Patents by Inventor Jeremy Brooks
Jeremy Brooks has filed for patents to protect the following inventions. This listing includes patent applications that are pending as well as patents that have already been granted by the United States Patent and Trademark Office (USPTO).
-
Patent number: 10891381Abstract: Examples relate to detecting vulnerabilities in a web application. One example enables identifying a set of inputs in a web application input form. The set of inputs may be categorized based on a set of predetermined conditions. The set of inputs may be scored based on the categorization. A subset of the set of inputs may be determined to be a set of parameters of interest for the web application based on the scored set of inputs.Type: GrantFiled: November 13, 2015Date of Patent: January 12, 2021Assignee: MICRO FOCUS LLCInventors: Jeremy Brooks, Sasi Siddharth Muthurajan, Nidhi Govindram Kejriwal
-
Patent number: 10878104Abstract: Examples relate to automated multi-credential assessment in a system. One example enables auditing an application by sending a first request for an action to be performed in the application, the first request based on a first privilege level, where the first privilege level corresponds with a first level of access to the application, and sending a second request for the action to be performed in the application, where the second request based on a second privilege level different from the first privilege level. The second privilege level may corresponds with a second level of access to the application different from the first level of access. The first request and second request may be performed, and the results of the performed first request and second request may be combined. The combined results may be made available.Type: GrantFiled: November 13, 2015Date of Patent: December 29, 2020Assignee: MICRO FOCUS LLCInventors: Gerald Sullivan, Sasi Siddharth Muthurajan, Nidhi Kejriwal, Jeremy Brooks
-
Patent number: 10650148Abstract: Example embodiments disclosed herein relate to determining whether a protective measure meeting criteria has been performed on data. Execution of an application under test (AUT) is monitored. A message that a field of the AUT should be considered sensitive is received. Data is determined to be entered into the field. The data is monitored during execution of the AUT to determine whether the protective measure that meets the criteria has been performed on the data.Type: GrantFiled: September 4, 2014Date of Patent: May 12, 2020Assignee: MICRO FOCUS LLCInventors: Sasi Muthurajan, Matias Madou, Ronald J. Sechman, Jeremy Brooks
-
Publication number: 20190354030Abstract: A toner package includes activated carbon and a toner composition. The toner composition includes toner particles and toner particle surface additives disposed on the toner particles. An amount of activated carbon present in the toner package is sufficient to reduce volatile organic compounds (VOCs).Type: ApplicationFiled: May 18, 2018Publication date: November 21, 2019Inventors: Simon Neil Jowett, Jeremy Brook Lewis, Paul Simon Golding, Michael John Wilsher
-
Publication number: 20190331340Abstract: A tool (toy) device that has a hollow tubular structure with a flat triangular flute attached to the end of the tube. The tubular structure constricts and directs a person's exhaled breath (air). The constriction of air increases the speed of air flow. The air is then redirected by a flute attached to the end of the tube. The flute is a triangular shape with small sides at a 90-degree angle directing the air. The flute changes the direction and shape of the exhaled air cutting off the bottom half of the air.Type: ApplicationFiled: April 25, 2019Publication date: October 31, 2019Inventor: Jeremy Brook Toole
-
Patent number: 10242199Abstract: Example embodiments disclosed herein relate to a security test. A crawl of an application under test (AUT) is performed to determine an attack surface using crawl sessions. One or more parameters of the attack surface are probed during the respective crawl sessions. A trace is requested from an observer for the probe of the one or more parameters. Attack suggestions are received from the observer based on the trace of the one or more parameters.Type: GrantFiled: January 31, 2014Date of Patent: March 26, 2019Assignee: EntiT Software, LLCInventors: Sasi Siddharth Muthurajan, Matias Madou, Prajakta Jagdale, Jeremy Brooks
-
Publication number: 20180349613Abstract: Examples relate to automated multi-credential assessment in a system. One example enables auditing an application by sending a first request for an action to be performed in the application, the first request based on a first privilege level, where the first privilege level corresponds with a first level of access to the application, and sending a second request for the action to be performed in the application, where the second request based on a second privilege level different from the first privilege level. The second privilege level may corresponds with a second level of access to the application different from the first level of access. The first request and second request may be performed, and the results of the performed first request and second request may be combined. The combined results may be made available.Type: ApplicationFiled: November 13, 2015Publication date: December 6, 2018Inventors: Gerald Sullivan, Sasi Siddharth Muthurajan, Nidhi Govindram Kejriwal, Jeremy Brooks
-
Publication number: 20180330099Abstract: Examples relate to detecting vulnerabilities in a web application. One example enables identifying a set of inputs in a web application input form. The set of inputs may be categorized based on a set of predetermined conditions. The set of inputs may be scored based on the categorization. A subset of the set of inputs may be determined to be a set of parameters of interest for the web application based on the scored set of inputs.Type: ApplicationFiled: November 13, 2015Publication date: November 15, 2018Inventors: Jeremy Brooks, Sasi Siddharth Muthurajan, Nidhi Govindram Kejriwal
-
Patent number: 10047235Abstract: What is disclosed is a method for encoding liquid ink with a biomarker which can be traced back to a specific inkjet printer. In one embodiment, an aqueous solution containing a biomarker is combined with a volume of liquid ink. The biomarker comprises a nucleic acid. An ordering of nucleobases forming that nucleic acid has a code sequence. In one embodiment hereof, the nucleic acid is constructed using a code sequence which contains, at least in part, the device specific serial number of the inkjet printer. The encoded liquid ink is added to an inkjet printer and the code sequence encoded in that ink is associated with that particular inkjet printer. The inkjet printer is then used to deposit the encoded ink onto a media substrate. In other embodiments, a fluorescent marker is also added with the volume of liquid ink such that the ink fluoresces under an ultraviolet light.Type: GrantFiled: December 8, 2015Date of Patent: August 14, 2018Assignee: Xerox CorporationInventors: Michael John Wilsher, Jeremy Brook Lewis
-
Publication number: 20170326460Abstract: A fantasy sports application or more specifically to a fantasy sports application that integrates the historically great “immortal” players onto a drafted team which includes players that are currently active in the sport. A user may challenge a second user to an online match via the application, instant message or through social media. The user who drafts the statistically better team wins the head-to-head competition.Type: ApplicationFiled: May 13, 2016Publication date: November 16, 2017Inventors: Jeremy Brooks, Justin Brooks, Josh Adams
-
Publication number: 20170220804Abstract: Example embodiments disclosed herein relate to determining whether a protective measure meeting criteria has been performed on data. Execution of an application under test (AUT) is monitored. A message that a field of the AUT should be considered sensitive is received. Data is determined to be entered into the field. The data is monitored during execution of the AUT to determine whether the protective measure that meets the criteria has been performed on the data.Type: ApplicationFiled: September 4, 2014Publication date: August 3, 2017Inventors: Sasi MUTHURAJAN, Matias MADOU, Ronald J. SECHMAN, Jeremy BROOKS
-
Publication number: 20170158897Abstract: What is disclosed is a method for encoding liquid ink with a biomarker which can be traced back to a specific inkjet printer. In one embodiment, an aqueous solution containing a biomarker is combined with a volume of liquid ink. The biomarker comprises a nucleic acid. An ordering of nucleobases forming that nucleic acid has a code sequence. In one embodiment hereof, the nucleic acid is constructed using a code sequence which contains, at least in part, the device specific serial number of the inkjet printer. The encoded liquid ink is added to an inkjet printer and the code sequence encoded in that ink is associated with that particular inkjet printer. The inkjet printer is then used to deposit the encoded ink onto a media substrate. In other embodiments, a fluorescent marker is also added with the volume of liquid ink such that the ink fluoresces under an ultraviolet light.Type: ApplicationFiled: December 8, 2015Publication date: June 8, 2017Inventors: Michael John WILSHER, Jeremy Brook LEWIS
-
Publication number: 20160267277Abstract: Example embodiments disclosed herein relate to a security test. A crawl of an application under test (AUT) is performed to determine an attack surface using crawl sessions. One or more parameters of the attack surface are probed during the respective crawl sessions. A trace is requested from an observer for the probe of the one or more parameters. Attack suggestions are received from the observer based on the trace of the one or more parameters.Type: ApplicationFiled: January 31, 2014Publication date: September 15, 2016Inventors: Sasi Siddharth Muthurajan, Matias Madou, Prajakta Jagdale, Jeremy Brooks
-
Patent number: 9108811Abstract: Various methods and devices maintain a registration nip and a transfer nip at the same sheet feeding speed when the leading edge of a sheet is between them. These methods and devices create a buckle in the sheet by increasing the sheet feeding speed of the registration nip while maintaining the transfer nip at the original sheet feeding speed during a first portion of when the sheet is simultaneously within the registration nip and the transfer nip. Such methods and devices then decrease the sheet feeding speed of the registration nip after creating the amount of buckle in the sheet and maintain the registration nip and the transfer nip at the same sheet feeding speed to maintain that specific amount of buckle in the sheet during the remaining portion of when the sheet is simultaneously within the registration nip and the transfer nip.Type: GrantFiled: October 9, 2014Date of Patent: August 18, 2015Assignee: Xerox CorporationInventors: Martin Richard Walsh, Jeremy Brook Lewis, John Kennedy Mangan, Simon Neil Jowett
-
Patent number: 7881637Abstract: Aspects of this disclosure describe a multi-pass printer having a photoreceptor device mounted on an axis, a developer that is arranged adjacent to the photoreceptor device and is movable between a first position and a second position, and a camming mechanism mounted on the axis that acts upon the developer to urge the developer between the first and second positions. The camming mechanism can further include a camming disc that is mounted to rotate about the axis. The camming disc can also have an outer periphery edge having a first portion defined by a first radius and a second portion defined by a second radius. The camming mechanism can also have a developer roll spacing cam having an effective radius that maintains a spacing between the developer and the photoreceptor device.Type: GrantFiled: July 17, 2007Date of Patent: February 1, 2011Assignee: Xerox CorporationInventors: Peter John Keilty, Andrew Edward Taylor, Roger Derek Masham, Jeremy Brook Lewis
-
Publication number: 20090022521Abstract: Aspects of this disclosure describe a multi-pass printer having a photoreceptor device mounted on an axis, a developer that is arranged adjacent to the photoreceptor device and is moving between a first portion and a second position, and a camming mechanism mounted on the axis that acts upon the developer to urge the developer between the firs and second positions. The camming mechanism can further include a camming disc that is mounted to rotate about the axis. The camming disc can also have an outer periphery edge having a first portion defined by a first radius and a second portion defined by a second radius. The camming mechanism can also have a developer roll spacing cam having an effective radius that maintains a spacing between the developer and the photoreceptor drum.Type: ApplicationFiled: July 17, 2007Publication date: January 22, 2009Applicant: XEROX CORPORATIONInventors: Peter John KEILTY, Andrew Edward TAYLOR, Roger Derek MASHAM, Jeremy Brook LEWIS
-
Patent number: 7069245Abstract: The present invention is a method, system and article of manufacture that provides near simultaneous delivery of information over a packet routed network architecture in an inexpensive, fast, global, bi-directional communication medium, while having means to verify receipt of a transmission. The present invention utilizes a local mainframe distributing encrypted client submissions over a network such as the internet to a number of customers having a receiver. The present invention includes delivering a relatively small decryption key over the same network so that a customer is able to decrypt the previously received encrypted client submission and display the decrypted version simultaneously relative to the other customers.Type: GrantFiled: February 6, 2003Date of Patent: June 27, 2006Assignee: Business WireInventors: Steve Messick, Bill Ross, Dean Large, Jeremy Brooks
-
Publication number: 20040158533Abstract: The present invention is a method, system and article of manufacture that provides near simultaneous delivery of information over a packet routed network architecture in an inexpensive, fast, global, bi-directional communication medium, while having means to verify receipt of a transmission. The present invention utilizes a local mainframe distributing encrypted client submissions over a network such as the internet to a number of customers having a receiver. The present invention includes delivering a relatively small decryption key over the same network so that a customer is able to decrypt the previously received encrypted client submission and display the decrypted version simultaneously relative to the other customers.Type: ApplicationFiled: February 6, 2003Publication date: August 12, 2004Inventors: Steve Messick, Bill Ross, Dean Large, Jeremy Brooks