Patents by Inventor James Le

James Le has filed for patents to protect the following inventions. This listing includes patent applications that are pending as well as patents that have already been granted by the United States Patent and Trademark Office (USPTO).

  • Patent number: 9602550
    Abstract: Methods and systems for remediating a security policy violation on a computer system are provided. According to one embodiment, information regarding a program-code-based operational state of a host asset is collected by a light weight sensor (LWS) running on the host asset via a survey tool. The information is transmitted by the LWS to a remote server via an external network. Multiple security policies are enforced by the remote server with respect to the host asset based on the received information including determining whether the program-code-based operational state of the host asset represents a violation of one or more security policies, by evaluating, the received information with respect to the security policies, each of which define at least one parameter condition violation of which is potentially indicative of unauthorized activity on the host asset or manipulation of the host asset making the host asset vulnerable to attack.
    Type: Grant
    Filed: May 16, 2016
    Date of Patent: March 21, 2017
    Assignee: Fortinet, Inc.
    Inventors: Daniel B. Bezilla, John L. Immordino, James Le Ogura
  • Publication number: 20170051829
    Abstract: A seal section for use in a downhole submersible pumping system includes one or more fluid separation mechanisms, a shaft and one or more primary mechanical seals. Each of the one or more primary mechanical seals is disposed along the shaft. The seal section also includes one or more redundant shaft seals that each substantially surrounds a corresponding one of the one or more primary mechanical seals. In another aspect, a seal section for use in a pumping system includes one or more fluid separation mechanisms, a shaft, a primary mechanical seal and a redundant shaft seal. The redundant shaft seal substantially surrounds the primary mechanical seal. The seal section further includes an internal seal chamber defined by the annular space between the primary mechanical seal and the redundant shaft seal.
    Type: Application
    Filed: May 1, 2014
    Publication date: February 23, 2017
    Inventors: Charles COLLINS, James LE
  • Publication number: 20160269444
    Abstract: Methods and systems for remediating a security policy violation on a computer system are provided. According to one embodiment, information regarding a program-code-based operational state of a host asset is collected by a light weight sensor (LWS) running on the host asset via a survey tool. The information is transmitted by the LWS to a remote server via an external network. Multiple security policies are enforced by the remote server with respect to the host asset based on the received information including determining whether the program-code-based operational state of the host asset represents a violation of one or more security policies, by evaluating, the received information with respect to the security policies, each of which define at least one parameter condition violation of which is potentially indicative of unauthorized activity on the host asset or manipulation of the host asset making the host asset vulnerable to attack.
    Type: Application
    Filed: May 16, 2016
    Publication date: September 15, 2016
    Applicant: Fortinet, Inc.
    Inventors: Daniel B. Bezilla, John L. Immordino, James Le Ogura
  • Patent number: 9392024
    Abstract: Methods and systems for remediating a security policy violation on a computer system are provided. According to one embodiment, information regarding a program-code-based operational state of a host asset is collected by a light weight sensor (LWS) running on the host asset via a survey tool. The information is transmitted by the LWS to a remote server via an external network. Multiple security policies are enforced by the remote server with respect to the host asset based on the received information including determining whether the program-code-based operational state of the host asset represents a violation of one or more security policies, by evaluating, the received information with respect to the security policies, each of which define at least one parameter condition violation of which is potentially indicative of unauthorized activity on the host asset or manipulation of the host asset making the host asset vulnerable to attack.
    Type: Grant
    Filed: August 18, 2015
    Date of Patent: July 12, 2016
    Assignee: Fortinet, Inc.
    Inventors: Daniel B. Bezilla, John L. Immordino, James Le Ogura
  • Publication number: 20160097243
    Abstract: A pumping system useful for pumping fluids from a subterranean formation to a surface facility includes a first component and a second component connected to the first component with a neck flange. The pumping system further includes a motor lead cable that provides electrical power from the surface facility to the pumping system and a cable protector connected to the neck flange that secures the motor lead cable to the first and second components. The cable protector includes a first clamp section and a second clamp section. The second clamp section includes a lead cable recess that extends in a longitudinal direction along the exterior of the second clamp section and a band recess that extends in a circumferential direction along the exterior of the second clamp section. A tie or band resides in the band recess and extends around the circumference of the cable protector to secure the motor lead cable within the lead cable recess.
    Type: Application
    Filed: October 2, 2014
    Publication date: April 7, 2016
    Inventors: Aaron Noakes, James Le
  • Publication number: 20160076550
    Abstract: A seal section for use in a downhole submersible pumping system includes redundant fluid separation mechanisms. The fluid separation mechanisms are bag seal assemblies, labyrinth seals, pistons and bellows. The seal section further includes a shaft, one or more shaft seals and a bag support tube. An annulus between the shaft and the shaft support tube provides a fluid flow path from a motor to the fluid separation mechanisms.
    Type: Application
    Filed: September 17, 2015
    Publication date: March 17, 2016
    Applicant: GE OIL & GAS ESP, INC.
    Inventors: Charles Collins, James Le
  • Publication number: 20150358360
    Abstract: Methods and systems for remediating a security policy violation on a computer system are provided. According to one embodiment, information regarding a program-code-based operational state of a host asset is collected by a light weight sensor (LWS) running on the host asset via a survey tool. The information is transmitted by the LWS to a remote server via an external network. Multiple security policies are enforced by the remote server with respect to the host asset based on the received information including determining whether the program-code-based operational state of the host asset represents a violation of one or more security policies, by evaluating, the received information with respect to the security policies, each of which define at least one parameter condition violation of which is potentially indicative of unauthorized activity on the host asset or manipulation of the host asset making the host asset vulnerable to attack.
    Type: Application
    Filed: August 18, 2015
    Publication date: December 10, 2015
    Applicant: FORTINET, INC.
    Inventors: Daniel B. Bezilla, John L. Immordino, James Le Ogura
  • Patent number: 9154523
    Abstract: Methods and systems for remediating a security policy violation on a computer system are provided. According to one embodiment, a first computer system receives information regarding an operational state of a second computer system. It is determined whether the operational state represents a violation of a security policy that has been applied to or is active in regard to the second computer system by evaluating the received information with respect to the multiple security policies. Each security policy defines a parameter condition violation of which is potentially indicative of unauthorized activity on or manipulation of the second computer system to make it vulnerable to attack. When a result of the determination is affirmative, then a remediation is identified by the first computer system that can be applied to the second computer system to address the violation; and the remediation is deployed to the second computer system.
    Type: Grant
    Filed: February 13, 2015
    Date of Patent: October 6, 2015
    Assignee: Fortinet, Inc.
    Inventors: Daniel B. Bezilla, John L. Immordino, James Le Ogura
  • Publication number: 20150163249
    Abstract: Methods and systems for remediating a security policy violation on a computer system are provided. According to one embodiment, a first computer system receives information regarding an operational state of a second computer system. It is determined whether the operational state represents a violation of a security policy that has been applied to or is active in regard to the second computer system by evaluating the received information with respect to the multiple security policies. Each security policy defines a parameter condition violation of which is potentially indicative of unauthorized activity on or manipulation of the second computer system to make it vulnerable to attack. When a result of the determination is affirmative, then a remediation is identified by the first computer system that can be applied to the second computer system to address the violation; and the remediation is deployed to the second computer system.
    Type: Application
    Filed: February 13, 2015
    Publication date: June 11, 2015
    Applicant: Fortinet, Inc.
    Inventors: Daniel B. Bezilla, John L. Immordino, James Le Ogura
  • Patent number: 8984586
    Abstract: Methods and systems for remediating a security policy violation on a computer system are provided. According to one embodiment, an agent running on an endpoint system collects information regarding a program-code-based operational state of the endpoint system. The agent transmits the information to a remote computer system via a network coupling the endpoint system and the remote computer system in communication. The remote computer system enforces one or more security policies with respect to the endpoint system based on the received information.
    Type: Grant
    Filed: January 11, 2014
    Date of Patent: March 17, 2015
    Assignee: Fortinet, Inc.
    Inventors: Daniel B. Bezilla, John L. Immordino, James Le Ogura
  • Patent number: 8914846
    Abstract: Methods and systems for remediating a security policy violation on a computer system are provided. According to one embodiment, information regarding a program-code-based operational state of a computer system is periodically sampled. A determination is made regarding whether the program-code-based operational state represents a violation of a security policy by evaluating the information with respect to multiple security policies each of with defines at least one parameter condition violation of which is potentially indicative of unauthorized activity on the computer system or manipulation of the computer system to make the computer system vulnerable to attack. When a violation exists then a remediation is identified and deployed to the computer system. The violation is based at least in part on one or more of: whether a particular process is running; the existence, version or status of a particular application; and a version, type or configuration of an operating system installed.
    Type: Grant
    Filed: May 17, 2014
    Date of Patent: December 16, 2014
    Assignee: Fortinet, Inc.
    Inventors: Daniel B. Bezilla, John L. Immordino, James Le Ogura
  • Publication number: 20140304767
    Abstract: Methods and systems for remediating a security policy violation on a computer system are provided. According to one embodiment, information regarding a program-code-based operational state of a computer system is periodically sampled. A determination is made regarding whether the program-code-based operational state represents a violation of a security policy by evaluating the information with respect to multiple security policies each of with defines at least one parameter condition violation of which is potentially indicative of unauthorized activity on the computer system or manipulation of the computer system to make the computer system vulnerable to attack. When a violation exists then a remediation is identified and deployed to the computer system. The violation is based at least in part on one or more of: whether a particular process is running; the existence, version or status of a particular application; and a version, type or configuration of an operating system installed.
    Type: Application
    Filed: May 17, 2014
    Publication date: October 9, 2014
    Applicant: FORTINET, INC.
    Inventors: Daniel B. Bezilla, John L. Immordino, James Le Ogura
  • Patent number: 8776170
    Abstract: Methods and systems for remediating a security policy violation on a computer system are provided. According to one embodiment, information is received by one computer system regarding a program-code-based operational state of another computer system at a particular time. It is determined whether the program-code-based operational state represents a violation of security policies that have been applied to or are active in regard to the computer system at issue by evaluating the received information with respect to the security policies. Each security policy defines at least one parameter condition violation of which is potentially indicative of unauthorized activity or manipulation to make the computer system at issue vulnerable to attack. When a security policy violation is detected, then a remediation is identified that can address the violation; and the remediation is caused to be deployed to the computer system at issue.
    Type: Grant
    Filed: August 31, 2013
    Date of Patent: July 8, 2014
    Assignee: Fortinet, Inc.
    Inventors: Daniel B. Bezilla, John L. Immordino, James Le Ogura
  • Publication number: 20140130120
    Abstract: Methods and systems for remediating a security policy violation on a computer system are provided. According to one embodiment, an agent running on an endpoint system collects information regarding a program-code-based operational state of the endpoint system. The agent transmits the information to a remote computer system via a network coupling the endpoint system and the remote computer system in communication. The remote computer system enforces one or more security policies with respect to the endpoint system based on the received information.
    Type: Application
    Filed: January 11, 2014
    Publication date: May 8, 2014
    Applicant: COLORADO REMEDIATION TECHNOLOGIES, LLC
    Inventors: Daniel B. Bezilla, John L. Immordino, James Le Ogura
  • Publication number: 20140013385
    Abstract: Methods and systems for remediating a security policy violation on a computer system are provided. According to one embodiment, information is received by one computer system regarding a program-code-based operational state of another computer system at a particular time. It is determined whether the program-code-based operational state represents a violation of security policies that have been applied to or are active in regard to the computer system at issue by evaluating the received information with respect to the security policies. Each security policy defines at least one parameter condition violation of which is potentially indicative of unauthorized activity or manipulation to make the computer system at issue vulnerable to attack. When a security policy violation is detected, then a remediation is identified that can address the violation; and the remediation is caused to be deployed to the computer system at issue.
    Type: Application
    Filed: August 31, 2013
    Publication date: January 9, 2014
    Applicant: Colorado Remediation Technologies, LLC
    Inventors: Daniel B. Bezilla, John L. Immordino, James Le Ogura
  • Patent number: 8561134
    Abstract: Methods and systems for automatically determining one or more remediations for a remotely monitored host asset are provided. According to one embodiment, a policy database, having stored therein policies defines at least one parameter condition violation of which is potentially indicative of unauthorized activity or manipulation of the host asset, is maintained by a remote server. The remote server receives via a network, a value of a parameter of the host asset. The parameter value is one of multiple parameter values that collectively characterize an operational state of the host asset. A determination is made whether there is a policy violation based on the parameter value by retrieving and evaluating one or more policies with reference to the parameter value. When a policy violation is confirmed, a remediation is retrieved from a remediation database associated with the remote server and the remediation is deployed to the host asset.
    Type: Grant
    Filed: December 14, 2012
    Date of Patent: October 15, 2013
    Assignee: Colorado Remediation Technologies, LLC
    Inventors: Daniel B. Bezilla, John L. Immordino, James Le Ogura
  • Patent number: 8341691
    Abstract: A method, of automatically determining one or more remediations for a device that includes a processor, may include: receiving values of a plurality of parameters which collectively characterize an operational state of the device, there being at least one policy associated with at least a given one of the plurality of parameters, policy defining as a condition thereof one or more potential values of, or based upon, the given parameter, satisfaction of the condition potentially being indicative of unauthorized activity or manipulation of the device; automatically determining, from the received parameter values, whether the conditions for any policies are satisfied, respectively; and automatically selecting one or more remediations for the device according to the satisfied policies, respectively.
    Type: Grant
    Filed: December 17, 2009
    Date of Patent: December 25, 2012
    Assignee: Colorado Remediation Technologies, LLC
    Inventors: Daniel Bailey Bezilla, John Leonard Immordina, James Le Ogura
  • Patent number: 8336103
    Abstract: A machine-actionable memory may include: one or more machine-actionable records arranged according to a data structure, the data structure including links that respectively map between at least one R_ID field, the contents of which denote an identification (ID) of a remediation (R_ID); and at least one POL_ID field, the contents of which denotes an ID of at least one policy (POL_ID), the at-least-one policy respectively defining a condition satisfaction of which is potentially indicative of unauthorized activity or manipulation of the device.
    Type: Grant
    Filed: June 21, 2010
    Date of Patent: December 18, 2012
    Assignee: Fortinet, Inc.
    Inventors: Daniel Bailey Bezilla, John Leonard Immordino, James Le Ogura, Sachchida Nand Ojha
  • Patent number: 8315680
    Abstract: In a cold superconducting joint, a joint cup is provided. Lengths of superconducting filaments are placed in the joint cup. A superconducting material fills the joint cup in contact with the superconducting filaments and in thermal and mechanical contact with a pipe carrying a cryogen. The pipe extends into the joint cup and the superconducting material extends around the pipe within the joint cup.
    Type: Grant
    Filed: January 25, 2012
    Date of Patent: November 20, 2012
    Assignee: Siemens PLC
    Inventors: Mark James Le Feuvre, Michael Simpkins
  • Publication number: 20120190553
    Abstract: In a cold superconducting joint, a joint cup is provided. Lengths of superconducting filaments are placed in the joint cup. A superconducting material fills the joint cup in contact with the superconducting filaments and in thermal and mechanical contact with a pipe carrying a cryogen. The pipe extends into the joint cup and the superconducting material extends around the pipe within the joint cup.
    Type: Application
    Filed: January 25, 2012
    Publication date: July 26, 2012
    Inventors: Mark James Le Feuvre, Michael Simpkins