Patents by Inventor Chris Newton

Chris Newton has filed for patents to protect the following inventions. This listing includes patent applications that are pending as well as patents that have already been granted by the United States Patent and Trademark Office (USPTO).

  • Publication number: 20240104293
    Abstract: A system and method for integrating machine learning algorithms to enrich content items in a content management system. The content management system includes at least one processor, a transformation engine to execute one or more transformations on content items stored in the content management system, and a machine learning services to apply a machine learning algorithm to the content items based on the one or more transformations.
    Type: Application
    Filed: December 8, 2023
    Publication date: March 28, 2024
    Inventors: John Newton, Brian Remmington, Jan Vonka, Tom Morris, Chris Hudson-Silver, Cezar Leahu
  • Patent number: 9288329
    Abstract: A communications device comprises a processor, a memory device coupled to processor, one or more wireless transmitters, one or more wireless receivers, an output component, and an input component. The memory device includes executable instructions to enable the processor to perform the following steps: initiate a call with a first remote device; receive, from the first remote device, an indication of a phone number that is programmed in the communications device; initiate a call with a second remote device associated with the phone number that is programmed in the communications device; and cause the communications device, the first remote device, and the second remote device to be placed into a conference call, or to place the first remote device on hold while the communications device provides information to the second remote device.
    Type: Grant
    Filed: July 25, 2014
    Date of Patent: March 15, 2016
    Assignee: Freeus, LLC
    Inventors: Chris Newton, Peter Muldoon, Justin Gern
  • Publication number: 20150038104
    Abstract: A communications device comprises a processor, a memory device coupled to processor, one or more wireless transmitters, one or more wireless receivers, an output component, and an input component. The memory device includes executable instructions to enable the processor to perform the following steps: initiate a call with a first remote device; receive, from the first remote device, an indication of a phone number that is programmed in the communications device; initiate a call with a second remote device associated with the phone number that is programmed in the communications device; and cause the communications device, the first remote device, and the second remote device to be placed into a conference call, or to place the first remote device on hold while the communications device provides information to the second remote device.
    Type: Application
    Filed: July 25, 2014
    Publication date: February 5, 2015
    Inventors: Chris Newton, Peter Muldoon, Justin Gern
  • Publication number: 20120011563
    Abstract: A network security system takes an active approach to network security. This is accomplished by providing intelligence about other networks. A master network intelligence database is established that uses a plurality of network information agents for gathering information about networks and providing the information to the master network intelligence database. A customer network security system is then able to secure the customer network in dependence upon information received from the master network intelligence. Security information includes at least one of hostility level on the Internet, collected from numerous sites; security event history; spam levels; hosted services; public wireless; organization type; organization associations; peer ISPs; bandwidth connection to the Internet; active security measures; number of users on the network; age of the network; inappropriate content served; industry; geographic placement; open proxy servers; and contact information.
    Type: Application
    Filed: September 16, 2011
    Publication date: January 12, 2012
    Inventor: Chris Newton
  • Patent number: 8024795
    Abstract: A network security system takes an active approach to network security. This is accomplished by providing intelligence about other networks. A master network intelligence database is established that uses a plurality of network information agents for gathering information about networks and providing the information to the master network intelligence database. A customer network security system is then able to secure the customer network in dependence upon information received from the master network intelligence. Security information includes at least one of hostility level on the Internet, collected from numerous sites; security event history; spam levels; hosted services; public wireless; organization type; organization associations; peer ISPs; bandwidth connection to the Internet; active security measures; number of users on the network; age of the network; inappropriate content served; industry; geographic placement; open proxy servers; and contact information.
    Type: Grant
    Filed: May 9, 2003
    Date of Patent: September 20, 2011
    Assignee: Q1 Labs, Inc.
    Inventor: Chris Newton
  • Publication number: 20050021683
    Abstract: Correlating network activity through visualizing network data and with identifying entities associated with targeted activities and correlating therewith other activities from those entities. Network traffic is classified into a number of conceptual views of network traffic, each instantiating view objects that are a representation of network traffic that satisfies a set of conditions. Configuration files define a hierarchy, the structure of the hierarchy, and its makeup. Any point on the hierarchy can be accessed using its Graphical Request Language (GRL) designation. Further GRL designations are used to label views associated with a point. A plurality of view objects are linked to corresponding view object databases. Define new view objects using one or more GRL does correlation and combining using logical operators. Generate a new list of addresses from the GRL address lists and place all current and subsequent traffic for those machines in the new view object.
    Type: Application
    Filed: March 27, 2003
    Publication date: January 27, 2005
    Inventors: Chris Newton, Chris Carton
  • Publication number: 20040250122
    Abstract: A network security system takes an active approach to network security. This is accomplished by providing intelligence about other networks. A master network intelligence database is established that uses a plurality of network information agents for gathering information about networks and providing the information to the master network intelligence database. A customer network security system is then able to secure the customer network in dependence upon information received from the master network intelligence. Security information includes at least one of hostility level on the Internet, collected from numerous sites; security event history; spam levels; hosted services; public wireless; organization type; organization associations; peer ISPs; bandwidth connection to the Internet; active security measures; number of users on the network; age of the network; inappropriate content served; industry; geographic placement; open proxy servers; and contact information.
    Type: Application
    Filed: May 9, 2003
    Publication date: December 9, 2004
    Inventor: Chris Newton
  • Publication number: 20040143658
    Abstract: Methods and apparatuses for the visualization of network traffic and permitting access thereto are provided. In one aspect of the invention, an illustrative method includes defining a plurality of views of network traffic for the classification of network traffic into the views. At least one of the views is a group view. In one example, the types of views include at least two of the following: network address, application, protocol, flow type, packet type, geographic region, ICMP type, slow scan, operating system, flag, remote host count, local host count, spoofing, fragments, service, sessions, response time, status, and user. In another example, network traffic is classified according to the composite views of various combinations of previously defined views. A master console permits users to access only the portion of the network for which the users is responsible. The permitted view does not show other parts of the network.
    Type: Application
    Filed: January 17, 2003
    Publication date: July 22, 2004
    Inventors: Chris Newton, William Bird, Dwight Spencer
  • Patent number: 5758651
    Abstract: A system is disclosed for enabling telemetry from an auditory prosthesis, illustratively a cochlear prosthesis. An electrode array 10 is used both for delivering electrical stimuli, and for sensing evoked potentials. Preferably a delay is provided between stimulus and measurement, and the sensing electrodes are distinct from the stimulus electrodes.
    Type: Grant
    Filed: June 13, 1995
    Date of Patent: June 2, 1998
    Inventors: Tony Mikeal Nygard, Chris Newton Daly, Jim Finlay Patrick, David Kerry Money