Patents by Inventor David P. Reese, JR.

David P. Reese, JR. has filed for patents to protect the following inventions. This listing includes patent applications that are pending as well as patents that have already been granted by the United States Patent and Trademark Office (USPTO).

  • Patent number: 10791538
    Abstract: Embodiments of the present invention are directed to cloud-based data synchronization. Two or more devices associated with an account in a cloud can be synched. The account is configured to manage publishing and subscription relationships between these devices such that a first device is able to publish data to the account in the cloud, and a second device is able to subscribe to the data from the account. In some embodiments, the account is configured to determine whether the second device has proper dependencies for subscribing to the data, and to prevent the second device from subscribing to the data upon determining that the second device does not have proper dependencies. However, in some embodiments, proper dependencies are automatically satisfied by downloading and installing a tool configured to properly process the data (e.g., execute applications) on the second device.
    Type: Grant
    Filed: July 6, 2012
    Date of Patent: September 29, 2020
    Assignee: BlueStack Systems, Inc.
    Inventors: Suman Saraf, David P. Reese, Jr., Harvinder Singh Sawhney, Shashi Kant Sharma
  • Patent number: 10737183
    Abstract: Embodiments of the present invention are directed to ancillary game data. Ancillary game data, including game state events and/or visual/audio elements, is generated from and stored in association with raw or original game play footage by a game state data (GSD) service. The ancillary game data is available for subsequently composition back with the corresponding original media stream, thereby generating a smart media stream, for viewers to consume. Game state events are available for searching and sorting archived media streams or for performing general data mining.
    Type: Grant
    Filed: October 27, 2016
    Date of Patent: August 11, 2020
    Assignee: BlueStack Systems, Inc.
    Inventors: Shashi Kant Sharma, Sabrina Marie Waun-Mei Li, Julia Larson, David P. Reese, Jr.
  • Patent number: 10310892
    Abstract: Embodiments of the present invention are directed toward apparatuses, systems and methods of switching operating systems. The present invention includes a multi-OS runtime with virtualization technology, which allows applications developed for different operating systems to execute simultaneously, side-by-side, on the same computing device. The computing device typically includes a host operating system and at least one guest operating system. An application, which is disguised as a host operating system specific application on the host operating system, is configured to be installed and executed within the guest operating system. Host operating system based policies can be set for the application. The application can be launched from the host operating system, the guest operating system or both. The computing device allows for the ability to switch between different operating systems via a soft button, a hard button, or based on a configuration of the computing device, or a combination thereof.
    Type: Grant
    Filed: March 4, 2015
    Date of Patent: June 4, 2019
    Assignee: Bluestack Systems, Inc.
    Inventors: Suman Saraf, Harvinder Singh Sawhney, Sharad Agrawal, Ambreesh Bangur, David P. Reese, Jr.
  • Patent number: 10255080
    Abstract: Embodiments of the present invention are directed to a method of providing non-native notifications and system thereof. These notifications are generated by non-native applications that can be executed on a target device, specifically within a guest environment on the target device, or can be executed on a physically disjoint source device that is communicatively coupled with the target device via a local pairing mechanism or a service in a cloud. The application player and the source device are able to capture these non-native notifications. The target device is able to receive and present these non-native notifications to a user. Notifications include alerts, reminders, updates and messages generated by non-native applications. The user does not need to access the non-native applications, or the application player or source device they are executing on to see the non-native notifications. Instead, the user views these non-native notifications at a central location on the target device.
    Type: Grant
    Filed: July 13, 2016
    Date of Patent: April 9, 2019
    Assignee: BlueStack Systems, Inc.
    Inventors: Shashi Kant Sharma, Sharad Agrawal, Suman Saraf, David P. Reese, Jr.
  • Patent number: 10089093
    Abstract: Embodiments of the present invention are directed toward apparatuses, systems and methods of switching operating systems. The present invention includes a multi-OS runtime with virtualization technology, which allows applications developed for different operating systems to execute simultaneously, side-by-side, on the same computing device. The computing device typically includes a host operating system and at least one guest operating system. An application, which is disguised as a host operating system specific application on the host operating system, is configured to be installed and executed within the guest operating system. Host operating system based policies can be set for the application. The application can be launched from the host operating system, the guest operating system or both. The computing device allows for the ability to switch between different operating systems via a soft button, a hard button, or based on a configuration of the computing device, or a combination thereof.
    Type: Grant
    Filed: May 23, 2012
    Date of Patent: October 2, 2018
    Assignee: Bluestack Systems, Inc.
    Inventors: Suman Saraf, Harvinder Singh Sawhney, Sharad Agrawal, Ambreesh Bangur, David P. Reese, Jr.
  • Patent number: 9832227
    Abstract: A method in one example implementation includes receiving information related to a network access attempt on a first computing device with the information identifying a software program file associated with the network access attempt. The method also includes evaluating a first criterion to determine whether network traffic associated with the software program file is permitted and then creating a restriction rule to block the network traffic if the network traffic is not permitted. The first criterion includes a trust status of the software program file. In specific embodiments, the method includes pushing the restriction rule to a network protection device that intercepts the network traffic associated with the software program file and applies the restriction rule to the network traffic. In more specific embodiments, the method includes searching a whitelist identifying trustworthy software program files to determine the trust status of the software program file.
    Type: Grant
    Filed: January 19, 2015
    Date of Patent: November 28, 2017
    Assignee: McAfee, LLC
    Inventors: Rishi Bhargava, David P. Reese, Jr.
  • Patent number: 9804864
    Abstract: Embodiments of the present invention are directed to a method of mapping inputs and system thereof. A computing device is configured to access a previously created profile for, such as, game play using a communicatively coupled controller to manipulate events on the computing device. The profile can be locally accessed from the computing device or remotely accessed from a cloud. The profile includes at least one mapping, each associating an input from the controller to an instruction understandable by an event on the computing device. The controller is integral with the computing device or is a physically disjoint device separate from the computing device. In some embodiments, the computing device is communicatively coupled with a camera configured to capture the input. One or more features of the controller can also be mapped to instructions understandable by the computing device.
    Type: Grant
    Filed: October 4, 2012
    Date of Patent: October 31, 2017
    Assignee: Bluestack Systems, Inc.
    Inventors: Shashi Kant Sharma, Sharad Agrawal, Suman Saraf, David P. Reese, Jr.
  • Publication number: 20170006123
    Abstract: Embodiments of the present invention are directed to a method of providing non-native notifications and system thereof. These notifications are generated by non-native applications that can be executed on a target device, specifically within a guest environment on the target device, or can be executed on a physically disjoint source device that is communicatively coupled with the target device via a local pairing mechanism or a service in a cloud. The application player and the source device are able to capture these non-native notifications. The target device is able to receive and present these non-native notifications to a user. Notifications include alerts, reminders, updates and messages generated by non-native applications. The user does not need to access the non-native applications, or the application player or source device they are executing on to see the non-native notifications. Instead, the user views these non-native notifications at a central location on the target device.
    Type: Application
    Filed: September 13, 2016
    Publication date: January 5, 2017
    Applicant: BlueStack Systems, Inc.
    Inventors: Shashi Kant Sharma, Sharad Agrawal, Suman Saraf, David P. Reese, JR.
  • Publication number: 20160321121
    Abstract: Embodiments of the present invention are directed to a method of providing non-native notifications and system thereof. These notifications are generated by non-native applications that can be executed on a target device, specifically within a guest environment on the target device, or can be executed on a physically disjoint source device that is communicatively coupled with the target device via a local pairing mechanism or a service in a cloud. The application player and the source device are able to capture these non-native notifications. The target device is able to receive and present these non-native notifications to a user. Notifications include alerts, reminders, updates and messages generated by non-native applications. The user does not need to access the non-native applications, or the application player or source device they are executing on to see the non-native notifications. Instead, the user views these non-native notifications at a central location on the target device.
    Type: Application
    Filed: July 13, 2016
    Publication date: November 3, 2016
    Applicant: BlueStack Systems, Inc.
    Inventors: Shashi Kant Sharma, Sharad Agrawal, Suman Saraf, David P. Reese, JR.
  • Patent number: 9467470
    Abstract: A method in one example implementation includes intercepting a network access attempt on a computing device and determining a software program file associated with the network access attempt. The method also includes evaluating a first criterion to determine whether the network access attempt is permitted and blocking the network access attempt if it is not permitted. The first criterion includes a trust status of the software program file. In specific embodiments, the trust status is defined as trusted if the software program file is included in a whitelist of trustworthy program files and untrusted if the software program file is not included in a whitelist. In more specific embodiments, the method includes blocking the network access attempt if the software program file has an untrusted status. In further embodiments, an event is logged if the software program file associated with the network access attempt has an untrusted status.
    Type: Grant
    Filed: December 26, 2014
    Date of Patent: October 11, 2016
    Assignee: McAfee, Inc.
    Inventors: Rishi Bhargava, David P. Reese, Jr.
  • Patent number: 9445392
    Abstract: Embodiments of the present invention are directed to a method of providing non-native notifications and system thereof. These notifications are generated by non-native applications executing on a physically disjoint source device that is communicatively coupled with a target device via an account in a cloud. An application player executing on the source device is able to capture these non-native notifications. The target device is able to receive and present these non-native notifications to a user. Notifications include alerts, reminders, updates and messages generated by non-native applications. The user does not need to access the non-native applications, or the application player or source device they are executing on to see the non-native notifications. Instead, the user views these non-native notifications at a central location on the target device.
    Type: Grant
    Filed: October 4, 2012
    Date of Patent: September 13, 2016
    Assignee: BLUESTACK SYSTEMS, INC.
    Inventors: Shashi Kant Sharma, Sharad Agrawal, Suman Saraf, David P. Reese, Jr.
  • Patent number: 9424154
    Abstract: A system for and method of system state analysis of a computational system. The method is comprised of capturing selective state information of a computational system configured to operated with one or more guest machines running on a virtual machine layer and configured to output state information. The state information is then analyzed to for compliance checking. The system for system state analysis is comprised of a storage system, computation hardware configured to run the guest machines and the virtual machine layer, guest machines, a virtual machine layer configured to output guest machine state information, a system state snapshot server configured to control the virtual machine layer for the capture of state information.
    Type: Grant
    Filed: November 7, 2008
    Date of Patent: August 23, 2016
    Assignee: McAfee, Inc.
    Inventors: Rishi Bhargava, David P. Reese, Jr.
  • Publication number: 20150310091
    Abstract: A method in one embodiment includes determining a frequency range corresponding to a subset of a plurality of program files on a plurality of hosts in a network environment. The method also includes generating a first set of counts including a first count that represents an aggregate amount of program files in a first grouping of one or more program files of the subset, where each of the one or more program files of the first grouping includes a first value of a primary attribute. In specific embodiments, each program file is unknown. In further embodiments, the primary attribute is one of a plurality of file attributes provided in file metadata. Other specific embodiments include either blocking or allowing execution of each of the program files of the first grouping. More specific embodiments include determining a unique identifier corresponding to at least one program file of the first grouping.
    Type: Application
    Filed: July 6, 2015
    Publication date: October 29, 2015
    Applicant: MCAFEE, INC.
    Inventors: Rishi Bhargava, David P. Reese, JR.
  • Publication number: 20150200968
    Abstract: A method in one example implementation includes receiving information related to a network access attempt on a first computing device with the information identifying a software program file associated with the network access attempt. The method also includes evaluating a first criterion to determine whether network traffic associated with the software program file is permitted and then creating a restriction rule to block the network traffic if the network traffic is not permitted. The first criterion includes a trust status of the software program file. In specific embodiments, the method includes pushing the restriction rule to a network protection device that intercepts the network traffic associated with the software program file and applies the restriction rule to the network traffic. In more specific embodiments, the method includes searching a whitelist identifying trustworthy software program files to determine the trust status of the software program file.
    Type: Application
    Filed: January 19, 2015
    Publication date: July 16, 2015
    Inventors: Rishi Bhargava, David P. Reese, JR.
  • Patent number: 9075993
    Abstract: A method in one embodiment includes determining a frequency range corresponding to a subset of a plurality of program files on a plurality of hosts in a network environment. The method also includes generating a first set of counts including a first count that represents an aggregate amount of program files in a first grouping of one or more program files of the subset, where each of the one or more program files of the first grouping includes a first value of a primary attribute. In specific embodiments, each program file is unknown. In further embodiments, the primary attribute is one of a plurality of file attributes provided in file metadata. Other specific embodiments include either blocking or allowing execution of each of the program files of the first grouping. More specific embodiments include determining a unique identifier corresponding to at least one program file of the first grouping.
    Type: Grant
    Filed: January 24, 2011
    Date of Patent: July 7, 2015
    Assignee: McAfee, Inc.
    Inventors: Rishi Bhargava, David P. Reese, Jr.
  • Publication number: 20150180884
    Abstract: A method in one example implementation includes intercepting a network access attempt on a computing device and determining a software program file associated with the network access attempt. The method also includes evaluating a first criterion to determine whether the network access attempt is permitted and blocking the network access attempt if it is not permitted. The first criterion includes a trust status of the software program file. In specific embodiments, the trust status is defined as trusted if the software program file is included in a whitelist of trustworthy program files and untrusted if the software program file is not included in a whitelist. In more specific embodiments, the method includes blocking the network access attempt if the software program file has an untrusted status. In further embodiments, an event is logged if the software program file associated with the network access attempt has an untrusted status.
    Type: Application
    Filed: December 26, 2014
    Publication date: June 25, 2015
    Inventors: Rishi Bhargava, David P. Reese, JR.
  • Patent number: 8938800
    Abstract: A method in one example implementation includes receiving information related to a network access attempt on a first computing device with the information identifying a software program file associated with the network access attempt. The method also includes evaluating a first criterion to determine whether network traffic associated with the software program file is permitted and then creating a restriction rule to block the network traffic if the network traffic is not permitted. The first criterion includes a trust status of the software program file. In specific embodiments, the method includes pushing the restriction rule to a network protection device that intercepts the network traffic associated with the software program file and applies the restriction rule to the network traffic. In more specific embodiments, the method includes searching a whitelist identifying trustworthy software program files to determine the trust status of the software program file.
    Type: Grant
    Filed: July 28, 2010
    Date of Patent: January 20, 2015
    Assignee: McAfee, Inc.
    Inventors: Rishi Bhargava, David P. Reese, Jr.
  • Patent number: 8925101
    Abstract: A method in one example implementation includes intercepting a network access attempt on a computing device and determining a software program file associated with the network access attempt. The method also includes evaluating a first criterion to determine whether the network access attempt is permitted and blocking the network access attempt if it is not permitted. The first criterion includes a trust status of the software program file. In specific embodiments, the trust status is defined as trusted if the software program file is included in a whitelist of trustworthy program files and untrusted if the software program file is not included in a whitelist. In more specific embodiments, the method includes blocking the network access attempt if the software program file has an untrusted status. In further embodiments, an event is logged if the software program file associated with the network access attempt has an untrusted status.
    Type: Grant
    Filed: July 28, 2010
    Date of Patent: December 30, 2014
    Assignee: McAfee, Inc.
    Inventors: Rishi Bhargava, David P. Reese, Jr.
  • Patent number: 8843496
    Abstract: A method in one example implementation includes obtaining a plurality of host file inventories corresponding respectively to a plurality of hosts, calculating input data using the plurality of host file inventories, and then providing the input data to a clustering procedure to group the plurality of hosts into one or more clusters of hosts. The method further includes each cluster of hosts being grouped using predetermined similarity criteria. In more specific embodiments, each of the host file inventories includes a set of one or more file identifiers with each file identifier representing a different executable software file on a corresponding one of the plurality of hosts. In other more specific embodiments, calculating the input data includes transforming the host file inventories into a matrix of keyword vectors in Euclidean space. In further embodiments, calculating the input data includes transforming the host file inventories into a similarity matrix.
    Type: Grant
    Filed: September 3, 2013
    Date of Patent: September 23, 2014
    Assignee: McAfee, Inc.
    Inventors: Rishi Bhargava, David P. Reese, Jr.
  • Publication number: 20140006405
    Abstract: A method in one example implementation includes obtaining a plurality of host file inventories corresponding respectively to a plurality of hosts, calculating input data using the plurality of host file inventories, and then providing the input data to a clustering procedure to group the plurality of hosts into one or more clusters of hosts. The method further includes each cluster of hosts being grouped using predetermined similarity criteria. In more specific embodiments, each of the host file inventories includes a set of one or more file identifiers with each file identifier representing a different executable software file on a corresponding one of the plurality of hosts. In other more specific embodiments, calculating the input data includes transforming the host file inventories into a matrix of keyword vectors in Euclidean space. In further embodiments, calculating the input data includes transforming the host file inventories into a similarity matrix.
    Type: Application
    Filed: September 3, 2013
    Publication date: January 2, 2014
    Inventors: Rishi Bhargava, David P Reese, JR.