Patents by Inventor David M. Cole

David M. Cole has filed for patents to protect the following inventions. This listing includes patent applications that are pending as well as patents that have already been granted by the United States Patent and Trademark Office (USPTO).

  • Patent number: 11960683
    Abstract: A display system for sensing a finger of a user applied to the display system includes a display panel; a sensor for sensing the finger; a sensing light source configured to emit a first light having a first wavelength W1; and a reflective polarizer disposed between the display panel and the sensor. For a substantially normally incident light, an optical transmittance of the reflective polarizer versus wavelength for a first polarization state has a band edge such that for a first wavelength range extending from a smaller wavelength L1 to a greater wavelength L2 and including W1, where 30 nm?L2?L1?50 nm and L1 is greater than and within about 20 nm of a wavelength L3 corresponding to an optical transmittance of about 50% along the band edge, the optical transmittance has an average of greater than about 75%.
    Type: Grant
    Filed: May 4, 2021
    Date of Patent: April 16, 2024
    Assignee: 3M INNOVATIVE PROPERTIES COMPANY
    Inventors: Bharat R. Acharya, Robert D. Taylor, Joseph P. Attard, Benjamin J. Forsythe, David T. Yust, Matthew E. Sousa, Jason S. Petaja, Anthony M. Renstrom, William Blake Kolb, Matthew S. Cole, Matthew S. Stay, Matthew R. D. Smith, Jeremy O. Swanson, Tri D. Pham, David A. Rosen, Qunyi Chen, Lisa A. DeNicola, Quinn D. Sanford, Carl A. Stover, Lin Zhao, Gilles J. Benoit
  • Publication number: 20240107113
    Abstract: Various implementations disclosed herein include devices, systems, and methods that provide video content (e.g., a TV show, a recorded sporting event, a movie, a 3D video, etc.) within a 3D environment using parameters selected based on one or more contextual factors. Such contextual factors may be determined based on an attribute of the content (e.g., its intended purpose or viewing environment), the user (e.g., the user's visual quality, interpupillary distance, etc.), the 3D environment (e.g., current lighting conditions, spatial considerations, etc.), or other context attributes.
    Type: Application
    Filed: September 15, 2023
    Publication date: March 28, 2024
    Inventors: Danvin Ruangchan, David M. Cole, Joshua J. Taylor, Christopher T. Eubank, Samir Gehani, Travis W. Brown, Shai Messingher Lang
  • Publication number: 20230077410
    Abstract: Encoding an image stream may include receiving an image stream with an original image resolution; generating a plurality of copies of the image stream with the original image resolution; encoding, for each copy of the plurality of copies of the image stream, the copy of the image stream to generate an encoded copy of the image stream, wherein the encoded copy of the image stream comprises a first region having a first image resolution and a second region having a second image resolution, wherein each encoded copy of the plurality of encoded copies of the image stream has a different first region, and providing, to a playback device, at least one encoded copy of the plurality of encoded copies of the image stream.
    Type: Application
    Filed: September 15, 2022
    Publication date: March 16, 2023
    Inventors: Matthew J. Yaeger, David M. Cole, Benjamin D. Buckner
  • Patent number: 8774184
    Abstract: System and method for a full featured network communications protocol that is both memory and processor efficient. A preferred embodiment comprises a method for transmitting information between electronic devices, the method comprising creating a connection between a pair of electronic devices, sending a packet between the pair, acknowledging a receipt of the packet by a receiver of the packet, and dissolving the connection when it is no longer needed. The creating of the connection comprises assigning a port number to the connection at an initiating electronic device and then transmitting a connection request containing the port number to a servicing electronic device. After the transmitting, the creating further comprises receiving a second port number to the connection from the servicing electronic device.
    Type: Grant
    Filed: October 13, 2009
    Date of Patent: July 8, 2014
    Assignee: Texas Instruments Incorporated
    Inventors: Sunil Gupta, Tanner R. Andrews, David M. Cole, Sekar Udayamurthy, Corey Brady, Patrick M. Milheron
  • Patent number: 8700767
    Abstract: A system and method provide comprehensive and highly automated testing of vulnerabilities to intrusion on a target network, including identification of operating system, identification of target network topology and target computers, identification of open target ports, assessment of vulnerabilities on target ports, active assessment of vulnerabilities based on information acquired from target computers, quantitative assessment of target network security and vulnerability, and hierarchical graphical representation of the target network, target computers, and vulnerabilities in a test report. The system and method employ minimally obtrusive techniques to avoid interference with or damage to the target network during or after testing.
    Type: Grant
    Filed: February 10, 2012
    Date of Patent: April 15, 2014
    Assignee: McAfee, Inc.
    Inventors: David M. Cole, Dennis J. Hanzlik, Erik Caso
  • Patent number: 8661126
    Abstract: A system and method provide comprehensive and highly automated testing of vulnerabilities to intrusion on a target network, including identification of operating system, identification of target network topology and target computers, identification of open target parts, assessment of vulnerabilities on target ports, active assessment of vulnerabilities based on information acquired from target computers, quantitative assessment of target network security and vulnerability, and hierarchical graphical representation of the target network, target computers, and vulnerabilities in a test report. The system and method employ minimally obtrusive techniques to avoid interference with or damage to the target network during or after testing.
    Type: Grant
    Filed: February 10, 2012
    Date of Patent: February 25, 2014
    Assignee: McAfee, Inc.
    Inventors: David M. Cole, Dennis J. Hanzlik, Erik Caso
  • Patent number: 8621073
    Abstract: A system and method provide comprehensive and highly automated testing of vulnerabilities to intrusion on a target network, including identification of operating system, identification of target network topology and target computers, identification of open target ports, assessment of vulnerabilities on target ports, active assessment of vulnerabilities based on information acquired from target computers, quantitative assessment of target network security and vulnerability, and hierarchical graphical representation of the target network, target computers, and vulnerabilities in a test report. The system and method employ minimally obtrusive techniques to avoid interference with or damage to the target network during or after testing.
    Type: Grant
    Filed: February 15, 2012
    Date of Patent: December 31, 2013
    Assignee: McAfee, Inc.
    Inventors: Stuart C. McClure, George Kurtz, Robin Keir, Marshall A. Beddoe, Michael J. Morton, Christopher M. Prosise, David M. Cole, Christopher Abad
  • Patent number: 8621060
    Abstract: A system and method provide comprehensive and highly automated testing of vulnerabilities to intrusion on a target network, including identification of operating system, identification of target network topology and target computers, identification of open target ports, assessment of vulnerabilities on target ports, active assessment of vulnerabilities based on information acquired from target computers, quantitative assessment of target network security and vulnerability, and hierarchical graphical representation of the target network, target computers, and vulnerabilities in a test report. The system and method employ minimally obtrusive techniques to avoid interference with or damage to the target network during or after testing.
    Type: Grant
    Filed: February 15, 2012
    Date of Patent: December 31, 2013
    Assignee: McAfee, Inc.
    Inventors: Stuart C. McClure, George Kurtz, Robin Keir, Marshall A. Beddoe, Michael J. Morton, Christopher M. Prosise, David M. Cole, Christopher Abad
  • Patent number: 8615582
    Abstract: A system and method provide comprehensive and highly automated testing of vulnerabilities to intrusion on a target network, including identification of operating system, identification of target network topology and target computers, identification of open target ports, assessment of vulnerabilities on target ports, active assessment of vulnerabilities based on information acquired from target computers, quantitative assessment of target network security and vulnerability, and hierarchical graphical representation of the target network, target computers, and vulnerabilities in a test report. The system and method employ minimally obtrusive techniques to avoid interference with or damage to the target network during or after testing.
    Type: Grant
    Filed: February 15, 2012
    Date of Patent: December 24, 2013
    Assignee: McAfee, Inc.
    Inventors: Stuart C. McClure, George Kurtz, Robin Keir, Marshall A. Beddoe, Michael J. Morton, Christopher M. Prosise, David M. Cole, Christopher Abad
  • Publication number: 20120185945
    Abstract: A security risk management system comprises a vulnerability database, an asset database, a local threat intelligence database and a threat correlation module. The vulnerability database comprises data about security vulnerabilities of assets on a network gathered using active or passive vulnerability assessment techniques. The asset database comprises data concerning attributes of each asset. The threat correlation module receives threat intelligence alerts that identify attributes and vulnerabilities associated with security threats that affect classes of assets. The threat correlation module compares asset attributes and vulnerabilities with threat attributes and vulnerabilities and displays a list of assets that are affected by a particular threat. The list can be sorted according to a calculated risk score, allowing an administrator to prioritize preventive action and respond first to threats that affect higher risk assets.
    Type: Application
    Filed: March 28, 2012
    Publication date: July 19, 2012
    Inventors: Steven G. Andres, David M. Cole, Thomas Gregory Cummings, Roberto Ramon Garcia, Brian Michael Kenyon, George R. Kurtz, Stuart Cartier McClure, Christopher William Moore, Michael J. O'Dea, Ken D. Saruwatari
  • Publication number: 20120151595
    Abstract: A system and method provide comprehensive and highly automated testing of vulnerabilities to intrusion on a target network, including identification of operating system, identification of target network topology and target computers, identification of open target ports, assessment of vulnerabilities on target ports, active assessment of vulnerabilities based on information acquired from target computers, quantitative assessment of target network security and vulnerability, and hierarchical graphical representation of the target network, target computers, and vulnerabilities in a test report. The system and method employ minimally obtrusive techniques to avoid interference with or damage to the target network during or after testing.
    Type: Application
    Filed: February 15, 2012
    Publication date: June 14, 2012
    Inventors: Stuart C. McClure, George Kurtz, Robin Keir, Marshall A. Beddoe, Michael J. Morton, Christopher M. Prosise, David M. Cole, Christopher Abad
  • Publication number: 20120151594
    Abstract: A system and method provide comprehensive and highly automated testing of vulnerabilities to intrusion on a target network, including identification of operating system, identification of target network topology and target computers, identification of open target ports, assessment of vulnerabilities on target ports, active assessment of vulnerabilities based on information acquired from target computers, quantitative assessment of target network security and vulnerability, and hierarchical graphical representation of the target network, target computers, and vulnerabilities in a test report. The system and method employ minimally obtrusive techniques to avoid interference with or damage to the target network during or after testing.
    Type: Application
    Filed: February 15, 2012
    Publication date: June 14, 2012
    Inventors: Stuart C. McClure, George Kurtz, Robin Keir, Marshall A. Beddoe, Michael J. Morton, Christopher M. Prosise, David M. Cole, Christopher Abad
  • Publication number: 20120151596
    Abstract: A system and method provide comprehensive and highly automated testing of vulnerabilities to intrusion on a target network, including identification of operating system, identification of target network topology and target computers, identification of open target ports, assessment of vulnerabilities on target ports, active assessment of vulnerabilities based on information acquired from target computers, quantitative assessment of target network security and vulnerability, and hierarchical graphical representation of the target network, target computers, and vulnerabilities in a test report. The system and method employ minimally obtrusive techniques to avoid interference with or damage to the target network during or after testing.
    Type: Application
    Filed: February 15, 2012
    Publication date: June 14, 2012
    Inventors: Stuart C. McClure, George Kurtz, Robin Keir, Marshall A. Beddoe, Michael J. Morton, Christopher M. Prosise, David M. Cole, Christopher Abad
  • Patent number: 8201257
    Abstract: A security risk management system comprises a vulnerability database, an asset database, a local threat intelligence database and a threat correlation module. The vulnerability database comprises data about security vulnerabilities of assets on a network gathered using active or passive vulnerability assessment techniques. The asset database comprises data concerning attributes of each asset. The threat correlation module receives threat intelligence alerts that identify attributes and vulnerabilities associated with security threats that affect classes of assets. The threat correlation module compares asset attributes and vulnerabilities with threat attributes and vulnerabilities and displays a list of assets that are affected by a particular threat. The list can be sorted according to a calculated risk score, allowing an administrator to prioritize preventive action and respond first to threats that affect higher risk assets.
    Type: Grant
    Filed: March 31, 2004
    Date of Patent: June 12, 2012
    Assignee: McAfee, Inc.
    Inventors: Steven G. Andres, David M. Cole, Thomas Gregory Cummings, Roberto Ramon Garcia, Brian Michael Kenyon, George R. Kurtz, Stuart Cartier McClure, Christopher William Moore, Michael J. O'Dea, Ken D. Saruwatari
  • Publication number: 20120144493
    Abstract: A system and method provide comprehensive and highly automated testing of vulnerabilities to intrusion on a target network, including identification of operating system, identification of target network topology and target computers, identification of open target ports, assessment of vulnerabilities on target ports, active assessment of vulnerabilities based on information acquired from target computers, quantitative assessment of target network security and vulnerability, and hierarchical graphical representation of the target network, target computers, and vulnerabilities in a test report. The system and method employ minimally obtrusive techniques to avoid interference with or damage to the target network during or after testing.
    Type: Application
    Filed: February 10, 2012
    Publication date: June 7, 2012
    Inventors: David M. Cole, Dennis J. Hanzlik, Erik Caso
  • Publication number: 20120144476
    Abstract: A system and method provide comprehensive and highly automated testing of vulnerabilities to intrusion on a target network, including identification of operating system, identification of target network topology and target computers, identification of open target ports, assessment of vulnerabilities on target ports, active assessment of vulnerabilities based on information acquired from target computers, quantitative assessment of target network security and vulnerability, and hierarchical graphical representation of the target network, target computers, and vulnerabilities in a test report. The system and method employ minimally obtrusive techniques to avoid interference with or damage to the target network during or after testing.
    Type: Application
    Filed: February 15, 2012
    Publication date: June 7, 2012
    Inventors: Stuart C. McClure, George Kurtz, Robin Keir, Marshall A. Beddoe, Michael J. Morton, Christopher M. Prosise, David M. Cole, Christopher Abad
  • Publication number: 20120144494
    Abstract: A system and method provide comprehensive and highly automated testing of vulnerabilities to intrusion on a target network, including identification of operating system, identification of target network topology and target computers, identification of open target parts, assessment of vulnerabilities on target ports, active assessment of vulnerabilities based on information acquired from target computers, quantitative assessment of target network security and vulnerability, and hierarchical graphical representation of the target network, target computers, and vulnerabilities in a test report. The system and method employ minimally obtrusive techniques to avoid interference with or damage to the target network during or after testing.
    Type: Application
    Filed: February 10, 2012
    Publication date: June 7, 2012
    Inventors: David M. Cole, Dennis J. Hanzlik, Erik Caso
  • Patent number: 8135830
    Abstract: A system and method provide comprehensive and highly automated testing of vulnerabilities to intrusion on a target network, including identification of operating system, identification of target network topology and target computers, identification of open target ports, assessment of vulnerabilities on target ports, active assessment of vulnerabilities based on information acquired from target computers, quantitative assessment of target network security and vulnerability, and hierarchical graphical representation of the target network, target computers, and vulnerabilities in a test report. The system and method employ minimally obtrusive techniques to avoid interference with or damage to the target network during or after testing.
    Type: Grant
    Filed: June 1, 2009
    Date of Patent: March 13, 2012
    Assignee: McAfee, Inc.
    Inventors: Stuart C. McClure, George Kurtz, Robin Keir, Marshall A. Beddoe, Michael J. Morton, Christopher M. Prosise, David M. Cole, Christopher Abad
  • Patent number: 8135823
    Abstract: A system and method provide comprehensive and highly automated testing of vulnerabilities to intrusion on a target network, including identification of operating system, identification of target network topology and target computers, identification of open target ports, assessment of vulnerabilities on target ports, active assessment of vulnerabilities based on information acquired from target computers, quantitative assessment of target network security and vulnerability, and hierarchical graphical representation of the target network, target computers, and vulnerabilities in a test report. The system and method employ minimally obtrusive techniques to avoid interference with or damage to the target network during or after testing.
    Type: Grant
    Filed: May 14, 2007
    Date of Patent: March 13, 2012
    Assignee: McAfee, Inc.
    Inventors: David M. Cole, Dennis J. Hanzlik, Erik Caso
  • Patent number: 7664845
    Abstract: A system and method provide comprehensive and highly automated testing of vulnerabilities to intrusion on a target network, including identification of operating system, identification of target network topology and target computers, identification of open target ports, assessment of vulnerabilities on target ports, active assessment of vulnerabilities based on information acquired from target computers, quantitative assessment of target network security and vulnerability, and hierarchical graphical representation of the target network, target computers, and vulnerabilities in a test report. The system and method employ minimally obtrusive techniques to avoid interference with or damage to the target network during or after testing.
    Type: Grant
    Filed: March 10, 2003
    Date of Patent: February 16, 2010
    Assignee: McAfee, Inc.
    Inventors: George R. Kurtz, David M. Cole, Erik Caso, Dan Kuykendall