Patents by Inventor Jeremy Elliott

Jeremy Elliott has filed for patents to protect the following inventions. This listing includes patent applications that are pending as well as patents that have already been granted by the United States Patent and Trademark Office (USPTO).

  • Patent number: 7583726
    Abstract: A method for transferring data over a communication link using a data rate and a voice modem not designed to provide communications at the data rate, includes generating, in a processor, a modulated Frequency Shift Keying (FSK) signal from an outgoing data stream. The voice modem, in playback mode, plays the modulated FSK signal over the communication link. The voice modem, in record mode, receives voice data from the communication link and sends the voice data to the processor, which demodulates any FSK signal that is present in the voice wave data to produce an incoming data stream.
    Type: Grant
    Filed: September 20, 2005
    Date of Patent: September 1, 2009
    Assignee: Tyco Safety Products Canada Ltd.
    Inventors: Jeremy Elliott, James Long
  • Publication number: 20070064782
    Abstract: A method for transferring data over a communication link using a data rate and a voice modem not designed to provide communications at the data rate, includes generating, in a processor, a modulated FSK signal from an outgoing data stream. The voice modem, in playback mode, plays the modulated FSK signal over the communication link. The voice modem, in record mode, receives voice data from the communication link and sends the voice data to the processor, which demodulates any FSK signal that is present in the voice wave data to produce an incoming data stream.
    Type: Application
    Filed: September 20, 2005
    Publication date: March 22, 2007
    Applicant: Tyco Safety Products Canada Ltd.
    Inventors: Jeremy Elliott, James Long
  • Publication number: 20050203851
    Abstract: A method and apparatus for corrupting a swarm download in a file sharing network provides corrupt data in response to a request for a portion of a file so that when portions received from various sources are assembled, the assembled product cannot be verified and the process must be repeated. To defeat the method, bad sources are identified and disconnected or otherwise ignored, or good sources are identified and given higher priorities. In another method for deterring unauthorized copying of a protected file in a P2P network, a P2P client offering the protected file is choked with agents connecting to it so that its upload capacity is diluted. In another method, false sources for a protected file are injected into a file sharing network so as to dilute the legitimate sources, making them more difficult to find.
    Type: Application
    Filed: February 7, 2005
    Publication date: September 15, 2005
    Inventors: Neil King, James Moore, Michael Colburn, Jeremy Elliott