a combination thereof, a plurality of second internet-facing assets related to at least one of the first internet-facing assets. The method further includes generating a graphical user interface (GUI) that includes a list of internet-facing assets related to the seed, where the list includes the plurality of first internet-facing assets and the plurality of second internet-facing assets.Type: ApplicationFiled: November 24, 2020Publication date: March 18, 2021Inventors: David K. Pon, Elias Manousos, Chris Kiernan, Ben Adams, Megan Chiu, Jonas Edgeworth
-
Patent number: 10848401Abstract: A method includes receiving a seed at a computing device. The method further includes identifying, based on first domain name system (DNS) data, first border gateway protocol (BGP) data, first whois data, or a combination thereof, a plurality of first internet-facing assets related to the seed. The method further includes identifying, based on second DNS data, second BGP data, second whois data, or a combination thereof, a plurality of second internet-facing assets related to at least one of the first internet-facing assets. The method further includes generating a graphical user interface (GUI) that includes a list of internet-facing assets related to the seed, where the list includes the plurality of first internet-facing assets and the plurality of second internet-facing assets.Type: GrantFiled: January 1, 2019Date of Patent: November 24, 2020Assignee: RiskIQ, Inc.Inventors: David K Pon, Elias Manousos, Chris Kiernan, Ben Adams, Megan Chiu, Jonas Edgeworth
-
Publication number: 20200360024Abstract: Methods and medical apparatus for deployment within an anatomical blood vessel. The medical apparatuses comprising: a first tubular wall, a second tubular wall, within the first tubular wall, and a constricting element configured to constrict a circumference of a portion of the second tubular wall; the combination of the first tubular wall, the second tubular wall and the constricting element forms a diametrical reducer.Type: ApplicationFiled: August 4, 2020Publication date: November 19, 2020Applicant: Restore Medical Ltd.Inventors: Stephen F. BELLOMO, Ben Adam FRIESEM
-
Publication number: 20200297516Abstract: A new medical apparatus for deployment within an anatomical blood vessel and methods of use thereof. The apparatus comprising: a first tubular wall; and a second tubular wall, placed within the first tubular wall; wherein the first and second tubular walls are firmly connected at their edges, therefore restricted to have same overall longitudinal length; and wherein the second tubular wall is configured to be partially constricted towards its inner radial axis, while maintaining its overall longitudinal length.Type: ApplicationFiled: June 4, 2018Publication date: September 24, 2020Applicant: Restore Medical Ltd.Inventors: Stephen F. BELLOMO, Ben Adam FRIESEM, Tanhum FELD
-
Patent number: 10757101Abstract: Embodiments are directed to using a hash signature of a rendered DOM object of a website to find similar content and behavior on other websites. Embodiments break a DOM into a large number of data portions (i.e., “shingles”), apply a hashing algorithm to the shingles, select a predetermined number of hashes from the hashed shingles according to a selection criteria to create a hash signature, and compare the hash signature to that of a reference page to determine similarity of website DOM object content. Embodiments can be used to identify phishing websites, defaced websites, spam websites, significant changes in the content of a webpage, copyright infringement, and any other suitable purposes related to the similarity between website DOM object content.Type: GrantFiled: September 25, 2018Date of Patent: August 25, 2020Assignee: RiskIQ, Inc.Inventors: Adam Hunt, David Pon, Chris Kiernan, Ben Adams, Jonas Edgeworth, Elias Manousos, Joseph Linn
-
Publication number: 20200204587Abstract: Embodiments of the present invention are directed to identifying phishing websites by rendering and analyzing document object model (DOM) objects associated with a website for features that indicate phishing behavior. Embodiments analyze the full scope and functionality associated with a website by executing functions embedded in a DOM object before analyzing the website for phishing activity. Accordingly, embodiments render and analyze a fully executed DOM object for phishing behavior. Embodiments may then perform steps to mediate a website that is classified as performing phishing. Thus, embodiments are configured to (1) collect website information from a variety of websites and web servers connected to the internet, (2) analyze the collected data to determine whether the website information is performing phishing, and (3) mediate websites and other actors that are determined to be performing phishing based on the results of the phishing analysis.Type: ApplicationFiled: March 3, 2020Publication date: June 25, 2020Inventors: Adam Hunt, David Pon, Chris Kiernan, Ben Adams, Jonas Edgeworth, Elias Manousos
-
Patent number: 10581908Abstract: Embodiments of the present invention are directed to identifying phishing websites by rendering and analyzing document object model (DOM) objects associated with a website for features that indicate phishing behavior. Embodiments analyze the full scope and functionality associated with a website by executing functions embedded in a DOM object before analyzing the website for phishing activity. Accordingly, embodiments render and analyze a fully executed DOM object for phishing behavior. Embodiments may then perform steps to mediate a website that is classified as performing phishing. Thus, embodiments are configured to (1) collect website information from a variety of websites and web servers connected to the internet, (2) analyze the collected data to determine whether the website information is performing phishing, and (3) mediate websites and other actors that are determined to be performing phishing based on the results of the phishing analysis.Type: GrantFiled: December 16, 2016Date of Patent: March 3, 2020Assignee: RiskIQ, Inc.Inventors: Adam Hunt, David Pon, Chris Kiernan, Ben Adams, Jonas Edgeworth, Elias Manousos
-
Publication number: 20190140925Abstract: A method includes receiving a seed at a computing device. The method further includes identifying, based on first domain name system (DNS) data, first border gateway protocol (BGP) data, first whois data, or a combination thereof, a plurality of first internet-facing assets related to the seed. The method further includes identifying, based on second DNS data, second BGP data, second whois data, or a combination thereof, a plurality of second internet-facing assets related to at least one of the first internet-facing assets. The method further includes generating a graphical user interface (GUI) that includes a list of internet-facing assets related to the seed, where the list includes the plurality of first internet-facing assets and the plurality of second internet-facing assets.Type: ApplicationFiled: January 1, 2019Publication date: May 9, 2019Inventors: David K. Pon, Elias Manousos, Chris Kiernan, Ben Adams, Megan Chiu, Jonas Edgeworth
-
Publication number: 20190028473Abstract: Embodiments are directed to using a hash signature of a rendered DOM object of a website to find similar content and behavior on other websites. Embodiments break a DOM into a large number of data portions (i.e., “shingles”), apply a hashing algorithm to the shingles, select a predetermined number of hashes from the hashed shingles according to a selection criteria to create a hash signature, and compare the hash signature to that of a reference page to determine similarity of website DOM object content. Embodiments can be used to identify phishing websites, defaced websites, spam websites, significant changes in the content of a webpage, copyright infringement, and any other suitable purposes related to the similarity between website DOM object content.Type: ApplicationFiled: September 25, 2018Publication date: January 24, 2019Inventors: Adam Hunt, David Pon, Chris Kiernan, Ben Adams, Jonas Edgeworth, Elias Manousos, Joseph Linn
-
Patent number: 10171318Abstract: A method includes receiving a seed at a computing device. The method further includes identifying, based on first domain name system (DNS) data, first border gateway protocol (BGP) data, first whois data, or a combination thereof, a plurality of first internet-facing assets related to the seed. The method further includes identifying, based on second DNS data, second BGP data, second whois data, or a combination thereof, a plurality of second internet-facing assets related to at least one of the first internet-facing assets. The method further includes generating a graphical user interface (GUI) that includes a list of internet-facing assets related to the seed, where the list includes the plurality of first internet-facing assets and the plurality of second internet-facing assets.Type: GrantFiled: October 21, 2014Date of Patent: January 1, 2019Assignee: RiskIQ, Inc.Inventors: David K. Pon, Elias Manousos, Chris Kiernan, Ben Adams, Megan Chiu, Jonas Edgeworth
-
Patent number: 10084779Abstract: Embodiments are directed to using a hash signature of a rendered DOM object of a website to find similar content and behavior on other websites. Embodiments break a DOM into a large number of data portions (i.e., “shingles”), apply a hashing algorithm to the shingles, select a predetermined number of hashes from the hashed shingles according to a selection criteria to create a hash signature, and compare the hash signature to that of a reference page to determine similarity of website DOM object content. Embodiments can be used to identify phishing websites, defaced websites, spam websites, significant changes in the content of a webpage, copyright infringement, and any other suitable purposes related to the similarity between website DOM object content.Type: GrantFiled: June 16, 2017Date of Patent: September 25, 2018Assignee: RiskIQ, Inc.Inventors: Adam Hunt, David Pon, Chris Kiernan, Ben Adams, Jonas Edgeworth, Elias Manousos, Joseph Linn
-
Patent number: 10052779Abstract: A waterjet safety enclosure formed by walls using a detection device or light curtain to detect unsafe conditions. The waterjet safety enclosure walls can be used in new work areas or retrofitted and shaped to fit existing work areas. The waterjet safety enclosure walls may form a partial or complete perimeter about a work area and may be adjustable or mobile. The waterjet safety enclosure wall detects unsafe conditions when a high pressure stream of water from a waterjet cutting machine approaches, contacts or penetrates the waterjet safety enclosure wall. The detection device detects the high pressure stream of water and sends a signal to a controller to stop the operation of the waterjet cutting machine.Type: GrantFiled: January 31, 2017Date of Patent: August 21, 2018Assignee: IDEASFL, LLCInventors: Richard Ralph Ward, Ben Adams, Christopher Indermuhle
-
Publication number: 20180085128Abstract: Methods and medical apparatus for deployment within an anatomical blood vessel. The medical apparatuses comprising: a first tubular wall, a second tubular wall, within the first tubular wall, and a constricting element configured to constrict a circumference of a portion of the second tubular wall; the combination of the first tubular wall, the second tubular wall and the constricting element forms a diametrical reducer.Type: ApplicationFiled: September 27, 2017Publication date: March 29, 2018Applicant: RESTORE MEDICAL LTDInventors: Stephen F. BELLOMO, Ben Adam Friesem
-
Publication number: 20170286544Abstract: Embodiments are directed to using a hash signature of a rendered DOM object of a website to find similar content and behavior on other websites. Embodiments break a DOM into a large number of data portions (i.e., “shingles”), apply a hashing algorithm to the shingles, select a predetermined number of hashes from the hashed shingles according to a selection criteria to create a hash signature, and compare the hash signature to that of a reference page to determine similarity of website DOM object content. Embodiments can be used to identify phishing websites, defaced websites, spam websites, significant changes in the content of a webpage, copyright infringement, and any other suitable purposes related to the similarity between website DOM object content.Type: ApplicationFiled: June 16, 2017Publication date: October 5, 2017Applicant: RiskIQ, Inc.Inventors: Adam Hunt, David Pon, Chris Kiernan, Ben Adams, Jonas Edgeworth, Elias Manousos, Joseph Linn