Patents by Inventor David Harris

David Harris has filed for patents to protect the following inventions. This listing includes patent applications that are pending as well as patents that have already been granted by the United States Patent and Trademark Office (USPTO).

  • Publication number: 20200349375
    Abstract: A method comprises positioning a display screen of a mobile device and a surface of interest such that the display screen of the mobile device faces the surface of interest; emitting light by the display screen, wherein at least part of the emitted light is reflected by the surface of interest; receiving, by a camera of the mobile device, at least part of the light emitted by the display screen and reflected from the surface of interest thereby to generate at least one image; and processing the at least one image to determine at least one property of the surface of interest.
    Type: Application
    Filed: August 31, 2018
    Publication date: November 5, 2020
    Inventors: Aaron Quigley, Hui Shyong Yeo, David Harris-Birtill
  • Patent number: 10817602
    Abstract: A data recorder stores endpoint activity on an ongoing basis as sequences of events that causally relate computer objects such as processes and files, and patterns within this event graph can be used to detect the presence of malware on the endpoint. The underlying recording process may be dynamically adjusted in order to vary the amount and location of recording as the security state of the endpoint changes over time.
    Type: Grant
    Filed: May 2, 2019
    Date of Patent: October 27, 2020
    Assignee: Sophos Limited
    Inventors: Beata Ladnai, Mark David Harris, Andrew J. Thomas, Andrew G. P. Smith, Russell Humphries
  • Publication number: 20200327461
    Abstract: This invention provides the end-to-end control, networking, and data management for information presentation services (Service 1) and collaboration services (Service 2) the 1.) identification of events, 2.) generation of push invitations to such events, 3.) personalization of ebooks via reader-author collaboration to embed Personalized Multimedia Autographs (PMAs) into the ebook or other media, 4.) event line control allowing readers to browse the bookstore or mingle while waiting for collaboration with the author during these events, 5.) capability for the readers and author to discuss the event on social media after the readers have registered for the event enabling the author to tailor his/her comments at the event to the readers' interests; 6.) synchronization and archival of the PMA among all of the reader's devices, 7.) integration of special services such as reserved seating as well as food and beverage that may make invitations to such events in the future very exclusive.
    Type: Application
    Filed: May 17, 2020
    Publication date: October 15, 2020
    Inventors: David Harris Walters, David M Brooks
  • Patent number: 10775274
    Abstract: A method and system for analyzing machinery operating parameters are provided. The method is implemented using a computing device coupled to a user interface and a memory device. The method can include determining an ideal curve of a first operating parameter of a machine that can include a plurality of component parts. The method also can include receiving an indication of a second operating parameter of the machine and receiving an indication of the first operating parameter of the machine wherein the indication of the first operating parameter is correlated to the received indication of the second operating parameter. The method further can include normalizing the indication of the first operating parameter to the ideal curve of the first operating parameter and determining a condition of the machine based on the normalizing of the indication of the first operating parameter to the ideal curve of the first operating parameter.
    Type: Grant
    Filed: August 12, 2015
    Date of Patent: September 15, 2020
    Assignee: BAKER HUGHES, A GE CONIPANY, LLC
    Inventors: David Harris Leatham, Matthew Dean Anderson
  • Patent number: 10733003
    Abstract: Pooled virtual machine load balancers are described. A system determines whether a number of virtual machine load balancers that are in a pool is less than a specified number. The system creates a calculated number of virtual machine load balancers for the pool if the number of virtual machine load balancers that are in the pool is less than the specified number, the calculated number being equal to the specified number minus the number of virtual machine load balancers that are in the pool. The system receives a request to create a virtual machine environment that requires at least one virtual machine load balancer. The system allocates a virtual machine load balancer from the pool to the virtual machine environment.
    Type: Grant
    Filed: November 3, 2016
    Date of Patent: August 4, 2020
    Assignee: salesforce.com, inc.
    Inventors: Kunal Sanghavi, Vijaysenthil Veeriah, Varun Gupta, Edward David Harris, Tyson Lutz
  • Patent number: 10709205
    Abstract: A cord lock device is provided, which includes a body having first and second faces, with a cord passage extending through the body between the first and second faces. First and second grip channels are formed in the first face and have respective first ends adjacent to the cord passage and second ends extending away from the cord passage. Each of the grip channels has a pair of grip teeth facing each other on opposite sides of the respective grip channel, ridges of the pairs of grip teeth extending from the first face toward the second face at an angle such that at the first face, the ridges are furthest from the cord passage, while at a point closest to the second face, the ridges are closest to the cord passage.
    Type: Grant
    Filed: March 13, 2018
    Date of Patent: July 14, 2020
    Inventor: Charles David Harris
  • Patent number: 10687589
    Abstract: A protective enclosure for a zipper of an article. The zipper enclosure may include an enclosure base that is attachable to the article, such as a mattress cover or padding materials for use with a bedding/furniture cover. The enclosure base may be configured to receive a one or more components of the zipper, such as the zipper slider and pull tab, upon closing of the zipper. When the zipper is closed, the enclosure base may be enclosed by an enclosure cover to contain and/or prevent migration of particles and/or organisms, such as bed bugs, allergens, dust mites, small particles and the like, from the article through an opening in the zipper chain adjacent the slider head. The enclosure may include one or more barriers for preventing migration of small particles and/or organisms past obstructions formed by the barriers.
    Type: Grant
    Filed: April 14, 2017
    Date of Patent: June 23, 2020
    Assignee: CleanBrands, LLC
    Inventors: Gary Goldberg, David Harris, Donna Charpentier
  • Publication number: 20200153849
    Abstract: A threat management facility that remotely stores global reputation information for network content can be used in combination with a recognition engine such as a machine learning classifier that is locally deployed on endpoints within an enterprise network. More specifically, the recognition engine can locally evaluate reputation for a network address being accessed by an endpoint, and this reputation information can be used to dynamically establish a timeout for a request from the endpoint to the threat management facility for corresponding global reputation information.
    Type: Application
    Filed: January 13, 2020
    Publication date: May 14, 2020
    Inventors: Neil Robert Tyndale Watkiss, Emile Marcus Kenning, Mark David Harris
  • Publication number: 20200092283
    Abstract: Aspects of the disclosure relate to a system and method for securely authenticating a device via token(s) and/or verification computing device(s). A verification computing device may generate a pseudorandom number or sequence. Based on the pseudorandom number or sequence, the verification computing device may select a first plurality of parameters associated with a user of a device to be authenticated. The verification computing device may transmit, to the device, the pseudorandom number or sequence, and the device may select a second plurality of parameters. The device may generate a token based on the second plurality of parameters. The device may send the token to another device, and the other device may send the token to the verification computing device. The verification computing device may authenticate the device based on the token.
    Type: Application
    Filed: September 18, 2018
    Publication date: March 19, 2020
    Inventors: John Parkinson, Jason Park, David Harris
  • Publication number: 20200076833
    Abstract: Activity on an endpoint is monitored in two stages with a local agent. In a first stage, particular computing objects on the endpoint are selected for tracking. In a second stage, particular types of changes to those objects are selected. By selecting objects and object changes in this manner, a compact data stream of information highly relevant to threat detection can be provided from an endpoint to a central threat management facility. In order to support dynamic threat response, the locus and level of detection applied by the local agent can be controlled by the threat management facility and/or the endpoint.
    Type: Application
    Filed: September 12, 2018
    Publication date: March 5, 2020
    Inventors: Beata Ladnai, Mark David Harris, Andrew G. P. Smith, Kenneth D. Ray, Andrew J. Thomas, Russell Humphries
  • Publication number: 20200076834
    Abstract: Activity on an endpoint is monitored in two stages with a local agent. In a first stage, particular computing objects on the endpoint are selected for tracking. In a second stage, particular types of changes to those objects are selected. By selecting objects and object changes in this manner, a compact data stream of information highly relevant to threat detection can be provided from an endpoint to a central threat management facility. At the same time, a local data recorder creates a local record of a wider range of objects and changes. The system may support forensic activity by facilitating queries to the local data recorder on the endpoint to retrieve more complete records of local activity when the compact data stream does not adequately characterize a particular context.
    Type: Application
    Filed: September 12, 2018
    Publication date: March 5, 2020
    Inventors: Beata Ladnai, Mark David Harris, Andrew G. P. Smith, Kenneth D. Ray, Andrew J. Thomas, Russell Humphries
  • Publication number: 20200076837
    Abstract: A data recorder stores endpoint activity on an ongoing basis as sequences of events that causally relate computer objects such as processes and files. When a security event is detected, an event graph may be generated based on these causal relationships among the computing objects. For a root cause analysis, the event graph may be traversed in a reverse order from the point of an identified security event (e.g., a malware detection event) to preceding computing objects, while applying one or more cause identification rules to identify a root cause of the security event. Once a root cause is identified, the event graph may be traversed forward from the root cause to identify other computing objects that are potentially compromised by the root cause.
    Type: Application
    Filed: November 8, 2019
    Publication date: March 5, 2020
    Inventors: Beata Ladnai, Mark David Harris, Andrew J. Thomas, Andrew G. P. Smith, Russell Humphries, Kenneth D. Ray
  • Publication number: 20200076835
    Abstract: In a threat management platform, a number of endpoints log events in an event data recorder. A local agent filters this data and feeds a filtered data stream to a central threat management facility. The central threat management facility can locally or globally tune filtering by local agents based on the current data stream, and can query local event data recorders for additional information where necessary or helpful in threat detection or forensic analysis. The central threat management facility also stores and deploys a number of security tools such as a web-based user interface supported by machine learning models to identify potential threats requiring human intervention and other models to provide human-readable context for evaluating potential threats.
    Type: Application
    Filed: September 12, 2018
    Publication date: March 5, 2020
    Inventors: Beata Ladnai, Mark David Harris, Andrew G. P. Smith, Kenneth D. Ray, Andrew J. Thomas, Russell Humphries
  • Publication number: 20200000983
    Abstract: Methods and apparatuses for detecting full waste canister and/or fluid flow path blockage conditions are disclosed. Also disclosed are methods and apparatuses for controlling a pump. In some embodiments, flow of fluid can be restricted in a portion of the fluid flow path. A controller can be configured to compare a difference in pressure values upstream and downstream of a fluid flow restrictor to a pressure difference threshold, and determine based on the comparison whether to activate an alarm indicating the full waste canister condition or the fluid flow path blockage condition. The controller can be additionally or alternatively configured to determine a fluid flow using a flow meter, open a selectable valve in response to a comparison of the fluid flow with a fluid flow threshold, determine fluid flow after opening the valve, and determine based on the fluid flow after opening the valve whether to activate the alarm.
    Type: Application
    Filed: June 17, 2019
    Publication date: January 2, 2020
    Inventors: Benjamin Gordon, Jake Turner, Edward Yerbury Hartwell, Stephen Jacob, Nathan Wrench, Edward Vernon-Harcourt, David Harris
  • Patent number: 10516682
    Abstract: A data recorder stores endpoint activity on an ongoing basis as sequences of events that causally relate computer objects such as processes and files. When a security event is detected, an event graph may be generated based on these causal relationships among the computing objects. For a root cause analysis, the event graph may be traversed in a reverse order from the point of an identified security event (e.g., a malware detection event) to preceding computing objects, while applying one or more cause identification rules to identify a root cause of the security event. Once a root cause is identified, the event graph may be traversed forward from the root cause to identify other computing objects that are potentially compromised by the root cause.
    Type: Grant
    Filed: April 5, 2018
    Date of Patent: December 24, 2019
    Assignee: Sophos Limited
    Inventors: Beata Ladnai, Mark David Harris, Andrew J. Thomas, Andrew G. P. Smith, Russell Humphries, Kenneth D. Ray
  • Publication number: 20190383902
    Abstract: A classification method comprises positioning an object and a radar unit in proximity to each other; receiving by the radar unit radar signals reflected from the object; and classifying the object, wherein the classifying is based on the radar signals and/or at least one feature extracted from the radar signals, and the classifying of the object comprises determining classification data for the object.
    Type: Application
    Filed: March 1, 2018
    Publication date: December 19, 2019
    Inventors: Hui Shyong Yeo, Aaron Quigley, Gergely Flamich, Patrick Schrempf, David Harris-Birtill
  • Patent number: 10496177
    Abstract: Systems and methods for switching a user interface input response mode. A direction of motion of a pointing device with reference to a spatial coordinate system may be determined. The direction of motion may be associated with a particular touch input for simulation by the computer system based on motion of the pointing device, the particular touch input selected from multiple touch inputs. The user interface input response mode may be switched from a first mode to a second mode associated with the particular touch input.
    Type: Grant
    Filed: February 11, 2013
    Date of Patent: December 3, 2019
    Assignee: DISH Technologies L.L.C.
    Inventors: Craig Avison-Fell, David Harris, Mark Nolan
  • Patent number: 10489588
    Abstract: A data recorder stores endpoint activity on an ongoing basis as sequences of events that causally relate computer objects such as processes and files, and patterns within this event graph can be used to detect the presence of malware on the endpoint. The underlying recording process may be dynamically adjusted in order to vary the amount and location of recording as the security state of the endpoint changes over time.
    Type: Grant
    Filed: March 19, 2018
    Date of Patent: November 26, 2019
    Assignee: Sophos Limited
    Inventors: Beata Ladnai, Mark David Harris, Andrew J. Thomas, Andrew G. P. Smith, Russell Humphries
  • Publication number: 20190340704
    Abstract: This invention provides the end-to-end control, networking, and data management for the 1.) identification of event signings, 2.) generation of push invitations to such events, 3.) personalization of ebooks via reader-author collaboration to embed Personalized Multimedia Autographs (PMAs) into the ebook or other media, 4.) event line control allowing readers to browse the bookstore or mingle while waiting for collaboration with the author during these events, 5.) capability for the readers and author to discuss the event on social media after the readers have registered for the event enabling the author to tailor his/her comments at the vent to the readers' interests; 6.) synchronization and archival of the PMA among all of the reader's devices, 7.) integration of special services such as reserved seating as well as food and beverage that may make invitations to such events in the future very exclusive.
    Type: Application
    Filed: July 15, 2019
    Publication date: November 7, 2019
    Inventors: David Harris Walters, David M Brooks
  • Patent number: 10460105
    Abstract: A data recorder stores endpoint activity on an ongoing basis as sequences of events that causally relate computer objects such as processes and files, and patterns within this event graph can be used to detect the presence of malware on the endpoint. The underlying recording process may be dynamically adjusted in order to vary the amount and location of recording as the security state of the endpoint changes over time.
    Type: Grant
    Filed: March 19, 2018
    Date of Patent: October 29, 2019
    Assignee: Sophos Limited
    Inventors: Beata Ladnai, Mark David Harris, Andrew J. Thomas, Andrew G. P. Smith, Russell Humphries