Patents by Inventor David Tyree

David Tyree has filed for patents to protect the following inventions. This listing includes patent applications that are pending as well as patents that have already been granted by the United States Patent and Trademark Office (USPTO).

  • Publication number: 20240180664
    Abstract: The present disclosure is directed to an instrument kit tracking system that includes a housing that has a parent tracker affixed thereto as well as at least one medical instrument tray residing in the instrument kit housing that receives at least one medical instrument. A child tracker affixed to each of the at least one medical instrument tray where the child tracker communicates data to the parent tracker to obviate the need for full communications electronics, such as including GPS, within the child tracker to thereby save costs while sacrificing minimal loss of accuracy. The temperature sensor in the parent tracker records a temperature reading and calculate a usage of the at least one medical instrument if the temperature reading is above a predetermined value.
    Type: Application
    Filed: December 1, 2023
    Publication date: June 6, 2024
    Applicant: Q Med Innovations, Inc.
    Inventors: Shelby Kornbluth, Victor Nunes, James Calvin, David Tyree, Ken Doucette
  • Publication number: 20220078199
    Abstract: A system and method automatically links security events associated with a computer network and system calls of plural networked computers interfaced with the computer network. System call information of the system calls of the plural networked computers are communicated to a network location to associate security events with system calls across the networked computers and provide a causal graph that reconstructs a sequence of events with precise attribution and timing to comprehend entities and actions associated with the security event.
    Type: Application
    Filed: September 9, 2021
    Publication date: March 10, 2022
    Applicant: Spyderbat, Inc.
    Inventors: Marc Willebeek-LeMair, Brian Smith, Ian Spencer Nelson, David Tyree, Seth Goldhammer
  • Publication number: 20130254858
    Abstract: A system and method is provided for authenticating logins. An authentication server may receive a request for an authentication code from a requesting site, wherein the request is associated with a login session being performed via the requesting site and a first device associated with a user. The authentication server may generate the authentication code, wherein the authentication code comprises a universally unique identifier and an identifier that identifies the authentication server. The authentication server may communicate the generated authentication code to the requesting site. The authentication server may receive the universally unique identifier from a second device associated with the user, wherein the universally unique identifier is retrieved by decoding an optically captured representation of the authentication code at the second device. The authentication server may determine whether the login session is authenticated based on the universally unique identifier.
    Type: Application
    Filed: March 26, 2012
    Publication date: September 26, 2013
    Inventors: Nathan J. Giardina, David Tyree
  • Publication number: 20060021052
    Abstract: A method of mapping a remediation to a plurality of vulnerabilities may include: assessing susceptibility of an non-remediated machine to a first vulnerability, which results in a first set of two or more vulnerabilities to which the machine is susceptible; implementing the remediation upon the machine; assessing susceptibility of the remediated machine to the first vulnerability, which results in a second set of vulnerabilities to which the machine is susceptible; and creating a machine-actionable map between the remediation and two or more members of the first set based upon differences between the first and second sets.
    Type: Application
    Filed: July 23, 2004
    Publication date: January 26, 2006
    Inventors: Kurt D'Mello, David Tyree, Sudhir Gandhe
  • Publication number: 20060021051
    Abstract: A machine-actionable memory comprises one or more machine-actionable records arranged according to a data structure. Such a data structure may include links that respectively map between: a RID field, the contents of which denote an identification (ID) of a remediation (RID); at least one TID field, the contents of which denotes an ID of at least two technologies (TIDs), respectively; and at least one ACTID field, the contents of which denotes an ID of an action (ACTID). A method, of selecting a remediation that is appropriate to a technology present on a machine to be remediated, may include: providing such a machine-actionable memory; and indexing into the memory using a given RID value and a given TID value to determine values of the at-least-one ACTID corresponding to the given RID value and appropriate to the given TID value.
    Type: Application
    Filed: July 23, 2004
    Publication date: January 26, 2006
    Inventors: Kurt D'Mello, David Tyree, Eric O'Brien, Sudhir Gandhe
  • Publication number: 20060021053
    Abstract: A machine-actionable memory comprises one or more machine-actionable records arranged according to a data structure. Such a data structure may include links that respectively map between a remediation, at least one action, and at least two vulnerabilities. A method of selecting a remediation, that is appropriate to a vulnerability which is present on a machine to be remediated, may include: providing a machine-actionable memory as mentioned above; and indexing into the memory using: a given vulnerability identifier to determine (A) at least one of a remediation mapped thereto and (B) at least one action mapped to the given vulnerability identifier; and/or a given remediation to determine at least two vulnerabilities mapped thereto.
    Type: Application
    Filed: September 20, 2004
    Publication date: January 26, 2006
    Inventors: Kurt D'Mello, David Tyree, Eric O'Brien, Sudhir Gandhe