Patents by Inventor James Le
James Le has filed for patents to protect the following inventions. This listing includes patent applications that are pending as well as patents that have already been granted by the United States Patent and Trademark Office (USPTO).
-
Patent number: 9602550Abstract: Methods and systems for remediating a security policy violation on a computer system are provided. According to one embodiment, information regarding a program-code-based operational state of a host asset is collected by a light weight sensor (LWS) running on the host asset via a survey tool. The information is transmitted by the LWS to a remote server via an external network. Multiple security policies are enforced by the remote server with respect to the host asset based on the received information including determining whether the program-code-based operational state of the host asset represents a violation of one or more security policies, by evaluating, the received information with respect to the security policies, each of which define at least one parameter condition violation of which is potentially indicative of unauthorized activity on the host asset or manipulation of the host asset making the host asset vulnerable to attack.Type: GrantFiled: May 16, 2016Date of Patent: March 21, 2017Assignee: Fortinet, Inc.Inventors: Daniel B. Bezilla, John L. Immordino, James Le Ogura
-
Publication number: 20170051829Abstract: A seal section for use in a downhole submersible pumping system includes one or more fluid separation mechanisms, a shaft and one or more primary mechanical seals. Each of the one or more primary mechanical seals is disposed along the shaft. The seal section also includes one or more redundant shaft seals that each substantially surrounds a corresponding one of the one or more primary mechanical seals. In another aspect, a seal section for use in a pumping system includes one or more fluid separation mechanisms, a shaft, a primary mechanical seal and a redundant shaft seal. The redundant shaft seal substantially surrounds the primary mechanical seal. The seal section further includes an internal seal chamber defined by the annular space between the primary mechanical seal and the redundant shaft seal.Type: ApplicationFiled: May 1, 2014Publication date: February 23, 2017Inventors: Charles COLLINS, James LE
-
Publication number: 20160269444Abstract: Methods and systems for remediating a security policy violation on a computer system are provided. According to one embodiment, information regarding a program-code-based operational state of a host asset is collected by a light weight sensor (LWS) running on the host asset via a survey tool. The information is transmitted by the LWS to a remote server via an external network. Multiple security policies are enforced by the remote server with respect to the host asset based on the received information including determining whether the program-code-based operational state of the host asset represents a violation of one or more security policies, by evaluating, the received information with respect to the security policies, each of which define at least one parameter condition violation of which is potentially indicative of unauthorized activity on the host asset or manipulation of the host asset making the host asset vulnerable to attack.Type: ApplicationFiled: May 16, 2016Publication date: September 15, 2016Applicant: Fortinet, Inc.Inventors: Daniel B. Bezilla, John L. Immordino, James Le Ogura
-
Patent number: 9392024Abstract: Methods and systems for remediating a security policy violation on a computer system are provided. According to one embodiment, information regarding a program-code-based operational state of a host asset is collected by a light weight sensor (LWS) running on the host asset via a survey tool. The information is transmitted by the LWS to a remote server via an external network. Multiple security policies are enforced by the remote server with respect to the host asset based on the received information including determining whether the program-code-based operational state of the host asset represents a violation of one or more security policies, by evaluating, the received information with respect to the security policies, each of which define at least one parameter condition violation of which is potentially indicative of unauthorized activity on the host asset or manipulation of the host asset making the host asset vulnerable to attack.Type: GrantFiled: August 18, 2015Date of Patent: July 12, 2016Assignee: Fortinet, Inc.Inventors: Daniel B. Bezilla, John L. Immordino, James Le Ogura
-
Publication number: 20160097243Abstract: A pumping system useful for pumping fluids from a subterranean formation to a surface facility includes a first component and a second component connected to the first component with a neck flange. The pumping system further includes a motor lead cable that provides electrical power from the surface facility to the pumping system and a cable protector connected to the neck flange that secures the motor lead cable to the first and second components. The cable protector includes a first clamp section and a second clamp section. The second clamp section includes a lead cable recess that extends in a longitudinal direction along the exterior of the second clamp section and a band recess that extends in a circumferential direction along the exterior of the second clamp section. A tie or band resides in the band recess and extends around the circumference of the cable protector to secure the motor lead cable within the lead cable recess.Type: ApplicationFiled: October 2, 2014Publication date: April 7, 2016Inventors: Aaron Noakes, James Le
-
Publication number: 20160076550Abstract: A seal section for use in a downhole submersible pumping system includes redundant fluid separation mechanisms. The fluid separation mechanisms are bag seal assemblies, labyrinth seals, pistons and bellows. The seal section further includes a shaft, one or more shaft seals and a bag support tube. An annulus between the shaft and the shaft support tube provides a fluid flow path from a motor to the fluid separation mechanisms.Type: ApplicationFiled: September 17, 2015Publication date: March 17, 2016Applicant: GE OIL & GAS ESP, INC.Inventors: Charles Collins, James Le
-
Publication number: 20150358360Abstract: Methods and systems for remediating a security policy violation on a computer system are provided. According to one embodiment, information regarding a program-code-based operational state of a host asset is collected by a light weight sensor (LWS) running on the host asset via a survey tool. The information is transmitted by the LWS to a remote server via an external network. Multiple security policies are enforced by the remote server with respect to the host asset based on the received information including determining whether the program-code-based operational state of the host asset represents a violation of one or more security policies, by evaluating, the received information with respect to the security policies, each of which define at least one parameter condition violation of which is potentially indicative of unauthorized activity on the host asset or manipulation of the host asset making the host asset vulnerable to attack.Type: ApplicationFiled: August 18, 2015Publication date: December 10, 2015Applicant: FORTINET, INC.Inventors: Daniel B. Bezilla, John L. Immordino, James Le Ogura
-
Patent number: 9154523Abstract: Methods and systems for remediating a security policy violation on a computer system are provided. According to one embodiment, a first computer system receives information regarding an operational state of a second computer system. It is determined whether the operational state represents a violation of a security policy that has been applied to or is active in regard to the second computer system by evaluating the received information with respect to the multiple security policies. Each security policy defines a parameter condition violation of which is potentially indicative of unauthorized activity on or manipulation of the second computer system to make it vulnerable to attack. When a result of the determination is affirmative, then a remediation is identified by the first computer system that can be applied to the second computer system to address the violation; and the remediation is deployed to the second computer system.Type: GrantFiled: February 13, 2015Date of Patent: October 6, 2015Assignee: Fortinet, Inc.Inventors: Daniel B. Bezilla, John L. Immordino, James Le Ogura
-
Publication number: 20150163249Abstract: Methods and systems for remediating a security policy violation on a computer system are provided. According to one embodiment, a first computer system receives information regarding an operational state of a second computer system. It is determined whether the operational state represents a violation of a security policy that has been applied to or is active in regard to the second computer system by evaluating the received information with respect to the multiple security policies. Each security policy defines a parameter condition violation of which is potentially indicative of unauthorized activity on or manipulation of the second computer system to make it vulnerable to attack. When a result of the determination is affirmative, then a remediation is identified by the first computer system that can be applied to the second computer system to address the violation; and the remediation is deployed to the second computer system.Type: ApplicationFiled: February 13, 2015Publication date: June 11, 2015Applicant: Fortinet, Inc.Inventors: Daniel B. Bezilla, John L. Immordino, James Le Ogura
-
Patent number: 8984586Abstract: Methods and systems for remediating a security policy violation on a computer system are provided. According to one embodiment, an agent running on an endpoint system collects information regarding a program-code-based operational state of the endpoint system. The agent transmits the information to a remote computer system via a network coupling the endpoint system and the remote computer system in communication. The remote computer system enforces one or more security policies with respect to the endpoint system based on the received information.Type: GrantFiled: January 11, 2014Date of Patent: March 17, 2015Assignee: Fortinet, Inc.Inventors: Daniel B. Bezilla, John L. Immordino, James Le Ogura
-
Patent number: 8914846Abstract: Methods and systems for remediating a security policy violation on a computer system are provided. According to one embodiment, information regarding a program-code-based operational state of a computer system is periodically sampled. A determination is made regarding whether the program-code-based operational state represents a violation of a security policy by evaluating the information with respect to multiple security policies each of with defines at least one parameter condition violation of which is potentially indicative of unauthorized activity on the computer system or manipulation of the computer system to make the computer system vulnerable to attack. When a violation exists then a remediation is identified and deployed to the computer system. The violation is based at least in part on one or more of: whether a particular process is running; the existence, version or status of a particular application; and a version, type or configuration of an operating system installed.Type: GrantFiled: May 17, 2014Date of Patent: December 16, 2014Assignee: Fortinet, Inc.Inventors: Daniel B. Bezilla, John L. Immordino, James Le Ogura
-
Publication number: 20140304767Abstract: Methods and systems for remediating a security policy violation on a computer system are provided. According to one embodiment, information regarding a program-code-based operational state of a computer system is periodically sampled. A determination is made regarding whether the program-code-based operational state represents a violation of a security policy by evaluating the information with respect to multiple security policies each of with defines at least one parameter condition violation of which is potentially indicative of unauthorized activity on the computer system or manipulation of the computer system to make the computer system vulnerable to attack. When a violation exists then a remediation is identified and deployed to the computer system. The violation is based at least in part on one or more of: whether a particular process is running; the existence, version or status of a particular application; and a version, type or configuration of an operating system installed.Type: ApplicationFiled: May 17, 2014Publication date: October 9, 2014Applicant: FORTINET, INC.Inventors: Daniel B. Bezilla, John L. Immordino, James Le Ogura
-
Patent number: 8776170Abstract: Methods and systems for remediating a security policy violation on a computer system are provided. According to one embodiment, information is received by one computer system regarding a program-code-based operational state of another computer system at a particular time. It is determined whether the program-code-based operational state represents a violation of security policies that have been applied to or are active in regard to the computer system at issue by evaluating the received information with respect to the security policies. Each security policy defines at least one parameter condition violation of which is potentially indicative of unauthorized activity or manipulation to make the computer system at issue vulnerable to attack. When a security policy violation is detected, then a remediation is identified that can address the violation; and the remediation is caused to be deployed to the computer system at issue.Type: GrantFiled: August 31, 2013Date of Patent: July 8, 2014Assignee: Fortinet, Inc.Inventors: Daniel B. Bezilla, John L. Immordino, James Le Ogura
-
Publication number: 20140130120Abstract: Methods and systems for remediating a security policy violation on a computer system are provided. According to one embodiment, an agent running on an endpoint system collects information regarding a program-code-based operational state of the endpoint system. The agent transmits the information to a remote computer system via a network coupling the endpoint system and the remote computer system in communication. The remote computer system enforces one or more security policies with respect to the endpoint system based on the received information.Type: ApplicationFiled: January 11, 2014Publication date: May 8, 2014Applicant: COLORADO REMEDIATION TECHNOLOGIES, LLCInventors: Daniel B. Bezilla, John L. Immordino, James Le Ogura
-
Publication number: 20140013385Abstract: Methods and systems for remediating a security policy violation on a computer system are provided. According to one embodiment, information is received by one computer system regarding a program-code-based operational state of another computer system at a particular time. It is determined whether the program-code-based operational state represents a violation of security policies that have been applied to or are active in regard to the computer system at issue by evaluating the received information with respect to the security policies. Each security policy defines at least one parameter condition violation of which is potentially indicative of unauthorized activity or manipulation to make the computer system at issue vulnerable to attack. When a security policy violation is detected, then a remediation is identified that can address the violation; and the remediation is caused to be deployed to the computer system at issue.Type: ApplicationFiled: August 31, 2013Publication date: January 9, 2014Applicant: Colorado Remediation Technologies, LLCInventors: Daniel B. Bezilla, John L. Immordino, James Le Ogura
-
Patent number: 8561134Abstract: Methods and systems for automatically determining one or more remediations for a remotely monitored host asset are provided. According to one embodiment, a policy database, having stored therein policies defines at least one parameter condition violation of which is potentially indicative of unauthorized activity or manipulation of the host asset, is maintained by a remote server. The remote server receives via a network, a value of a parameter of the host asset. The parameter value is one of multiple parameter values that collectively characterize an operational state of the host asset. A determination is made whether there is a policy violation based on the parameter value by retrieving and evaluating one or more policies with reference to the parameter value. When a policy violation is confirmed, a remediation is retrieved from a remediation database associated with the remote server and the remediation is deployed to the host asset.Type: GrantFiled: December 14, 2012Date of Patent: October 15, 2013Assignee: Colorado Remediation Technologies, LLCInventors: Daniel B. Bezilla, John L. Immordino, James Le Ogura
-
Patent number: 8341691Abstract: A method, of automatically determining one or more remediations for a device that includes a processor, may include: receiving values of a plurality of parameters which collectively characterize an operational state of the device, there being at least one policy associated with at least a given one of the plurality of parameters, policy defining as a condition thereof one or more potential values of, or based upon, the given parameter, satisfaction of the condition potentially being indicative of unauthorized activity or manipulation of the device; automatically determining, from the received parameter values, whether the conditions for any policies are satisfied, respectively; and automatically selecting one or more remediations for the device according to the satisfied policies, respectively.Type: GrantFiled: December 17, 2009Date of Patent: December 25, 2012Assignee: Colorado Remediation Technologies, LLCInventors: Daniel Bailey Bezilla, John Leonard Immordina, James Le Ogura
-
Patent number: 8336103Abstract: A machine-actionable memory may include: one or more machine-actionable records arranged according to a data structure, the data structure including links that respectively map between at least one R_ID field, the contents of which denote an identification (ID) of a remediation (R_ID); and at least one POL_ID field, the contents of which denotes an ID of at least one policy (POL_ID), the at-least-one policy respectively defining a condition satisfaction of which is potentially indicative of unauthorized activity or manipulation of the device.Type: GrantFiled: June 21, 2010Date of Patent: December 18, 2012Assignee: Fortinet, Inc.Inventors: Daniel Bailey Bezilla, John Leonard Immordino, James Le Ogura, Sachchida Nand Ojha
-
Patent number: 8315680Abstract: In a cold superconducting joint, a joint cup is provided. Lengths of superconducting filaments are placed in the joint cup. A superconducting material fills the joint cup in contact with the superconducting filaments and in thermal and mechanical contact with a pipe carrying a cryogen. The pipe extends into the joint cup and the superconducting material extends around the pipe within the joint cup.Type: GrantFiled: January 25, 2012Date of Patent: November 20, 2012Assignee: Siemens PLCInventors: Mark James Le Feuvre, Michael Simpkins
-
Publication number: 20120190553Abstract: In a cold superconducting joint, a joint cup is provided. Lengths of superconducting filaments are placed in the joint cup. A superconducting material fills the joint cup in contact with the superconducting filaments and in thermal and mechanical contact with a pipe carrying a cryogen. The pipe extends into the joint cup and the superconducting material extends around the pipe within the joint cup.Type: ApplicationFiled: January 25, 2012Publication date: July 26, 2012Inventors: Mark James Le Feuvre, Michael Simpkins