Patents by Inventor Collin Green
Collin Green has filed for patents to protect the following inventions. This listing includes patent applications that are pending as well as patents that have already been granted by the United States Patent and Trademark Office (USPTO).
-
Publication number: 20250178871Abstract: A system for design of a synchronous rope extended telescoping boom, the system including a base section, a rope extended tip section, and at least one rope extended boom section disposed between the base section and the tip section, each section having an open interior space. An extensible power source disposed within the open interior space of the base section for translating the rope extended boom sections, the power source comprising an extensible first end and an unanchored body portion, wherein the extensible first end is anchored to the base section proximate a trailing edge of the first section.Type: ApplicationFiled: January 31, 2025Publication date: June 5, 2025Applicant: Custom Truck One Source, Inc.Inventors: Collin Green, Kyle Gerber
-
Patent number: 12240739Abstract: A telescopic boom that includes a plurality of extensible boom sections and a power source for delivering translational force to the boom sections. The boom further includes at least one rope transiting between boom sections wherein a first section is extending, and the second section is adjacent to the extending sections. The rope is redirected by at least one sheave mounted to the adjacent section and further redirected by at least one sheave mounted to the extensible section.Type: GrantFiled: November 21, 2022Date of Patent: March 4, 2025Assignee: Custom Truck One Source, Inc.Inventors: Collin Green, Kyle Gerber
-
Publication number: 20240106158Abstract: Connector receptacles and connector receptacle interfaces that can detect a connection to a corresponding connector insert, can detect liquid in the connector receptacle, and can limit damage to the connector receptacle caused by the liquid.Type: ApplicationFiled: September 11, 2023Publication date: March 28, 2024Applicant: Apple Inc.Inventors: Eric B. Wankoff, Peter J. Cameron, Mahmoud R. Amini, Daren L. Rimando, Sotirios Lyrintzis, Makiko K. Brzezinski, Adam H. Herzog, Mohammed Nasser Khamis Al Jashmi, George Tziviskos, Aaron N. Miletich, Collin Greene, Jason S. Sloey, Sydney Puckett
-
Publication number: 20230278835Abstract: A telescopic boom that includes a plurality of extensible boom sections and a power source for delivering translational force to the boom sections. The boom further includes at least one rope transiting between boom sections wherein a first section is extending, and the second section is adjacent to the extending sections. The rope is redirected by at least one sheave mounted to the adjacent section and further redirected by at least one sheave mounted to the extensible section.Type: ApplicationFiled: November 21, 2022Publication date: September 7, 2023Inventors: Collin Green, Kyle Gerber
-
Patent number: 9507940Abstract: A system and method for adapting a security tool for performing security analysis on a software application. In one embodiment, a method includes maintaining a registry of security tools; receiving code for a software application; and comparing component criteria for each security tool against each component of the software application, wherein the component criteria for each respective security tool indicate which components the respective security tool is designed to analyze for security vulnerabilities. The method also includes generating a tool-specific package for each component of the software application, wherein the tool-specific package comprises one or more security tools that are designed to analyze the respective component for security vulnerabilities.Type: GrantFiled: August 10, 2010Date of Patent: November 29, 2016Assignee: salesforce.com, inc.Inventors: Collin Greene, Robert Fly
-
Publication number: 20140259164Abstract: Disclosed are systems, apparatus, methods, and computer readable media for determining a confidentiality for a site record. In one embodiment, a site record for analysis is identified at a computing device. The computing device may identify a source for the site record and determine, based on the source, a source-based confidentiality for the site record. The computing device may identify, based on the site record, a designated confidentiality for the site record, and determine that the designated confidentiality is different from the source-based confidentiality. Responsive to the determination that the designated confidentiality is different from the source-based confidentiality, the computing device may store the source-based confidentiality for the site record on a storage medium.Type: ApplicationFiled: May 22, 2014Publication date: September 11, 2014Applicant: salesforce.com, inc.Inventors: Robert Fly, Collin Greene, Brian Soby, James Dolph
-
Patent number: 8768964Abstract: Disclosed are systems, apparatus, methods, and computer readable media for analyzing computing site information. In one embodiment, an analysis tool for analyzing a first site record stored on a storage medium may be selected. The first site record comprising information may relate to a computing site. The computing site may comprise a unit of computing functionality accessible via a network. When it is determined that first confidentiality level for the computing site exceeds a trust level for the analysis tool, the first site record may be modified to create a second site record, the second site record having a second confidentiality level, the second confidentiality level not exceeding the trust level.Type: GrantFiled: March 14, 2011Date of Patent: July 1, 2014Assignee: salesforce.com, inc.Inventors: Robert Fly, Collin Greene, Brian Soby, James Dolph
-
Patent number: 8701198Abstract: A system and method for performing security analysis on a software application. In one embodiment, a method includes receiving application architecture information for a software application; and determining an application type based on the application architecture information. The method also includes performing one or more security tests on the software application based on the application type and the application architecture information; and approving the software application to be available in an online marketplace if the software application passes the one or more security tests.Type: GrantFiled: August 10, 2010Date of Patent: April 15, 2014Assignee: salesforce.com, inc.Inventors: Collin Greene, Robert Fly, Varun Badhwar
-
Publication number: 20140074734Abstract: A water rights marketing system, methods, and products that perform maintaining a listings database including listings data representative of a plurality of water right listings, receiving data representative of a search query for locating one or more relevant water right listings included in the plurality of water right listings, the search query including search criteria defined by a user of the user device, identifying the one or more relevant water right listings having at least one listings data element that satisfies the search criteria, and presenting the one or more relevant water right listings on a display associated with the user device for access by the user.Type: ApplicationFiled: September 11, 2013Publication date: March 13, 2014Applicant: Pinnacle Software, LLCInventors: Jesse R. Lassley, Collin Green, Michael Bemis
-
Patent number: 8516591Abstract: Disclosed are systems, apparatus, methods, and computer readable media for determining a combined trust level for a website. In one embodiment, a user account associated with the creation or maintenance of the website may be analyzed. The analysis of the user account may be capable of identifying the presence or absence of a first risk factor affecting a likelihood that the user account is engaged in a malicious activity. A source code file capable of being used to create a message for sending to a remote computing device may be analyzed. The analysis of the source code file may be capable of identifying the presence or absence of a second risk factor affecting a likelihood that the source code file is facilitating a malicious activity. Based on the analysis, a combined trust level for the website may be determined.Type: GrantFiled: March 14, 2011Date of Patent: August 20, 2013Assignee: salesforce.com, inc.Inventors: Robert Fly, Collin Greene, Brian Soby, James Dolph
-
Publication number: 20120042383Abstract: A system and method for adapting a security tool for performing security analysis on a software application. In one embodiment, a method includes maintaining a registry of security tools; receiving code for a software application; and comparing component criteria for each security tool against each component of the software application, wherein the component criteria for each respective security tool indicate which components the respective security tool is designed to analyze for security vulnerabilities. The method also includes generating a tool-specific package for each component of the software application, wherein the tool-specific package comprises one or more security tools that are designed to analyze the respective component for security vulnerabilities.Type: ApplicationFiled: August 10, 2010Publication date: February 16, 2012Applicant: Salesforce.com, Inc.Inventors: Collin Greene, Robert Fly
-
Publication number: 20120042384Abstract: A system and method for performing security analysis on a software application. In one embodiment, a method includes receiving application architecture information for a software application; and determining an application type based on the application architecture information. The method also includes performing one or more security tests on the software application based on the application type and the application architecture information; and approving the software application to be available in an online marketplace if the software application passes the one or more security tests.Type: ApplicationFiled: August 10, 2010Publication date: February 16, 2012Applicant: Salesforce.com, inc.Inventors: Varun Badhwar, Collin Greene, Robert Fly
-
Publication number: 20110307452Abstract: A system and method for performing code analysis in a database system. In one embodiment, a method includes receiving a request to scan code for a software application. The method further includes fetching metadata associated with a user, fetching the code for the software application, and scanning the code.Type: ApplicationFiled: December 23, 2010Publication date: December 15, 2011Applicant: Salesforce.com, inc.Inventors: Robert Fly, Collin Greene, Brendan O'Connor, Brian Soby
-
Publication number: 20110282908Abstract: Disclosed are systems, apparatus, methods, and computer readable media for analyzing computing site information. In one embodiment, an analysis tool for analyzing a first site record stored on a storage medium may be selected. The first site record comprising information may relate to a computing site. The computing site may comprise a unit of computing functionality accessible via a network. When it is determined that first confidentiality level for the computing site exceeds a trust level for the analysis tool, the first site record may be modified to create a second site record, the second site record having a second confidentiality level, the second confidentiality level not exceeding the trust level.Type: ApplicationFiled: March 14, 2011Publication date: November 17, 2011Applicant: SALESFORCE.COM, INC.Inventors: Robert Fly, Collin Greene, Brian Soby, James Dolph
-
Publication number: 20110283356Abstract: Disclosed are systems, apparatus, methods, and computer readable media for determining a combined trust level for a website. In one embodiment, a user account associated with the creation or maintenance of the website may be analyzed. The analysis of the user account may be capable of identifying the presence or absence of a first risk factor affecting a likelihood that the user account is engaged in a malicious activity. A source code file capable of being used to create a message for sending to a remote computing device may be analyzed. The analysis of the source code file may be capable of identifying the presence or absence of a second risk factor affecting a likelihood that the source code file is facilitating a malicious activity. Based on the analysis, a combined trust level for the website may be determined.Type: ApplicationFiled: March 14, 2011Publication date: November 17, 2011Applicant: SALESFORCE.COM, INC.Inventors: Robert Fly, Collin Greene, Brian Soby, James Dolph
-
Patent number: 7599902Abstract: The present invention relates to a general-purpose analogical reasoning system. More specifically, the present invention relates to a high-performance, semantic-based hybrid architecture for analogical reasoning, capable of finding correspondences between a novel situation and a known situation using relational symmetries, object similarities, or a combination of the two. The system is a high-performance symbolic connectionist model which multiplexes activation across a non-temporal dimension and uses controlled activation flow based on an analogical network structure. The system uses incremental inference to stop inference early for object correspondence, uses initial mappings to constrain future mappings, uses inferred mappings to synchronize activation, and independent mapping based on roles, superficial similarity, or composites.Type: GrantFiled: April 27, 2006Date of Patent: October 6, 2009Assignee: HRL Laboratories, LLCInventors: Jason Fox, Chris Furmanski, Collin Green
-
Publication number: 20070255671Abstract: The present invention relates to a general-purpose analogical reasoning system. More specifically, the present invention relates to a high-performance, semantic-based hybrid architecture for analogical reasoning, capable of finding correspondences between a novel situation and a known situation using relational symmetries, object similarities, or a combination of the two. The system is a high-performance symbolic connectionist model which multiplexes activation across a non-temporal dimension and uses controlled activation flow based on an analogical network structure. The system uses incremental inference to stop inference early for object correspondence, uses initial mappings to constrain future mappings, uses inferred mappings to synchronize activation, and independent mapping based on roles, superficial similarity, or composites.Type: ApplicationFiled: April 27, 2006Publication date: November 1, 2007Inventors: Jason Fox, Chris Furmanski, Collin Green