Patents by Inventor David A. Harris

David A. Harris has filed for patents to protect the following inventions. This listing includes patent applications that are pending as well as patents that have already been granted by the United States Patent and Trademark Office (USPTO).

  • Patent number: 9909237
    Abstract: A wrappable textile sleeve and method of construction thereof is provided. The wrappable textile sleeve includes an elongate wall extending along a longitudinal axis between opposite ends with lengthwise extending edges extending parallel or substantially parallel with the longitudinal axis between the opposite ends. The wall is woven from lengthwise extending warp yarns and circumferentially extending weft yarns. The weft yarns form a plurality of discrete annular bands, with adjacent bands having weft yarns of different diameters to provide the wall with discrete enhanced hoop strength regions and with discrete enhanced flexibility regions, where the enhanced hoop strength and enhanced flexibility regions alternate in adjacent relation with one another.
    Type: Grant
    Filed: February 4, 2014
    Date of Patent: March 6, 2018
    Assignee: Federal-Mogul Powertrain LLC
    Inventors: Alexa A. Woodruff, Cassie M. Malloy, David A. Harris
  • Publication number: 20180046623
    Abstract: The MULTI-SOURCE, MULTI-DIMENSIONAL, CROSS-ENTITY, MULTIMEDIA MERCHANT ANALYTICS DATABASE PLATFORM APPARATUSES, METHODS AND SYSTEMS (“MDB”) transform data aggregated from various computer resources using MDB components into updated entity profiles and/or social graphs. In one implementation, the MDB aggregates data records including search results, purchase transaction data, service usage data, service enrollment data, and social data. The MDB identifies data field types within the data records and their associated data values. From the data field types and their associated data values, the MDB identifies an entity. The MDB generates correlations of the entity to other entities identifiable from the data field types and their associated data values. The MDB also associates attributes to the entity by drawing inferences related to the entity from the data field types and their associated data values.
    Type: Application
    Filed: September 27, 2017
    Publication date: February 15, 2018
    Inventors: Patrick Faith, Theodore David Harris
  • Patent number: 9866426
    Abstract: Apparatus and methods facilitate analysis of events associated with network and computer systems. Event data, such as security threats, are comparison matched with event rules of event rule sets associated with each network or computer system to determine whether the items are potentially significant. Additionally, the system-event data may be scored where the score is used for prioritizing system-event data as to their significance. Associated with the comparison matching are various analytics that further analyze event data for measuring and analyzing the system-event data according to various algorithms.
    Type: Grant
    Filed: February 3, 2015
    Date of Patent: January 9, 2018
    Assignee: HAWK NETWORK DEFENSE, INC.
    Inventors: Tim Shelton, David Harris, Todd Jason Wheeler, Jr.
  • Publication number: 20170359306
    Abstract: A gateway or other network device may be configured to monitor endpoint behavior, and to request a verification of user presence at the endpoint under certain conditions suggesting, e.g., malware or other endpoint compromise. For example, when a network request is directed to a low-reputation or unknown network address, user presence may be verified to ensure that this action was initiated by a human user rather than automatically by malware or the like. User verification may be implicit, based on local behavior such as keyboard or mouse activity, or the user verification may be explicit, such as where a notification is presented on a display of the endpoint requesting user confirmation to proceed.
    Type: Application
    Filed: June 10, 2016
    Publication date: December 14, 2017
    Inventors: Andrew J. Thomas, Mark David Harris, Kenneth D. Ray
  • Patent number: 9830328
    Abstract: The MULTI-SOURCE, MULTI-DIMENSIONAL, CROSS-ENTITY, MULTIMEDIA MERCHANT ANALYTICS DATABASE PLATFORM APPARATUSES, METHODS AND SYSTEMS (“MDB”) transform data aggregated from various computer resources using MDB components into updated entity profiles and/or social graphs. In one implementation, the MDB aggregates data records including search results, purchase transaction data, service usage data, service enrollment data, and social data. The MDB identifies data field types within the data records and their associated data values. From the data field types and their associated data values, the MDB identifies an entity. The MDB generates correlations of the entity to other entities identifiable from the data field types and their associated data values. The MDB also associates attributes to the entity by drawing inferences related to the entity from the data field types and their associated data values.
    Type: Grant
    Filed: February 4, 2013
    Date of Patent: November 28, 2017
    Assignee: VISA INTERNATIONAL SERVICE ASSOCIATION
    Inventors: Patrick Faith, Theodore David Harris
  • Publication number: 20170310686
    Abstract: An enterprise security system is improved by instrumenting endpoints to explicitly label network flows according to sources of network traffic. When a network message from an endpoint is received at a gateway, firewall, or other network device/service, the network message may be examined to determine the application on the endpoint that originated the request, and this source information may be used to control routing or other handling of the network message.
    Type: Application
    Filed: April 22, 2016
    Publication date: October 26, 2017
    Inventors: Kenneth D. Ray, Andrew J. Thomas, Mark David Harris
  • Publication number: 20170310703
    Abstract: An endpoint in an enterprise network is monitored, and when a potential trigger for a distributed denial of service (DDoS) attack is followed by an increase in network traffic from the endpoint to a high reputation network address, the endpoint is treated as a DDoS service bot and isolated from the network until remediation can be performed.
    Type: Application
    Filed: April 5, 2017
    Publication date: October 26, 2017
    Inventors: Karl Ackerman, Mark David Harris, Simon Neil Reed, Andrew J. Thomas, Kenneth D. Ray
  • Publication number: 20170310692
    Abstract: In the context of network activity by an endpoint in an enterprise network, malware detection is improved by using a combination of reputation information for a network address that is accessed by the endpoint with reputation information for an application on the endpoint that is accessing the network address. This information, when combined with a network usage history for the application, provides improved differentiation between malicious network activity and legitimate, user-initiated network activity.
    Type: Application
    Filed: April 5, 2017
    Publication date: October 26, 2017
    Inventors: Karl Ackerman, Mark David Harris, Kenneth D. Ray, Andrew J. Thomas, Daniel Stutz
  • Patent number: 9795749
    Abstract: A dry powder inhaler includes a dose container assembly having a dose container disk with opposing upper and lower surfaces, a first row of circumferentially spaced apart dose containers at a first radius and a second row of circumferentially spaced apart dose containers at a second radius. The dose containers have dry powder therein and are sealed via a first flexible sealant over apertures in the upper surface and a second flexible sealant over apertures in the lower surface. A piercing mechanism includes two reciprocating piercers that serially alternate between the two rows of dose containers in the dose container disk. A rotatable ramp disk includes first and second sets of circumferentially spaced-apart ramp elements in staggered, concentric relationship that are configured to move the first and second piercing members between retracted and extended positions.
    Type: Grant
    Filed: February 12, 2015
    Date of Patent: October 24, 2017
    Assignee: Oriel Therapeutics, Inc.
    Inventors: Gerald A. Thoe, James G. Skakoon, David A. Schuelke, Thomas W. Ruckdeschel, David Harris, Scott Alexander Lewis, Andrew Murray Gow, Jonathan David Tuckwell
  • Publication number: 20170300690
    Abstract: A data recorder stores endpoint activity on an ongoing basis as sequences of events that causally relate computer objects such as processes and files, and patterns within this event graph can be used to detect the presence of malware on the endpoint. The underlying recording process may be dynamically adjusted in order to vary the amount and location of recording as the security state of the endpoint changes over time.
    Type: Application
    Filed: April 11, 2017
    Publication date: October 19, 2017
    Inventors: Beata Ladnai, Mark David Harris, Andrew J. Thomas, Andrew G. P. Smith, Russell Humphries
  • Publication number: 20170295892
    Abstract: A protective enclosure for a zipper of an article. The zipper enclosure may include an enclosure base that is attachable to the article, such as a mattress cover or padding materials for use with a bedding/furniture cover. The enclosure base may be configured to receive a one or more components of the zipper, such as the zipper slider and pull tab, upon closing of the zipper. When the zipper is closed, the enclosure base may be enclosed by an enclosure cover to contain and/or prevent migration of particles and/or organisms, such as bed bugs, allergens, dust mites, small particles and the like, from the article through an opening in the zipper chain adjacent the slider head. The enclosure may include one or more barriers for preventing migration of small particles and/or organisms past obstructions formed by the barriers.
    Type: Application
    Filed: April 14, 2017
    Publication date: October 19, 2017
    Inventors: Gary Goldberg, David Harris, Donna Charpentier
  • Publication number: 20170302685
    Abstract: A data recorder stores endpoint activity on an ongoing basis as sequences of events that causally relate computer objects such as processes and files. When a security event is detected, an event graph may be generated based on these causal relationships among the computing objects. For a root cause analysis, the event graph may be traversed in a reverse order from the point of an identified security event (e.g., a malware detection event) to preceding computing objects, while applying one or more cause identification rules to identify a root cause of the security event. Once a root cause is identified, the event graph may be traversed forward from the root cause to identify other computing objects that are potentially compromised by the root cause.
    Type: Application
    Filed: April 15, 2016
    Publication date: October 19, 2017
    Inventors: Beata Ladnai, Mark David Harris, Andrew J. Thomas, Andrew G. P. Smith, Russell Humphries, Kenneth D. Ray
  • Publication number: 20170264603
    Abstract: An entity may store various levels of sensitive and personal data in a secure computing environment. The entity may create permission rules which allow the data to be shared or not shared depending on the circumstances and situation. As an entity such as a human moves through life, the entity may be in touch with numerous electronic devices that act like sensors. The entity may share a token which may allow a sensor or operator of the sensor to access various levels of the sensitive data stored in the secure computing environment.
    Type: Application
    Filed: May 26, 2017
    Publication date: September 14, 2017
    Inventors: Patrick Faith, Theodore David Harris
  • Publication number: 20170235786
    Abstract: THE MULTI-SOURCE, MULTI-DIMENSIONAL, CROSS-ENTITY, MULTIMEDIA CENTRALIZED PERSONAL INFORMATION DATABASE PLATFORM APPARATUSES, METHODS AND SYSTEMS (“CPDB”) transform data aggregated from various computer resources using CPDB components into updated entity profiles and/or social graphs. In one implementation, the CPDB aggregates data records including search results, purchase transaction data, service usage data, service enrollment data, and social data. The CPDB identifies data field types within the data records and their associated data values. From the data field types and their associated data values, the CPDB identifies an entity. The CPDB generates correlations of the entity to other entities identifiable from the data field types and their associated data values. The CPDB also associates attributes to the entity by drawing inferences related to the entity from the data field types and their associated data values.
    Type: Application
    Filed: February 4, 2013
    Publication date: August 17, 2017
    Inventors: Patrick Faith, Theodore David Harris
  • Publication number: 20170235449
    Abstract: This invention provides the end-to-end control, networking, and data management for the 1.) identification of event signings, 2.) generation of push invitations to such events, 3.) personalization of ebooks via reader-author collaboration to embed Personalized Multimedia Autographs (PMAs) into the ebook or other media, 4.) event line control allowing readers to browse the bookstore or mingle while waiting for collaboration with the author during these events, 5.) capability for the readers and author to discuss the event on social media after the readers have registered for the event enabling the author to tailor his/her comments at the vent to the readers' interests; 6.) synchronization and archival of the PMA among all of the reader's devices, 7.) integration of special services such as reserved seating as well as food and beverage that may make invitations to such events in the future very exclusive.
    Type: Application
    Filed: February 6, 2017
    Publication date: August 17, 2017
    Inventors: David Harris Walters, David Michael Brooks
  • Patent number: 9720032
    Abstract: An automated test platform for testing a first device under test includes N voltage sources for providing N different voltages. A cross matrix switching system is coupled to the N voltage sources, the cross matrix switch being configured to provide the N different voltages to M discrete test points within the first device under test, wherein M is larger than N. An N voltage measuring system is coupled to the first device under test, the N voltage measuring system being configured to measure the voltage potential present on the M discrete test points.
    Type: Grant
    Filed: March 31, 2015
    Date of Patent: August 1, 2017
    Assignee: Xcerra Corporation
    Inventors: Wai-Kong Chen, David Harris
  • Publication number: 20170183920
    Abstract: A method for manufacturing a centralizer. The method includes selecting a tubular having a first inner diameter, cutting the tubular to form a blank including at least one end collar and ribs integrally-formed therewith, and swaging the at least one end collar such that the first inner diameter is modified to a second inner diameter.
    Type: Application
    Filed: May 6, 2015
    Publication date: June 29, 2017
    Inventors: George W. Ribble, Michael L. Betik, David Harris Stewart, Eugene Edward Miller
  • Publication number: 20170111374
    Abstract: Static analysis is applied to unrecognized software objects in order to identify and address potential anti-sandboxing techniques. Where static analysis suggests the presence of any such corresponding code, the software object may be forwarded to a sandbox for further analysis. In another aspect, multiple types of sandboxes may be provided, with the type being selected according to the type of exploit suggested by the static analysis.
    Type: Application
    Filed: November 2, 2015
    Publication date: April 20, 2017
    Inventors: Mark David Harris, Daniel Stutz, Vincent Kevin Lynch
  • Publication number: 20170109528
    Abstract: Static analysis is applied to unrecognized software objects in order to identify and address potential anti-sandboxing techniques. Where static analysis suggests the presence of any such corresponding code, the software object may be forwarded to a sandbox for further analysis. In another aspect, multiple types of sandboxes may be provided, with the type being selected according to the type of exploit suggested by the static analysis.
    Type: Application
    Filed: November 2, 2015
    Publication date: April 20, 2017
    Inventors: Mark David Harris, Daniel Stutz, Vincent Kevin Lynch
  • Publication number: 20170091813
    Abstract: A computer-implemented method includes identifying a first set of members on a social network, each member of the first set of members includes a class value comprising one of a positive member and a negative member, each positive member is associated with a target offering, determining a skillset of each member of the first set of members, training a first model based on the class value and skillset of each member of the first set of members, the first model configured to generate at least one of a classification value and a prospect score for a prospect member based on a prospect member skillset, computing a prospect score for the prospect member using the first model and the prospect member skillset, and providing the at least one of a classification value and a prospect score for use in evaluating the prospect member in relation to the target offering.
    Type: Application
    Filed: September 30, 2015
    Publication date: March 30, 2017
    Inventors: Sophia Li-Ming Wong, Jimmy K. Wong, David Harris Karel