Patents by Inventor Daniel L. Sullivan

Daniel L. Sullivan has filed for patents to protect the following inventions. This listing includes patent applications that are pending as well as patents that have already been granted by the United States Patent and Trademark Office (USPTO).

  • Publication number: 20230158557
    Abstract: Medical diagnostic devices or components thereof are described that comprise a microstructured surface that comprises peak structures and adjacent valleys wherein the valleys have a maximum width ranging from 1 to 1000 microns and the peak structures. In some embodiments (e.g. for improved cleanability) the peak structures of the microstructured surface have a side wall angle of greater than 10 degrees. The peak structures may comprise two or more facets such as in the case of a linear array of prisms or an array of cube-comers elements. The microstructured surface of the medical diagnostic device typically comes in contact with multiple patients during normal use of the device, such as a stethoscope diaphragm. The microstructured surface exhibits better microorganism (e.g. bacteria) removal when cleaned and/or provides a reduction in microbial touch transfer. Also described are methods of making and methods of use.
    Type: Application
    Filed: May 14, 2021
    Publication date: May 25, 2023
    Inventors: Jodi L. Connell, Raymond P. Johnston, Daniel J. Rogers, John J. Sullivan, Gordon A. Kuhnley, Brian W. Lueck, Alexander C. Eldredge, Kurt J. Halverson, Hyacinth L. Lechuga
  • Patent number: 11611574
    Abstract: Disclosed in some examples are systems, methods, and machine readable mediums for identifying insider threats by determining file system element activity models that correlate to undesirable behavior and then utilizing the determined model to detect insider threats. Events involving file system elements of a client computing device (e.g., a network endpoint) may be monitored by a file system element monitoring application on the client computing device. The values of these signals are aggregated across all events of the same type that have occurred within a predetermined time window (e.g., an hour) for a particular client computing device. Each time an aggregated signal has a value over the threshold, an anomaly is recorded. Anomaly counts for each signal are then calculated as the aggregate number of anomalies for a particular signal over a second time period, the span of which is determined by the generation of first anomaly to the close of an alert by the network monitor.
    Type: Grant
    Filed: August 2, 2017
    Date of Patent: March 21, 2023
    Assignee: Code42 Software, Inc.
    Inventors: Ajaykumar Rajasekharan, Matthew Mills Parker, Daniel L. Sullivan
  • Patent number: 11537713
    Abstract: A method of detecting the onset of a ransomware attack is presented. In an example embodiment, file backup metadata for each of a plurality of computing devices is accessed and analyzed to detect anomalous file backup activity of individual ones of the computing devices. A determination is made as to whether the detected anomalous file backup activity of at least some of the computing devices is correlated in time. File description metadata for each of the computing devices is also accessed and analyzed to identify files in the computing devices that are anomalous to other files in the computing devices. A determination whether a ransomware attack has begun is based on a determination that the detected anomalous file backup activity of at least some of the computing devices is correlated in time, as well as on the identified anomalous files.
    Type: Grant
    Filed: August 2, 2017
    Date of Patent: December 27, 2022
    Assignee: CRASHPLAN GROUP LLC
    Inventors: Ajaykumar Rajasekharan, Matthew Mills Parker, Daniel L. Sullivan
  • Publication number: 20190044963
    Abstract: Disclosed in some examples are systems, methods, and machine readable mediums for identifying insider threats by determining file system element activity models that correlate to undesirable behavior and then utilizing the determined model to detect insider threats. Events involving file system elements of a client computing device (e.g., a network endpoint) may be monitored by a file system element monitoring application on the client computing device. The values of these signals are aggregated across all events of the same type that have occurred within a predetermined time window (e.g., an hour) for a particular client computing device. Each time an aggregated signal has a value over the threshold, an anomaly is recorded. Anomaly counts for each signal are then calculated as the aggregate number of anomalies for a particular signal over a second time period, the span of which is determined by the generation of first anomaly to the close of an alert by the network monitor.
    Type: Application
    Filed: August 2, 2017
    Publication date: February 7, 2019
    Inventors: Ajaykumar Rajasekharan, Matthew Mills Parker, Daniel L. Sullivan
  • Publication number: 20190042744
    Abstract: A method of detecting the onset of a ransomware attack is presented. In an example embodiment, file backup metadata for each of a plurality of computing devices is accessed and analyzed to detect anomalous file backup activity of individual ones of the computing devices. A determination is made as to whether the detected anomalous file backup activity of at least some of the computing devices is correlated in time. File description metadata for each of the computing devices is also accessed and analyzed to identify files in the computing devices that are anomalous to other files in the computing devices. A determination whether a ransomware attack has begun is based on a determination that the detected anomalous file backup activity of at least some of the computing devices is correlated in time, as well as on the identified anomalous files.
    Type: Application
    Filed: August 2, 2017
    Publication date: February 7, 2019
    Inventors: Ajaykumar Rajasekharan, Matthew Mills Parker, Daniel L. Sullivan
  • Publication number: 20040049437
    Abstract: A transaction tax calculating system using a hybrid method of referring to tables providing rules for state and local tax brackets, rounding and exceptions and applying those rounding and bracket tax calculation rules in conjunction for rounding.
    Type: Application
    Filed: September 11, 2002
    Publication date: March 11, 2004
    Applicant: govONE Solutions, LP
    Inventors: Mikhail S. Brikman, Daniel L. Sullivan
  • Publication number: 20030093320
    Abstract: A transaction tax compliance system having a transaction tax compliance processor which receives transaction information from selling/purchasing input systems and returns, stores, and reports the tax liabilities caused by the transaction event.
    Type: Application
    Filed: November 18, 2002
    Publication date: May 15, 2003
    Inventor: Daniel L. Sullivan
  • Publication number: 20030055754
    Abstract: A transaction tax compliance system having a transaction tax compliance processor which receives transaction information from selling/purchasing input systems and returns, stores, and reports the tax liabilities caused by the transaction event.
    Type: Application
    Filed: September 10, 2002
    Publication date: March 20, 2003
    Applicant: govONE Solutions, LP
    Inventor: Daniel L. Sullivan