Patents by Inventor Jeremy Bennett

Jeremy Bennett has filed for patents to protect the following inventions. This listing includes patent applications that are pending as well as patents that have already been granted by the United States Patent and Trademark Office (USPTO).

  • Patent number: 11914759
    Abstract: Examples of augmented reality (AR) environment control advantageously employ multi-factor intention determination and include: performing a multi-factor intention determination for summoning a control object (e.g., a menu, a keyboard, or an input panel) using a set of indications in an AR environment, the set of indications comprising a plurality of indications (e.g., two or more of a palm-facing gesture, an eye gaze, a head gaze, and a finger position simultaneously); and based on at least the set of indications indicating a summoning request by a user, displaying the control object in a position proximate to the user in the AR environment (e.g., docked to a hand of the user). Some examples continue displaying the control object while at least one indication remains, and continue displaying the control object during a timer period if one of the indications is lost.
    Type: Grant
    Filed: January 19, 2022
    Date of Patent: February 27, 2024
    Assignee: Microsoft Technology Licensing, LLC.
    Inventors: Andrew Jackson Klein, Cory Ryan Bramall, Kyle Mouritsen, Ethan Harris Arnowitz, Jeremy Bruce Kersey, Victor Jia, Justin Thomas Savino, Stephen Michael Lucas, Darren A. Bennett
  • Publication number: 20220188878
    Abstract: Methods and apparatus for efficient execution of modules are disclosed.
    Type: Application
    Filed: February 28, 2022
    Publication date: June 16, 2022
    Inventors: Nicholas Naveen Rau, Ryan O'Hearn, Thomas Sturm, Jeremy Bennett
  • Patent number: 11270356
    Abstract: Methods and apparatus for efficient execution of modules are disclosed. An example method includes generating, by a first module, a first module identifier, the first module having been instantiated by an advertisement on a webpage, loading, by the first module, a component, communicating the module identifier to the component, determining that a second module having a second module identifier has been loaded, and, in response to determining that the second module has been loaded, communicating, by the first module, the second module identifier to the component to instruct the component to communicate with the second module.
    Type: Grant
    Filed: October 19, 2020
    Date of Patent: March 8, 2022
    Assignee: The Nielsen Company (US), LLC
    Inventors: Nicholas Naveen Rau, Ryan O'Hearn, Thomas Sturm, Jeremy Bennett
  • Publication number: 20210035168
    Abstract: Methods and apparatus for efficient execution of modules are disclosed.
    Type: Application
    Filed: October 19, 2020
    Publication date: February 4, 2021
    Inventors: Nicholas Naveen Rau, Ryan O'Hearn, Thomas Sturm, Jeremy Bennett
  • Patent number: 10810634
    Abstract: Methods and apparatus for efficient execution of modules are disclosed. An example method includes generating, by a first module, a first module identifier, the first module having been instantiated by an advertisement on a webpage, loading, by the first module, a component, communicating the module identifier to the component, determining that a second module having a second module identifier has been loaded, and, in response to determining that the second module has been loaded, communicating, by the first module, the second module identifier to the component to instruct the component to communicate with the second module.
    Type: Grant
    Filed: February 8, 2013
    Date of Patent: October 20, 2020
    Assignee: The Nielsen Company (US), LLC
    Inventors: Nicholas Naveen Rau, Ryan O'Hearn, Thomas Sturm, Jeremy Bennett
  • Patent number: 10530720
    Abstract: In an example, there is disclosed a computing apparatus, including a user notification interface; a context interface; and one or more logic elements forming a contextual privacy engine operable to: receive a notification; receive a context via the context interface; apply the context to the notification via a notification rule; and take an action via the user notification interface based at least in part on the applying. The contextual privacy engine may also be operable to mathematically incorporate user feedback into the notification rule. There is also described a method of providing a contextual privacy engine, and one or more computer-readable storage mediums having stored thereon executable instructions for providing a contextual privacy engine.
    Type: Grant
    Filed: August 27, 2015
    Date of Patent: January 7, 2020
    Assignee: McAfee, LLC
    Inventors: Raj Vardhan, Igor Tatourian, Dattatraya Kulkarni, Jeremy Bennett, Samrat Chitta, Reji Gopalakrishnan, Muralitharan Chithanathan
  • Patent number: 9870466
    Abstract: There is disclosed in one example, a computing apparatus, including: first one or more logic elements providing a code module, the code module comprising a member having a branching policy designating either a public or private member; second one or more logic elements providing a policy engine, operable to: receive a first branch instruction to the member; determine that the branch instructions does not meet the policy; and take a security action. There is also disclosed a method of providing a policy engine, and a computer-readable medium having stored thereon executable instructions for providing a policy engine.
    Type: Grant
    Filed: September 26, 2015
    Date of Patent: January 16, 2018
    Assignee: McAfee, Inc.
    Inventors: Carl D. Woodward, Jennifer Eligius Mankin, Jeremy Bennett
  • Patent number: 9762591
    Abstract: In an example, a system and method are provided for validating the sender of a message, such as an e-mail, text message, voice mail, network message, internet posting, or other electronic message. An authenticity server engine may first prescreen the message with anti-spam, anti-malware, and other filters. The screened message is then provided to the end user. If the end user deems the message suspicious, he may request additional validation. The authenticity server engine may then apply an example four-phase validation scheme, including analyzing header data for consistency with the message body, analyzing public data sources, analyzing private data sources, and receiving a result of an off-channel challenge to the sender. The server may then assign the message a sender validity confidence score.
    Type: Grant
    Filed: December 27, 2014
    Date of Patent: September 12, 2017
    Assignee: McAfee, Inc.
    Inventors: Neeta Srivastava, Yi Zheng, Jeremy Bennett
  • Publication number: 20170091444
    Abstract: There is disclosed in one example, a computing apparatus, including: first one or more logic elements providing a code module, the code module comprising a member having a branching policy designating either a public or private member; second one or more logic elements providing a policy engine, operable to: receive a first branch instruction to the member; determine that the branch instructions does not meet the policy; and take a security action. There is also disclosed a method of providing a policy engine, and a computer-readable medium having stored thereon executable instructions for providing a policy engine.
    Type: Application
    Filed: September 26, 2015
    Publication date: March 30, 2017
    Applicant: McAfee, Inc.
    Inventors: Carl D. Woodward, Jennifer Eligius Mankin, Jeremy Bennett
  • Publication number: 20170063750
    Abstract: In an example, there is disclosed a computing apparatus, including a user notification interface; a context interface; and one or more logic elements forming a contextual privacy engine operable to: receive a notification; receive a context via the context interface; apply the context to the notification via a notification rule; and take an action via the user notification interface based at least in part on the applying. The contextual privacy engine may also be operable to mathematically incorporate user feedback into the notification rule. There is also described a method of providing a contextual privacy engine, and one or more computer-readable storage mediums having stored thereon executable instructions for providing a contextual privacy engine.
    Type: Application
    Filed: August 27, 2015
    Publication date: March 2, 2017
    Applicant: McAfee, Inc.
    Inventors: Raj Vardhan, Igor Tatourian, Dattatraya Kulkarni, Jeremy Bennett, Samrat Chitta, Reji Gopalakrishnan, Muralitharan Chithanathan
  • Patent number: 9424370
    Abstract: A method and related CAD system and computer readable medium. A method includes loading an object model in a CAD system, the object model including a plurality of parts each of which may contain one or more shapes which in turn are composed of multiple polygons. The method includes adding the shapes to a spatial tree, the shapes each corresponding to at least one cell, each cell corresponding to a spatial region of the object model. The method also includes, for each cell that is too complex to process within a memory space of the CAD system, subdividing the cell into a plurality of subcells using a first subdivision process. The method also includes subdividing each cell into a plurality of subcells using a multi-threaded subdivision process, and combining the subcells into the spatial tree.
    Type: Grant
    Filed: December 3, 2009
    Date of Patent: August 23, 2016
    Assignee: Siemens Product Lifecycle Management Software Inc.
    Inventors: Jeremy Bennett, Michael B. Carter
  • Publication number: 20160191542
    Abstract: In an example, a system and method are provided for validating the sender of a message, such as an e-mail, text message, voice mail, network message, internet posting, or other electronic message. An authenticity server engine may first prescreen the message with anti-spam, anti-malware, and other filters. The screened message is then provided to the end user. If the end user deems the message suspicious, he may request additional validation. The authenticity server engine may then apply an example four-phase validation scheme, including analyzing header data for consistency with the message body, analyzing public data sources, analyzing private data sources, and receiving a result of an off-channel challenge to the sender. The server may then assign the message a sender validity confidence score.
    Type: Application
    Filed: December 27, 2014
    Publication date: June 30, 2016
    Inventors: Neeta Srivastava, Yi Zheng, Jeremy Bennett
  • Patent number: 9078017
    Abstract: The invention relates to a method and device for buffering data for multiplexing. The invention also relates to a method of multiplexing and to a multiplexer arrangement using the method and device for buffering data for multiplexing. In one embodiment the invention can be applied to the buffering of non-traffic data, such as firmware updates or other supplementary information, before multiplexing the non-traffic data with traffic data, such as television data of television channels, to form a satellite broadcast channel. In embodiments of the invention, non-traffic data for multiplexing is buffered and then read out again for multiplexing at a rate which is a function of buffer fullness. The non-traffic data may be multiplexed with at least one traffic data channel. A multiplexer can view the non-traffic data channel as another multiplexing input and can allocate the available bit rate between the traffic data channels and the non-traffic data accordingly.
    Type: Grant
    Filed: November 26, 2010
    Date of Patent: July 7, 2015
    Assignee: Telefonaktiebolaget L M Ericsson (publ)
    Inventors: Jeremy Bennett, Steven Woodhead
  • Patent number: 8988420
    Abstract: A system, method, and computer program for producing a visualization format from CAD data comprising producing a BREP model for visualization, wherein said BREP model has a topology component and a geometry component; removing a plurality of redundant control points from said geometry component; normalizing a plurality of knot vectors and a plurality of weight components from said geometry component; recognizing an analytic geometry from said geometry component; recognizing a plurality of equivalents from said geometry component; and converting said analytic geometry to said light model representation, and appropriate means and computer-readable instructions.
    Type: Grant
    Filed: August 10, 2007
    Date of Patent: March 24, 2015
    Assignee: Siemens Product Lifecycle Management Software Inc.
    Inventors: Jianbing Huang, Michael B. Carter, Andreas Johannsen, Brett Harper, Jeremy Bennett
  • Publication number: 20140245366
    Abstract: The present invention relates to a method of and apparatus for establishing a time base for variable data rate traffic data received from an asynchronous network. In some embodiments, the invention relates to a method of and apparatus for establishing a time base for a compression coded video signal transmitted over an Internet Protocol (IP) network. A method of establishing a traffic data time base for variable data rate traffic data received over an asynchronous network is provided in which a time base for the traffic data is established using a first method of time base recovery and a reliability metric for first method is determined. If the reliability metric shows that the first method is unreliable, a second method of establishing a time-base for the traffic data is used. In some embodiments the arrival timing of asynchronous network data is used in the step of establishing a time base for the traffic data using a first method of time-base recovery.
    Type: Application
    Filed: July 4, 2011
    Publication date: August 28, 2014
    Applicant: Telefonaktiebolaget L M Ericsson (publ)
    Inventor: Jeremy Bennett
  • Publication number: 20140229297
    Abstract: Methods and apparatus for efficient execution of modules are disclosed.
    Type: Application
    Filed: February 8, 2013
    Publication date: August 14, 2014
    Inventors: Nicholas Naveen Rau, Ryan O'Hearn, Thomas Sturm, Jeremy Bennett
  • Patent number: 8713306
    Abstract: A technique for providing computer security is described. The technique comprises providing network configuration information on a dynamic network; determining whether the network configuration information meets a criterion; and in the event the configuration information meets the criterion, configuring a decoy associated with the network.
    Type: Grant
    Filed: October 14, 2003
    Date of Patent: April 29, 2014
    Assignee: Symantec Corporation
    Inventor: Jeremy Bennett
  • Patent number: 8661250
    Abstract: Remote activation of covert service channels is provided. A remote host can initiate and establish a connection with a target host without exposing a service channel or communications port to an unauthenticated host. Triggers can be received by and sent to a host and an associated operating system, under direction of a stealth listener. The stealth listener provides can control and direct an operating system to respond to incoming data packets, but can also open and close ports to enable access to services on a host. Using a variety of transport mechanisms, protocols, and triggers to covertly enable a connection to be established between a service and a remote client, the disclosed techniques also enable reduction of processing and storage resources by reducing the amount of host or client-installed software.
    Type: Grant
    Filed: March 28, 2008
    Date of Patent: February 25, 2014
    Assignee: Symantec Corporation
    Inventors: Brian Hernacki, Thomas Lofgren, Jeremy Bennett
  • Publication number: 20130247126
    Abstract: The invention relates to a method and device for buffering data for multiplexing. The invention also relates to a method of multiplexing and to a multiplexer arrangement using the method and device for buffering data for multiplexing. In one embodiment the invention can be applied to the buffering of non-traffic data, such as firmware updates or other supplementary information, before multiplexing the non-traffic data with traffic data, such as television data of television channels, to form a satellite broadcast channel. In embodiments of the invention, non-traffic data for multiplexing is buffered and then read out again for multiplexing at a rate which is a function of buffer fullness. The non-traffic data may be multiplexed with at least one traffic data channel. A multiplexer can view the non-traffic data channel as another multiplexing input and can allocate the available bit rate between the traffic data channels and the non-traffic data accordingly.
    Type: Application
    Filed: November 26, 2010
    Publication date: September 19, 2013
    Applicant: TELEFONAKTIEBOLAGET L M ERICSSON (PUBL)
    Inventors: Jeremy Bennett, Steven Woodhead
  • Patent number: 8079083
    Abstract: Recording network traffic is disclosed. Data associated with a network flow are monitored. If it is determined that the data associated with the network flow satisfy a first criterion based at least in part on a prediction value that reflects a likelihood that the network flow will result in a security event, the data associated with the network flow are begun to be recorded even though a second criterion corresponding to the security event has not been satisfied.
    Type: Grant
    Filed: September 2, 2005
    Date of Patent: December 13, 2011
    Assignee: Symantec Corporation
    Inventors: Jeremy Bennett, Carl Alexander Adams