Patents by Inventor Christopher Glen
Christopher Glen has filed for patents to protect the following inventions. This listing includes patent applications that are pending as well as patents that have already been granted by the United States Patent and Trademark Office (USPTO).
-
Publication number: 20200072312Abstract: A position-sensitive shock absorber 1 comprising an internal fluid space 3, a piston 5 and fluid system 7. The piston divides the internal fluid space into a compression side 3a and a rebound side 3b. The fluid system fluidly connects the compression side to the rebound side. The fluid system comprises a chain 9 of three or more external fluid spaces 9a, 9b, 9c, 9d external to the internal fluid space, space flow-control-arrangements 27i, 27ii, 27iii, and passage arrangements 25a, 25b, 25c, 25d mutually spaced along the internal fluid space. Each of the space flow-control-arrangements is configured to mutually fluidly connect a respective adjacent two of the external fluid spaces. Each of the external fluid spaces has a respective one of the passage arrangements. Each of the passage arrangements comprises one or more passages opening to the internal fluid space.Type: ApplicationFiled: July 12, 2019Publication date: March 5, 2020Applicant: Birkgrove Pty Ltd.Inventors: Adam Reginald Dobinson, Benjamin Luke Dobinson, Christopher Glen Dobinson
-
Publication number: 20190327973Abstract: A method of controlling potato psyllid in plant propagation materials comprising applying a composition comprising cyantraniliprole and abamectin to the plant propagation material.Type: ApplicationFiled: September 21, 2017Publication date: October 31, 2019Applicant: SYNGENTA PARTICIPATIONS AGInventors: Christopher Glen CLEMENS, Elijah MECK
-
Patent number: 10294850Abstract: A machine engine enclosure arrangement that has sound reducing elements allows for the overall sound rating of the machine to be decreased. The engine enclosure includes a housing that has a housing length and a housing width. The housing defines a housing axis that extends along the housing length and the housing axis defines a vertical reference plane. The vertical reference plane is perpendicular to a ground surface on which machine is resting. The engine enclosure further includes a radiator fan that is configured to provide air flow across the radiator. The radiator fan has a diameter greater than the housing width and defines a fan plane perpendicular to an axis of rotation of the radiator fan. The radiator fan is positioned between the side walls of the housing so that the fan plane is at a non-perpendicular angle with respect to the vertical reference plane.Type: GrantFiled: April 15, 2016Date of Patent: May 21, 2019Assignee: Vermeer Manufacturing CompanyInventors: Christopher Glen Shue, Timothy Jon Whitcomb, Benjamin Kenneth Downing
-
Patent number: 10194284Abstract: Systems and methods for utilizing unused space in expensive message based communication to embed messages from a sender device to a receiver device to maximize payload usage over a potentially fee-based messaging service. One or more machine-to-machine messages may be embedded in unutilized transport space when other communications, that may potentially be delivered over a fee-based network, are initiated at a device. The machine-to-machine message and other communications may be extracted from a combined message package at a receiving device and processed as if they were independently transported. Machine-to-machine messages may be segmented and embedded across multiple unrelated communication packages and later reassembled.Type: GrantFiled: September 12, 2012Date of Patent: January 29, 2019Assignee: Digit International Inc.Inventors: Adam D. Dirstine, Christopher Glen Popp
-
Publication number: 20170213052Abstract: Approaches for determining a potential merchant breach are described. A system can acquire card transaction data from one or more sources such as merchants or financial institutions, in some instances at a predetermined time interval. Cards associated with the card transaction data can be analyzed to determine the health of a particular card, including the likelihood that the particular card has been compromised. A set of cards are accumulated, and their associated health data is stored. Based on the information obtained from a source, and the health associated with a set of cards, a potential date where a merchant was breached can be determined and fraudulent purchases can be prevented.Type: ApplicationFiled: April 10, 2017Publication date: July 27, 2017Inventors: Jean-Baptiste MICHEL, Barry MCCARDEL, Daniel NORRIS, Craig SAPERSTEIN, Christopher GLEN, Eric DENOVITZER
-
Patent number: 9661012Abstract: Approaches for determining a potential merchant breach are described. A system can acquire card transaction data from one or more sources such as merchants or financial institutions, in some instances at a predetermined time interval. Cards associated with the card transaction data can be analyzed to determine the health of a particular card, including the likelihood that the particular card has been compromised. A set of cards are accumulated, and their associated health data is stored. Based on the information obtained from a source, and the health associated with a set of cards, a potential date where a merchant was breached can be determined and fraudulent purchases can be prevented.Type: GrantFiled: July 8, 2016Date of Patent: May 23, 2017Assignee: PALANTIR TECHNOLOGIES INC.Inventors: Jean-Baptiste Michel, Barry McCardel, Daniel Norris, Craig Saperstein, Christopher Glen, Eric Denovitzer
-
Publication number: 20170024828Abstract: Approaches for determining a potential payment card that has been tested or a testing site are disclosed. Based on a variety of information, including transaction information associated with one or more cards, information indicative of unscrupulous actors vetting cards can be determined. By reviewing transaction information, patterns can emerge such as a card being used in many different locations within a short time span. Based on these patterns, a test site or compromised merchant can be determined. After a test site is determined, other cards used at the particular test site can also be determined.Type: ApplicationFiled: October 26, 2015Publication date: January 26, 2017Inventors: Jean-Baptiste MICHEL, Barry MCCARDEL, Daniel NORRIS, Craig SAPERSTEIN, Christopher GLEN, Eric DENOVITZER
-
Publication number: 20170026396Abstract: Approaches for determining a potential merchant breach are described. A system can acquire card transaction data from one or more sources such as merchants or financial institutions, in some instances at a predetermined time interval. Cards associated with the card transaction data can be analyzed to determine the health of a particular card, including the likelihood that the particular card has been compromised. A set of cards are accumulated, and their associated health data is stored. Based on the information obtained from a source, and the health associated with a set of cards, a potential date where a merchant was breached can be determined and fraudulent purchases can be prevented.Type: ApplicationFiled: July 8, 2016Publication date: January 26, 2017Inventors: Jean-Baptiste MICHEL, Barry MCCARDEL, Daniel NORRIS, Craig SAPERSTEIN, Christopher GLEN, Eric DENOVITZER
-
Publication number: 20160305307Abstract: A machine engine enclosure arrangement that has sound reducing elements allows for the overall sound rating of the machine to be decreased. The engine enclosure includes a housing that has a housing length and a housing width. The housing defines a housing axis that extends along the housing length and the housing axis defines a vertical reference plane. The vertical reference plane is perpendicular to a ground surface on which machine is resting. The engine enclosure further includes a radiator fan that is configured to provide air flow across the radiator. The radiator fan has a diameter greater than the housing width and defines a fan plane perpendicular to an axis of rotation of the radiator fan. The radiator fan is positioned between the side walls of the housing so that the fan plane is at a non-perpendicular angle with respect to the vertical reference plane.Type: ApplicationFiled: April 15, 2016Publication date: October 20, 2016Inventors: Christopher Glen Shue, Timothy Jon Whitcomb, Benjamin Kenneth Downing
-
Patent number: 9392008Abstract: Approaches for determining a potential merchant breach are described. A system can acquire card transaction data from one or more sources such as merchants or financial institutions, in some instances at a predetermined time interval. Cards associated with the card transaction data can be analyzed to determine the health of a particular card, including the likelihood that the particular card has been compromised. A set of cards are accumulated, and their associated health data is stored. Based on the information obtained from a source, and the health associated with a set of cards, a potential date where a merchant was breached can be determined and fraudulent purchases can be prevented.Type: GrantFiled: October 26, 2015Date of Patent: July 12, 2016Assignee: Palantir Technologies Inc.Inventors: Jean-Baptiste Michel, Barry McCardel, Daniel Norris, Craig Saperstein, Christopher Glen, Eric Denovitzer
-
Patent number: 8775509Abstract: Disclosed in some examples is a method for communications between a client and a server using a stateless messaging protocol by transmitting from a client to a server a first message using the stateless messaging protocol; receiving from the server a response message, the response message including an indication of the presence of a second message at the server intended for the client, the indication including message retrieval information; sending a third message from the client to the server including the message retrieval information; and receiving a fourth message from the server, the fourth message including the contents of the second message.Type: GrantFiled: July 30, 2012Date of Patent: July 8, 2014Assignee: Digi International Inc.Inventors: Adam D. Dirstine, Christopher Glen Popp
-
Patent number: 8769525Abstract: A networked firmware management system is operable to manage firmware in one or more target devices by receiving one or more firmware target specifications from one or more target devices, the firmware target specifications each identifying a firmware target in the target device. The server stores the one or more received firmware target specification, associated with the one or more firmware targets in the target device. When the server receives a firmware update, the server matches a firmware attribute of the received firmware update against the one or more firmware target specifications stored in the server, and sends the received firmware update to any firmware targets in the target device having a firmware target specification that matches the received firmware update attribute.Type: GrantFiled: January 31, 2012Date of Patent: July 1, 2014Assignee: Digi International Inc.Inventors: Adam D. Dirstine, Christopher Glen Popp
-
Patent number: 8732338Abstract: A wireless mesh network server is operable to receive a message to one or more mesh network nodes from a client external to the mesh network, the message comprising an alias identifying the one or more mesh network nodes. The server is further operable to identify the one or more receiving mesh network nodes by the received message alias via an alias table, and forward the received message to the one or more mesh network nodes identified by the alias.Type: GrantFiled: October 22, 2009Date of Patent: May 20, 2014Assignee: Digi International Inc.Inventors: David J. Hutchison, Adam D. Dirstine, Pamela A. Wright, Jeffrey M. Ryan, Steven L. Halter, Christopher Glen Popp
-
Publication number: 20140115093Abstract: Systems and methods for the remote data exchange and device management with efficient file replication over heterogeneous communication transports. A user or application may provide a server with a communication bundle that may include a command and a data file. A transfer of the bundle from the server to one or more devices coupled to the server by a network over a first protocol may be initiated. Before the completion of the transfer, if a more cost effective connection becomes available the transfer of the bundle from the server to one or more devices may be completed via the more cost effective connection. The bundle may be transmitted in multiple segments. The individual segments may be transferred in any order and over various network protocols, and reassembled at the receiving device.Type: ApplicationFiled: October 22, 2012Publication date: April 24, 2014Applicant: DIGI INTERNATIONAL INC.Inventors: Adam D. Dirstine, Christopher Glen Popp
-
Patent number: 8683226Abstract: Systems and methods for automatically provisioning devices that do not include or cannot provide a unique hardware identifier over a machine-to-machine network. A device or application may provide a server with a non-unique provisioning identifier during restricted communication between the server and the device. In response to receiving a provisioning identifier from a device, a server may generate a globally unique device identifier associated with the provisioning identifier for the individual device, and transmit the unique identifier to the device. The device may retain the unique identifier for future transactions. A request may be provided to a user, at the device, the server or any other interface, requesting that a newly identified device be authenticated. Upon authentication the device may communicate with the server with additional interactions that were not provided after provisioning and before authentication.Type: GrantFiled: July 16, 2012Date of Patent: March 25, 2014Assignee: Digi International Inc.Inventors: Christopher Glen Popp, Adam D. Dirstine
-
Publication number: 20140074946Abstract: Systems and methods for utilizing unused space in expensive message based communication to embed messages from a sender device to a receiver device to maximize payload usage over a potentially fee-based messaging service. One or more machine-to-machine messages may be embedded in unutilized transport space when other communications, that may potentially be delivered over a fee-based network, are initiated at a device. The machine-to-machine message and other communications may be extracted from a combined message package at a receiving device and processed as if they were independently transported. Machine-to-machine messages may be segmented and embedded across multiple unrelated communication packages and later reassembled.Type: ApplicationFiled: September 12, 2012Publication date: March 13, 2014Applicant: DIGI INTERNATIONAL INC.Inventors: Adam D. Dirstine, Christopher Glen Popp
-
Publication number: 20140032643Abstract: Disclosed in some examples is a method for communications between a client and a server using a stateless messaging protocol by transmitting from a client to a server a first message using the stateless messaging protocol; receiving from the server a response message, the response message including an indication of the presence of a second message at the server intended for the client, the indication including message retrieval information; sending a third message from the client to the server including the message retrieval information; and receiving a fourth message from the server, the fourth message including the contents of the second message.Type: ApplicationFiled: July 30, 2012Publication date: January 30, 2014Inventors: Adam D. Dirstine, Christopher Glen Popp
-
Publication number: 20140020061Abstract: Systems and methods for automatically provisioning devices that do not include or cannot provide a unique hardware identifier over a machine-to-machine network. A device or application may provide a server with a non-unique provisioning identifier during restricted communication between the server and the device. In response to receiving a provisioning identifier from a device, a server may generate a globally unique device identifier associated with the provisioning identifier for the individual device, and transmit the unique identifier to the device. The device may retain the unique identifier for future transactions. A request may be provided to a user, at the device, the server or any other interface, requesting that a newly identified device be authenticated. Upon authentication the device may communicate with the server with additional interactions that were not provided after provisioning and before authentication.Type: ApplicationFiled: July 16, 2012Publication date: January 16, 2014Applicant: Digi International Inc.Inventors: Christopher Glen Popp, Adam D. Dirstine
-
Publication number: 20120198435Abstract: A networked firmware management system is operable to manage firmware in one or more target devices by receiving one or more firmware target specifications from one or more target devices, the firmware target specifications each identifying a firmware target in the target device. The server stores the one or more received firmware target specification, associated with the one or more firmware targets in the target device. When the server receives a firmware update, the server matches a firmware attribute of the received firmware update against the one or more firmware target specifications stored in the server, and sends the received firmware update to any firmware targets in the target device having a firmware target specification that matches the received firmware update attribute.Type: ApplicationFiled: January 31, 2012Publication date: August 2, 2012Applicant: Digi International Inc.Inventors: Adam D. Dirstine, Christopher Glen Popp
-
Publication number: 20120198434Abstract: A networked firmware management system is operable to manage firmware in one or more target devices by receiving a virtual bundled firmware update package comprising two or more individual firmware update files. The system identifies one or more networked target devices having a virtual firmware target matching the virtual bundled firmware update package, and sends the virtual bundled firmware update package to the virtual firmware target on the one or more networked devices.Type: ApplicationFiled: January 31, 2012Publication date: August 2, 2012Applicant: Digi International Inc.Inventors: Adam D. Dirstine, Christopher Glen Popp