Patents by Inventor Charles Hubbard
Charles Hubbard has filed for patents to protect the following inventions. This listing includes patent applications that are pending as well as patents that have already been granted by the United States Patent and Trademark Office (USPTO).
-
Publication number: 20240108780Abstract: Air purification devices are described. Devices are powered to form an electric field along an airflow path that creates a plasma for destruction of pathogens carried through the device. Devices can be single-user, portable devices for purification of air flow to and/or from a single user.Type: ApplicationFiled: September 29, 2022Publication date: April 4, 2024Inventors: ELIEL VILLA-ALEMAN, JOHN T. BOBBITT, III, WENDY KUHNE, MICHAEL C. MAXWELL, MATTHEW FOLSOM, CHARLES TURICK, COURTNEY BURCKHALTER, TRAVIS HUBBARD, TYLER BARNES, JOSEPH KINNEY
-
Patent number: 9503262Abstract: Embodiments are directed toward transparent denial of service protection. Instruction set information that references a seed file may be communicated to a client computer. A network packet key may be generated based on the instruction set information or encrypted and provided by a server. A client computer may generate a client network packet key based on the instruction set information provided by the network computer and a seed file installed on the client computer. The client computer may include the client network packet key the one or more network packets that it is sending to the network computer before they are provided to the network computer. A packet rule that includes the network packet key may be generated and installed in a packet inspection engine. If network packets are received, the packet inspection engine compares the network packet key to the network packets using the packet rule.Type: GrantFiled: December 7, 2015Date of Patent: November 22, 2016Assignee: Centri Technology, Inc.Inventors: Michael Patrick Mackey, Luis Gerardo Paris, Charles Hubbard Taylor
-
Publication number: 20160205133Abstract: Embodiments are directed toward transparent denial of service protection. Instruction set information that references a seed file may be communicated to a client computer. A network packet key may be generated based on the instruction set information or encrypted and provided by a server. A client computer may generate a client network packet key based on the instruction set information provided by the network computer and a seed file installed on the client computer. The client computer may include the client network packet key the one or more network packets that it is sending to the network computer before they are provided to the network computer. A packet rule that includes the network packet key may be generated and installed in a packet inspection engine. If network packets are received, the packet inspection engine compares the network packet key to the network packets using the packet rule.Type: ApplicationFiled: December 7, 2015Publication date: July 14, 2016Inventors: Michael Patrick Mackey, Luis Gerardo Paris, Charles Hubbard Taylor
-
Patent number: 9210187Abstract: Embodiments are directed toward transparent denial of service protection. Instruction set information that references a seed file may be communicated to a client computer. A network packet key may be generated based on the instruction set information or encrypted and provided by a server. A client computer may generate a client network packet key based on the instruction set information provided by the network computer and a seed file installed on the client computer. The client computer may include the client network packet key the one or more network packets that it is sending to the network computer before they are provided to the network computer. A packet rule that includes the network packet key may be generated and installed in a packet inspection engine. If network packets are received, the packet inspection engine compares the network packet key to the network packets using the packet rule.Type: GrantFiled: July 31, 2015Date of Patent: December 8, 2015Assignee: Centri Technology, Inc.Inventors: Michael Patrick Mackey, Luis Gerardo Paris, Charles Hubbard Taylor
-
Patent number: 9027121Abstract: A security management system can log, investigate, respond, and track computer security incidents that can occur in a networked computer system. In other words, the security management system can produce a security record of information related to the tracking of suspicious computer activity or actual computer security threats, such as denial of service attacks or other similar compromises to computers or computer networks. The security record can include, but is not limited to, date and times of computer security incidents, a name for a particular security incident, a security management system user, and a potential source of the computer security incident. The security record can be designed as a running log that saves or records all activity of a computer incident source as well as the activity of the security team responding to the computer incident source.Type: GrantFiled: July 13, 2007Date of Patent: May 5, 2015Assignee: International Business Machines CorporationInventors: John M. Hammer, Rixin Ge, Charles D. Burke, Charles Hubbard
-
Publication number: 20150084829Abstract: An apparatus includes a wireless device having a radio frequency (RF) circuit, an omni-directional antenna coupled to the RF circuit, a directional antenna coupled to the RF circuit, and a switch configured to couple at least one of the omni-directional antenna and the directional antenna to an output of the RF circuit.Type: ApplicationFiled: May 19, 2014Publication date: March 26, 2015Applicant: QUALCOMM IncorporatedInventors: Jatupum Jenwatanavet, Leif Arvid Woodahl, Jeffrey Joseph Vaccaro, Jon Charles Hubbard
-
Patent number: 7590350Abstract: A computerized method for modifying an optical wavelength division multiplexing (WDM) network is described. The method includes providing an initial configuration of the optical WDM network. At least one parameter that represents a characteristic of a span in the optical WDM network as defined by the initial configuration is evaluated. The initial configuration of the optical WDM network is modified in response to the evaluation. The method can also include determining if a predetermined set of engineering rules are satisfied.Type: GrantFiled: September 2, 2003Date of Patent: September 15, 2009Assignee: Nortel Networks LimitedInventors: Gregory Moffatt, Joanne Wakefield, Thomas Coleman, Mark Riley, Charles Hubbard
-
Publication number: 20080016569Abstract: A security management system can log, investigate, respond, and track computer security incidents that can occur in a networked computer system. In other words, the security management system can produce a security record of information related to the tracking of suspicious computer activity or actual computer security threats, such as denial of service attacks or other similar compromises to computers or computer networks. The security record can include, but is not limited to, date and times of computer security incidents, a name for a particular security incident, a security management system user, and a potential source of the computer security incident. The security record can be designed as a running log that saves or records all activity of a computer incident source as well as the activity of the security team responding to the computer incident source.Type: ApplicationFiled: July 13, 2007Publication date: January 17, 2008Applicant: Internet Security Systems, Inc.Inventors: John Hammer, Rixin Ge, Charles Burke, Charles Hubbard
-
Publication number: 20050041600Abstract: A computerized method for modifying an optical wavelength division multiplexing (WDM) network is described. The method includes providing an initial configuration of the optical WDM network. At least one parameter that represents a characteristic of a span in the optical WDM network as defined by the initial configuration is evaluated. The initial configuration of the optical WDM network is modified in response to the evaluation. The method can also include determining if a predetermined set of engineering rules are satisfied.Type: ApplicationFiled: September 2, 2003Publication date: February 24, 2005Applicant: Nortel Networks LimitedInventors: Gregory Moffatt, Joanne Wakefield, Thomas Coleman, Mark Riley, Charles Hubbard