Patents by Inventor Christopher Duane
Christopher Duane has filed for patents to protect the following inventions. This listing includes patent applications that are pending as well as patents that have already been granted by the United States Patent and Trademark Office (USPTO).
-
Patent number: 11969375Abstract: A cervical collar has an anterior component including a lower support that is adjustable in angle relative to a main support. The lower support is hingedly connected to the main support at first and second end portions. An elongate element engages the first and second end portions. A lock mechanism is operatively connected to the elongate element, and is arranged for locking rotation of the lower support relative to the main support, by moving the elongate element between locked and unlocked conditions. An upper support is received by the main support at least at a front section of the main support, and is arranged to be fitted against a user's chin.Type: GrantFiled: September 22, 2022Date of Patent: April 30, 2024Assignee: OSSUR ICELAND EHFInventors: Wayne Calco, Christopher Callicott Webster, Harry Duane Romo
-
Patent number: 10853864Abstract: Described herein are techniques for providing information regarding brands of items offered for acquisition by an offering service. The items may comprise tangible or intangible goods, products (e.g., electronics, sporting goods, digital music, etc.), services, or the like. A brand, meanwhile, may refer to a name, term, design, symbol, or any other feature that distinguishes a designer, maker, manufacturer, seller or the like from other entities.Type: GrantFiled: November 17, 2017Date of Patent: December 1, 2020Assignee: Amazon Technologies, Inc.Inventors: Paul A. Kotas, James F. Lu, Jason A. Galep, Christopher Duane Furniss
-
Publication number: 20200286186Abstract: The invention is the process of tracking and collecting components and process parameters from a plurality of devices used to build product between two or more predefined data points as one operation (i.e. work zone). The data points defined within the work zone are used to identify each article of work and its lifecycle within the work zone using a unique identifier for each unit produced. Information collected from the devices or operations defined between the work zone data points is collected by the system as one operation.Type: ApplicationFiled: March 6, 2019Publication date: September 10, 2020Applicant: Imperative Solutions LLCInventor: Christopher Duane Clapper
-
Determining similarity between security rules based on weighted comparisons of their rule parameters
Patent number: 10038697Abstract: First and second security rules are accessed in a configuration file. Comparison points for comparing the first and second security rules are determined. Each comparison point identifies respective rule parameters of the first and second security rules. Respective weights are assigned to the comparison points. For each comparison point, the respective rule parameters are compared against each other to produce a corresponding comparison score indicative of a level similarity. Each comparison score is weighted by the weight assigned to the comparison point corresponding to the comparison score. The weighted comparison scores are combined into a total score indicative of an overall level of similarity between the first and second security rules.Type: GrantFiled: July 23, 2015Date of Patent: July 31, 2018Assignee: Cisco Technology, Inc.Inventors: Yedidya Dotan, Christopher Duane, Daniel Hollingshead, Denis Knjazihhin -
Patent number: 9875497Abstract: Described herein are techniques for providing information regarding brands of items offered for acquisition by an offering service. The items may comprise tangible or intangible goods, products (e.g., electronics, sporting goods, digital music, etc.), services, or the like. A brand, meanwhile, may refer to a name, term, design, symbol, or any other feature that distinguishes a designer, maker, manufacturer, seller or the like from other entities.Type: GrantFiled: August 6, 2012Date of Patent: January 23, 2018Assignee: Amazon Technologies, Inc.Inventors: Paul A. Kotas, James F. Lu, Jason A. Galep, Christopher Duane Furniss
-
Patent number: 9860059Abstract: A method and system for use in distributing token records is disclosed. At least one token record comprises a unique seed associated with a one-time password (OTP) token. An encryption key and a corresponding decryption key are generated for assisting selective encryption and decryption of a token record associated with a OTP token. The encryption key and the decryption key being unique to an end user of the token record. The token record is encrypted with the assistance of the encryption key. One of the decryption key and the encrypted token record is provided to the end user of the token record. The other of the decryption key and the encrypted token record is provided to the end user in response to secure receipt of the one of the decryption key and the encrypted token record by the end user. The encrypted token record can be decrypted with the assistance of the decryption key.Type: GrantFiled: December 23, 2011Date of Patent: January 2, 2018Assignee: EMC IP Holding Company LLCInventors: Christopher Duane, Robert S. Philpott, William Duane, Gareth Richards
-
Publication number: 20170317999Abstract: Presented herein are techniques for remotely releasing bootstrap credentials to a cloud management proxy device. In particular, a cloud management proxy device that is associated with a cloud system commences a boot operation. The cloud management proxy device then initiates a remote credential release process to obtain the bootstrap credentials, which are useable by the cloud management proxy device to complete the boot operation. Upon completion of the remote credential release process, the bootstrap credentials are received from a remote credential manager system.Type: ApplicationFiled: April 27, 2016Publication date: November 2, 2017Inventors: Denis Knjazihhin, Yedidya Dotan, Christopher Duane, Jason M. Perry
-
Patent number: 9787722Abstract: An integrated development environment (IDE) preprocesses a configuration file including security rules. The preprocessing maps object names in the security rules to associated object values based on object definitions for the object names. Responsive to the configuration file being opened in an editor, the IDE provides the editor with access to preprocessing results. Each security rule in the opened configuration file is searched for object names. The IDE links each object name found in the search to an associated object value mapped thereto by the mapping performed during the preprocessing. The IDE receives a selection of an object name in a security rule of the opened configuration file and generates for display the associated object value linked to the selected object name.Type: GrantFiled: June 30, 2015Date of Patent: October 10, 2017Assignee: Cisco Technology, Inc.Inventors: Denis Knjazihhin, Yedidya Dotan, Zachary D. Siswick, Christopher Duane, Daniel Hollingshead
-
Patent number: 9734137Abstract: Systems and methods for secure third-party document editing are described. In some embodiments, a method may include tokenizing a file retrieved from a cloud storage provider (CSP); transmitting the tokenized file to a cloud editing provider (CEP); receiving a modified, tokenized file from the CEP; de-tokenizing the modified file; and enabling rendering of the de-tokenized, modified file. In other embodiments, a memory device may have program instructions stored thereon that, upon execution by a processor of an Information Handling System (IHS), cause the IHS to: provide a portal to a user executing a browser on a client device, wherein the portal includes an interface to a CSP and to a cloud editing provider (CDEP); and allow the user to access a document stored in the CSP and to edit the document using the CDEP via the browser.Type: GrantFiled: October 26, 2015Date of Patent: August 15, 2017Assignee: Dell Products, L.P.Inventors: Christopher Duane Burchett, James Michael Burke, David Konetski, James Darrell Testerman
-
Publication number: 20170140151Abstract: Systems and methods for securely passing user authentication data between a Pre-Boot Authentication (PBA) environment and an Operating System (OS) are described. In some embodiments, an Information Handling System (IHS) may include a processor; and a Basic I/O System (BIOS) coupled to the processor, the BIOS having program instructions stored thereon that, upon execution by the processor, cause the computer system to: identify an encrypted Single-Sign-On (SSO) token and a Trusted Platform Module (TPM) key pair provisioned by an Operating System (OS) and stored in an OS registry; extract a TPM public key from the TPM key pair; encrypt a PBA private key generated by a PBA application with the TPM public key; and store the encrypted PBA private key, the TPM key pair, and the encrypted SSO token in a shadow partition of a self-encrypting hard drive coupled to the IHS.Type: ApplicationFiled: November 16, 2015Publication date: May 18, 2017Applicant: DELL PRODUCTS, L.P.Inventors: Amy C. Nelson, Christopher Duane Burchett
-
Publication number: 20170116166Abstract: Systems and methods for secure third-party document editing are described. In some embodiments, a method may include tokenizing a file retrieved from a cloud storage provider (CSP); transmitting the tokenized file to a cloud editing provider (CEP); receiving a modified, tokenized file from the CEP; de-tokenizing the modified file; and enabling rendering of the de-tokenized, modified file. In other embodiments, a memory device may have program instructions stored thereon that, upon execution by a processor of an Information Handling System (IHS), cause the IHS to: provide a portal to a user executing a browser on a client device, wherein the portal includes an interface to a CSP and to a cloud editing provider (CDEP); and allow the user to access a document stored in the CSP and to edit the document using the CDEP via the browser.Type: ApplicationFiled: October 26, 2015Publication date: April 27, 2017Applicant: DELL PRODUCTS, L.P.Inventors: Christopher Duane Burchett, James Michael Burke, David Konetski, James Darrell Testerman
-
Patent number: 9571524Abstract: A management entity generates selectable security policy classifications each identifying security policies that share common security rules. Each of the security policies is applied by a corresponding one of different security devices to control access to a resource. The management entity creates a new policy template that includes all of the security policies identified by selected ones of the policy classification selections and then creates a new security policy based on the new policy template. The management entity applies the new security policy to a security device over a network.Type: GrantFiled: January 20, 2015Date of Patent: February 14, 2017Assignee: Cisco Technology, Inc.Inventors: Yedidya Dotan, Christopher Duane, Denis Knjazihhin
-
Determining Similarity Between Security Rules Based On Weighted Comparisons Of Their Rule Parameters
Publication number: 20160344738Abstract: First and second security rules are accessed in a configuration file. Comparison points for comparing the first and second security rules are determined. Each comparison point identifies respective rule parameters of the first and second security rules. Respective weights are assigned to the comparison points. For each comparison point, the respective rule parameters are compared against each other to produce a corresponding comparison score indicative of a level similarity. Each comparison score is weighted by the weight assigned to the comparison point corresponding to the comparison score. The weighted comparison scores are combined into a total score indicative of an overall level of similarity between the first and second security rules.Type: ApplicationFiled: July 23, 2015Publication date: November 24, 2016Inventors: Yedidya Dotan, Christopher Duane, Daniel Hollingshead, Denis Knjazihhin -
Publication number: 20160344773Abstract: An integrated development environment (IDE) preprocesses a configuration file including security rules. The preprocessing maps object names in the security rules to associated object values based on object definitions for the object names. Responsive to the configuration file being opened in an editor, the IDE provides the editor with access to preprocessing results. Each security rule in the opened configuration file is searched for object names. The IDE links each object name found in the search to an associated object value mapped thereto by the mapping performed during the preprocessing. The IDE receives a selection of an object name in a security rule of the opened configuration file and generates for display the associated object value linked to the selected object name.Type: ApplicationFiled: June 30, 2015Publication date: November 24, 2016Inventors: Denis Knjazihhin, Yedidya Dotan, Zachary D. Siswick, Christopher Duane, Daniel Hollingshead
-
Patent number: 9454648Abstract: Method and system for distributing token records in market environment is disclosed. At least one token record comprising a unique seed associated with a OTP token. Encryption key and decryption key are generated for assisting selective encryption and decryption of token record associated with OTP token. The token record is encrypted with the assistance of encryption key. One of encrypted token record and decryption key is provided into market environment. A device comprising an identifier for facilitating identification of token record associated with OTP token is provided into market environment together with the one of encrypted token record and decryption key. The identifier concealed by tamper-evident removable material such that any effort to reveal identifier will be readily apparent. The other of the encrypted token record and decryption key is provided to an entity in response to entity providing identifier.Type: GrantFiled: December 23, 2011Date of Patent: September 27, 2016Assignee: EMC CorporationInventors: Robert S Philpott, William Duane, Christopher Duane, Gareth Richards
-
Publication number: 20160212168Abstract: A management entity generates selectable security policy classifications each identifying security policies that share common security rules. Each of the security policies is applied by a corresponding one of different security devices to control access to a resource. The management entity creates a new policy template that includes all of the security policies identified by selected ones of the policy classification selections and then creates a new security policy based on the new policy template. The management entity applies the new security policy to a security device over a network.Type: ApplicationFiled: January 20, 2015Publication date: July 21, 2016Inventors: Yedidya Dotan, Christopher Duane, Denis Knjazihhin
-
Patent number: 9292879Abstract: A social marker is generated from data about user relationships and interactions with consumer objects such as brands, products, services, or a combination thereof. The social marker provides an indicator to a target user that someone they have a relationship with has taken some action associated with the consumer object. This action may include, but is not limited to, posting a comment, a rating, a recommendation, and so forth about the consumer object.Type: GrantFiled: March 26, 2012Date of Patent: March 22, 2016Assignee: Amazon Technologies, Inc.Inventors: James F. Lu, Christopher Duane Furniss, James Fisher Robinson, Jr., Rudy B. Gajadhar
-
Patent number: D704827Type: GrantFiled: July 11, 2011Date of Patent: May 13, 2014Assignee: The Procter & Gamble CompanyInventors: Lisa (June) Hood, Signe (Christina) Larson, Christopher (Duane) Heckman, Bryan (Martin) Shova, Chelsea (Faith) McLemore
-
Patent number: D797611Type: GrantFiled: May 29, 2015Date of Patent: September 19, 2017Assignee: Ciro, LLCInventor: Christopher Duane Lindloff
-
Patent number: D832694Type: GrantFiled: November 9, 2016Date of Patent: November 6, 2018Assignee: Ciro, LLCInventors: Darron Bradley May, Christopher Duane Lindloff