Patents by Inventor Eric J. Martin
Eric J. Martin has filed for patents to protect the following inventions. This listing includes patent applications that are pending as well as patents that have already been granted by the United States Patent and Trademark Office (USPTO).
-
Publication number: 20240065884Abstract: Disclosed herein are systems and methods for providing targeted temperature management (TTM) therapy to a patient. The TTM system can include multiple embodiments of a thermal pad including embodiments that are convertible from a first patient contact area to a second patient contact area. Embodiments of thermal pads can include pads that are expandable, extendable, and/or comprise attachable or removable portions. The TTM system can include embodiments where a second thermal pad is coupled to a first thermal pad.Type: ApplicationFiled: January 11, 2022Publication date: February 29, 2024Inventors: Eric A. Fallows, Nicholas J. Jardine, Qihua Xu, Adam T. Martin, Sean E. Walker
-
Patent number: 10129278Abstract: Disclosed are various systems, methods, and other embodiments directed to detection of malware in content items. To detect the malware, for example, one or more content items are identified in association with the rendering of a network page in a simulated environment. A plurality of tests are applied to the one or more content items to detect an existence of malware associated with the content items.Type: GrantFiled: May 16, 2016Date of Patent: November 13, 2018Assignee: Amazon Technologies, Inc.Inventors: Jon A. McClintock, Eric J. Martin, Karl A. McCabe, Thibault Candebat, Adam J. Cecchetti, David Erdmann
-
Publication number: 20160261623Abstract: Disclosed are various systems, methods, and other embodiments directed to detection of malware in content items. To detect the malware, for example, one or more content items are identified in association with the rendering of a network page in a simulated environment. A plurality of tests are applied to the one or more content items to detect an existence of malware associated with the content items.Type: ApplicationFiled: May 16, 2016Publication date: September 8, 2016Inventors: Jon A. McClintock, Eric J. Martin, Karl A. McCabe, Thibault Candebat, Adam J. Cecchetti, David Erdmann
-
Patent number: 9348977Abstract: Disclosed are various systems, methods, and other embodiments directed to detection of malware in content items. To detect the malware, for example, one or more content items are identified in association with the rendering of a network page in a simulated environment. A plurality of tests are applied to the one or more content items to detect an existence of malware associated with the content items.Type: GrantFiled: May 26, 2009Date of Patent: May 24, 2016Assignee: Amazon Technologies, Inc.Inventors: Jon A. McClintock, Eric J. Martin, Karl A. McCabe, Thibault Candebat, Adam J. Cecchetti, David Erdmann
-
Patent number: 9003540Abstract: Cross Site Request Forgery (CSRF) and other types of fraudulent submission can be mitigated using state information that typically is already maintained for various users. Each submission requiring authentication can include a state identifier (ID). The state ID can be compared to a corresponding secure state ID stored in a secure location, such as in a secure token or cookie or in a variable on a page that can only be accessed by code executing in the same security context as the site to which the request is made. If the received state ID is valid and matches the secure state ID, the submission is processed. Otherwise, an interstitial element is generated to prompt the user to confirm the prior submission. A subsequent confirmation submission confirming the prior submission and containing the proper state ID can be processed. If no such confirmation is received, the submission is not processed.Type: GrantFiled: October 7, 2009Date of Patent: April 7, 2015Assignee: Amazon Technologies, Inc.Inventors: Jesper M. Johansson, Eric J. Martin, Brandon M. Knight
-
Patent number: 8850024Abstract: A method includes sending a request for network services to plural devices, where the request identifies the network services using a self-describing data structure, and receiving a response to the request from at least one device, where the response identifies which of the network services are supported by the at least one device.Type: GrantFiled: April 2, 2012Date of Patent: September 30, 2014Assignee: Communications Acquisitions, LLCInventors: Julian Wray West, Eric J. Martin, Rajesh K. Mishra
-
Patent number: 8848922Abstract: Secure information is managed for each host or machine in an electronic environment using a series of key identifiers that each represent one or more secure keys, passwords, or other secure information. Applications and services needing access to the secure information can specify the key identifier, for example, and the secure information currently associated with that identifier can be determined without any change to the code or manual input or exposure of the secure information on the respective device. Functionality such as encryption key management and rotation are inaccessible and transparent to the user. In a networked or distributed environment, the key identifiers can be associated with host classes such that at startup any host in a class can obtain the necessary secure information. Updates and key rotation can be performed in a similar fashion by pushing updates to host classes transparent to a user, application, or service.Type: GrantFiled: November 26, 2012Date of Patent: September 30, 2014Assignee: Amazon Technologies, Inc.Inventors: Cyrus J. Durgin, Pratik S. Dave, Eric J. Martin
-
Patent number: 8693465Abstract: A method performed by a device adapted for communication over a network includes establishing a presence on the network, obtaining default configuration information for the device via the network, the default configuration information identifying a service on the network, receiving a request for validation information from the service, providing the validation information to the service, the service generating device-specific information in response to the validation information, and obtaining the device-specific information.Type: GrantFiled: February 16, 2012Date of Patent: April 8, 2014Assignee: Communications Acquisitions, LLCInventors: Julian Wray West, Eric J. Martin, Rajesh K. Mishra
-
Patent number: 8689345Abstract: Cross Site Request Forgery (CSRF) and other types of fraudulent submission in an electronic environment can be mitigated using state information that typically is already maintained for various users. Each submission requiring authentication includes a state identifier (ID). The state ID is compared to corresponding a state ID submitted in a relatively secure format, such as in a secure token or cookie. If the state ID matches a state ID in the secure token received from the user, and the state ID is valid, the submission is processed. Otherwise an interstitial page, including the state ID and a secure token, is generated to prompt the user to confirm the submission. A subsequent confirmation submission will contain the proper state ID and the new cookie, and can be processed. If no confirmation is received from the user with a valid state ID, the submission is not processed.Type: GrantFiled: October 20, 2011Date of Patent: April 1, 2014Assignee: Amazon Technologies, Inc.Inventors: Eric J. Martin, Jesper M. Johansson
-
Patent number: 8621613Abstract: Disclosed are various systems, methods, and other embodiments directed to detection of malware in content items. To detect the malware, for example, an environment is simulated in a computing device configured to render a network page having a container for content placement. The existence of malware in a content item is detected in the computing device by implementing a rendering of the network page in the environment with the content item inserted in the container to detect an unauthorized action by the content item.Type: GrantFiled: May 26, 2009Date of Patent: December 31, 2013Assignee: Amazon Technologies, Inc.Inventors: Jon A. McClintock, Eric J. Martin, Karl A. McCabe, Thibault Candebat, Adam J. Cecchetti, David Erdmann
-
Publication number: 20130324530Abstract: The present invention provides a compound of formula (I): and pharmaceutically acceptable salts, enantiomers, stereoisomers, rotamers, tautomers, diastereomers, or racemates thereof. Also provided are pharmaceutical compositions containing these compounds and methods of treating a disease or condition mediated by CDK9 using these compounds and compositions.Type: ApplicationFiled: November 17, 2011Publication date: December 5, 2013Inventors: William R. Antonios-McCrea, Paul A. Barsanti, Cheng Hu, Xianming Jin, Eric J. Martin, Yue Pan, Keith B. Pfister, Martin Sendzik, James Sutton, Lifeng Wan
-
Patent number: 8539231Abstract: Secure information is managed for each host or machine in an electronic environment using a series of key identifiers that each represent one or more secure keys, passwords, or other secure information. Applications and services needing access to the secure information can specify the key identifier, for example, and the secure information currently associated with that identifier can be determined without any change to the code or manual input or exposure of the secure information on the respective device. Functionality such as encryption key management and rotation are inaccessible and transparent to the user. In a networked or distributed environment, the key identifiers can be associated with host classes such that at startup any host in a class can obtain the necessary secure information. Updates and key rotation can be performed in a similar fashion by pushing updates to host classes transparent to a user, application, or service.Type: GrantFiled: August 14, 2012Date of Patent: September 17, 2013Assignee: Amazon Technologies, Inc.Inventors: Cyrus J. Durgin, Pratik S. Dave, Eric J. Martin
-
Patent number: 8321925Abstract: Secure information is managed for each host or machine in an electronic environment using a series of key identifiers that each represent one or more secure keys, passwords, or other secure information. Applications and services needing access to the secure information can specify the key identifier, for example, and the secure information currently associated with that identifier can be determined without any change to the code or manual input or exposure of the secure information on the respective device. Functionality such as encryption key management and rotation are inaccessible and transparent to the user. In a networked or distributed environment, the key identifiers can be associated with host classes such that at startup any host in a class can obtain the necessary secure information. Updates and key rotation can be performed in a similar fashion by pushing updates to host classes transparent to a user, application, or service.Type: GrantFiled: February 17, 2009Date of Patent: November 27, 2012Assignee: Amazon Technologies, Inc.Inventors: Cyrus J. Durgin, Pratik S. Dave, Eric J. Martin
-
Publication number: 20120207291Abstract: A method performed by a device adapted for communication over a network includes establishing a presence on the network, obtaining default configuration information for the device via the network, the default configuration information identifying a service on the network, receiving a request for validation information from the service, providing the validation information to the service, the service generating device-specific information in response to the validation information, and obtaining the device-specific information.Type: ApplicationFiled: February 16, 2012Publication date: August 16, 2012Inventors: Julian Wray West, Eric J. Martin, Rajesh K. Mishra
-
Patent number: 8245037Abstract: Secure information is managed for each host or machine in an electronic environment using a series of key identifiers that each represent one or more secure keys, passwords, or other secure information. Applications and services needing access to the secure information can specify the key identifier, for example, and the secure information currently associated with that identifier can be determined without any change to the code or manual input or exposure of the secure information on the respective device. Functionality such as encryption key management and rotation are inaccessible and transparent to the user. In a networked or distributed environment, the key identifiers can be associated with host classes such that at startup any host in a class can obtain the necessary secure information. Updates and key rotation can be performed in a similar fashion by pushing updates to host classes transparent to a user, application, or service.Type: GrantFiled: February 17, 2009Date of Patent: August 14, 2012Assignee: Amazon Technologies, Inc.Inventors: Cyrus J. Durgin, Pratik S. Dave, Eric J. Martin
-
Publication number: 20120191813Abstract: A method includes sending a request for network services to plural devices, where the request identifies the network services using a self-describing data structure, and receiving a response to the request from at least one device, where the response identifies which of the network services are supported by the at least one device.Type: ApplicationFiled: April 2, 2012Publication date: July 26, 2012Inventors: Julian Wray West, Eric J. Martin, Rajesh K. Mishra
-
Patent number: 8156564Abstract: A method includes sending a request for network services to plural devices, where the request identifies the network services using a self-describing data structure, and receiving a response to the request from at least one device, where the response identifies which of the network services are supported by the at least one device.Type: GrantFiled: October 13, 2006Date of Patent: April 10, 2012Assignee: Whaleback Systems CorporationInventors: Julian Wray West, Eric J. Martin, Rajesh K. Mishra
-
Patent number: 8130769Abstract: A method performed by a device adapted for communication over a network includes establishing a presence on the network, obtaining default configuration information for the device via the network, the default configuration information identifying a service on the network, receiving a request for validation information from the service, providing the validation information to the service, the service generating device-specific information in response to the validation information, and obtaining the device-specific information.Type: GrantFiled: October 13, 2006Date of Patent: March 6, 2012Assignee: Whaleback Systems CorporationInventors: Julian Wray West, Eric J. Martin, Rajesh K. Mishra
-
Patent number: 8051465Abstract: Cross Site Request Forgery (CSRF) and other types of fraudulent submission in an electronic environment can be mitigated using state information that typically is already maintained for various users. Each submission requiring authentication includes a state identifier (ID). The state ID is compared to corresponding a state ID submitted in a relatively secure format, such as in a secure token or cookie. If the state ID matches a state ID in the secure token received from the user, and the state ID is valid, the submission is processed. Otherwise an interstitial page, including the state ID and a secure token, is generated to prompt the user to confirm the submission. A subsequent confirmation submission will contain the proper state ID and the new cookie, and can be processed. If no confirmation is received from the user with a valid state ID, the submission is not processed.Type: GrantFiled: September 26, 2008Date of Patent: November 1, 2011Assignee: Amazon Technologies, Inc.Inventors: Eric J. Martin, Jesper M. Johansson
-
Patent number: 6121240Abstract: Compounds of the invention inhibit urokinase plasminogen activator or uPAR: ##STR1## where R.sub.10 is --CH(R.sub.9)XCH(R.sub.1)(R.sub.11) or a capping group, where X is NR.sub.12, CR.sub.12 R.sub.15, O, S, SR.sub.12, or SR.sub.12 R.sub.15 ; R.sub.1, R.sub.9, R.sub.11, R.sub.12 R.sub.15 are each H, lower alkyl, lower alkenyl, lower alkynyl, aryl, aralkyl, aryl-alkenyl, aryl-alkynyl, aryl-cycloalkyl, substituted with 0-3 halo, OH, NH.sub.2, lower alkyl, halo-lower alkyl, lower alkoxy, lower alkylamino, lower alkylthio, CN or NO.sub.2 ; R.sub.16 is --CH(R.sub.5)C(.dbd.O)NH.sub.2, H, lower alkyl, cycloalkyl, or lower alkenyl; R.sub.2 is aryl or aralkyl, unsubstituted or substituted with 1-3 halo, OH, NH.sub.2, CN, NO.sub.2, lower alkyl, halo-lower alkyl, lower alkoxy, lower alkylamino, lower alkylthio, or cycloalkyl; R.sub.3 and R.sub.5 are each independently H or lower alkyl; R.sub.4 is --CH.sub.2 C(.dbd.O)NR.sub.13 R.sub.14, where R.sub.13 is H, lower alkyl, phenyl or benzyl, and R.sub.Type: GrantFiled: December 20, 1996Date of Patent: September 19, 2000Assignee: Chiron CorporationInventors: Steven Rosenberg, Kerry L. Spear, Eric J. Martin