Patents by Inventor HUGH CARR
HUGH CARR has filed for patents to protect the following inventions. This listing includes patent applications that are pending as well as patents that have already been granted by the United States Patent and Trademark Office (USPTO).
-
Publication number: 20240125235Abstract: An aggregate slinger for an underground void stabilization system, the aggregate slinger comprising a vertically extending shaft and a number of dispersing members. The vertically extending shaft is inserted through a ground hole into an underground void and rotated about a vertical axis in the ground hole. The dispersing members are configured to extend radially from a lower end of the vertically extending shaft in the underground void so that the dispersing members radially spread aggregate descending into the underground void from the ground hole to form a radially enlarged support column of aggregate in the underground void.Type: ApplicationFiled: October 13, 2022Publication date: April 18, 2024Inventors: Patrick Hugh Carr, Clay Robert Rathbun
-
Patent number: 10845362Abstract: The application provides competition assays used to detect free-light chains or intact immunoglobulins comprising incubating the sample with anti-FLC antibody, or heavy chain class-light chain type-specific antibodies, or fragments of such antibodies, and a known amount of FLC or intact immunoglobulin and detecting the binding of the antibody to the known amount of FLC or immunoglobulin. Assay kits and methods of producing particles coated with FLC are also provided.Type: GrantFiled: July 19, 2011Date of Patent: November 24, 2020Assignee: THE BINDING SITE GROUP LIMITEDInventors: Graham Peter Mead, Hugh Carr Smith, Arthur Randall Bradwell
-
Patent number: 10721312Abstract: Orchestration and/or management of services on deployed computing, electronic, appliance and like devices are described. A service orchestration and/or management system (“SOMS”) may be configured to provide for orchestration and/or management of services to one or more deployed devices. The SOMS may obtain information from deployed devices, such as status, capabilities and service metadata. The SOMS may then encapsulate and store the obtained information for later use. The SOMS may also store service information, facilitate creation of services based on stored service definition meta-data, modeling or simulating a service prior to deployment, and deployment of a service to remotely deployed devices followed by activation to begin operation of the service. Other embodiments may be described and claimed.Type: GrantFiled: February 12, 2015Date of Patent: July 21, 2020Assignee: Intel CorporationInventors: Mark Kelly, Charlie Sheridan, Jessica C. McCarthy, Keith A. Ellis, Michael Nolan, Cliodhna Ni Scanaill, Peter J. Barry, Niall Cahill, Keith Nolan, Hugh Carr, Gabriel Mullarkey, Brian McCarson
-
Patent number: 10411958Abstract: Various systems and methods for automatic device configuration are described herein. A system for automatic device configuration comprises a performance monitor module to monitor, at a computing device, performance of the computing device during a period while the computing device communicates on a network using a current network interface of the computing device, a policy enforcement module to compare the performance of the computing device during the period with a performance policy installed on the computing device, and determine that the performance violates a threshold, the threshold provided in the performance policy. The system also includes a network configuration module to reconfigure a network configuration in response to the determining that the performance violates the threshold by disabling the current network interface and enabling a replacement network interface from a plurality of network interfaces available on the computing device.Type: GrantFiled: September 8, 2014Date of Patent: September 10, 2019Assignee: Intel CorporationInventors: Keith Nolan, Mark Kelly, Hugh Carr
-
Patent number: 10390232Abstract: This disclosure describes systems, and methods related to bridging communication networks. A computing device may identify one or more signals at one or more communication interfaces in accordance with one or more communication standards. The computing device may select one or more available frequency segments from a frequency spectrum database. The computing device may transform the one or more signals into one or more converted signals for transmission on a backhaul link, the backhaul link being established for two-way data communication using the one or more available frequency segments. The computing device may cause to send the one or more converted signals using the one or more available frequency segments.Type: GrantFiled: March 27, 2015Date of Patent: August 20, 2019Assignee: Intel CorporationInventors: Keith Nolan, Mark Kelly, Hugh Carr
-
Patent number: 10033751Abstract: The invention provides a security system and method for use in a communications network, said network comprising means to allow a plurality of devices to communicate over the network; a security agent configured on at least one device and adapted to communicate with the security system; said system comprising: means for performing dynamic intelligent traffic steering from the device based on analysis of data traffic on the network or on the device, wherein the steering decision can be made to select a channel on a per flow basis.Type: GrantFiled: February 21, 2014Date of Patent: July 24, 2018Assignee: Adaptive Mobile Security LimitedInventors: Darrel Donnelly, Brendan Dillon, Jim Donnelly, Hugh Carr
-
Patent number: 9813433Abstract: The invention provides a security system and method for use in a communications network, said network comprising means to allow a plurality of devices to communicate over the network wherein at least one device is a machine to machine (M2M) operated device and at least one other device is a human operated device, said security system comprising: means to capture data traffic originating from the plurality of devices on the network; means for analysing the data traffic; and means for identifying at least one of the M2M operated devices on the network wherein the system is configured to dynamically adapt to different data traffic patterns on the network.Type: GrantFiled: February 21, 2014Date of Patent: November 7, 2017Assignee: Adaptive Mobile Security LimitedInventors: Cathal McDaid, Hugh Carr, Mark Buckley
-
Publication number: 20170286861Abstract: Disclosed is a computing device. The computing device can include a processor and a memory. The memory can store instructions that, when executed by the processor, can cause the processor to perform operations. The operations can comprise determining a computational burden for a component of an application, developing a cost model, and generating resource provisioning set points. The component of the application can execute at a specified performance level. The cost model can specify a cost to execute the component of the application over a range of performance levels. The range of performance levels can include the specified performance level. Each of the resource provisioning set points can indicate a quantity of compute nodes assigned for each phase of the component of the application. The quantity of compute nodes can be based on the specified performance level and the cost to execute the component of the application.Type: ApplicationFiled: April 1, 2016Publication date: October 5, 2017Inventors: Damian Kelly, David Boundy, Hugh Carr
-
Publication number: 20170238189Abstract: This disclosure describes systems, and methods related to bridging communication networks. A computing device may identify one or more signals at one or more communication interfaces in accordance with one or more communication standards. The computing device may select one or more available frequency segments from a frequency spectrum database. The computing device may transform the one or more signals into one or more converted signals for transmission on a backhaul link, the backhaul link being established for two-way data communication using the one or more available frequency segments. The computing device may cause to send the one or more converted signals using the one or more available frequency segments.Type: ApplicationFiled: March 27, 2015Publication date: August 17, 2017Inventors: Keith Nolan, Mark Kelly, Hugh Carr
-
Publication number: 20170006116Abstract: Orchestration and/or management of services on deployed computing, electronic, appliance and like devices are described. A service orchestration and/or management system (“SOMS”) may be configured to provide for orchestration and/or management of services to one or more deployed devices. The SOMS may obtain information from deployed devices, such as status, capabilities and service metadata. The SOMS may then encapsulate and store the obtained information for later use. The SOMS may also store service information, facilitate creation of services based on stored service definition meta-data, modeling or simulating a service prior to deployment, and deployment of a service to remotely deployed devices followed by activation to begin operation of the service. Other embodiments may be described and claimed.Type: ApplicationFiled: February 12, 2015Publication date: January 5, 2017Applicant: Intel CorporationInventors: Mark KELLY, Charlie SHERIDAN, Jessica C. MCCARTHY, Keith A. ELLIS, Michael NOLAN, Cliodhna NI SCANAILL, Peter J. BARRY, Niall CAHILL, Keith NOLAN, Hugh CARR, Gabriel MULLARKEY, Brian MCCARSON
-
Publication number: 20160072674Abstract: Various systems and methods for automatic device configuration are described herein. A system for automatic device configuration comprises a performance monitor module to monitor, at a computing device, performance of the computing device during a period while the computing device communicates on a network using a current network interface of the computing device, a policy enforcement module to compare the performance of the computing device during the period with a performance policy installed on the computing device, and determine that the performance violates a threshold, the threshold provided in the performance policy. The system also includes a network configuration module to reconfigure a network configuration in response to the determining that the performance violates the threshold by disabling the current network interface and enabling a replacement network interface from a plurality of network interfaces available on the computing device.Type: ApplicationFiled: September 8, 2014Publication date: March 10, 2016Inventors: Keith Nolan, Mark Kelly, Hugh Carr
-
Publication number: 20160014149Abstract: The invention provides a network security method and system for use in a communications network, said network comprising a plurality of devices adapted to communicate over the network, at least one device capable of downloading or uploading an application over the network, said system comprises means for data capture on the network by receiving data from a first data source and a second data source; means for analysing comprising means for correlating data arising from network behaviour of at least one device obtained from the first data source and data from a second data source and means for generating a data structure; and based on said analyses of the generated data structure, means for identifying applications on devices which are behaving suspiciously.Type: ApplicationFiled: February 21, 2014Publication date: January 14, 2016Inventors: Ciaran Bradley, Hugh Carr, Brendan Dillon, Gareth MacLachlan, Mark Buckley
-
Publication number: 20160006755Abstract: The invention provides a security system and method for use in a communications network, said network comprising means to allow a plurality of devices to communicate over the network; a security agent configured on at least one device and adapted to communicate with the security system; said system comprising: means for performing dynamic intelligent traffic steering from the device based on analysis of data traffic on the network or on the device, wherein the steering decision can be made to select a channel on a per flow basis.Type: ApplicationFiled: February 21, 2014Publication date: January 7, 2016Applicant: Adaptive Mobile Security LimitedInventors: Darrell Donnelly, Brendan Dillon, Jim Donnelly, Hugh Carr
-
Publication number: 20160006753Abstract: The invention provides a security system and method for use in a communications network, said network comprising means to allow a plurality of devices to communicate over the network wherein at least one device is a machine to machine (M2M) operated device and at least one other device is a human operated device, said security system comprising: means to capture data traffic originating from the plurality of devices on the network; means for analysing the data traffic; and means for identifying at least one of the M2M operated devices on the network wherein the system is configured to dynamically adapt to different data traffic patterns on the network.Type: ApplicationFiled: February 21, 2014Publication date: January 7, 2016Inventors: Cathal McDaid, Hugh Carr, Mark Buckley
-
Publication number: 20150051839Abstract: The invention provides a method for characterising a plasma cell associated disease in a patient comprising: (i) providing at least one sample from the patient; (ii) determining in the sample(s) two or more of; (a) the ?:? free light chain (FLC) ratio; (b) the ratio of ? light chains bound to a class of heavy chain:? light chain bound to the same class of heavy chain (HLC?:HLC ? ratio); (c) the total amount of FLC in the samples and (d) the total amount of ? light chains bound to the heavy chain class plus ? light chains bound to the same heavy chain class (total HLC); (iii) comparing each ratio or amount from (a) (b), (c) and/or (d) to predetermined values and assigning a score to each amount or ratio; and (iv) using the scores to characterise the plasma cell associated disease. Apparatus configured to carry out the method of the invention are also provided.Type: ApplicationFiled: March 6, 2013Publication date: February 19, 2015Applicant: THE BINDING SITE GROUP LIMITEDInventors: Stephen Harding, Richard Hughes, Hugh Carr-Smith
-
Publication number: 20130217149Abstract: The application provides competition assays used to detect free-light chains or intact immunoglobulins comprising incubating the sample with anti-FLC antibody, or heavy chain class-light chain type-specific antibodies, or fragments of such antibodies, and a known amount of FLC or intact immunoglobulin and detecting the binding of the antibody to the known amount of FLC or immunoglobulin. Assay kits and methods of producing particles coated with FLC are also provided.Type: ApplicationFiled: July 19, 2011Publication date: August 22, 2013Applicant: THE BINDING SITE GROUP LIMITEDInventors: Graham Peter Mead, Hugh Carr Smith, Arthur Randall Bradwell
-
Publication number: 20130166667Abstract: The invention provides a system and method for filtering unsolicited network messaging in a network comprising at least one remote messaging device, at least one data routing device and at least one remote destination device. The invention provides a means for determining a probability of the network message being unsolicited; and means for translating a first network address into a second network address associated with unsolicited network messaging when the probability determining means indicates a high probability of unsolicited network messaging. In a further embodiment there is provided a means for translating the first network address into the at least one second network address associated with legitimate network messaging, when the probability determining means indicates a low probability of unsolicited network messaging.Type: ApplicationFiled: September 2, 2011Publication date: June 27, 2013Applicant: ADAPTIVE MOBILE SECURITY LIMITEDInventors: Hugh Carr, Brendan Dillon, Owen Edwards, Gareth MacLachlan, Cathal McDaid
-
Patent number: 8452866Abstract: The invention provides real time dynamic resource management to improve end-to-end QoS by mobile devices regularly updating a resource availability server (RAS) with resource update information. Examples of resource update information are device battery status, available memory, session bandwidth, delay, packet loss, and jitter, network element storage capacity, network element processing power. This information is made available by the RAS. In addition, the RAS generates and maintains predictive models and makes available predictive data from these models. Network elements and devices retrieve this information in the form of notifications from the RAS or by way of querying the RAS. The network elements and devices, based on these predictions, act to negotiate sessions to optimise QoS. In one embodiment the RAS is updated by only mobile devices subscribed to the operator which hosts the RAS. The update information is addressed to the RAS as a stand-alone entity.Type: GrantFiled: July 17, 2008Date of Patent: May 28, 2013Assignee: Markport LimitedInventors: Michel De Boer, Hugh Carr, Wim Wedershoven, Klaas Wijbrans, Igor Radovanović, Tanir Özçelebi
-
Publication number: 20120100830Abstract: A voice processing system in a communication network performs an operation in relation to a call from an anonymous calling party to a called party in a home network associated with the system. The operation uses the identity of the anonymous calling party without revealing the identity to the called party. The operations may include allowing the called party to return a call to the anonymous calling party or to send a message to the anonymous calling party, or performing a task in response to future calls or messages from the anonymous calling party such as filtering, blocking, or diverting or requesting authorization for the calling party to call the anonymous called party on demand, hi one aspect, the system automatically generates a dummy number for the anonymous calling party and uses the dummy number to guarantee anonymity by including said dummy number in a notification message or an out-dial notification.Type: ApplicationFiled: June 24, 2010Publication date: April 26, 2012Applicant: MARKPORT LIMITEDInventors: Shawn Alan Barber, Hugh Carr, Wijbrans Klaas
-
Publication number: 20100312612Abstract: A service management framework operates in a communication network having a service delivery infrastructure providing services to subscribers. The framework collects service delivery data from the network and analyses the data to dynamically and pre-emptively modify the service delivery infrastructure to optimise service delivery. The analysis involves performing, using subscriber profiles, subscriber segmentation to generate segmentation models representing behavioural characteristics of subscribers. It also involves deriving service predictive models from the segmentation models and collected network infrastructure data, said service predictive models correlating service demand levels and network infrastructure utilisation. The framework determines in response to the predictive models the actions to be taken.Type: ApplicationFiled: October 23, 2008Publication date: December 9, 2010Inventors: Hugh Carr, Ekaterina Sizova