Patents by Inventor James A. Barclay
James A. Barclay has filed for patents to protect the following inventions. This listing includes patent applications that are pending as well as patents that have already been granted by the United States Patent and Trademark Office (USPTO).
-
Patent number: 11946478Abstract: There is provided a fan assembly comprising a motor-driven impeller arranged to generate an airflow, an air outlet arranged to emit the airflow, a plurality of sensors arranged to measure a value for each of a plurality of air quality characteristics, a display and a processor. The processor is configured to receive measured values for each of the plurality of air quality characteristics, identify one of a corresponding set of intervals within which the measured value falls and select an air quality index value associated with the identified interval. The processor is then configured to identify the highest of the selected air quality index values as a current overall air quality index value and to cause the display to display a time series plot of the current air quality index value and a number of preceding air quality index values.Type: GrantFiled: February 27, 2019Date of Patent: April 2, 2024Assignee: Dyson Technology LimitedInventors: David John Shorter, Liam Craig Barclay, Mark Douglas Whiting, Victoria Isabelle Palmer, Jonathan Edward Clear, Edward Michael Waugh, Daniel James Beavis, Thomas Sideropoulos, James Benjamin Brooks
-
Publication number: 20240048560Abstract: A system and method for mitigating security vulnerabilities of a computer network by detecting a management status of an endpoint computing device attempting to authenticate to one or more computing resources accessible via the computer network includes: detecting an authentication attempt by the endpoint computing device to the computer network; during the authentication attempt, collecting management status indicia from the endpoint computing device, wherein the management status indicia comprise data used to determine a management status of the endpoint computing device; using the management status indicia to identify the management status of the endpoint computing device and identifying the management status of the endpoint computing device; and controlling access to the computer network based on (a) whether the authentication attempt by the endpoint computing device is successful and (b) the identified management status of the endpoint computing device.Type: ApplicationFiled: September 28, 2023Publication date: February 8, 2024Inventors: Jon Oberheide, Adam Goodman, Michael Hanley, Peter Johnson, Omar Abduljaber, James Barclay
-
Patent number: 11831642Abstract: A system and method for mitigating security vulnerabilities of a computer network by detecting a management status of an endpoint computing device attempting to authenticate to one or more computing resources accessible via the computer network includes: detecting an authentication attempt by the endpoint computing device to the computer network; during the authentication attempt, collecting management status indicia from the endpoint computing device, wherein the management status indicia comprise data used to determine a management status of the endpoint computing device; using the management status indicia to identify the management status of the endpoint computing device and identifying the management status of the endpoint computing device; and controlling access to the computer network based on (a) whether the authentication attempt by the endpoint computing device is successful and (b) the identified management status of the endpoint computing device.Type: GrantFiled: April 20, 2021Date of Patent: November 28, 2023Assignee: CISCO TECHNOLOGY, INC.Inventors: Jon Oberheide, Adam Goodman, Michael Hanley, Peter Johnson, Omar Abduljaber, James Barclay
-
Publication number: 20210258307Abstract: A system and method for mitigating security vulnerabilities of a computer network by detecting a management status of an endpoint computing device attempting to authenticate to one or more computing resources accessible via the computer network includes: detecting an authentication attempt by the endpoint computing device to the computer network; during the authentication attempt, collecting management status indicia from the endpoint computing device, wherein the management status indicia comprise data used to determine a management status of the endpoint computing device; using the management status indicia to identify the management status of the endpoint computing device and identifying the management status of the endpoint computing device; and controlling access to the computer network based on (a) whether the authentication attempt by the endpoint computing device is successful and (b) the identified management status of the endpoint computing device.Type: ApplicationFiled: April 20, 2021Publication date: August 19, 2021Inventors: Jon Oberheide, Adam Goodman, Michael Hanley, Peter Johnson, Omar Abduljaber, James Barclay
-
Patent number: 11019057Abstract: A system and method for mitigating security vulnerabilities of a computer network by detecting a management status of an endpoint computing device attempting to authenticate to one or more computing resources accessible via the computer network includes: detecting an authentication attempt by the endpoint computing device to the computer network; during the authentication attempt, collecting management status indicia from the endpoint computing device, wherein the management status indicia comprise data used to determine a management status of the endpoint computing device; using the management status indicia to identify the management status of the endpoint computing device and identifying the management status of the endpoint computing device; and controlling access to the computer network based on (a) whether the authentication attempt by the endpoint computing device is successful and (b) the identified management status of the endpoint computing device.Type: GrantFiled: January 14, 2020Date of Patent: May 25, 2021Assignee: DUO SECURITY, INC.Inventors: Jon Oberheide, Adam Goodman, Michael Hanley, Peter Johnson, Omar Abduljaber, James Barclay
-
Publication number: 20200204550Abstract: A system and method for mitigating security vulnerabilities of a computer network by detecting a management status of an endpoint computing device attempting to authenticate to one or more computing resources accessible via the computer network includes: detecting an authentication attempt by the endpoint computing device to the computer network; during the authentication attempt, collecting management status indicia from the endpoint computing device, wherein the management status indicia comprise data used to determine a management status of the endpoint computing device; using the management status indicia to identify the management status of the endpoint computing device and identifying the management status of the endpoint computing device; and controlling access to the computer network based on (a) whether the authentication attempt by the endpoint computing device is successful and (b) the identified management status of the endpoint computing device.Type: ApplicationFiled: January 14, 2020Publication date: June 25, 2020Inventors: Jon Oberheide, Adam Goodman, Michael Hanley, Peter Johnson, Omar Abduljaber, James Barclay
-
Patent number: 10594692Abstract: A system and method for mitigating security vulnerabilities of a computer network by detecting a management status of an endpoint computing device attempting to authenticate to one or more computing resources accessible via the computer network includes: detecting an authentication attempt by the endpoint computing device to the computer network; during the authentication attempt, collecting management status indicia from the endpoint computing device, wherein the management status indicia comprise data used to determine a management status of the endpoint computing device; using the management status indicia to identify the management status of the endpoint computing device and identifying the management status of the endpoint computing device; and controlling access to the computer network based on (a) whether the authentication attempt by the endpoint computing device is successful and (b) the identified management status of the endpoint computing device.Type: GrantFiled: May 18, 2018Date of Patent: March 17, 2020Assignee: Duo Security, Inc.Inventors: Jon Oberheide, Adam Goodman, Michael Hanley, Peter Johnson, Omar Abduljaber, James Barclay
-
Publication number: 20180270235Abstract: A system and method for mitigating security vulnerabilities of a computer network by detecting a management status of an endpoint computing device attempting to authenticate to one or more computing resources accessible via the computer network includes: detecting an authentication attempt by the endpoint computing device to the computer network; during the authentication attempt, collecting management status indicia from the endpoint computing device, wherein the management status indicia comprise data used to determine a management status of the endpoint computing device; using the management status indicia to identify the management status of the endpoint computing device and identifying the management status of the endpoint computing device; and controlling access to the computer network based on (a) whether the authentication attempt by the endpoint computing device is successful and (b) the identified management status of the endpoint computing device.Type: ApplicationFiled: May 18, 2018Publication date: September 20, 2018Inventors: Jon Oberheide, Adam Goodman, Michael Hanley, Peter Johnson, Omar Abduljaber, James Barclay
-
Patent number: 10009344Abstract: A system and method for mitigating security vulnerabilities of a computer network by detecting a management status of an endpoint computing device attempting to authenticate to one or more computing resources accessible via the computer network includes: detecting an authentication attempt by the endpoint computing device to the computer network; during the authentication attempt, collecting management status indicia from the endpoint computing device, wherein the management status indicia comprise data used to determine a management status of the endpoint computing device; using the management status indicia to identify the management status of the endpoint computing device and identifying the management status of the endpoint computing device; and controlling access to the computer network based on (a) whether the authentication attempt by the endpoint computing device is successful and (b) the identified management status of the endpoint computing device.Type: GrantFiled: June 19, 2017Date of Patent: June 26, 2018Assignee: Duo Security, Inc.Inventors: Jon Oberheide, Adam Goodman, Michael Hanley, Peter Johnson, Omar Abduljaber, James Barclay
-
Publication number: 20180007046Abstract: A system and method for mitigating security vulnerabilities of a computer network by detecting a management status of an endpoint computing device attempting to authenticate to one or more computing resources accessible via the computer network includes: detecting an authentication attempt by the endpoint computing device to the computer network; during the authentication attempt, collecting management status indicia from the endpoint computing device, wherein the management status indicia comprise data used to determine a management status of the endpoint computing device; using the management status indicia to identify the management status of the endpoint computing device and identifying the management status of the endpoint computing device; and controlling access to the computer network based on (a) whether the authentication attempt by the endpoint computing device is successful and (b) the identified management status of the endpoint computing device.Type: ApplicationFiled: June 19, 2017Publication date: January 4, 2018Inventors: John Oberheide, Adam Goodman, Michael Hanley, Peter Johnson, Omar Abduljaber, James Barclay
-
Patent number: 7635733Abstract: A latex article is provided that contains chromium oxide particles dispersed throughout one or more cured latex layers rendering the latex article, or smaller pieces of the latex article, magnetically detectable. The chromium oxide may be present within the latex in combination with magnetically detectable ferrite. The article may include multiple cured latex layers having chromium oxide together with magnetically detectable ferrite dispersed throughout the cured latex layers.Type: GrantFiled: August 31, 2006Date of Patent: December 22, 2009Assignee: Ansell Healthcare Products LLCInventors: David M. Lucas, Liong Y. Loo, Hee M. Lai, James Barclay, Siau W. Wong
-
Publication number: 20080109343Abstract: Methods, apparatus, systems, and programs for computers are provided for automatic allocation of resource occupiers (e.g. data, people) to available resources (e.g. bandwidth, radio frequency spectrum, theatre seats). Allocation of resources to resource occupiers is based on a measure of urgency of allocation derived from the size of the resource occupier, the resource available, and the time remaining in which to allocate resource to the resource occupier. One, two, or more time thresholds may be associated with each resource occupier: in particular a timeliness threshold up to which allocation urgency increases but after which it decreases, and a perishability threshold after which allocation of resource to the resource occupier ceases to be at all useful, and after which no more resource is allocated. Also automated auction methods, systems, and programs for real-time allocation of radio frequency spectrum.Type: ApplicationFiled: September 2, 2005Publication date: May 8, 2008Inventors: David Leslie Robinson, Graeme James Barclay, Judith Elizabeth Tyson
-
Publication number: 20070083977Abstract: A latex article is provided that contains chromium oxide particles dispersed throughout one or more cured latex layers rendering the latex article, or smaller pieces of the latex article, magnetically detectable. The chromium oxide may be present within the latex in combination with magnetically detectable ferrite. The article may include multiple cured latex layers having chromium oxide together with magnetically detectable ferrite dispersed throughout the cured latex layers.Type: ApplicationFiled: August 31, 2006Publication date: April 19, 2007Inventors: David Lucas, James Barclay, Liong Loo, Hee Lai, Siau Wong
-
Patent number: 7122593Abstract: A latex article is provided that contains chromium oxide particles dispersed throughout a cured latex layer. The chromium oxide particles render the latex article, or smaller pieces of the latex article, magnetically detectable. The chromium oxide may be present within the latex in combination with magnetically detectable ferrite. The article may include multiple cured latex layers having chromium oxide or magnetically detectable ferrite dispersed throughout the cured latex layers.Type: GrantFiled: January 14, 2003Date of Patent: October 17, 2006Assignee: Ansell Healthcare Products LLCInventors: David M. Lucas, James Barclay, Jr., Liong Yu Loo, Hee Meng Lai, Siau Woon Wong
-
Publication number: 20050119387Abstract: A latex article is provided that contains chromium oxide particles dispersed throughout a cured latex layer. The chromium oxide particles render the latex article, or smaller pieces of the latex article, magnetically detectable. The chromium oxide may be present within the latex in combination with magnetically detectable ferrite. The article may include multiple cured latex layers having chromium oxide or magnetically detectable ferrite dispersed throughout the cured latex layers.Type: ApplicationFiled: January 14, 2003Publication date: June 2, 2005Applicant: ANSELL HEALTHCARE PRODUCTS, INC.Inventors: David Lucas, James Barclay Jr, Liong Loo, Hee Lai, Siau Wong
-
Patent number: 6462929Abstract: A compact polarity-insensitive integrated circuit amplifier is described designed to be powered by a miniature low voltage battery of variable polarity. Low current, polarity corrected voltage sources are integrated into functional blocks to supply low current non-bidirectional elements and to provide a constant polarity bias to a substrate of CMOS circuits. Polarity corrected voltage sources are used to provide a polarity sensing function. The invention is embodied in a Class D amplifier which may comprise four n-channel MOSFET transistors arranged in an H-bridge configuration. Additional driver circuitry is described which increases the voltage of the pulse-width modulated input signal to the MOSFET transistors and also performs a pulse trimming function, which reduces parasitic crowbar currents in the amplifier output stage.Type: GrantFiled: November 29, 2000Date of Patent: October 8, 2002Assignee: The Engineering Consortium, Inc.Inventors: James Barclay Compton, Clyde Kip M. Brown, Jr.
-
Patent number: 6448852Abstract: A compact polarity-insensitive integrated circuit amplifier is described designed to be powered by a miniature low voltage battery of variable polarity. Low current, polarity corrected voltage sources are integrated into functional blocks to supply low current non-bidirectional elements and to provide a constant polarity bias to a substrate of CMOS circuits. Polarity corrected voltage sources are used to provide a polarity sensing function. The invention is embodied in a Class D amplifier which may comprise four n-channel MOSFET transistors arranged in an H-bridge configuration. Additional driver circuitry is described which increases the voltage of the pulse-width modulated input signal to the MOSFET transistors and also performs a pulse trimming function, which reduces parasitic crowbar currents in the amplifier output stage.Type: GrantFiled: November 29, 2000Date of Patent: September 10, 2002Assignee: The Engineering Consortium, Inc.Inventors: James Barclay Compton, Clyde “Kip” M. Brown, Jr.
-
Publication number: 20010002100Abstract: A compact polarity-insensitive integrated circuit amplifier is described designed to be powered by a miniature low voltage battery of variable polarity. Low current, polarity corrected voltage sources are integrated into functional blocks to supply low current non-bidirectional elements and to provide a constant polarity bias to a substrate of CMOS circuits. Polarity corrected voltage sources are used to provide a polarity sensing function. The invention is embodied in a Class D amplifier which may comprise four n-channel MOSFET transistors arranged in an H-bridge configuration. Additional driver circuitry is described which increases the voltage of the pulse-width modulated input signal to the MOSFET transistors and also performs a pulse trimming function, which reduces parasitic crowbar currents in the amplifier output stage.Type: ApplicationFiled: November 29, 2000Publication date: May 31, 2001Inventors: James Barclay Compton, Clyde ?quot;Kip?quot; M. Brown
-
Patent number: 6157252Abstract: A battery polarity insensitive amplifier utilizes a power management architecture to reduce the size of the circuitry used to accomplish the polarity correction function. An efficient Class D amplifier and compact voltage multiplying driver circuit reduce the size of the battery polarity insensitive amplifier circuit.Type: GrantFiled: September 9, 1998Date of Patent: December 5, 2000Assignee: The Engineering Consortium, Inc.Inventors: James Barclay Compton, Clyde "Kip "M. Brown, Jr.
-
Patent number: 4045964Abstract: A subterranean panel drain is provided comprising a unitary prefabricated panel having a serpentine shaped transverse cross-section defining a series of substantially vertically arrayed corrugations. A plurality of spaced slots is provided in each alternately arrayed corrugation with the slots preferably being disposed at an angle to a horizontal plane passing through the panel. In one preferred embodiment, the subterranean panel drain may be employed in abutting relation against a foundation wall to form a conduit between moisture in the soil adjacent the foundation and a conventional drain pipe at the base of the foundation. In another preferred embodiment, a pair of subterranean panel drains may be placed in back-to-back relation to form a curtain drain for transferring collected moisture in soil to a drainage pipe.Type: GrantFiled: December 15, 1975Date of Patent: September 6, 1977Inventor: James A. Barclay