Patents by Inventor Jeremy Bennett
Jeremy Bennett has filed for patents to protect the following inventions. This listing includes patent applications that are pending as well as patents that have already been granted by the United States Patent and Trademark Office (USPTO).
-
Patent number: 11914759Abstract: Examples of augmented reality (AR) environment control advantageously employ multi-factor intention determination and include: performing a multi-factor intention determination for summoning a control object (e.g., a menu, a keyboard, or an input panel) using a set of indications in an AR environment, the set of indications comprising a plurality of indications (e.g., two or more of a palm-facing gesture, an eye gaze, a head gaze, and a finger position simultaneously); and based on at least the set of indications indicating a summoning request by a user, displaying the control object in a position proximate to the user in the AR environment (e.g., docked to a hand of the user). Some examples continue displaying the control object while at least one indication remains, and continue displaying the control object during a timer period if one of the indications is lost.Type: GrantFiled: January 19, 2022Date of Patent: February 27, 2024Assignee: Microsoft Technology Licensing, LLC.Inventors: Andrew Jackson Klein, Cory Ryan Bramall, Kyle Mouritsen, Ethan Harris Arnowitz, Jeremy Bruce Kersey, Victor Jia, Justin Thomas Savino, Stephen Michael Lucas, Darren A. Bennett
-
Publication number: 20220188878Abstract: Methods and apparatus for efficient execution of modules are disclosed.Type: ApplicationFiled: February 28, 2022Publication date: June 16, 2022Inventors: Nicholas Naveen Rau, Ryan O'Hearn, Thomas Sturm, Jeremy Bennett
-
Patent number: 11270356Abstract: Methods and apparatus for efficient execution of modules are disclosed. An example method includes generating, by a first module, a first module identifier, the first module having been instantiated by an advertisement on a webpage, loading, by the first module, a component, communicating the module identifier to the component, determining that a second module having a second module identifier has been loaded, and, in response to determining that the second module has been loaded, communicating, by the first module, the second module identifier to the component to instruct the component to communicate with the second module.Type: GrantFiled: October 19, 2020Date of Patent: March 8, 2022Assignee: The Nielsen Company (US), LLCInventors: Nicholas Naveen Rau, Ryan O'Hearn, Thomas Sturm, Jeremy Bennett
-
Publication number: 20210035168Abstract: Methods and apparatus for efficient execution of modules are disclosed.Type: ApplicationFiled: October 19, 2020Publication date: February 4, 2021Inventors: Nicholas Naveen Rau, Ryan O'Hearn, Thomas Sturm, Jeremy Bennett
-
Patent number: 10810634Abstract: Methods and apparatus for efficient execution of modules are disclosed. An example method includes generating, by a first module, a first module identifier, the first module having been instantiated by an advertisement on a webpage, loading, by the first module, a component, communicating the module identifier to the component, determining that a second module having a second module identifier has been loaded, and, in response to determining that the second module has been loaded, communicating, by the first module, the second module identifier to the component to instruct the component to communicate with the second module.Type: GrantFiled: February 8, 2013Date of Patent: October 20, 2020Assignee: The Nielsen Company (US), LLCInventors: Nicholas Naveen Rau, Ryan O'Hearn, Thomas Sturm, Jeremy Bennett
-
Patent number: 10530720Abstract: In an example, there is disclosed a computing apparatus, including a user notification interface; a context interface; and one or more logic elements forming a contextual privacy engine operable to: receive a notification; receive a context via the context interface; apply the context to the notification via a notification rule; and take an action via the user notification interface based at least in part on the applying. The contextual privacy engine may also be operable to mathematically incorporate user feedback into the notification rule. There is also described a method of providing a contextual privacy engine, and one or more computer-readable storage mediums having stored thereon executable instructions for providing a contextual privacy engine.Type: GrantFiled: August 27, 2015Date of Patent: January 7, 2020Assignee: McAfee, LLCInventors: Raj Vardhan, Igor Tatourian, Dattatraya Kulkarni, Jeremy Bennett, Samrat Chitta, Reji Gopalakrishnan, Muralitharan Chithanathan
-
Patent number: 9870466Abstract: There is disclosed in one example, a computing apparatus, including: first one or more logic elements providing a code module, the code module comprising a member having a branching policy designating either a public or private member; second one or more logic elements providing a policy engine, operable to: receive a first branch instruction to the member; determine that the branch instructions does not meet the policy; and take a security action. There is also disclosed a method of providing a policy engine, and a computer-readable medium having stored thereon executable instructions for providing a policy engine.Type: GrantFiled: September 26, 2015Date of Patent: January 16, 2018Assignee: McAfee, Inc.Inventors: Carl D. Woodward, Jennifer Eligius Mankin, Jeremy Bennett
-
Patent number: 9762591Abstract: In an example, a system and method are provided for validating the sender of a message, such as an e-mail, text message, voice mail, network message, internet posting, or other electronic message. An authenticity server engine may first prescreen the message with anti-spam, anti-malware, and other filters. The screened message is then provided to the end user. If the end user deems the message suspicious, he may request additional validation. The authenticity server engine may then apply an example four-phase validation scheme, including analyzing header data for consistency with the message body, analyzing public data sources, analyzing private data sources, and receiving a result of an off-channel challenge to the sender. The server may then assign the message a sender validity confidence score.Type: GrantFiled: December 27, 2014Date of Patent: September 12, 2017Assignee: McAfee, Inc.Inventors: Neeta Srivastava, Yi Zheng, Jeremy Bennett
-
Publication number: 20170091444Abstract: There is disclosed in one example, a computing apparatus, including: first one or more logic elements providing a code module, the code module comprising a member having a branching policy designating either a public or private member; second one or more logic elements providing a policy engine, operable to: receive a first branch instruction to the member; determine that the branch instructions does not meet the policy; and take a security action. There is also disclosed a method of providing a policy engine, and a computer-readable medium having stored thereon executable instructions for providing a policy engine.Type: ApplicationFiled: September 26, 2015Publication date: March 30, 2017Applicant: McAfee, Inc.Inventors: Carl D. Woodward, Jennifer Eligius Mankin, Jeremy Bennett
-
Publication number: 20170063750Abstract: In an example, there is disclosed a computing apparatus, including a user notification interface; a context interface; and one or more logic elements forming a contextual privacy engine operable to: receive a notification; receive a context via the context interface; apply the context to the notification via a notification rule; and take an action via the user notification interface based at least in part on the applying. The contextual privacy engine may also be operable to mathematically incorporate user feedback into the notification rule. There is also described a method of providing a contextual privacy engine, and one or more computer-readable storage mediums having stored thereon executable instructions for providing a contextual privacy engine.Type: ApplicationFiled: August 27, 2015Publication date: March 2, 2017Applicant: McAfee, Inc.Inventors: Raj Vardhan, Igor Tatourian, Dattatraya Kulkarni, Jeremy Bennett, Samrat Chitta, Reji Gopalakrishnan, Muralitharan Chithanathan
-
Patent number: 9424370Abstract: A method and related CAD system and computer readable medium. A method includes loading an object model in a CAD system, the object model including a plurality of parts each of which may contain one or more shapes which in turn are composed of multiple polygons. The method includes adding the shapes to a spatial tree, the shapes each corresponding to at least one cell, each cell corresponding to a spatial region of the object model. The method also includes, for each cell that is too complex to process within a memory space of the CAD system, subdividing the cell into a plurality of subcells using a first subdivision process. The method also includes subdividing each cell into a plurality of subcells using a multi-threaded subdivision process, and combining the subcells into the spatial tree.Type: GrantFiled: December 3, 2009Date of Patent: August 23, 2016Assignee: Siemens Product Lifecycle Management Software Inc.Inventors: Jeremy Bennett, Michael B. Carter
-
Publication number: 20160191542Abstract: In an example, a system and method are provided for validating the sender of a message, such as an e-mail, text message, voice mail, network message, internet posting, or other electronic message. An authenticity server engine may first prescreen the message with anti-spam, anti-malware, and other filters. The screened message is then provided to the end user. If the end user deems the message suspicious, he may request additional validation. The authenticity server engine may then apply an example four-phase validation scheme, including analyzing header data for consistency with the message body, analyzing public data sources, analyzing private data sources, and receiving a result of an off-channel challenge to the sender. The server may then assign the message a sender validity confidence score.Type: ApplicationFiled: December 27, 2014Publication date: June 30, 2016Inventors: Neeta Srivastava, Yi Zheng, Jeremy Bennett
-
Patent number: 9078017Abstract: The invention relates to a method and device for buffering data for multiplexing. The invention also relates to a method of multiplexing and to a multiplexer arrangement using the method and device for buffering data for multiplexing. In one embodiment the invention can be applied to the buffering of non-traffic data, such as firmware updates or other supplementary information, before multiplexing the non-traffic data with traffic data, such as television data of television channels, to form a satellite broadcast channel. In embodiments of the invention, non-traffic data for multiplexing is buffered and then read out again for multiplexing at a rate which is a function of buffer fullness. The non-traffic data may be multiplexed with at least one traffic data channel. A multiplexer can view the non-traffic data channel as another multiplexing input and can allocate the available bit rate between the traffic data channels and the non-traffic data accordingly.Type: GrantFiled: November 26, 2010Date of Patent: July 7, 2015Assignee: Telefonaktiebolaget L M Ericsson (publ)Inventors: Jeremy Bennett, Steven Woodhead
-
Patent number: 8988420Abstract: A system, method, and computer program for producing a visualization format from CAD data comprising producing a BREP model for visualization, wherein said BREP model has a topology component and a geometry component; removing a plurality of redundant control points from said geometry component; normalizing a plurality of knot vectors and a plurality of weight components from said geometry component; recognizing an analytic geometry from said geometry component; recognizing a plurality of equivalents from said geometry component; and converting said analytic geometry to said light model representation, and appropriate means and computer-readable instructions.Type: GrantFiled: August 10, 2007Date of Patent: March 24, 2015Assignee: Siemens Product Lifecycle Management Software Inc.Inventors: Jianbing Huang, Michael B. Carter, Andreas Johannsen, Brett Harper, Jeremy Bennett
-
Publication number: 20140245366Abstract: The present invention relates to a method of and apparatus for establishing a time base for variable data rate traffic data received from an asynchronous network. In some embodiments, the invention relates to a method of and apparatus for establishing a time base for a compression coded video signal transmitted over an Internet Protocol (IP) network. A method of establishing a traffic data time base for variable data rate traffic data received over an asynchronous network is provided in which a time base for the traffic data is established using a first method of time base recovery and a reliability metric for first method is determined. If the reliability metric shows that the first method is unreliable, a second method of establishing a time-base for the traffic data is used. In some embodiments the arrival timing of asynchronous network data is used in the step of establishing a time base for the traffic data using a first method of time-base recovery.Type: ApplicationFiled: July 4, 2011Publication date: August 28, 2014Applicant: Telefonaktiebolaget L M Ericsson (publ)Inventor: Jeremy Bennett
-
Publication number: 20140229297Abstract: Methods and apparatus for efficient execution of modules are disclosed.Type: ApplicationFiled: February 8, 2013Publication date: August 14, 2014Inventors: Nicholas Naveen Rau, Ryan O'Hearn, Thomas Sturm, Jeremy Bennett
-
Patent number: 8713306Abstract: A technique for providing computer security is described. The technique comprises providing network configuration information on a dynamic network; determining whether the network configuration information meets a criterion; and in the event the configuration information meets the criterion, configuring a decoy associated with the network.Type: GrantFiled: October 14, 2003Date of Patent: April 29, 2014Assignee: Symantec CorporationInventor: Jeremy Bennett
-
Patent number: 8661250Abstract: Remote activation of covert service channels is provided. A remote host can initiate and establish a connection with a target host without exposing a service channel or communications port to an unauthenticated host. Triggers can be received by and sent to a host and an associated operating system, under direction of a stealth listener. The stealth listener provides can control and direct an operating system to respond to incoming data packets, but can also open and close ports to enable access to services on a host. Using a variety of transport mechanisms, protocols, and triggers to covertly enable a connection to be established between a service and a remote client, the disclosed techniques also enable reduction of processing and storage resources by reducing the amount of host or client-installed software.Type: GrantFiled: March 28, 2008Date of Patent: February 25, 2014Assignee: Symantec CorporationInventors: Brian Hernacki, Thomas Lofgren, Jeremy Bennett
-
Publication number: 20130247126Abstract: The invention relates to a method and device for buffering data for multiplexing. The invention also relates to a method of multiplexing and to a multiplexer arrangement using the method and device for buffering data for multiplexing. In one embodiment the invention can be applied to the buffering of non-traffic data, such as firmware updates or other supplementary information, before multiplexing the non-traffic data with traffic data, such as television data of television channels, to form a satellite broadcast channel. In embodiments of the invention, non-traffic data for multiplexing is buffered and then read out again for multiplexing at a rate which is a function of buffer fullness. The non-traffic data may be multiplexed with at least one traffic data channel. A multiplexer can view the non-traffic data channel as another multiplexing input and can allocate the available bit rate between the traffic data channels and the non-traffic data accordingly.Type: ApplicationFiled: November 26, 2010Publication date: September 19, 2013Applicant: TELEFONAKTIEBOLAGET L M ERICSSON (PUBL)Inventors: Jeremy Bennett, Steven Woodhead
-
Patent number: 8079083Abstract: Recording network traffic is disclosed. Data associated with a network flow are monitored. If it is determined that the data associated with the network flow satisfy a first criterion based at least in part on a prediction value that reflects a likelihood that the network flow will result in a security event, the data associated with the network flow are begun to be recorded even though a second criterion corresponding to the security event has not been satisfied.Type: GrantFiled: September 2, 2005Date of Patent: December 13, 2011Assignee: Symantec CorporationInventors: Jeremy Bennett, Carl Alexander Adams