Patents by Inventor Eric Cole

Eric Cole has filed for patents to protect the following inventions. This listing includes patent applications that are pending as well as patents that have already been granted by the United States Patent and Trademark Office (USPTO).

  • Publication number: 20080070720
    Abstract: A method of forming a golf club head includes providing a body having an end portion (e.g., a heel end or a toe end of the club head) wherein the body end portion includes a lower surface and a boss extending therefrom. The method comprises providing a weight having a top surface and a cavity configured to receive the boss, and inserting the boss on the body into the cavity in the weight by rotating the weight such that the boss interlocks with the cavity and so that at least a portion of the top surface of the weight contacts at least a portion of the lower surface of the body end portion. The weight further includes a protrusion having a concave surface and the body has a corresponding convex surface. The weight is rotated about an axis extending through the body such that the concave surface of the weight bears on the convex surface of the body.
    Type: Application
    Filed: November 19, 2007
    Publication date: March 20, 2008
    Inventor: Eric Cole
  • Publication number: 20070139227
    Abstract: An approach is described for the compression of input data, and particularly one which is suited for providing a lossless method for compressing random input data. Both a compression algorithm is described, as well as a decompression algorithm for restoring the original uncompressed data. The decompression algorithm allows for its parameters to be adjusted to suit one's needs as they relate, for example, to the ratio of compression as a function of the decompression speed.
    Type: Application
    Filed: October 22, 2005
    Publication date: June 21, 2007
    Applicant: SYTEX, INC.
    Inventors: William Speirs, Eric Cole
  • Publication number: 20070116267
    Abstract: Methods are provided for categorizing input data into a selected data type category. Exemplary embodiments are directed to the categorization of binary input data, for example random input data, as either compressed or encrypted based on statistical analysis. To this end, at least a portion of the input data is analyzed to derive a statistical test result for the portion that is indicative of a degree of randomness of the data. The data is then categorized as either compressed or encrypted based on the statistical test result.
    Type: Application
    Filed: November 28, 2005
    Publication date: May 24, 2007
    Applicant: Sytex, Inc.
    Inventors: William Speirs, Eric Cole
  • Publication number: 20070026967
    Abstract: The present invention provides an iron-type golf club head comprising a primary cavity that is approximately parallel to the ground when the club head is resting at normal address. A secondary cavity, positioned within the primary cavity, has a bottom wall that is approximately parallel to the club face and is positioned above the club head sole. An interior wall that forms the secondary cavity is uniform in height while increasing in width in a bottom segment thereof.
    Type: Application
    Filed: August 1, 2005
    Publication date: February 1, 2007
    Applicant: Karsten Manufacturing Corporation
    Inventors: Bradley Schweigert, Michael Nicolette, John Solheim, Eric Cole
  • Publication number: 20060235997
    Abstract: Systems and methods are provided for resolving Internet Protocol (IP) address conflicts using agents in the zero configuration network. Agent's originate at respective nodes on the zero configuration network. Each agent and each node logs a localized shared memory table (SMT) providing identifying information pertaining to other nodes on the network. When a sending node transmits an SMT to one or more target nodes on the network, it is analyzed by the target node to ascertain whether a localized IP address conflict exists involving the target node and a remote node. If it is deemed appropriate to resolve the conflict, the target node resolves the conflict by selecting a new IP address for itself.
    Type: Application
    Filed: April 18, 2005
    Publication date: October 19, 2006
    Applicant: SYTEX, INC.
    Inventors: Vignesh Munirajan, Sandra Ring, Eric Cole
  • Publication number: 20060217214
    Abstract: A golf club head, preferably a putter head, has a body fitted with inserts having a density greater than that of the club head body. Two cavities are formed in the body and are accessible only through a front face of the body. One cavity is adjacent a heel region of the body, and the other cavity is adjacent a toe region of the body. In a preferred embodiment, the inserts and the cavities are provided with a suitable draft angle. The inserts are bonded within the cavities and are subsequently finished using a milling process or the like so that a front surface of each insert is substantially flush with the front face of the body.
    Type: Application
    Filed: March 22, 2005
    Publication date: September 28, 2006
    Applicant: Karsten Manufacturing Corporation
    Inventor: Eric Cole
  • Publication number: 20060199662
    Abstract: A method of forming a golf club head includes providing a body having an end portion (e.g., a heel end or a toe end of the club head) wherein the body end portion includes a lower surface and a boss extending therefrom. The method comprises providing a weight having a top surface and a cavity configured to receive the boss, and inserting the boss on the body into the cavity in the weight by rotating the weight such that the boss interlocks with the cavity and so that at least a portion of the top surface of the weight contacts at least a portion of the lower surface of the body end portion. The weight further includes a protrusion having a concave surface and the body has a corresponding convex surface.
    Type: Application
    Filed: March 1, 2005
    Publication date: September 7, 2006
    Applicant: Karsten Manufacturing Corporation
    Inventor: Eric Cole
  • Publication number: 20060195610
    Abstract: The present invention relates to methods and a system for enhancing DHCP to promote a more secure IP address allocation model. The invention advantageously accomplishes this through the utilization of an address generator which is compatible with the existing DHCP protocol, and which incorporates an algorithm for use in producing a selected IP address as one of a sub-set of allocable addresses that are non-sequentially distributed within an address pool. As such, the invention offers robust security and allows for the rapid detection of unauthorized activity such as network intrusion, worms, virus propagation, network scanners, and SPAM.
    Type: Application
    Filed: February 28, 2005
    Publication date: August 31, 2006
    Applicant: SYTEX, INC.
    Inventors: Eric Cole, Huy Vu
  • Publication number: 20060182124
    Abstract: Methods are provided relating to the exchange of a cipher key between devices on a network segment to enable encrypted transmissions between the devices. In preferred embodiments the cipher key is a random key which is commonly used by the devices for synchronous encryption/decryption of data.
    Type: Application
    Filed: February 15, 2005
    Publication date: August 17, 2006
    Applicant: SYTEX, INC.
    Inventors: Eric Cole, James Conley
  • Publication number: 20060176884
    Abstract: The present invention relates to the manipulation or monitoring of one communications device from another via a network. More particularly, the invention relates to remote control or administration of a target computer from a launch computer via predetermined relay routes therebetween. To this end, systems, devices and methodologies are provided.
    Type: Application
    Filed: February 4, 2005
    Publication date: August 10, 2006
    Applicant: SYTEX, INC.
    Inventors: Donald Fair, Eric Cole, Evan Teran
  • Publication number: 20060179433
    Abstract: Methods and systems are provided for remotely administering a target network communications device (NCD) from a launch NCD. System level access to the target NCD is obtained and sets of launch and target tools are respectively installed on the launch and target NCDs. A trigger command corresponding to a data request is transmitted from the launch NCD to the target NCD. Reply data responsive to the request is retrieved at the target NCD and transmitted to the launch NCD. Provided also is a system wherein the first NCD includes a front end trigger component for generating selected trigger commands, and the second NCD includes a response component for the replies. A data transmission component is interfaced between the first and second NCDs.
    Type: Application
    Filed: June 28, 2005
    Publication date: August 10, 2006
    Applicant: SYTEX, INC.
    Inventors: Donald Fair, Eric Cole, Evan Teran
  • Publication number: 20060176887
    Abstract: Provided are systems, devices and methods pertaining to the relaying of communications between a launch computer and a target computer in a manner which obscures at least the launch computer as a participant in the communications. Outbound traffic from the launch follows an outbound relay route which includes at least one intermediary relay computer, while reply traffic from the target computer follows a return relay route also including at least one intermediary relay computer. The outbound and return routes may be either the same or different, and one or more of the intermediary computer(s) may be kept unwitting of their role in the communications.
    Type: Application
    Filed: June 24, 2005
    Publication date: August 10, 2006
    Applicant: SYTEX, INC.
    Inventors: Donald Fair, Eric Cole, Evan Teran
  • Publication number: 20060069671
    Abstract: A computerized method, a computer-readable medium and a computerized test system are provided for analyzing target web-based applications, for example, to identify design characteristics of the application which render it susceptible to exploit. Hypertext links within the application are navigated to obtain a listing of associated web pages. Each web page may then be parsed to extract associated traffic data which matches any search items pertaining to sensitive data categories of interest. The extracted traffic data is stored within a storage location to identify a compilation of potentially exploitable design characteristics.
    Type: Application
    Filed: September 29, 2004
    Publication date: March 30, 2006
    Inventors: James Conley, Eric Cole
  • Publication number: 20060041935
    Abstract: Provided is a method for configuring filter parameters for a network firewall whereby information corresponding to a core set of data parameters is extracted from each of a plurality of data packets traversing a network segment. The extracted information is stored as a respective log entry within a database. A set of proposed filter parameters is established from the log entries and a final set of filter parameters is generated from the proposed filter parameters.
    Type: Application
    Filed: August 17, 2004
    Publication date: February 23, 2006
    Inventors: James Conley, Eric Cole
  • Publication number: 20060031928
    Abstract: Devices and methods are provided to ascertain an existence of tunneling activity through a network firewall. According to one methodology, a set of norms is established for network traffic and a series of data packets transmitted through the firewall are monitored. Data packet attributes are analyzed to determine an absence or an existence of tunneling activity based on whether the attributes conform to the norms. A device is also provided in the form of a detector which is situated behind a network firewall and incorporates a data capture component for passively monitoring network traffic through the firewall and for producing detection data, and a data analysis component for comparing the detection data to a set of network traffic norms that are characteristic of an absence of tunneling activity. Tunneling activity potentially exists if the detection data fails to conform to any one of the set of norms.
    Type: Application
    Filed: August 9, 2004
    Publication date: February 9, 2006
    Inventors: James Conley, Eric Cole
  • Publication number: 20050240993
    Abstract: A packet filtering system for use with a host computer implementing a streams sub-system comprises a configuration component for maintaining a collection of configuration parameters based on user input, and a streams interface component for managing bi-directional transmission of packets according to the collection of configuration parameters. The configuration parameters may include sets of authorized port, protocol and address designations. The streams interface component preferably includes corresponding modules for port filtering, protocol filtering and address filtering whereby inbound and outbound packets which are not blocked by any of filtering modules are, respectively, passed upstream and downstream between an associated network device and the stream head. A computerized method for managing bi-directional transmission of packets, as well as a computer-readable medium having executable instructions for managing packet transmission, are also provided.
    Type: Application
    Filed: April 22, 2004
    Publication date: October 27, 2005
    Inventors: William Treadwell, Eric Cole
  • Publication number: 20050229250
    Abstract: Various embodiments are provided relating to security of a computer, namely, a security software product, a computer-readable medium, a computerized method, and a computer security system. Illustrative is one embodiment of a security software product for use on a host computer to monitor for, and respond to, activity corresponding to a rootkit exploitation which renders the host computer's operating system insecure. The security software product comprises computer readable media having a suite of interfaced software components, such as loadable kernel modules. An exploitation detection component detects the activity corresponding to the rootkit exploitation. A forensics data collection component collects forensics data characteristic of the rootkit exploitation so that it may be transferred to a removable storage device. An OS restoration component restores the operating system to a secure condition in response to detection of the exploit.
    Type: Application
    Filed: February 26, 2004
    Publication date: October 13, 2005
    Inventors: Sandra Ring, Eric Cole
  • Publication number: 20050204205
    Abstract: A system, computerized method and computer-readable medium are provided for the detection of an operating system exploitation, such as a rootkit install. The operating system is monitored to ascertain an occurrence of anomalous activity resulting from operating system behavior which deviates from any one of a set of pre-determined operating system parameters. Each parameter corresponds to a dynamic characteristic associated with an unexploited operating system. Output can then be generated to indicate any anomalous activity that is ascertained. The computer-readable medium may comprise a loadable kernel module for detecting hidden patches, processes, files or other kernel modules.
    Type: Application
    Filed: February 27, 2004
    Publication date: September 15, 2005
    Inventors: Sandra Ring, Eric Cole
  • Publication number: 20050193428
    Abstract: Methods, systems and computer-readable media are provided for recovery from an operating system (OS) exploit so that the OS can be returned to a pre-exploit condition. Recovery involves restoration of each system call table modification which has been identified, the termination of each hidden process which has been identified, and the removal from the OS of each hidden file which has been identified.
    Type: Application
    Filed: June 17, 2004
    Publication date: September 1, 2005
    Inventors: Sandra Ring, Eric Cole
  • Publication number: 20050193173
    Abstract: A computerized method for collecting suspected data of interest from a computer comprises searching the computer's shot-term memory to locate at least one target memory range containing the suspected data of interest, and copying the suspected data of interest within the target memory range to an alternate data storage location in a manner which avoids writing the suspected data to the computer's long-term memory. Alternatively, the suspected data of interest can be copied to a previously unused data storage location while preserving integrity of non-volatile memory resources. A computer-readable medium and a system for collecting target forensics data are also provided.
    Type: Application
    Filed: March 18, 2004
    Publication date: September 1, 2005
    Inventors: Sandra Ring, Eric Cole