Patents by Inventor Charles Hubbard

Charles Hubbard has filed for patents to protect the following inventions. This listing includes patent applications that are pending as well as patents that have already been granted by the United States Patent and Trademark Office (USPTO).

  • Publication number: 20240108780
    Abstract: Air purification devices are described. Devices are powered to form an electric field along an airflow path that creates a plasma for destruction of pathogens carried through the device. Devices can be single-user, portable devices for purification of air flow to and/or from a single user.
    Type: Application
    Filed: September 29, 2022
    Publication date: April 4, 2024
    Inventors: ELIEL VILLA-ALEMAN, JOHN T. BOBBITT, III, WENDY KUHNE, MICHAEL C. MAXWELL, MATTHEW FOLSOM, CHARLES TURICK, COURTNEY BURCKHALTER, TRAVIS HUBBARD, TYLER BARNES, JOSEPH KINNEY
  • Patent number: 9503262
    Abstract: Embodiments are directed toward transparent denial of service protection. Instruction set information that references a seed file may be communicated to a client computer. A network packet key may be generated based on the instruction set information or encrypted and provided by a server. A client computer may generate a client network packet key based on the instruction set information provided by the network computer and a seed file installed on the client computer. The client computer may include the client network packet key the one or more network packets that it is sending to the network computer before they are provided to the network computer. A packet rule that includes the network packet key may be generated and installed in a packet inspection engine. If network packets are received, the packet inspection engine compares the network packet key to the network packets using the packet rule.
    Type: Grant
    Filed: December 7, 2015
    Date of Patent: November 22, 2016
    Assignee: Centri Technology, Inc.
    Inventors: Michael Patrick Mackey, Luis Gerardo Paris, Charles Hubbard Taylor
  • Publication number: 20160205133
    Abstract: Embodiments are directed toward transparent denial of service protection. Instruction set information that references a seed file may be communicated to a client computer. A network packet key may be generated based on the instruction set information or encrypted and provided by a server. A client computer may generate a client network packet key based on the instruction set information provided by the network computer and a seed file installed on the client computer. The client computer may include the client network packet key the one or more network packets that it is sending to the network computer before they are provided to the network computer. A packet rule that includes the network packet key may be generated and installed in a packet inspection engine. If network packets are received, the packet inspection engine compares the network packet key to the network packets using the packet rule.
    Type: Application
    Filed: December 7, 2015
    Publication date: July 14, 2016
    Inventors: Michael Patrick Mackey, Luis Gerardo Paris, Charles Hubbard Taylor
  • Patent number: 9210187
    Abstract: Embodiments are directed toward transparent denial of service protection. Instruction set information that references a seed file may be communicated to a client computer. A network packet key may be generated based on the instruction set information or encrypted and provided by a server. A client computer may generate a client network packet key based on the instruction set information provided by the network computer and a seed file installed on the client computer. The client computer may include the client network packet key the one or more network packets that it is sending to the network computer before they are provided to the network computer. A packet rule that includes the network packet key may be generated and installed in a packet inspection engine. If network packets are received, the packet inspection engine compares the network packet key to the network packets using the packet rule.
    Type: Grant
    Filed: July 31, 2015
    Date of Patent: December 8, 2015
    Assignee: Centri Technology, Inc.
    Inventors: Michael Patrick Mackey, Luis Gerardo Paris, Charles Hubbard Taylor
  • Patent number: 9027121
    Abstract: A security management system can log, investigate, respond, and track computer security incidents that can occur in a networked computer system. In other words, the security management system can produce a security record of information related to the tracking of suspicious computer activity or actual computer security threats, such as denial of service attacks or other similar compromises to computers or computer networks. The security record can include, but is not limited to, date and times of computer security incidents, a name for a particular security incident, a security management system user, and a potential source of the computer security incident. The security record can be designed as a running log that saves or records all activity of a computer incident source as well as the activity of the security team responding to the computer incident source.
    Type: Grant
    Filed: July 13, 2007
    Date of Patent: May 5, 2015
    Assignee: International Business Machines Corporation
    Inventors: John M. Hammer, Rixin Ge, Charles D. Burke, Charles Hubbard
  • Publication number: 20150084829
    Abstract: An apparatus includes a wireless device having a radio frequency (RF) circuit, an omni-directional antenna coupled to the RF circuit, a directional antenna coupled to the RF circuit, and a switch configured to couple at least one of the omni-directional antenna and the directional antenna to an output of the RF circuit.
    Type: Application
    Filed: May 19, 2014
    Publication date: March 26, 2015
    Applicant: QUALCOMM Incorporated
    Inventors: Jatupum Jenwatanavet, Leif Arvid Woodahl, Jeffrey Joseph Vaccaro, Jon Charles Hubbard
  • Patent number: 7590350
    Abstract: A computerized method for modifying an optical wavelength division multiplexing (WDM) network is described. The method includes providing an initial configuration of the optical WDM network. At least one parameter that represents a characteristic of a span in the optical WDM network as defined by the initial configuration is evaluated. The initial configuration of the optical WDM network is modified in response to the evaluation. The method can also include determining if a predetermined set of engineering rules are satisfied.
    Type: Grant
    Filed: September 2, 2003
    Date of Patent: September 15, 2009
    Assignee: Nortel Networks Limited
    Inventors: Gregory Moffatt, Joanne Wakefield, Thomas Coleman, Mark Riley, Charles Hubbard
  • Publication number: 20080016569
    Abstract: A security management system can log, investigate, respond, and track computer security incidents that can occur in a networked computer system. In other words, the security management system can produce a security record of information related to the tracking of suspicious computer activity or actual computer security threats, such as denial of service attacks or other similar compromises to computers or computer networks. The security record can include, but is not limited to, date and times of computer security incidents, a name for a particular security incident, a security management system user, and a potential source of the computer security incident. The security record can be designed as a running log that saves or records all activity of a computer incident source as well as the activity of the security team responding to the computer incident source.
    Type: Application
    Filed: July 13, 2007
    Publication date: January 17, 2008
    Applicant: Internet Security Systems, Inc.
    Inventors: John Hammer, Rixin Ge, Charles Burke, Charles Hubbard
  • Publication number: 20050041600
    Abstract: A computerized method for modifying an optical wavelength division multiplexing (WDM) network is described. The method includes providing an initial configuration of the optical WDM network. At least one parameter that represents a characteristic of a span in the optical WDM network as defined by the initial configuration is evaluated. The initial configuration of the optical WDM network is modified in response to the evaluation. The method can also include determining if a predetermined set of engineering rules are satisfied.
    Type: Application
    Filed: September 2, 2003
    Publication date: February 24, 2005
    Applicant: Nortel Networks Limited
    Inventors: Gregory Moffatt, Joanne Wakefield, Thomas Coleman, Mark Riley, Charles Hubbard