Patents by Inventor HUGH CARR

HUGH CARR has filed for patents to protect the following inventions. This listing includes patent applications that are pending as well as patents that have already been granted by the United States Patent and Trademark Office (USPTO).

  • Publication number: 20240125235
    Abstract: An aggregate slinger for an underground void stabilization system, the aggregate slinger comprising a vertically extending shaft and a number of dispersing members. The vertically extending shaft is inserted through a ground hole into an underground void and rotated about a vertical axis in the ground hole. The dispersing members are configured to extend radially from a lower end of the vertically extending shaft in the underground void so that the dispersing members radially spread aggregate descending into the underground void from the ground hole to form a radially enlarged support column of aggregate in the underground void.
    Type: Application
    Filed: October 13, 2022
    Publication date: April 18, 2024
    Inventors: Patrick Hugh Carr, Clay Robert Rathbun
  • Patent number: 10845362
    Abstract: The application provides competition assays used to detect free-light chains or intact immunoglobulins comprising incubating the sample with anti-FLC antibody, or heavy chain class-light chain type-specific antibodies, or fragments of such antibodies, and a known amount of FLC or intact immunoglobulin and detecting the binding of the antibody to the known amount of FLC or immunoglobulin. Assay kits and methods of producing particles coated with FLC are also provided.
    Type: Grant
    Filed: July 19, 2011
    Date of Patent: November 24, 2020
    Assignee: THE BINDING SITE GROUP LIMITED
    Inventors: Graham Peter Mead, Hugh Carr Smith, Arthur Randall Bradwell
  • Patent number: 10721312
    Abstract: Orchestration and/or management of services on deployed computing, electronic, appliance and like devices are described. A service orchestration and/or management system (“SOMS”) may be configured to provide for orchestration and/or management of services to one or more deployed devices. The SOMS may obtain information from deployed devices, such as status, capabilities and service metadata. The SOMS may then encapsulate and store the obtained information for later use. The SOMS may also store service information, facilitate creation of services based on stored service definition meta-data, modeling or simulating a service prior to deployment, and deployment of a service to remotely deployed devices followed by activation to begin operation of the service. Other embodiments may be described and claimed.
    Type: Grant
    Filed: February 12, 2015
    Date of Patent: July 21, 2020
    Assignee: Intel Corporation
    Inventors: Mark Kelly, Charlie Sheridan, Jessica C. McCarthy, Keith A. Ellis, Michael Nolan, Cliodhna Ni Scanaill, Peter J. Barry, Niall Cahill, Keith Nolan, Hugh Carr, Gabriel Mullarkey, Brian McCarson
  • Patent number: 10411958
    Abstract: Various systems and methods for automatic device configuration are described herein. A system for automatic device configuration comprises a performance monitor module to monitor, at a computing device, performance of the computing device during a period while the computing device communicates on a network using a current network interface of the computing device, a policy enforcement module to compare the performance of the computing device during the period with a performance policy installed on the computing device, and determine that the performance violates a threshold, the threshold provided in the performance policy. The system also includes a network configuration module to reconfigure a network configuration in response to the determining that the performance violates the threshold by disabling the current network interface and enabling a replacement network interface from a plurality of network interfaces available on the computing device.
    Type: Grant
    Filed: September 8, 2014
    Date of Patent: September 10, 2019
    Assignee: Intel Corporation
    Inventors: Keith Nolan, Mark Kelly, Hugh Carr
  • Patent number: 10390232
    Abstract: This disclosure describes systems, and methods related to bridging communication networks. A computing device may identify one or more signals at one or more communication interfaces in accordance with one or more communication standards. The computing device may select one or more available frequency segments from a frequency spectrum database. The computing device may transform the one or more signals into one or more converted signals for transmission on a backhaul link, the backhaul link being established for two-way data communication using the one or more available frequency segments. The computing device may cause to send the one or more converted signals using the one or more available frequency segments.
    Type: Grant
    Filed: March 27, 2015
    Date of Patent: August 20, 2019
    Assignee: Intel Corporation
    Inventors: Keith Nolan, Mark Kelly, Hugh Carr
  • Patent number: 10033751
    Abstract: The invention provides a security system and method for use in a communications network, said network comprising means to allow a plurality of devices to communicate over the network; a security agent configured on at least one device and adapted to communicate with the security system; said system comprising: means for performing dynamic intelligent traffic steering from the device based on analysis of data traffic on the network or on the device, wherein the steering decision can be made to select a channel on a per flow basis.
    Type: Grant
    Filed: February 21, 2014
    Date of Patent: July 24, 2018
    Assignee: Adaptive Mobile Security Limited
    Inventors: Darrel Donnelly, Brendan Dillon, Jim Donnelly, Hugh Carr
  • Patent number: 9813433
    Abstract: The invention provides a security system and method for use in a communications network, said network comprising means to allow a plurality of devices to communicate over the network wherein at least one device is a machine to machine (M2M) operated device and at least one other device is a human operated device, said security system comprising: means to capture data traffic originating from the plurality of devices on the network; means for analysing the data traffic; and means for identifying at least one of the M2M operated devices on the network wherein the system is configured to dynamically adapt to different data traffic patterns on the network.
    Type: Grant
    Filed: February 21, 2014
    Date of Patent: November 7, 2017
    Assignee: Adaptive Mobile Security Limited
    Inventors: Cathal McDaid, Hugh Carr, Mark Buckley
  • Publication number: 20170286861
    Abstract: Disclosed is a computing device. The computing device can include a processor and a memory. The memory can store instructions that, when executed by the processor, can cause the processor to perform operations. The operations can comprise determining a computational burden for a component of an application, developing a cost model, and generating resource provisioning set points. The component of the application can execute at a specified performance level. The cost model can specify a cost to execute the component of the application over a range of performance levels. The range of performance levels can include the specified performance level. Each of the resource provisioning set points can indicate a quantity of compute nodes assigned for each phase of the component of the application. The quantity of compute nodes can be based on the specified performance level and the cost to execute the component of the application.
    Type: Application
    Filed: April 1, 2016
    Publication date: October 5, 2017
    Inventors: Damian Kelly, David Boundy, Hugh Carr
  • Publication number: 20170238189
    Abstract: This disclosure describes systems, and methods related to bridging communication networks. A computing device may identify one or more signals at one or more communication interfaces in accordance with one or more communication standards. The computing device may select one or more available frequency segments from a frequency spectrum database. The computing device may transform the one or more signals into one or more converted signals for transmission on a backhaul link, the backhaul link being established for two-way data communication using the one or more available frequency segments. The computing device may cause to send the one or more converted signals using the one or more available frequency segments.
    Type: Application
    Filed: March 27, 2015
    Publication date: August 17, 2017
    Inventors: Keith Nolan, Mark Kelly, Hugh Carr
  • Publication number: 20170006116
    Abstract: Orchestration and/or management of services on deployed computing, electronic, appliance and like devices are described. A service orchestration and/or management system (“SOMS”) may be configured to provide for orchestration and/or management of services to one or more deployed devices. The SOMS may obtain information from deployed devices, such as status, capabilities and service metadata. The SOMS may then encapsulate and store the obtained information for later use. The SOMS may also store service information, facilitate creation of services based on stored service definition meta-data, modeling or simulating a service prior to deployment, and deployment of a service to remotely deployed devices followed by activation to begin operation of the service. Other embodiments may be described and claimed.
    Type: Application
    Filed: February 12, 2015
    Publication date: January 5, 2017
    Applicant: Intel Corporation
    Inventors: Mark KELLY, Charlie SHERIDAN, Jessica C. MCCARTHY, Keith A. ELLIS, Michael NOLAN, Cliodhna NI SCANAILL, Peter J. BARRY, Niall CAHILL, Keith NOLAN, Hugh CARR, Gabriel MULLARKEY, Brian MCCARSON
  • Publication number: 20160072674
    Abstract: Various systems and methods for automatic device configuration are described herein. A system for automatic device configuration comprises a performance monitor module to monitor, at a computing device, performance of the computing device during a period while the computing device communicates on a network using a current network interface of the computing device, a policy enforcement module to compare the performance of the computing device during the period with a performance policy installed on the computing device, and determine that the performance violates a threshold, the threshold provided in the performance policy. The system also includes a network configuration module to reconfigure a network configuration in response to the determining that the performance violates the threshold by disabling the current network interface and enabling a replacement network interface from a plurality of network interfaces available on the computing device.
    Type: Application
    Filed: September 8, 2014
    Publication date: March 10, 2016
    Inventors: Keith Nolan, Mark Kelly, Hugh Carr
  • Publication number: 20160014149
    Abstract: The invention provides a network security method and system for use in a communications network, said network comprising a plurality of devices adapted to communicate over the network, at least one device capable of downloading or uploading an application over the network, said system comprises means for data capture on the network by receiving data from a first data source and a second data source; means for analysing comprising means for correlating data arising from network behaviour of at least one device obtained from the first data source and data from a second data source and means for generating a data structure; and based on said analyses of the generated data structure, means for identifying applications on devices which are behaving suspiciously.
    Type: Application
    Filed: February 21, 2014
    Publication date: January 14, 2016
    Inventors: Ciaran Bradley, Hugh Carr, Brendan Dillon, Gareth MacLachlan, Mark Buckley
  • Publication number: 20160006753
    Abstract: The invention provides a security system and method for use in a communications network, said network comprising means to allow a plurality of devices to communicate over the network wherein at least one device is a machine to machine (M2M) operated device and at least one other device is a human operated device, said security system comprising: means to capture data traffic originating from the plurality of devices on the network; means for analysing the data traffic; and means for identifying at least one of the M2M operated devices on the network wherein the system is configured to dynamically adapt to different data traffic patterns on the network.
    Type: Application
    Filed: February 21, 2014
    Publication date: January 7, 2016
    Inventors: Cathal McDaid, Hugh Carr, Mark Buckley
  • Publication number: 20160006755
    Abstract: The invention provides a security system and method for use in a communications network, said network comprising means to allow a plurality of devices to communicate over the network; a security agent configured on at least one device and adapted to communicate with the security system; said system comprising: means for performing dynamic intelligent traffic steering from the device based on analysis of data traffic on the network or on the device, wherein the steering decision can be made to select a channel on a per flow basis.
    Type: Application
    Filed: February 21, 2014
    Publication date: January 7, 2016
    Applicant: Adaptive Mobile Security Limited
    Inventors: Darrell Donnelly, Brendan Dillon, Jim Donnelly, Hugh Carr
  • Publication number: 20150051839
    Abstract: The invention provides a method for characterising a plasma cell associated disease in a patient comprising: (i) providing at least one sample from the patient; (ii) determining in the sample(s) two or more of; (a) the ?:? free light chain (FLC) ratio; (b) the ratio of ? light chains bound to a class of heavy chain:? light chain bound to the same class of heavy chain (HLC?:HLC ? ratio); (c) the total amount of FLC in the samples and (d) the total amount of ? light chains bound to the heavy chain class plus ? light chains bound to the same heavy chain class (total HLC); (iii) comparing each ratio or amount from (a) (b), (c) and/or (d) to predetermined values and assigning a score to each amount or ratio; and (iv) using the scores to characterise the plasma cell associated disease. Apparatus configured to carry out the method of the invention are also provided.
    Type: Application
    Filed: March 6, 2013
    Publication date: February 19, 2015
    Applicant: THE BINDING SITE GROUP LIMITED
    Inventors: Stephen Harding, Richard Hughes, Hugh Carr-Smith
  • Publication number: 20130217149
    Abstract: The application provides competition assays used to detect free-light chains or intact immunoglobulins comprising incubating the sample with anti-FLC antibody, or heavy chain class-light chain type-specific antibodies, or fragments of such antibodies, and a known amount of FLC or intact immunoglobulin and detecting the binding of the antibody to the known amount of FLC or immunoglobulin. Assay kits and methods of producing particles coated with FLC are also provided.
    Type: Application
    Filed: July 19, 2011
    Publication date: August 22, 2013
    Applicant: THE BINDING SITE GROUP LIMITED
    Inventors: Graham Peter Mead, Hugh Carr Smith, Arthur Randall Bradwell
  • Publication number: 20130166667
    Abstract: The invention provides a system and method for filtering unsolicited network messaging in a network comprising at least one remote messaging device, at least one data routing device and at least one remote destination device. The invention provides a means for determining a probability of the network message being unsolicited; and means for translating a first network address into a second network address associated with unsolicited network messaging when the probability determining means indicates a high probability of unsolicited network messaging. In a further embodiment there is provided a means for translating the first network address into the at least one second network address associated with legitimate network messaging, when the probability determining means indicates a low probability of unsolicited network messaging.
    Type: Application
    Filed: September 2, 2011
    Publication date: June 27, 2013
    Applicant: ADAPTIVE MOBILE SECURITY LIMITED
    Inventors: Hugh Carr, Brendan Dillon, Owen Edwards, Gareth MacLachlan, Cathal McDaid
  • Patent number: 8452866
    Abstract: The invention provides real time dynamic resource management to improve end-to-end QoS by mobile devices regularly updating a resource availability server (RAS) with resource update information. Examples of resource update information are device battery status, available memory, session bandwidth, delay, packet loss, and jitter, network element storage capacity, network element processing power. This information is made available by the RAS. In addition, the RAS generates and maintains predictive models and makes available predictive data from these models. Network elements and devices retrieve this information in the form of notifications from the RAS or by way of querying the RAS. The network elements and devices, based on these predictions, act to negotiate sessions to optimise QoS. In one embodiment the RAS is updated by only mobile devices subscribed to the operator which hosts the RAS. The update information is addressed to the RAS as a stand-alone entity.
    Type: Grant
    Filed: July 17, 2008
    Date of Patent: May 28, 2013
    Assignee: Markport Limited
    Inventors: Michel De Boer, Hugh Carr, Wim Wedershoven, Klaas Wijbrans, Igor Radovanović, Tanir Özçelebi
  • Publication number: 20120100830
    Abstract: A voice processing system in a communication network performs an operation in relation to a call from an anonymous calling party to a called party in a home network associated with the system. The operation uses the identity of the anonymous calling party without revealing the identity to the called party. The operations may include allowing the called party to return a call to the anonymous calling party or to send a message to the anonymous calling party, or performing a task in response to future calls or messages from the anonymous calling party such as filtering, blocking, or diverting or requesting authorization for the calling party to call the anonymous called party on demand, hi one aspect, the system automatically generates a dummy number for the anonymous calling party and uses the dummy number to guarantee anonymity by including said dummy number in a notification message or an out-dial notification.
    Type: Application
    Filed: June 24, 2010
    Publication date: April 26, 2012
    Applicant: MARKPORT LIMITED
    Inventors: Shawn Alan Barber, Hugh Carr, Wijbrans Klaas
  • Publication number: 20100312612
    Abstract: A service management framework operates in a communication network having a service delivery infrastructure providing services to subscribers. The framework collects service delivery data from the network and analyses the data to dynamically and pre-emptively modify the service delivery infrastructure to optimise service delivery. The analysis involves performing, using subscriber profiles, subscriber segmentation to generate segmentation models representing behavioural characteristics of subscribers. It also involves deriving service predictive models from the segmentation models and collected network infrastructure data, said service predictive models correlating service demand levels and network infrastructure utilisation. The framework determines in response to the predictive models the actions to be taken.
    Type: Application
    Filed: October 23, 2008
    Publication date: December 9, 2010
    Inventors: Hugh Carr, Ekaterina Sizova