Patents by Inventor Daniar Hussain

Daniar Hussain has filed for patents to protect the following inventions. This listing includes patent applications that are pending as well as patents that have already been granted by the United States Patent and Trademark Office (USPTO).

  • Publication number: 20110320389
    Abstract: The present invention is a safety and business productivity system having the following components. One or more cameras capture video data having attribute data, the attribute data representing importance of the cameras. One or more video analytics devices process the video data from one or more of the cameras and detect primitive video events in the video data. A correlation engine correlates two or more primitive video events from the video analytics devices weighted by the attribute data of the cameras used to capture the video data. An alerting engine generates one or more alerts and performs one or more actions based on the correlation performed by the correlation engine.
    Type: Application
    Filed: September 6, 2011
    Publication date: December 29, 2011
    Applicant: KD SECURE LLC
    Inventors: John J. Donovan, Daniar Hussain
  • Patent number: 8013738
    Abstract: The present invention is a video surveillance, storage, and alerting system having the following components. One or more surveillance cameras capture video data having attribute data, the attribute data representing importance of the surveillance cameras. One or more video analytics devices process the video data from one or more of the surveillance cameras and detect primitive video events in the video data. A network management module monitors network status of the surveillance cameras, and the video analytics devices, and generates network events reflective of the network status of all subsystems. A correlation engine correlates two or more primitive video events from the video analytics devices weighted by the attribute data of the surveillance cameras used to capture the video data, and network events from the network management module weighted by attribute data of device corresponding to the network event.
    Type: Grant
    Filed: October 4, 2007
    Date of Patent: September 6, 2011
    Assignee: KD Secure, LLC
    Inventors: John J. Donovan, Daniar Hussain
  • Publication number: 20110202396
    Abstract: Disclosed is a portable interactive modular selling room that recreates the home environment in a retail business location to help educate the user for sales and training purposes. The plug and play selling system utilizes standard electrical connectors to allow for seamless integration within a store without the need of electricians or construction contractors. Encompassing all five senses in an interactive environment develops an intellectual and emotional connection with the user which allows the product implementation to demonstrate features and value in a more meaningful and engaging manner over traditional retail environments. The computer system implemented inside of the system encompasses an interaction engine which utilizes sensors and monitoring equipment to record and analyze the user to provide real-time responses and also feedback to a central database for future interaction development.
    Type: Application
    Filed: September 1, 2010
    Publication date: August 18, 2011
    Inventors: Walter Viveiros, Howard Sharfe, Daniar Hussain, Gregg Kulback
  • Patent number: 7999847
    Abstract: An audio surveillance, storage, and alerting system, including the following components: One or more audio sensory devices capture audio data having attribute data representing importance of the audio sensory devices. One or more audio analytics devices process the audio data to detect audio events. A network management module monitors network status of the audio sensory devices and generates network events reflective of the network status of all subsystems. A correlation engine correlates two or more events weighted by the attribute data of the device used to capture the data. Finally, an alerting engine generates one or more alerts and performs one or more actions based on the correlation performed by the correlation engine. This invention may be used to help fight crime and help ensure safety procedures are followed.
    Type: Grant
    Filed: September 9, 2008
    Date of Patent: August 16, 2011
    Assignee: KD Secure LLC
    Inventors: John J. Donovan, Daniar Hussain
  • Publication number: 20110173127
    Abstract: The present invention relates to configuration of inspection systems and compliance verification systems using a handheld device and a remote database.
    Type: Application
    Filed: January 8, 2010
    Publication date: July 14, 2011
    Inventors: Albert Ho, Marc Siegel, Christopher Tossing, Adam Ierymenko, Daniar Hussain
  • Patent number: 7876351
    Abstract: Methods, systems, and apparatus for monitoring, alerting, and acting, including the following steps. Input data is received from one or more sensory devices. One or more data weights are determined for the input data based on a weight corresponding to a source of the input data, a weight corresponding to a time the input data was received, and a weight corresponding to a frequency that the input data was received. A set of rules is evaluated based on the input data and the data weights. One or more actions, including a heirarchy of one or more alerts, are activated based on the results of the evaluation of the rules.
    Type: Grant
    Filed: September 3, 2008
    Date of Patent: January 25, 2011
    Assignee: KD Secure LLC
    Inventors: John J. Donovan, Daniar Hussain
  • Publication number: 20100321183
    Abstract: The present invention is a video surveillance, storage, and alerting system having the following components. One or more surveillance cameras capture video data having attribute data, the attribute data representing importance of the surveillance cameras. One or more video analytics devices process the video data from one or more of the surveillance cameras and detect primitive video events in the video data. A network management module monitors network status of the surveillance cameras, and the video analytics devices, and generates network events reflective of the network status of all subsystems. A correlation engine correlates two or more primitive video events from the video analytics devices weighted by the attribute data of the surveillance cameras used to capture the video data, and network events from the network management module weighted by attribute data of device corresponding to the network event.
    Type: Application
    Filed: October 4, 2007
    Publication date: December 23, 2010
    Inventors: John J. Donovan, Daniar Hussain
  • Publication number: 20100262688
    Abstract: This invention is a system, method, and apparatus for detecting compromise of IP devices that make up an IP-based network. One embodiment is a method for detecting and alerting on the following conditions: (1) Denial of Service Attack; (2) Unauthorized Usage Attack; and (3) Spoofing Attack. A survey of services running on the IP device, historical benchmark data, and traceroute information may be used to detect a possible Denial of Service Attack. A detailed log analysis and a passive DNS compromise system may be used to detect a possible unauthorized usage. Finally, a fingerprint of the IP device or its configuration settings, a watermark inserted in the data-stream, and a private key burned into the IP devices' physical memory may be used to detect a possible spoofing attack. The present invention may be used to help mitigate intrusions and vulnerabilities in IP networks.
    Type: Application
    Filed: January 18, 2010
    Publication date: October 14, 2010
    Inventors: Daniar Hussain, Marc Siegel
  • Patent number: 7793850
    Abstract: The present invention relates to configuration of inspection systems and compliance verification systems using a handheld device and a remote database.
    Type: Grant
    Filed: March 14, 2010
    Date of Patent: September 14, 2010
    Assignee: KD Secure LLC
    Inventors: Albert Ho, Marc Siegel, Christopher Tossing, Adam Ierymenko, Daniar Hussain
  • Publication number: 20100185549
    Abstract: The present invention is a system and method for inspections and compliance verification of industrial equipment using a handheld device. An inspector first segments an inspected component into logical inspection points. The inspector then scans a unique machine-readable tag, such as an RFID tag, with a handheld device at each logical inspection point. The inspector then takes a media sample, such as a digital photograph, of the physical component referred to by each corresponding logical inspection point. Then the inspector associates the media samples with the corresponding scan of the unique machine-readable tag. For each of the actions the inspector carries out on the handheld device, a timestamp is added that represents evidence of a date and a time of physical visitation to the associated logical inspection point. The inspector may then annotate the media samples in such ways that substantiate inspector statements of problems with inspected components found during inspection.
    Type: Application
    Filed: April 12, 2010
    Publication date: July 22, 2010
    Inventors: Jeffery York, Marc Siegel, Albert Ho, Christopher Tossing, Adam Ierymenko, Daniar Hussain
  • Publication number: 20100153168
    Abstract: The present invention is a system and method for inspections and compliance verification of industrial equipment using a handheld device. An inspector first segments an inspected component into logical inspection points. The inspector then scans a unique machine-readable tag, such as an RFID tag, with a handheld device at each logical inspection point. The inspector then takes a media sample, such as a digital photograph, of the physical component referred to by each corresponding logical inspection point. Then the inspector associates the media samples with the corresponding scan of the unique machine-readable tag. For each of the actions the inspector carries out on the handheld device, a timestamp is added that represents evidence of a date and a time of physical visitation to the associated logical inspection point. The inspector may then annotate the media samples in such ways that substantiate inspector statements of problems with inspected components found during inspection.
    Type: Application
    Filed: June 22, 2009
    Publication date: June 17, 2010
    Inventors: Jeffrey York, Marc Siegel, Albert Ho, Christopher Tossing, Adam Ierymenko, Daniar Hussain
  • Patent number: 7737837
    Abstract: The present invention is an alerting system having one or more sensors for capturing sensory data, one or more processors and one or more memories having program code to (1) capture sensory data from the one or more sensors; (2) capture attribute data representing information about the sensors used to capture the sensory data; (3) process the sensory data from the one or more sensors to detect primitive events in the sensory data; (4) correlate two or more primitive events, the primitive events weighted by the attribute data of the sensors used to capture the sensory data; and (5) perform one or more actions based on the correlation performed in the correlating step. The system may also be connected to one or more legacy systems, such as FBI, Interpol, or other criminal database systems.
    Type: Grant
    Filed: April 21, 2008
    Date of Patent: June 15, 2010
    Assignee: KD Secure LLC
    Inventors: John J. Donovan, Daniar Hussain
  • Publication number: 20100125663
    Abstract: This invention is a system, method, and apparatus for detecting compromise of IP devices that make up an IP-based network. One embodiment is a method for detecting and alerting on the following conditions: (1) Denial of Service Attack; (2) Unauthorized Usage Attack (for an IP camera, unauthorized person seeing a camera image); and (3) Spoofing Attack (for an IP camera, unauthorized person seeing substitute images). A survey of services running on the IP device, historical benchmark data, and traceroute information may be used to detect a possible Denial of Service Attack. A detailed log analysis and a passive DNS compromise system may be used to detect a possible unauthorized usage. Finally, a fingerprint (a hash of device configuration data) may be used as a private key to detect a possible spoofing attack. The present invention may be used to help mitigate intrusions and vulnerabilities in IP networks.
    Type: Application
    Filed: January 28, 2009
    Publication date: May 20, 2010
    Inventors: John J. Donovan, Daniar Hussain, Adam Ierymenko, Paul Parisi, Richard Person, Marc Siegel, Charles Stefanidakis
  • Publication number: 20100023418
    Abstract: The present invention is a computer-based method and system for coordinating the collaborative selection and purchase of a gift given by any number of gift contributors to a recipient. The gift shopping system maintains updated information on the remaining balance for gift's purchase amount The collaborative gift shopping system processes monetary transactions for each gift contributor until the full purchase amount has been reached. When the full purchase amount is reached by the collaborating gift contributors, the gift order is processed for delivery to the gift recipient. The gift shopping system can send communications to gift contributors each time a contribution towards a gift has been processed. Once the purchase amount of the gift has been reached the gift shopping system can send communications to gift contributors.
    Type: Application
    Filed: January 30, 2009
    Publication date: January 28, 2010
    Inventors: Bradley Bader, Daniar Hussain
  • Patent number: 7595815
    Abstract: A method and system for intelligent monitoring and intelligent alerting. One or more data inputs are received from one or more systems. A weight is attributed to each data input based on the data input, the source of the data input, and other factors. One or more video inputs are received from one or more video sources. Image analysis is performed on the video data to determine one or more video parameters. The video parameters are assigned one or more weights based on the video source and other factors. A series of rules are evaluated using the data inputs, the video inputs, and their respective weights. An associated action is performed for each rule that is activated. The present invention may be used for various security and safety purposes, including fighting crime, detecting and preventing terrorist activity, and ensuring safety procedures are followed.
    Type: Grant
    Filed: May 8, 2007
    Date of Patent: September 29, 2009
    Assignee: KD Secure, LLC
    Inventors: John J. Donovan, Daniar Hussain
  • Publication number: 20090135007
    Abstract: The present invention is an alerting system having one or more sensors for capturing sensory data, one or more processors and one or more memories having program code to (1) capture sensory data from the one or more sensors; (2) capture attribute data representing information about the sensors used to capture the sensory data; (3) process the sensory data from the one or more sensors to detect primitive events in the sensory data; (4) correlate two or more primitive events, the primitive events weighted by the attribute data of the sensors used to capture the sensory data; and (5) perform one or more actions based on the correlation performed in the correlating step. The system may also be connected to one or more legacy systems, such as FBI, Interpol, or other criminal database systems.
    Type: Application
    Filed: April 21, 2008
    Publication date: May 28, 2009
    Inventors: John J. Donovan, Daniar Hussain
  • Publication number: 20090002157
    Abstract: An audio surveillance, storage, and alerting system, including the following components: One or more audio sensory devices capture audio data having attribute data representing importance of the audio sensory devices. One or more audio analytics devices process the audio data to detect audio events. A network management module monitors network status of the audio sensory devices and generates network events reflective of the network status of all subsystems. A correlation engine correlates two or more events weighted by the attribute data of the device used to capture the data. Finally, an alerting engine generates one or more alerts and performs one or more actions based on the correlation performed by the correlation engine. This invention may be used to help fight crime and help ensure safety procedures are followed.
    Type: Application
    Filed: September 9, 2008
    Publication date: January 1, 2009
    Inventors: John J. Donovan, Daniar Hussain
  • Publication number: 20080316315
    Abstract: Methods, systems, and apparatus for monitoring, alerting, and acting, including the following steps. Input data is received from one or more sensory devices. One or more data weights are determined for the input data based on a weight corresponding to a source of the input data, a weight corresponding to a time the input data was received, and a weight corresponding to a frequency that the input data was received. A set of rules is evaluated based on the input data and the data weights. One or more actions, including a hierarchy of one or more alerts, are activated based on the result of the evaluation of the rules.
    Type: Application
    Filed: September 3, 2008
    Publication date: December 25, 2008
    Inventors: John J. Donovan, Daniar Hussain
  • Publication number: 20080297599
    Abstract: One embodiment is a method of storing video data from a video surveillance system having one or more cameras. Video data is captured from one or more surveillance cameras. Meta-data is automatically generated by performing video analysis on the captured video data from the surveillance cameras. A human operator may manually enter additional meta-data. Attribute data and associated weights, representing information about the relevance of the meta-data, is received. The video data is stored in a hierarchical video storage area; the meta-data, indexed by date and time stamp to the video data, is stored in a meta-data storage area; and the attribute data is stored in an attribute storage area. One or more alerts may be issued based on the past and present meta-data. The video data is secured by encrypting and storing the video data remotely, and audit trails are generated about who and when viewed the video data.
    Type: Application
    Filed: May 28, 2007
    Publication date: December 4, 2008
    Inventors: John J. Donovan, Daniar Hussain
  • Publication number: 20080278579
    Abstract: A method and system for intelligent monitoring and intelligent alerting. One or more data inputs are received from one or more systems. A weight is attributed to each data input based on the data input, the source of the data input, and other factors. One or more video inputs are received from one or more video sources. Image analysis is performed on the video data to determine one or more video parameters. The video parameters are assigned one or more weights based on the video source and other factors. A series of rules are evaluated using the data inputs, the video inputs, and their respective weights. An associated action is performed for each rule that is activated. The present invention may be used for various security and safety purposes, including fighting crime, detecting and preventing terrorist activity, and ensuring safety procedures are followed.
    Type: Application
    Filed: May 8, 2007
    Publication date: November 13, 2008
    Inventors: John J. Donovan, Daniar Hussain