Patents by Inventor Jason V. Miller

Jason V. Miller has filed for patents to protect the following inventions. This listing includes patent applications that are pending as well as patents that have already been granted by the United States Patent and Trademark Office (USPTO).

  • Patent number: 11963691
    Abstract: A surgical instrument, has an end effector that includes an ultrasonic blade, and a clamp arm that moves relative to the ultrasonic blade from an opened position toward an intermediate position and a closed position. The clamp arm is offset from the ultrasonic blade to define a predetermined gap in the intermediate position between the opened position and the closed position. A clamp arm actuator connects to the clamp arm and moves from an opened configuration to a closed configuration to direct the clamp arm from the opened position toward the intermediate position and the closed position. A spacer connects with the clamp arm to inhibit movement of the clamp arm from the intermediate position toward the closed position for maintaining the predetermined gap between the clamp arm and the ultrasonic blade.
    Type: Grant
    Filed: December 21, 2020
    Date of Patent: April 23, 2024
    Assignee: Cilag GmbH International
    Inventors: Ryan M. Asher, Brian D. Black, John E. Brady, Joseph Dennis, Geni M. Giannotti, Bryce L. Heitman, Timothy S. Holland, Joseph E. Hollo, Andrew Kolpitcke, Amy M. Krumm, Jason R. Lesko, Matthew C. Miller, David A. Monroe, Ion V. Nicolaescu, Rafael J. Ruiz Ortiz, Matthew S. Schneider, Richard C. Smith, Shawn C. Snyder, Sarah A. Worthington, Monica L. Rivard, Fajian Zhang
  • Patent number: 11063975
    Abstract: A server obtains security intelligence data used for classifying whether data associated with user activity in a network is undesirable, and classifies the data based on the security intelligence data. The server provides an initial classifying result of the data to a device associated with the data. At a subsequent time, the server obtains updated security intelligence data and re-classifies whether the first data is undesirable based on the updated security intelligence data. Responsive to a determination that the initial classifying result is changed based on the re-classifying, the server provides an updated classifying result to the device associated with the data.
    Type: Grant
    Filed: January 9, 2020
    Date of Patent: July 13, 2021
    Assignee: CISCO TECHNOLOGY, INC.
    Inventors: Jason V. Miller, Adam J. O'Donnell
  • Publication number: 20200153848
    Abstract: A server obtains security intelligence data used for classifying whether data associated with user activity in a network is undesirable, and classifies the data based on the security intelligence data. The server provides an initial classifying result of the data to a device associated with the data. At a subsequent time, the server obtains updated security intelligence data and re-classifies whether the first data is undesirable based on the updated security intelligence data. Responsive to a determination that the initial classifying result is changed based on the re-classifying, the server provides an updated classifying result to the device associated with the data.
    Type: Application
    Filed: January 9, 2020
    Publication date: May 14, 2020
    Inventors: Jason V. Miller, Adam J. O'Donnell
  • Patent number: 10554678
    Abstract: A method includes: at a server, obtaining security intelligence data used for classifying whether a data associated with a user activity in a network is undesirable at a first time; classifying whether a first data in the network is undesirable based on the security intelligence data; receiving a request for classifying whether a second data is undesirable based on the security intelligence data; determining whether the server is overloaded with tasks; if the server is determined to be overloaded with tasks: logging the second data in a repository, and tagging the second data to re-visit classification of the second data; and when the server is no longer overloaded, classifying whether the second data is undesirable to produce a second classifying result and re-classifying whether the first data is undesirable based on updated security intelligence data obtained by the server.
    Type: Grant
    Filed: July 26, 2017
    Date of Patent: February 4, 2020
    Assignee: Cisco Technology, Inc.
    Inventors: Jason V. Miller, Adam J. O'Donnell
  • Publication number: 20190036949
    Abstract: A method includes: at a server, obtaining security intelligence data used for classifying whether a data associated with a user activity in a network is undesirable at a first time; classifying whether a first data in the network is undesirable based on the security intelligence data; receiving a request for classifying whether a second data is undesirable based on the security intelligence data; determining whether the server is overloaded with tasks; if the server is determined to be overloaded with tasks: logging the second data in a repository, and tagging the second data to re-visit classification of the second data; and when the server is no longer overloaded, classifying whether the second data is undesirable to produce a second classifying result and re-classifying whether the first data is undesirable based on updated security intelligence data obtained by the server.
    Type: Application
    Filed: July 26, 2017
    Publication date: January 31, 2019
    Inventors: Jason V. Miller, Adam J. O'Donnell