Patents by Inventor James William Murray

James William Murray has filed for patents to protect the following inventions. This listing includes patent applications that are pending as well as patents that have already been granted by the United States Patent and Trademark Office (USPTO).

  • Patent number: 11939321
    Abstract: The invention provides a compound of formula (0): or a pharmaceutically acceptable salt, N-oxide or tautomer thereof; wherein: n is 1 or 2; X is CH or N; Y is selected from CH and C—F; Z is selected from C—Rz and N; R1 is selected from: -(Alk1)t-Cyc1; wherein t is 0 or 1; Optionally substituted C1-6 acyclic hydrocarbon groups R2 is selected from hydrogen; halogen; and C1-3 hydrocarbon groups optionally substituted with one or more fluorine atoms; R3 is hydrogen or a group L1-R7; R4 is selected from hydrogen; methoxy; and optionally substituted C1-3 alkyl; and R4a is selected from hydrogen and a C1-3 alkyl group; wherein Rz, Alk1, Cyc1, L1 and R7 are defined herein; provided that the compound is other than 6-benzyl-3-{2-[(2-methylpyrimidin-4-yl)amino]pyridin-4-yl}-7,8-dihydro-1,6-naphthyridin-5(6H)-one and 3-{2-[(2-methylpyrimidin-4-yl)amino]pyridin-4-yl}-7,8-dihydro-1,6-naphthyridin-5(6H)-one and salts and tautomers thereof.
    Type: Grant
    Filed: April 7, 2021
    Date of Patent: March 26, 2024
    Assignee: OTSUKA PHARMACEUTICAL CO., LTD.
    Inventors: Valerio Berdini, Ildiko Maria Buck, James Edward Harvey Day, Charlotte Mary Griffiths-Jones, Thomas Daniel Heightman, Steven Howard, Christopher William Murray, David Norton, Marc O'Reilly, Alison Jo-Anne Woolford, Michael Liam Cooke, David Cousin, Stuart Thomas Onions, Jonathan Martin Shannon, John Paul Watts
  • Patent number: 9734450
    Abstract: A method includes a computing device receiving data traffic flow and initializing a subroutine to assess alerts for the received data traffic flow; the computer device determining a collection of rules which produce more than a threshold of false positive alerts and more than a threshold of true positive alerts for the assessed alerts; the computer device determining a logical condition and an atomic rule element to add to the collection of rules; and the computer device implementing the added logical condition and atomic rule element if the number of assessed alerts are decreased below a value.
    Type: Grant
    Filed: June 5, 2014
    Date of Patent: August 15, 2017
    Assignee: Lenovo Enterprise Solutions (Singapore) Pte. Ltd.
    Inventors: Charles Steven Lingafelt, James William Murray, James Thomas Swantek, James Steven Worely
  • Publication number: 20150356445
    Abstract: A method includes a computing device receiving data traffic flow and initializing a subroutine to assess alerts for the received data traffic flow; the computer device determining a collection of rules which produce more than a threshold of false positive alerts and more than a threshold of true positive alerts for the assessed alerts; the computer device determining a logical condition and an atomic rule element to add to the collection of rules; and the computer device implementing the added logical condition and atomic rule element if the number of assessed alerts are decreased below a value.
    Type: Application
    Filed: June 5, 2014
    Publication date: December 10, 2015
    Inventors: Charles Steven Lingafelt, James William Murray, James Thomas Swantek, James Steven Worley
  • Patent number: 8806628
    Abstract: In at least one embodiment, a method and a system include capability to fine-tune a data loss prevention system. An example system includes a computer readable storage medium for storing at least one alert database and at least one associated signature set to each alert database; an analytics module in communication to the computer readable storage medium, the analytics module analyzes at least one alert database present on the computer storage medium to determine whether any signatures from the signature set associated with the alert database being analyzed are ineffective based at least on a ratio of valid alerts to false positive alerts for individual signatures selected from a group including a plurality of signatures present in the signature set; and an adjustment module in communication to the computer readable storage medium and the analytics module, the adjustment module removes at least one ineffective signature from the signature set.
    Type: Grant
    Filed: January 4, 2013
    Date of Patent: August 12, 2014
    Assignee: International Business Machines Corporation
    Inventors: Charles Steven Lingafelt, James William Murray, James Thomas Swantek, James Steven Worley
  • Patent number: 8769679
    Abstract: In at least one embodiment, a method and a system include capability to fine-tune a data loss prevention system. An example method includes gaining access to or creating an alert database and a signature set by an analytics module and an adjustment module, where the alert database includes an alert validity attribute for each alert; quantifying for each signature contained in the signature set an effect on the change in the number of alerts from its removal; determining with an analytics module whether any signature has a ratio of valid to false positive alerts less than a threshold; and when at least one signature has the ratio less than the first threshold identifying and removing with an adjustment module at least one signature from the signature database having a ratio less than the threshold where the signature is removed from the signature set, and repeating quantifying and determining.
    Type: Grant
    Filed: December 17, 2012
    Date of Patent: July 1, 2014
    Assignee: International Business Machines Corporation
    Inventors: Charles Steven Lingafelt, James William Murray, James Thomas Swantek, James Steven Worley
  • Publication number: 20140173727
    Abstract: In at least one embodiment, a method and a system include capability to fine-tune a data loss prevention system. An example system includes a computer readable storage medium for storing at least one alert database and at least one associated signature set to each alert database; an analytics module in communication to the computer readable storage medium, the analytics module analyzes at least one alert database present on the computer storage medium to determine whether any signatures from the signature set associated with the alert database being analyzed are ineffective based at least on a ratio of valid alerts to false positive alerts for individual signatures selected from a group including a plurality of signatures present in the signature set; and an adjustment module in communication to the computer readable storage medium and the analytics module, the adjustment module removes at least one ineffective signature from the signature set.
    Type: Application
    Filed: January 4, 2013
    Publication date: June 19, 2014
    Applicant: INTERNATIONAL BUSINESS MACHINES CORPORATION
    Inventors: Charles Steven Lingafelt, James William Murray, James Thomas Swantek, James Steven Worley
  • Publication number: 20140173724
    Abstract: In at least one embodiment, a method and a system include capability to fine-tune a data loss prevention system. An example method includes gaining access to or creating an alert database and a signature set by an analytics module and an adjustment module, where the alert database includes an alert validity attribute for each alert; quantifying for each signature contained in the signature set an effect on the change in the number of alerts from its removal; determining with an analytics module whether any signature has a ratio of valid to false positive alerts less than a threshold; and when at least one signature has the ratio less than the first threshold identifying and removing with an adjustment module at least one signature from the signature database having a ratio less than the threshold where the signature is removed from the signature set, and repeating quantifying and determining.
    Type: Application
    Filed: December 17, 2012
    Publication date: June 19, 2014
    Applicant: INTERNATIONAL BUSINESS MACHINES CORPORATION
    Inventors: Charles Steven Lingafelt, James William Murray, James Thomas Swantek, James Steven Worley
  • Patent number: 8635683
    Abstract: An embodiment of the invention provides a method for detecting fraudulent use of a moderator passcode in a conference calling system. The method sets a threshold number of moderator passcodes permitted in a conference call. The total number of moderator passcodes entered into the conference call is determined and compared to the threshold number with a processor. The conference call is allowed to continue if the threshold number exceeds the total number of moderator passcodes entered into the conference call. If, however, the total number of moderator passcodes exceeds the threshold number of moderator passcodes, the processor performs validation actions and/or alert actions.
    Type: Grant
    Filed: December 4, 2009
    Date of Patent: January 21, 2014
    Assignee: International Business Machines Corporation
    Inventors: Charles Steven Lingafelt, James William Murray, James Thomas Swantek
  • Patent number: 8494142
    Abstract: An embodiment of the invention includes a method for detecting fraudulent use in a conference calling system. One or more time duration thresholds are received for a conference call. The conference call is monitored to determine an attendee duration, a participants duration, and/or a conference call duration. The attendee duration represents the call duration of an attendee of the conference call; the participants duration represents the total call duration of all of the attendees combined; and, the conference call duration represents the call duration of the conference call. The time duration thresholds are compared to the attendee duration, participants duration, and/or conference call duration. Actions are performed by a processor if the attendee duration, participants duration, and/or conference call duration exceeds the time duration thresholds.
    Type: Grant
    Filed: December 4, 2009
    Date of Patent: July 23, 2013
    Assignee: International Business Machines Corporation
    Inventors: Charles Steven Lingafelt, James William Murray, James Thomas Swantek
  • Patent number: 8243904
    Abstract: An embodiment of the invention includes a method for detecting fraudulent use in a conference calling system. A threshold period is received, wherein the threshold period indicates the maximum allowable time period for a participant of a conference call to enter the conference call prior to the entry of the moderator of the conference call. A monitor detects the entry of the moderator into the conference call and entry of the participants into the conference call. A waiting period is determined for one or more of the participants, wherein the waiting period represents the time period between the entry of the moderator and the entry of the participant. A processor compares the waiting period to the threshold period. If the threshold period exceeds the waiting period, the conference call is allowed to continue. In at least one embodiment, actions are performed with the processor if the waiting period exceeds the threshold period.
    Type: Grant
    Filed: December 4, 2009
    Date of Patent: August 14, 2012
    Assignee: International Business Machines Corporation
    Inventors: Charles Steven Lingafelt, James William Murray, James Thomas Swantek
  • Publication number: 20110135081
    Abstract: An embodiment of the invention includes a method for detecting fraudulent use in a conference calling system. One or more access parameters are received, wherein the access parameters include an authorized day of week parameter, an authorized time of day parameter, and/or an authorized location parameter. One or more requests to access the conference calling system are received, wherein each request includes a user passcode and one or more request parameters. A processor determines whether the request parameters match the access parameters. Access to the conference calling system is granted when the request parameters match the access parameters; however, the processor performs actions when a request parameter does not match an access parameter.
    Type: Application
    Filed: December 4, 2009
    Publication date: June 9, 2011
    Inventors: Charles Steven Lingafelt, James William Murray, James Thomas Swantek
  • Publication number: 20110135082
    Abstract: An embodiment of the invention includes a method for detecting fraudulent use in a conference calling system. A threshold period is received, wherein the threshold period indicates the maximum allowable time period for a participant of a conference call to enter the conference call prior to the entry of the moderator of the conference call. A monitor detects the entry of the moderator into the conference call and entry of the participants into the conference call. A waiting period is determined for one or more of the participants, wherein the waiting period represents the time period between the entry of the moderator and the entry of the participant. A processor compares the waiting period to the threshold period. If the threshold period exceeds the waiting period, the conference call is allowed to continue. In at least one embodiment, actions are performed with the processor if the waiting period exceeds the threshold period.
    Type: Application
    Filed: December 4, 2009
    Publication date: June 9, 2011
    Inventors: Charles Steven Lingafelt, James William Murray, James Thomas Swantek
  • Publication number: 20110135080
    Abstract: An embodiment of the invention provides a method for detecting fraudulent use of a moderator passcode in a conference calling system. The method sets a threshold number of moderator passcodes permitted in a conference call. The total number of moderator passcodes entered into the conference call is determined and compared to the threshold number with a processor. The conference call is allowed to continue if the threshold number exceeds the total number of moderator passcodes entered into the conference call. If, however, the total number of moderator passcodes exceeds the threshold number of moderator passcodes, the processor performs validation actions and/or alert actions.
    Type: Application
    Filed: December 4, 2009
    Publication date: June 9, 2011
    Inventors: Charles Steven Lingafelt, James William Murray, James Thomas Swantek
  • Publication number: 20110135073
    Abstract: An embodiment of the invention includes a method for detecting fraudulent use in a conference calling system. An authorized device registry is created in an electronic database, wherein the authorized device registry identifies one or more authorized devices permitted to access the conference calling system. A request to access the conference calling system is received from a device; and, a processor determines whether the device is included in the authorized device registry. If the device is included in the authorized device registry, the device is granted access to the conference calling system. If the device is not included in the authorized device registry, however, are performed by the processor.
    Type: Application
    Filed: December 4, 2009
    Publication date: June 9, 2011
    Inventors: Charles Steven Lingafelt, James William Murray, James Thomas Swantek
  • Publication number: 20110135083
    Abstract: An embodiment of the invention includes a method for detecting fraudulent use in a conference calling system. One or more time duration thresholds are received for a conference call. The conference call is monitored to determine an attendee duration, a participants duration, and/or a conference call duration. The attendee duration represents the call duration of an attendee of the conference call; the participants duration represents the total call duration of all of the attendees combined; and, the conference call duration represents the call duration of the conference call. The time duration thresholds are compared to the attendee duration, participants duration, and/or conference call duration. Actions are performed by a processor if the attendee duration, participants duration, and/or conference call duration exceeds the time duration thresholds.
    Type: Application
    Filed: December 4, 2009
    Publication date: June 9, 2011
    Inventors: Charles Steven Lingafelt, James William Murray, James Thomas Swantek