Patents by Inventor David Harris

David Harris has filed for patents to protect the following inventions. This listing includes patent applications that are pending as well as patents that have already been granted by the United States Patent and Trademark Office (USPTO).

  • Publication number: 20220111852
    Abstract: A non-transitory computer readable medium stores instructions that, when executed by a processor, cause the processor to utilize artificial intelligence to update a mission for an aircraft flown by a pilot. The instructions include: receiving, from at least one storage device, pre-event preparation information that identifies a mission for the aircraft and includes historical information about the pilot; receiving, from an operator device, event execution information that describes how the aircraft is being flown; comparing the pre-event preparation information to the event execution information and the historical information about the pilot using artificial intelligence to determine a deviation from the mission indicating that the mission will likely not be successful; and updating the mission based on the deviation.
    Type: Application
    Filed: February 7, 2020
    Publication date: April 14, 2022
    Applicant: 2 Circle, Inc.
    Inventors: David Harris, Bradford Gilroy
  • Patent number: 11297073
    Abstract: Activity on an endpoint is monitored in two stages with a local agent. In a first stage, particular computing objects on the endpoint are selected for tracking. In a second stage, particular types of changes to those objects are selected. By selecting objects and object changes in this manner, a compact data stream of information highly relevant to threat detection can be provided from an endpoint to a central threat management facility. At the same time, a local data recorder creates a local record of a wider range of objects and changes. The system may support forensic activity by facilitating queries to the local data recorder on the endpoint to retrieve more complete records of local activity when the compact data stream does not adequately characterize a particular context.
    Type: Grant
    Filed: September 12, 2018
    Date of Patent: April 5, 2022
    Assignee: Sophos Limited
    Inventors: Beata Ladnai, Mark David Harris, Andrew G. P. Smith, Kenneth D. Ray, Andrew J. Thomas, Russell Humphries
  • Patent number: 11277416
    Abstract: An enterprise security system is improved by instrumenting endpoints to explicitly label network flows according to sources of network traffic. When a network message from an endpoint is received at a gateway, firewall, or other network device/service, the network message may be examined to determine the application on the endpoint that originated the request, and this source information may be used to control routing or other handling of the network message.
    Type: Grant
    Filed: April 22, 2016
    Date of Patent: March 15, 2022
    Assignee: Sophos Limited
    Inventors: Kenneth D. Ray, Andrew J. Thomas, Mark David Harris
  • Publication number: 20220070184
    Abstract: A data recorder stores endpoint activity on an ongoing basis as sequences of events that causally relate computer objects such as processes and files. When a security event is detected, an event graph may be generated based on these causal relationships among the computing objects. For a root cause analysis, the event graph may be traversed in a reverse order from the point of an identified security event (e.g., a malware detection event) to preceding computing objects, while applying one or more cause identification rules to identify a root cause of the security event. Once a root cause is identified, the event graph may be traversed forward from the root cause to identify other computing objects that are potentially compromised by the root cause.
    Type: Application
    Filed: July 9, 2021
    Publication date: March 3, 2022
    Inventors: Beata Ladnai, Mark David Harris, Andrew J. Thomas, Andrew G. P. Smith, Russell Humphries, Kenneth D. Ray
  • Publication number: 20220062531
    Abstract: This disclosure relates generally to an apparatus for creating a mechanically-wound infusion pump which can be used in a medical context to provide steady, reliable mechanical infusion amounts without relying on electricity and which can operate accurately in areas where electric power is not available or when ambulation is desired.
    Type: Application
    Filed: August 27, 2021
    Publication date: March 3, 2022
    Inventor: John David Harris
  • Patent number: 11263640
    Abstract: The CLOUD SERVICE FACILITATOR APPARATUSES, METHODS AND SYSTEMS (“CSF”) transforms user purchase requests, refund requests, and product/service replacement requests via CSF components into transaction records, refunds, and replacement products/services outputs. The CSF may receive a consumer purchase request for a cloud service from a merchant. In response to the request, the CSF may generate a unique record key for the purchase and may transmit the unique record key to the merchant. The CSF may further receive additional transaction information and the unique record key from the merchant. In response to the received information and the unique key, the CSF may provide additional service to the merchant or the consumer.
    Type: Grant
    Filed: May 10, 2018
    Date of Patent: March 1, 2022
    Assignee: VISA INTERNATIONAL SERVICE ASSOCIATION
    Inventors: Theodore David Harris, Patrick Faith
  • Publication number: 20220060466
    Abstract: Methods, computer-readable media, software, and apparatuses are provided to assist a user and vendor in completing an online trusted transaction. Trusted vendor websites are verified and user identities are confirmed through a cyber-security safe logon credentialing system. The vendor can be confident that the user identity has been verified to be who they say they are and the user can be confident that they are using a trusted verified vendor website.
    Type: Application
    Filed: November 4, 2021
    Publication date: February 24, 2022
    Applicant: Allstate Insurance Company
    Inventors: John Parkinson, David Harris, Mark D. Hansen, Nicolette De Guia
  • Publication number: 20220051108
    Abstract: Methods for controlling genetic learning for predictive models using predefined strategies may include, for each of a plurality of agents, selecting a type of predictive model. A strategy may be selected from predefined strategies. Candidate genomes may be generated and may include a plurality of genes. Each gene may be associated with a feature of the agent predictive model. A fit of each candidate genome to the agent strategy may be determined. A candidate genome may be selected based on the fit. For each of a plurality of epochs, a plurality of training iterations may be performed for each agent. A fitness of each agent predictive model may be determined. A subset of agents with a highest fitness may be determined. For each agent of the subset, at least one new agent may be generated. The genomes of the new agents may be merged with some genomes of the subset.
    Type: Application
    Filed: March 20, 2019
    Publication date: February 17, 2022
    Inventors: Theodore David Harris, Tatiana Korolevskaya, Yue Li, Craig O'Connell
  • Publication number: 20220016138
    Abstract: The compositions and methods provided herein are related, in part, to the discovery of cholic acid 7-sulfate as a treatment for diabetes. Provided herein is a method for treating a metabolic disorder (e.g., diabetes, obesity), or an inflammatory disease (e.g., Crohn's disease, inflammatory bowel disease, ulcerative colitis, pancreatitis, hepatitis, appendicitis, gastritis, diverticulitis, celiac disease, food intolerance, enteritis, ulcer, gastroesophageal reflux disease (GERD), psoriatic arthritis, psoriasis, and rheumatoid arthritis) in a subject in need thereof comprising administering to a subject a compound of Formulae (I)-(XVII).
    Type: Application
    Filed: December 4, 2019
    Publication date: January 20, 2022
    Applicants: President and Fellows of Harvard College, The Brigham and Women's Hospital, Inc.
    Inventors: Abigail Sloan Devlin, Snehal N. Chaudhari, Eric Garland Sheu, David A. Harris, Jinbo Lee
  • Publication number: 20210383382
    Abstract: A computer-implemented method includes receiving a payment request for a financial transaction and determining whether the financial transaction violates at least one of a hard or soft rule associated with a customer account. The method also includes, in response to determining that the transaction does not violate a hard rule but violates a soft rule, determining whether the financial transaction is low risk and, in response to determining that the financial transaction is low risk, authorizing the payment for the transaction. The method further includes updating the violated soft rule such that future financial transactions similar to the authorized financial transaction do not violate the soft rule.
    Type: Application
    Filed: September 1, 2017
    Publication date: December 9, 2021
    Inventors: David Harris, John G. Kolar, Michele M. Ladmirault, Laura Lee Orcutt, Angela Sicord
  • Patent number: 11196734
    Abstract: Methods, computer-readable media, software, and apparatuses are provided to assist a user and vendor in completing an online trusted transaction. Trusted vendor websites are verified and user identities are confirmed through a cyber-security safe logon credentialing system. The vendor can be confident that the user identity has been verified to be who they say they are and the user can be confident that they are using a trusted verified vendor website.
    Type: Grant
    Filed: July 23, 2019
    Date of Patent: December 7, 2021
    Assignee: ALLSTATE INSURANCE COMPANY
    Inventors: John Parkinson, David Harris, Mark D. Hansen, Nicolette De Guia
  • Patent number: 11182486
    Abstract: A security driver loads early in the boot process for a compute instance and detects processes that are subsequently launched. The detected processes can be recorded, and then scanned with any suitable malware scanning tool(s) once a user mode is available on the compute instance. After the operating system is installed and a user mode is available, other scanning tools may also be deployed (e.g., in the user mode) to augment security of the compute instance.
    Type: Grant
    Filed: June 11, 2019
    Date of Patent: November 23, 2021
    Assignee: Sophos Limited
    Inventors: Richard Paul Cosgrove, Mark David Harris, Andrew G. P. Smith
  • Publication number: 20210359992
    Abstract: Aspects of the disclosure relate to a system and method for securely authenticating a device via token(s) and/or verification computing device(s). A verification computing device may generate a pseudorandom number or sequence. Based on the pseudorandom number or sequence, the verification computing device may select a first plurality of parameters associated with a user of a device to be authenticated. The verification computing device may transmit, to the device, the pseudorandom number or sequence, and the device may select a second plurality of parameters. The device may generate a token based on the second plurality of parameters. The device may send the token to another device, and the other device may send the token to the verification computing device. The verification computing device may authenticate the device based on the token.
    Type: Application
    Filed: June 4, 2021
    Publication date: November 18, 2021
    Inventors: John Parkinson, Jason Park, David Harris
  • Publication number: 20210344707
    Abstract: An endpoint in an enterprise network is monitored, and when a potential trigger for a distributed denial of service (DDoS) attack is followed by an increase in network traffic from the endpoint to a high reputation network address, the endpoint is treated as a DDoS service bot and isolated from the network until remediation can be performed.
    Type: Application
    Filed: July 8, 2021
    Publication date: November 4, 2021
    Inventors: Karl Ackerman, Mark David Harris, Simon Neil Reed, Andrew J. Thomas, Kenneth D. Ray
  • Patent number: 11165797
    Abstract: In the context of network activity by an endpoint in an enterprise network, malware detection is improved by using a combination of reputation information for a network address that is accessed by the endpoint with reputation information for an application on the endpoint that is accessing the network address. This information, when combined with a network usage history for the application, provides improved differentiation between malicious network activity and legitimate, user-initiated network activity.
    Type: Grant
    Filed: April 5, 2017
    Date of Patent: November 2, 2021
    Assignee: Sophos Limited
    Inventors: Karl Ackerman, Mark David Harris, Kenneth D. Ray, Andrew J. Thomas, Daniel Stutz
  • Publication number: 20210315908
    Abstract: Provided are methods of treating diabetes and/or obesity in a subject in need thereof, and methods of increasing the amount of cholic acid-7-sulfate (CA7S) in a subject. Further provided herein are methods of administering CA7S to a subject. Also provided are compositions and kits comprising cholic acid-7-sulfate, or a salt thereof for use in the treatment of diabetes and/or obesity.
    Type: Application
    Filed: August 23, 2019
    Publication date: October 14, 2021
    Applicants: President and Fellows of Harvard College, The Brigham and Women's Hospital, Inc.
    Inventors: Abigail Sloan Devlin, Snehal N. Chaudhari, Eric Garland Sheu, David A. Harris
  • Patent number: 11102238
    Abstract: An endpoint in an enterprise network is monitored, and when a potential trigger for a distributed denial of service (DDoS) attack is followed by an increase in network traffic from the endpoint to a high reputation network address, the endpoint is treated as a DDoS service bot and isolated from the network until remediation can be performed.
    Type: Grant
    Filed: April 5, 2017
    Date of Patent: August 24, 2021
    Assignee: Sophos Limited
    Inventors: Karl Ackerman, Mark David Harris, Simon Neil Reed, Andrew J. Thomas, Kenneth D. Ray
  • Patent number: 11095669
    Abstract: A data recorder stores endpoint activity on an ongoing basis as sequences of events that causally relate computer objects such as processes and files. When a security event is detected, an event graph may be generated based on these causal relationships among the computing objects. For a root cause analysis, the event graph may be traversed in a reverse order from the point of an identified security event (e.g., a malware detection event) to preceding computing objects, while applying one or more cause identification rules to identify a root cause of the security event. Once a root cause is identified, the event graph may be traversed forward from the root cause to identify other computing objects that are potentially compromised by the root cause.
    Type: Grant
    Filed: November 8, 2019
    Date of Patent: August 17, 2021
    Assignee: Sophos Limited
    Inventors: Beata Ladnai, Mark David Harris, Andrew J. Thomas, Andrew G. P. Smith, Russell Humphries, Kenneth D. Ray
  • Patent number: 11093919
    Abstract: The MERCHANT-CONSUMER BRIDGING PLATFORM APPARATUSES, METHODS AND SYSTEMS (“MCB-Platform”) various activity requests (e.g., transaction request, merchant information update request, offer issuance request, etc.) via MCB-Platform components into transaction records and merchant database updates outputs.
    Type: Grant
    Filed: November 13, 2018
    Date of Patent: August 17, 2021
    Assignee: VISA INTERNATIONAL SERVICE ASSOCIATION
    Inventors: Edward Katzin, Phillip L. Kumnick, Theodore David Harris, Patrick Faith, Jennifer A. Schulz
  • Publication number: 20210250366
    Abstract: In a threat management platform, a number of endpoints log events in an event data recorder. A local agent filters this data and feeds a filtered data stream to a central threat management facility. The central threat management facility can locally or globally tune filtering by local agents based on the current data stream, and can query local event data recorders for additional information where necessary or helpful in threat detection or forensic analysis. The central threat management facility also stores and deploys a number of security tools such as a web-based user interface supported by machine learning models to identify potential threats requiring human intervention and other models to provide human-readable context for evaluating potential threats.
    Type: Application
    Filed: March 26, 2021
    Publication date: August 12, 2021
    Inventors: Beata Ladnai, Mark David Harris, Andrew G. P. Smith, Kenneth D. Ray, Andrew J. Thomas, Russell Humphries