Patents by Inventor Brett Weaver

Brett Weaver has filed for patents to protect the following inventions. This listing includes patent applications that are pending as well as patents that have already been granted by the United States Patent and Trademark Office (USPTO).

  • Publication number: 20150381651
    Abstract: A method and system for protecting and repairing a current virtual asset from damage by potential security threats, according to one embodiment. The method and system include monitoring a current a current virtual asset for potential security threats, with a virtual asset agent, according to one embodiment. The method and system include determining a severity of the potential security threats that are identified by the virtual asset agent, according to one embodiment. The method and system include creating a new virtual asset with the virtual asset agent and decommissioning the current virtual asset, according to one embodiment. The system and method receiving, with the new virtual asset, secrets that are associated with the current virtual asset to enable the new virtual asset to continue operations of the current virtual asset, according to one embodiment.
    Type: Application
    Filed: June 30, 2014
    Publication date: December 31, 2015
    Applicant: INTUIT INC.
    Inventors: M. Shannon Lietz, Luis Felipe Cabrera, Thomas Bishop, Brett Weaver, Capen Brinkley
  • Publication number: 20150312274
    Abstract: Asset security compliance data ensuring defined asset security policies are applied to the creation and/or operation of assets to be used to implement an application and application deployment security compliance data for ensuring compliance with one or more application deployment security policies associated with the deployment of assets used to implement the application is generated. The asset security compliance data is then used to ensure each asset used to implement the application is created and used in compliance with asset security policies and the application deployment security compliance data is used to ensure that each asset used to implement the application is deployed in compliance with the application deployment security policies.
    Type: Application
    Filed: April 25, 2014
    Publication date: October 29, 2015
    Applicant: INTUIT INC.
    Inventors: Thomas Bishop, Brett Weaver, Christian Price, Javier Godinez, Capen Brinkley, M. Shannon Lietz, Luis Felipe Cabrera
  • Publication number: 20150278523
    Abstract: An application is implemented in the production environment in which the application will be used. Two or more backend systems are provided. Actual user data is received. The actual user data is routed and processed in the production environment using a first backend system of the two or more backend systems. Fabricated user data is generated, routed, and also processed in the production environment but using a second backend system of the two or more backend systems. Results data from the processing of the fabricated user data is then analyzed to evaluate the production environment and/or operation of the application in the production environment.
    Type: Application
    Filed: March 31, 2014
    Publication date: October 1, 2015
    Applicant: Intuit Inc.
    Inventors: Capen Brinkley, Javier Godinez, Thomas Bishop, Brett Weaver, M. Shannon Lietz, Luis Felipe Cabrera
  • Publication number: 20150278517
    Abstract: An application is implemented in the production environment in which the application will be used. Two or more backend systems are used to implement different versions of the application using the production environment in which the application will actually be used and accessed. Actual user data is received. A first portion of the actual user data is routed and processed in the production environment using a first version of the application and a first backend system of the two or more backend systems. A second portion of the actual user data is also routed and processed in the production environment but using a second version of the application and a second backend system of the two or more backend systems. The results data is then analyzed to evaluate the various versions of the application in the production environment.
    Type: Application
    Filed: March 31, 2014
    Publication date: October 1, 2015
    Applicant: Intuit Inc.
    Inventors: Brett Weaver, Javier Godinez, Capen Brinkley, Thomas Bishop, M. Shannon Lietz, Luis Felipe Cabrera
  • Publication number: 20150269064
    Abstract: An application is implemented in the production environment in which the application will be used. Fabricated user data associated with the application implemented in the production environment is then generated and provided to the application as implemented in the production environment. The fabricated user data is then processed by the application in the production environment to transform the fabricated user data into fabricated user results data. In one embodiment, the fabricated user results data is then analyzed to evaluate the production environment and/or operation of the application in the production environment.
    Type: Application
    Filed: March 21, 2014
    Publication date: September 24, 2015
    Applicant: INTUIT INC.
    Inventors: Thomas Bishop, Javier Godinez, Capen Brinkley, Brett Weaver, M. Shannon Lietz, Luis Felipe Cabrera
  • Publication number: 20150128130
    Abstract: Virtual host creation data used to instantiate a hardened task specific virtual host in a first computing environment is generated including hardening logic for providing enhanced security and trust for the hardened task specific virtual host and internal task specific logic for directing and/or allowing the hardened task specific virtual host to perform a specific function assigned to the hardened task specific virtual host. When task data is received indicating a task to be performed in the first computing environment requires the performance of the specific function assigned to the hardened task specific virtual host, the hardened task specific virtual host is automatically instantiated and/or deployed in the first computing environment.
    Type: Application
    Filed: November 1, 2013
    Publication date: May 7, 2015
    Applicant: Intuit Inc.
    Inventors: Brett Weaver, Capen Brinkley, Jeffrey M. Wolfe, Ankur Jain, M. Shannon Lietz, Luis Felipe Cabrera
  • Publication number: 20150106869
    Abstract: Secrets data representing one or more secrets required to access associated resources is provided along with secrets distribution policy data representing one or more secrets distribution factors used to control the distribution of the secrets. When a requesting virtual asset submits secrets request data, virtual asset profile data associated with the requesting virtual asset is obtained. The requesting virtual asset profile data is then analyzed using at least one of the secrets distribution factors to authenticate the requesting virtual asset. The requesting virtual asset profile data is then analyzed using one or more of secrets distribution factors to determine what secrets the requesting virtual asset legitimately needs. Authorized secrets data for the requesting virtual asset representing one or more authorized secrets is then generated. The requesting virtual asset is then provided access to the authorized secrets data.
    Type: Application
    Filed: October 14, 2013
    Publication date: April 16, 2015
    Applicant: Intuit Inc.
    Inventors: Luis Felipe Cabrera, M. Shannon Lietz, James Armitage, Oleg Gryb, Elangovan Shanmugam, Sabu Kuruvila Philip, Brett Weaver, Thomas Bishop, Troy Otillio, Jinglei Whitehouse, Jeffrey M. Wolfe, Ankur Jain
  • Publication number: 20090026237
    Abstract: A stethoscope restraint for selectively maintaining a stethoscope tube near a user's body includes a base member having front and rear faces. The stethoscope restraint includes at least one of a magnet, a pin, and a clip for selectively coupling the base member to an article of clothing. Further, the stethoscope restraint device includes a tube clip coupled to the base member for selectively coupling a stethoscope tube to the base member. The front face of the base member may include a planar configuration and may include indicia. The tube clip may be removably coupled to the base member and may be semi-permanently attachable to a stethoscope tube. More particularly, the tube clip may be magnetically coupled to the base member. In one embodiment, a timepiece may be coupled to the tube clip.
    Type: Application
    Filed: July 23, 2007
    Publication date: January 29, 2009
    Inventor: Brett Weaver
  • Patent number: D652517
    Type: Grant
    Filed: April 20, 2011
    Date of Patent: January 17, 2012
    Inventor: Brett Weaver