Patents by Inventor David A. Helsley

David A. Helsley has filed for patents to protect the following inventions. This listing includes patent applications that are pending as well as patents that have already been granted by the United States Patent and Trademark Office (USPTO).

  • Patent number: 11212465
    Abstract: An endoscopy video feature enhancement platform (EVFEP) is connected to the output of any type endoscope system, and inputs and captures the output video. The video is visually augmented live with indicators of possible polyp detection and localization, polyp attributes, and procedure metrics, based on the collective learning of the output results of many different types of endoscopy systems on a large scale. An artificial intelligence model is trained on confirmed polyp detection previously determined by this and other EVFEP devices used with many different types of endoscope systems on a large scale. Augmented video, images and automatically generated short video clips of key procedure segments are passed to a reporting system, and supplemented with meta data.
    Type: Grant
    Filed: July 1, 2020
    Date of Patent: December 28, 2021
    Assignee: ENDOVIGILANT INC
    Inventors: Vineet Sachdev, Ravindra Kompella, Om P. Chaurasia, H. David Helsley, Jr.
  • Patent number: 10841514
    Abstract: An endoscopy video feature enhancement platform (EVFEP) is connected to the output of any type endoscope system, and inputs and captures the output video. The video is visually augmented live with indicators of possible polyp detection and localization, polyp attributes, and procedure metrics, based on the collective learning of the output results of many different types of endoscopy systems on a large scale. An artificial intelligence model is trained on confirmed polyp detection previously determined by this and other EVFEP devices used with many different types of endoscope systems on a large scale. Augmented video, images and automatically generated short video clips of key procedure segments are passed to a reporting system, and supplemented with meta data.
    Type: Grant
    Filed: March 20, 2019
    Date of Patent: November 17, 2020
    Assignee: EndoVigilant Inc
    Inventors: Vineet Sachdev, Ravindra Kompella, Om P. Chaurasia, H. David Helsley, Jr.
  • Publication number: 20200336679
    Abstract: An endoscopy video feature enhancement platform (EVFEP) is connected to the output of any type endoscope system, and inputs and captures the output video. The video is visually augmented live with indicators of possible polyp detection and localization, polyp attributes, and procedure metrics, based on the collective learning of the output results of many different types of endoscopy systems on a large scale. An artificial intelligence model is trained on confirmed polyp detection previously determined by this and other EVFEP devices used with many different types of endoscope systems on a large scale. Augmented video, images and automatically generated short video clips of key procedure segments are passed to a reporting system, and supplemented with meta data.
    Type: Application
    Filed: July 1, 2020
    Publication date: October 22, 2020
    Applicant: EndoVigilant Inc
    Inventors: Vineet SACHDEV, Ravindra KOMPELLA, Om P. CHAURASIA, H. David HELSLEY, JR.
  • Patent number: 10237115
    Abstract: A method is described for determining automatically, via a network protocol, a system topology of a network system, wherein the network system comprises a plurality of network components, wherein each of the network components support a directory protocol, and wherein the system topology comprises a respective address of each of the plurality of network components. The system topology is mapped via the directory protocol. Finally, a role-based access credential is configured for a user, via the directory protocol, wherein the role-based access credential determines which of the plurality of network components are accessible to the user.
    Type: Grant
    Filed: November 10, 2015
    Date of Patent: March 19, 2019
    Assignee: CA, Inc.
    Inventors: Alvin Yoon Lee, Kenneth Ellington, Lawrence Lee, David Helsley, Ryan Cerrato, Faisal Rabbani, Leland Townsend, Aaron McKay, Walter Brekeen, Jr., Ronnie Mathes
  • Publication number: 20170134211
    Abstract: A method is described for determining automatically, via a network protocol, a system topology of a network system, wherein the network system comprises a plurality of network components, wherein each of the network components support a directory protocol, and wherein the system topology comprises a respective address of each of the plurality of network components. The system topology is mapped via the directory protocol. Finally, a role-based access credential is configured for a user, via the directory protocol, wherein the role-based access credential determines which of the plurality of network components are accessible to the user.
    Type: Application
    Filed: November 10, 2015
    Publication date: May 11, 2017
    Inventors: Alvin YOON LEE, Kenneth ELLINGTON, Lawrence LEE, David HELSLEY, Ryan CERRATO, Faisal RABBANI, Leland TOWNSEND, Aaron MCKAY, Walter BREKEEN, JR., Ronnie MATHES
  • Publication number: 20170103087
    Abstract: A method is described for detecting a mainframe dataset on a local storage medium managed by a mainframe operating system, the mainframe dataset comprising a plurality of related files. According to a storage policy, a first subset of the plurality of related files to store on a cloud storage medium is determined. A second subset of the plurality of related files to remain on the local storage medium is also determined. The first subset of the plurality of related files is written to the cloud storage system, according to the storage policy. An input operation for the mainframe dataset is detected via a component of the mainframe operating system. Finally, an update of the first subset of the plurality of related files on the local storage medium is emulated on the cloud storage medium.
    Type: Application
    Filed: October 13, 2015
    Publication date: April 13, 2017
    Inventors: David HELSLEY, Lawrence LEE, Kenneth ELLINGTON
  • Patent number: 9477696
    Abstract: A method includes identifying a first value of a lock word corresponding to a data structure, by a process in a plurality of processes that each have access to the data structure. The method also includes copying the data structure to a corresponding shadow record. The method additionally includes modifying the shadow record with a desired update for the data structure, and atomically updating the data structure and the lock word, by the process, using a hardware built-in function. The updating includes identifying a second value of the lock word and determining whether the first value of the lock word and the second value of the lock word are equivalent. The method additionally includes, in response to determining that the first value of the lock word and the second value of the lock word are equivalent, replacing the data structure with the shadow record and incrementing the lock word.
    Type: Grant
    Filed: March 12, 2014
    Date of Patent: October 25, 2016
    Assignee: CA, Inc.
    Inventors: David Helsley, Lawrence Lee
  • Patent number: 9304707
    Abstract: A method includes receiving, at a logical partition, a series of messages. Each message in the series of messages includes a respective block of data. The method further includes, in response to receiving the first message of the series of messages, suspending further processing of the series of messages. The method also includes identifying, from a header of the first message, a respective buffer address for each block of data. The method still further includes resuming processing of the series of messages. The method additionally includes, for each respective block of data, storing the respective block of data at the respective buffer address, and transferring the respective block of data from the corresponding buffer address to an open storage disk.
    Type: Grant
    Filed: October 30, 2013
    Date of Patent: April 5, 2016
    Assignee: CA, Inc.
    Inventors: David Helsley, Lawrence Lee
  • Publication number: 20150261790
    Abstract: A method includes identifying a first value of a lock word corresponding to a data structure, by a process in a plurality of processes that each have access to the data structure. The method also includes copying the data structure to a corresponding shadow record. The method additionally includes modifying the shadow record with a desired update for the data structure, and atomically updating the data structure and the lock word, by the process, using a hardware built-in function. The updating includes identifying a second value of the lock word and determining whether the first value of the lock word and the second value of the lock word are equivalent. The method additionally includes, in response to determining that the first value of the lock word and the second value of the lock word are equivalent, replacing the data structure with the shadow record and incrementing the lock word.
    Type: Application
    Filed: March 12, 2014
    Publication date: September 17, 2015
    Applicant: CA, INC.
    Inventors: David Helsley, Lawrence Lee
  • Patent number: 8593846
    Abstract: An analog floating gate circuit (10-3, 10-4) includes a first sense transistor (21, 3), a first storage capacitor (20, 5), and first (24, 4) and second (31A, 42) tunneling regions. Various portions of a first floating gate conductor (12, 2) form a floating gate of the first sense transistor, a floating first plate of the first storage capacitor (20, 5), a floating first plate of the first tunneling region, and a floating first plate of the second tunneling region, respectively. A second plate of the first storage capacitor is coupled to a first reference voltage (VREF, GND), and a second plate of the second tunneling region is coupled to a second reference voltage (VPROG/GND). Compensation circuitry (44-1, 44-2) is coupled to the first floating gate conductor, for compensating loss of trapped charge from the first floating gate conductor.
    Type: Grant
    Filed: August 17, 2011
    Date of Patent: November 26, 2013
    Assignee: Texas Instruments Incorporated
    Inventors: David A. Helsley, Allan T. Mitchell
  • Publication number: 20070112677
    Abstract: The present invention is directed to a method and system for intercepting transactions for encryption. In accordance with a particular embodiment of the present invention, an application for a storage device is monitored. A transaction for the storage device is intercepted. An encryption request within the transaction is identified. Performance of the transaction is emulated by performing the encryption request in a predetermined exit point of the application.
    Type: Application
    Filed: November 9, 2006
    Publication date: May 17, 2007
    Applicant: Computer Associates Think, Inc.
    Inventors: Russell Witt, Timothy Bruce, David Helsley, Osvaldo Ridner, John Casey
  • Publication number: 20070113104
    Abstract: Systems and methods are provided for encrypting data, generating encryption keys, and generating encryption indicators. The encryption indicators may be stored on a storage medium in a location separate from the location of stored encrypted data. The encryption indicator includes information indicative of the encryption key used for encrypting and decrypting the data. In one example, the storage medium is a tape, and the encryption indicator is stored in the user header label of the tape.
    Type: Application
    Filed: April 18, 2006
    Publication date: May 17, 2007
    Inventors: Russell Witt, Timothy Bruce, David Helsley, Osvaldo Ridner, John Casey
  • Publication number: 20070113078
    Abstract: Systems and methods are provided for encrypting data without regard to applications writing the data to, or reading the data from, encrypted data storage devices. An operating system intercept detects information indicating that a file will be encrypted and, in respond, sets device-level flags indicating encryption and also establishes one or more encryption keys to be used in the encryption process. A second intercept detects an input/output event and, in response, calls an encryption application to encrypt (or decrypt) the data before it is written to (or read from) the data storage device.
    Type: Application
    Filed: April 18, 2006
    Publication date: May 17, 2007
    Inventors: Russell Witt, Timothy Bruce, David Helsley, Osvaldo Ridner, John Casey