Patents by Inventor James Crane

James Crane has filed for patents to protect the following inventions. This listing includes patent applications that are pending as well as patents that have already been granted by the United States Patent and Trademark Office (USPTO).

  • Publication number: 20240084639
    Abstract: In one aspect, a movable barrier operator includes a housing and a motor. The movable barrier operator further includes a camera mount that is connected to the housing and that supports a camera. The camera mount is configured to facilitate movement of the camera between a storage position wherein at least a portion of the camera is inside the housing and an operative position wherein the at least a portion of the camera is outside of the housing.
    Type: Application
    Filed: November 21, 2023
    Publication date: March 14, 2024
    Inventors: Matthew James Baer, Jimmy Bedolla, Matthew Peter Crane, Corey Lyn Herrboldt, Sapta Gireesh Pudipeddi
  • Publication number: 20230155894
    Abstract: Disclosed are various examples for determining an IT topology for an enterprise IT organization based on operational goals of the enterprise organization. Visual models that are designed to facilitate responses associated with the current IT topology and operational goals of an enterprise IT organization are displayed to an entity of the enterprise. The entity can provide enterprise profile data to an IT solutions system by interacting with user interfaces. The IT solutions system can generate the IT topology prescription and roadmap for implementing the IT topology prescription based on the operational goals identified in the responses. Statements of work can be dynamically generated that outline details and terms of implementing the IT topology prescription for the enterprise IT organization.
    Type: Application
    Filed: January 12, 2023
    Publication date: May 18, 2023
    Inventors: Michael Francis, Peter Legere, Justin Patrick MGarry, Ryan Veino, Andrea Siviero, David James Crane, David James Percy, Kingsley Turner
  • Patent number: 11582109
    Abstract: Disclosed are various examples for determining an IT topology for an enterprise IT organization based on operational goals of the enterprise organization. Visual models that are designed to facilitate responses associated with the current IT topology and operational goals of an enterprise IT organization are displayed to an entity of the enterprise. The entity can provide enterprise profile data to an IT solutions system by interacting with user interfaces. The IT solutions system can generate the IT topology prescription and roadmap for implementing the IT topology prescription based on the operational goals identified in the responses. Statements of work can be dynamically generated that outline details and terms of implementing the IT topology prescription for the enterprise IT organization.
    Type: Grant
    Filed: January 24, 2020
    Date of Patent: February 14, 2023
    Assignee: VMWARE, INC.
    Inventors: Michael Francis, Peter Legere, Justin Patrick McGarry, Ryan Veino, Andrea Siviero, David James Crane, David James Percy, Kingsley Turner
  • Patent number: 11340915
    Abstract: Embodiments disclosed herein are directed at applying transformations to computer code residing in original libraries for protection against cyberattacks. For example, the transformations applied on original libraries cause random reorganization of the computer code resulting in a transformed version of an original library. Although a malicious attacker can utilize a known exploit of the original library and launch a cyberattack, such knowledge is of no use on the transformed version of the original library. In some embodiments, the transformed version of the original library is stored in cache memory and shared by multiple executable programs to facilitate efficient memory utilization.
    Type: Grant
    Filed: November 25, 2020
    Date of Patent: May 24, 2022
    Assignee: RUNSAFE SECURITY, INC.
    Inventors: Stephen James Crane, Andrei Homescu
  • Publication number: 20210160144
    Abstract: Disclosed are various examples for determining an IT topology for an enterprise IT organization based on operational goals of the enterprise organization. Visual models that are designed to facilitate responses associated with the current IT topology and operational goals of an enterprise IT organization are displayed to an entity of the enterprise. The entity can provide enterprise profile data to an IT solutions system by interacting with user interfaces. The IT solutions system can generate the IT topology prescription and roadmap for implementing the IT topology prescription based on the operational goals identified in the responses. Statements of work can be dynamically generated that outline details and terms of implementing the IT topology prescription for the enterprise IT organization.
    Type: Application
    Filed: January 24, 2020
    Publication date: May 27, 2021
    Inventors: Michael Francis, Peter Legere, Justin Patrick McGarry, Ryan Veino, Andrea Siviero, David James Crane, David James Percy, Kingsley Turner
  • Publication number: 20210160143
    Abstract: Disclosed are various examples for determining an IT topology for an enterprise IT organization based on operational goals of the enterprise organization. Visual models that are designed to facilitate responses associated with the current IT topology and operational goals of an enterprise IT organization are presented to an entity of the enterprise. The entity can provide enterprise profile data to an IT solutions system by interacting with user interfaces. The IT solutions system can generate the IT topology and roadmap for implementing the IT topology based on the operational goals identified in the responses. Statements of work can be dynamically generated that outline details and terms of implementing the proposed IT topology for the enterprise IT organization.
    Type: Application
    Filed: November 27, 2019
    Publication date: May 27, 2021
    Inventors: Michael Francis, Peter Legere, Justin Patrick McGarry, Ryan Veino, Andrea Siviero, David James Crane, David James Percy, Kingsley Turner
  • Publication number: 20210157612
    Abstract: Embodiments disclosed herein are directed at applying transformations to computer code residing in original libraries for protection against cyberattacks. For example, the transformations applied on original libraries cause random reorganization of the computer code resulting in a transformed version of an original library. Although a malicious attacker can utilize a known exploit of the original library and launch a cyberattack, such knowledge is of no use on the transformed version of the original library. In some embodiments, the transformed version of the original library is stored in cache memory and shared by multiple executable programs to facilitate efficient memory utilization.
    Type: Application
    Filed: November 25, 2020
    Publication date: May 27, 2021
    Inventors: Stephen James CRANE, Andrei HOMESCU
  • Patent number: 10331528
    Abstract: Example implementations relate to capturing and/or recovering components of a computing system. A recovery service may receive a recovery script from an external recovery script repository, wherein the recovery script may include a number of actions, each respective action being a capture action or a recovery action. For action in the recovery script, the recovery service may request a recovery agent to perform the action on a component of the computing system.
    Type: Grant
    Filed: March 2, 2017
    Date of Patent: June 25, 2019
    Assignee: HEWLETT PACKARD ENTERPRISE DEVELOPMENT LP
    Inventors: Kate Elizabeth Reinecke, Philipp Reinecke, Stephen James Crane
  • Publication number: 20180253362
    Abstract: Example implementations relate to capturing and/or recovering components of a computing system. A recovery service may receive a recovery script from an external recovery script repository, wherein the recovery script may include a number of actions, each respective action being a capture action or a recovery action. For action in the recovery script, the recovery service may request a recovery agent to perform the action on a component of the computing system.
    Type: Application
    Filed: March 2, 2017
    Publication date: September 6, 2018
    Inventors: Kate Elizabeth Reinecke, Philipp Reinecke, Stephen James Crane
  • Patent number: 10048225
    Abstract: A method for inspection of tubes in a boiler is disclosed. The method of inspecting includes the steps of providing an apparatus having a sensor and a housing adapted to contain the sensor. The method further including the steps of extending the apparatus into a tube bundle until a desired tube for inspection is reached; rotating the apparatus until the sensor is positioned over the tube to be inspected; clamping the housing around the tube to be inspected, thereby clamping the sensor around the tube; transmitting a pulse of guided waves into the tube to be inspected and detecting reflected signals; and acquiring data from the reflected signals and determining the condition of the tube.
    Type: Grant
    Filed: June 18, 2015
    Date of Patent: August 14, 2018
    Assignee: ELECTRIC POWER RESEARCH INSTITUTE, INC.
    Inventors: Hegeon Kwun, Matthew Capps, James Crane, Stanley M. Walker
  • Patent number: 9967234
    Abstract: The present invention is a device, system and method for providing a more secure full motion video with metadata streaming product. More specifically, the invention is capable of ensuring a more secure video transfer from a less secure input data network to a more secure data receiving network through the use of a firewall on the less secure input network interface, which is used for separating video and discarding other unwanted data, and an Air Gap that physically separates the input and output networks. This physical separation ensures a secure transfer of the “cleaned” input data from the less secure input source to the more secure data receiving network.
    Type: Grant
    Filed: April 27, 2016
    Date of Patent: May 8, 2018
    Assignee: THE UNITED STATES OF AMERICA, AS REPRESENTED BY THE SECRETARY OF THE NAVY
    Inventors: Bradford James Crane, Kevin Dee Shepherd
  • Publication number: 20150285768
    Abstract: A method for inspection of tubes in a boiler is disclosed. The method of inspecting includes the steps of providing an apparatus having a sensor and a housing adapted to contain the sensor. The method further including the steps of extending the apparatus into a tube bundle until a desired tube for inspection is reached; rotating the apparatus until the sensor is positioned over the tube to be inspected; clamping the housing around the tube to be inspected, thereby clamping the sensor around the tube; transmitting a pulse of guided waves into the tube to be inspected and detecting reflected signals; and acquiring data from the reflected signals and determining the condition of the tube.
    Type: Application
    Filed: June 18, 2015
    Publication date: October 8, 2015
    Inventors: Hegeon Kwun, Matthew Capps, James Crane, Stanley M. Walker
  • Patent number: 9146215
    Abstract: An apparatus and method for inspection of tubes in a boiler is disclosed. The apparatus includes a sensor adapted to generate and detect guided-waves and a mechanical device adapted to reach into a tube bundle and clamp the sensor onto an interior tube selected for inspection. The mechanical device includes a housing adapted to contain the sensor and an air cylinder adapted to actuate the housing to allow the housing to clamp onto the interior tube.
    Type: Grant
    Filed: September 18, 2012
    Date of Patent: September 29, 2015
    Assignee: Electric Power Research Institute, Inc.
    Inventors: Hegeon Kwun, Matthew Capps, James Crane, Stanley M. Walker
  • Patent number: 8510789
    Abstract: Data to be output to a removable storage medium is encrypted for sending to an output device by an encryption process based on encryption parameters comprising public data of a trusted party and an encryption key string comprising a policy for allowing the output of the data. The trusted party provides a decryption key to the output device but only after being satisfied that the policy has been met. The decryption key is generated in dependence on the encryption key string and private data of the trusted party. The output device uses the decryption key in decrypting the data to be output. Embodiments are provided that involve multiple policies and trusted parties.
    Type: Grant
    Filed: September 16, 2003
    Date of Patent: August 13, 2013
    Assignee: Hewlett-Packard Development Company, L.P.
    Inventors: Cheh Goh, Liqun Chen, Stephen James Crane, Marco Casassa Mont, Keith Alexander Harrison
  • Patent number: 8311883
    Abstract: A method and system for sorting online advertisements to enable users of online advertising networks, auctions, merchants, etc. to identify known or trusted parties are provided. Users designate other users as friends. When a user searches for or browses through advertisements, those advertisements posted by the user's friends are easily identified. Advertisements posted by members of the user's network (i.e., friends of the user's friends) are also easily identified.
    Type: Grant
    Filed: September 26, 2007
    Date of Patent: November 13, 2012
    Assignee: RedeParede.com Inc.
    Inventor: James Crane-Baker
  • Patent number: 8046592
    Abstract: A data-handling system (20) is arranged to scan through data it holds for instances of sensitive information as identified by reference (35) to a set of sensitive-information identifiers held by the system. Each identifier identifies one or more items of sensitive information (25) and is so formed or protected as to not reveal any such item. Following an instance of sensitive information being found by the scan, it is replaced by a reference to an instance of the corresponding sensitive-information item (25) held in protected storage (21). As a result, in due course the only instances of, sensitive information held by the system (20) will be those in the protected storage (21).
    Type: Grant
    Filed: January 23, 2006
    Date of Patent: October 25, 2011
    Assignee: Hewlett-Packard Development Company, L.P.
    Inventors: Stephen James Crane, Richard James Smith
  • Patent number: 7721955
    Abstract: A secure transaction method is provided for publicly-accessible transaction terminals. The method uses quantum key distribution (QKD) between a hand-portable QKD device and a complimentary QKD apparatus incorporated the transaction terminal. After the QKD device has been brought up to the transaction terminal, the QKD device and the complimentary QKD apparatus of the terminal are is used to provide the device and terminal with new secret shared random material. The new secret shared random material is then used to establish a secure classical communication channel between the device and transaction terminal for conducting a transaction. An ATM terminal and POS terminal that use quantum key distribution are also disclosed.
    Type: Grant
    Filed: June 16, 2006
    Date of Patent: May 25, 2010
    Assignee: Hewlett-Packard Development Company, L.P.
    Inventors: Keith Alexander Harrison, William John Munro, Stephen James Crane
  • Patent number: 7603702
    Abstract: A method and device are disclosed for identifying an item of equipment previously selected by a user. At the time the user selects the item of equipment a reading of a biometric characteristic of the user is taken to provide first biometric data that is then stored for access only by the user-selected item. Subsequently, a user-associated device is used to contact an item of equipment and determine whether the contacted item is the user-selected item by checking whether the contacted item can provide biometric data that matches second biometric data known to correspond to the user. Preferably, the device also checks whether the contacted item of equipment is trustable. User-selectable equipment facilitating identification using biometrics is also disclosed.
    Type: Grant
    Filed: April 6, 2005
    Date of Patent: October 13, 2009
    Assignee: Hewlett-Packard Development Company, L.P.
    Inventor: Stephen James Crane
  • Patent number: 7516321
    Abstract: A trusted authority delegates authority to a device. This delegation of authority is effected by providing a yet-to-be completed chain of public/private cryptographic key pairs linked in a subversion-resistant manner. The chain terminates with a penultimate key pair formed by public/private data, and a link towards an end key pair to be formed by an encryption/decryption key pair of an Identifier-Based Encryption, IBE, scheme. The private data is securely stored in the device for access only by an authorized key-generation process that forms the link to the end key pair and is arranged to provide the IBE decryption key generated using the private data and encryption key. This key generation/provision is normally only effected if at least one condition, for example specified in the encryption key, is satisfied. Such a condition may be one tested against data provided by the trusted authority and stored in the device.
    Type: Grant
    Filed: March 8, 2004
    Date of Patent: April 7, 2009
    Assignee: Hewlett-Packard Development Company, L.P.
    Inventors: Liqun Chen, Stephen James Crane, Cheh Goh
  • Patent number: D618365
    Type: Grant
    Filed: June 18, 2009
    Date of Patent: June 22, 2010
    Inventor: James Crane