Patents by Inventor John A. Boyer
John A. Boyer has filed for patents to protect the following inventions. This listing includes patent applications that are pending as well as patents that have already been granted by the United States Patent and Trademark Office (USPTO).
-
Publication number: 20240098100Abstract: An automated sandbox generator for a cyber-attack exercise on a mimic network in a cloud environment can include various components. The cloud deployment component deploys the mimic network in a sandbox environment in the cloud environment. The mimic network can be a clone of components from a network that exists in an organization's environment and/or, predefined example components. The attack engine deploys a cyber threat to use an exploit for the wargaming cyber-attack exercise in the mimic network. The user interface displays, in real time, results of the wargaming cyber-attack exercise being conducted in the sandbox environment, to create a behavioral profile of how the cyber threat using the exploit would actually perform in that particular organization's environment as well as have human users interact with the cyber threat deployed by the attack engine during the cyber-attack on the mimic network, as it happens in real time, during the wargaming cyber-attack exercise.Type: ApplicationFiled: September 15, 2023Publication date: March 21, 2024Inventors: Jake Lal, Frank Jasik, Simon Fellows, James Rees Wingar, Alexander Fox Thompson, Billy McDermot, John Boyer
-
Publication number: 20230095415Abstract: Aspects of the invention relate to a cyber security system that may enable an end user to communicate with a cyber security appliance to identify cyber threats across the client system. The system can include one or more host devices each having a user interface and an endpoint agent for facilitating bi-directional communication between the user and a cyber security appliance. The endpoint agent may include a communication facilitation module including a user interaction module configured to communicate with the user interface and a helper module configured to communicate with the cyber security appliance. The endpoint agent is configured to enable the bi-directional communication between the user interface and the cyber security appliance on receiving a query associated with identified unusual behavior.Type: ApplicationFiled: November 1, 2022Publication date: March 30, 2023Applicant: Darktrace Holdings LimitedInventors: John Boyer, Ciaran Mckey, Connor Trimble, James Wingar, Holly Birch, Joseph Gardner, Thomas Marlow, Jake Lal, Patrick Osbourne, Daniel Rutter
-
Publication number: 20210273957Abstract: A cyber threat defense system can incorporate data from multiple Software-as-a-Service (SaaS) applications hosted by multiple third-party platforms to identify cyber threats across platforms. The system can collect third-party event data describing an administrative event of a SaaS application hosted by an associated third-party platform. The system can identify a user associated with the third-party event data based on a composite user profile constructed from user context data collected across the multiple SaaS applications to identify the user across multiple third-party platforms. The system can associate the user with a user risk profile based on the composite user profile. The system can identify whether the third-party event data corresponds to a cyber threat partially based on the user risk profile. The system can execute an autonomous response in response to the cyber threat using an autonomous response module factoring in the user risk profile.Type: ApplicationFiled: February 26, 2021Publication date: September 2, 2021Inventors: John Boyer, Clement Robin, Holly Birch
-
Publication number: 20190125372Abstract: In the use of devices and methods for measuring applied pressure on an article, such as a patella construct during a surgical procedure, a clamp is provided with arms, an optional external spring, an optional internal spring and a torque knob for applying constant and measurable pressure to the article. Embodiments of the clamp include a spring rod engaged with the torque knob for assisting in applying and retaining desired pressure. Spike elements and a bushing insert are secured to the ends of the arms for retaining the article in place during use. The elements are advantageously assembled and disassembled to facilitate thorough and quick cleaning.Type: ApplicationFiled: July 30, 2018Publication date: May 2, 2019Inventors: John Boyer, Bruce Reed Anderson
-
Patent number: 10153561Abstract: An antenna arrangement can produce omni-directional polarisations of two or more types and comprises a compact arrangement of a dipole with array comprising first and second conductors in parallel planes separated by a printed circuit board and laid on the printed circuit board for generating horizontally polarised signals. A monopole arrangement comprises a third conductor substantially orthogonal to the planes of the first and second conductors and arranged so that one of the first and second conductors acts as a ground plane for the third conductor.Type: GrantFiled: March 20, 2014Date of Patent: December 11, 2018Assignee: British Broadcasting CorporationInventor: John Boyer
-
Patent number: 9573564Abstract: Disclosed is an improved reel assembly for use in conjunction with an occupant restraint system. The assembly employs a dual locking arrangement whereby an occupant can be restrained during both major and minor incidents. After a major incident, the reel assembly remains locked until the occupant disengages the reel via a push button. After a minor incident, the reel assembly can be conveniently unlocked, without the need for accessing the push button, by applying counter tension to the webbing.Type: GrantFiled: August 27, 2012Date of Patent: February 21, 2017Assignee: Carleton Life Support Systems, Inc.Inventors: John Boyer, Daniel Meggs, Alan Lane
-
Publication number: 20160072196Abstract: An antenna arrangement can produce omni-directional polarisations of two or more types and comprises a compact arrangement of a dipole with array comprising first and second conductors in parallel planes separated by a printed circuit board and laid on the printed circuit board for generating horizontally polarised signals. A monopole arrangement comprises a third conductor substantially orthogonal to the planes of the first and second conductors and arranged so that one of the first and second conductors acts as a ground plane for the third conductor.Type: ApplicationFiled: March 20, 2014Publication date: March 10, 2016Applicant: Bristish Broadcasting CorporationInventor: John Boyer
-
Patent number: 8732478Abstract: A security framework for a host computer system which allows a host to control access to a compliant security token by ensuring enforcement of established security policies administered by a middleware application. Processing between the host computer system and the security token is performed using one or more modular security application agents. The modular security application agents are counterpart applications to security applications installed in the security token and may be retrieved and installed upon to ensure compatibility between counterpart token and host security applications. The security policies are a composite of host security policies and token security policies which are logically combined by the middleware application at the beginning of a session.Type: GrantFiled: February 25, 2011Date of Patent: May 20, 2014Assignee: Assa Abloy ABInventors: Eric Le Saint, John Boyer
-
Publication number: 20130269018Abstract: Providing remote user access to secure financial applications includes deployment of SSO software to client workstations by receiving a password for collaborating access to a secure server, navigating to the secure server using a web browser on a remote workstation, providing user authorization details and the received password to the secure server, generating a subsequent password at the secure server upon validation of the user authorization details and received password, and downloading an SSO deployment file to the remote workstation. The deployment file includes a subsequent password. The SSO deployment file is executed to install an SSO client application on the remote workstation. Workstation settings and user credentials are read from a secure file or data store. The SSO client application is run on the workstation to employ the user credentials and subsequent password to logon to the secure application.Type: ApplicationFiled: January 14, 2013Publication date: October 10, 2013Inventors: Timothy Dingwall, Matthew Herscovitch, Jason Hart, John F. Clark, John Boyer
-
Publication number: 20130134251Abstract: Disclosed is an improved reel assembly for use in conjunction with an occupant restraint system. The assembly employs a dual locking arrangement whereby an occupant can be restrained during both major and minor incidents. After a major incident, the reel assembly remains locked until the occupant disengages the reel via a push button. After a minor incident, the reel assembly can be conveniently unlocked, without the need for accessing the push button, by applying counter tension to the webbing.Type: ApplicationFiled: August 27, 2012Publication date: May 30, 2013Applicant: CONAX FLORIDA CORPORATIONInventors: John Boyer, Daniel Meggs, Alan Lane
-
Patent number: 8381271Abstract: A method and system for providing remote user access to secure financial applications by deployment of SSO software (126) to client workstations (120), including receiving a password for collaborating access to a secure server (110); navigating to the secure server (110) using a web browser (124) on a remote workstation (120); providing user authorization details and the received password to the secure server (120); generating a subsequent password at the secure server (110) upon validation of the user authorization details and received password; downloading an SSO deployment file (122) to the remote workstation (120), said deployment file (122) including the subsequent password; executing the SSO deployment file (122) to install an SSO client application (126) on the remote workstation; reading workstation settings and user credentials from a secure file or data store; and running the SSO client application (126) on the workstation to employ the user credentials and subsequent password to logon to the secureType: GrantFiled: September 19, 2006Date of Patent: February 19, 2013Assignee: Actividentity (Australia) Pty, Ltd.Inventors: Timothy Dingwall, Matthew Herscovitch, Jason Hart, John F. Clark, John Boyer
-
Patent number: 8251304Abstract: Disclosed is an improved reel assembly for use in conjunction with an occupant restraint system. The assembly employs a dual locking arrangement whereby an occupant can be restrained during both major and minor incidents. After a major incident, the reel assembly remains locked until the occupant disengages the reel via a push button. After a minor incident, the reel assembly can be conveniently unlocked, without the need for accessing the push button, by applying counter tension to the webbing.Type: GrantFiled: January 29, 2009Date of Patent: August 28, 2012Assignee: Conax Florida CorporationInventors: John Boyer, Daniel Meggs, Alan Lane
-
Patent number: 8201078Abstract: Business process enablement of electronic documents is provided. A method includes populating an electronic document supporting structured and unstructured content. The electronic document includes a description identifying a server and the content. The method further includes notifying a document processor of a submission event. The method also includes serializing a portion of the electronic document containing some of the unstructured content. The method additionally includes submitting the electronic document to the server in response to the submission event.Type: GrantFiled: September 16, 2008Date of Patent: June 12, 2012Assignee: International Business Machines CorporationInventors: John Boyer, Martin F. Dunn, Maureen E. Kraft, Jun Liu, Mihir R. Shah, He Feng Su, Saurabh Tiwari
-
Publication number: 20120036551Abstract: A security framework for a host computer system which allows a host to control access to a compliant security token by ensuring enforcement of established security policies administered by a middleware application. Processing between the host computer system and the security token is performed using one or more modular security application agents. The modular security application agents are counterpart applications to security applications installed in the security token and may be retrieved and installed upon to ensure compatibility between counterpart token and host security applications. The security policies are a composite of host security policies and token security policies which are logically combined by the middleware application at the beginning of a session.Type: ApplicationFiled: February 25, 2011Publication date: February 9, 2012Inventors: Eric Le Saint, John Boyer
-
Patent number: 7921298Abstract: A security framework for a host computer system which allows a host to control access to a compliant security token by ensuring enforcement of established security policies administered by a middleware application. Processing between the host computer system and the security token is performed using one or more modular security application agents. The modular security application agents are counterpart applications to security applications installed in the security token and may be retrieved and installed upon to ensure compatibility between counterpart token and host security applications. The security policies are a composite of host security policies and token security policies which are logically combined by the middleware application at the beginning of a session.Type: GrantFiled: November 13, 2007Date of Patent: April 5, 2011Assignee: Activcard Ireland, LimitedInventors: Eric Le Saint, John Boyer
-
Publication number: 20100070562Abstract: Business process enablement of electronic documents is provided. A method includes populating an electronic document supporting structured and unstructured content. The electronic document includes a description identifying a server and the content. The method further includes notifying a document processor of a submission event. The method also includes serializing a portion of the electronic document containing some of the unstructured content. The method additionally includes submitting the electronic document to the server in response to the submission event.Type: ApplicationFiled: September 16, 2008Publication date: March 18, 2010Applicant: INTERNATIONAL BUSINESS MACHINES CORPORATIONInventors: John Boyer, Martin F. Dunn, Maureen E. Kraft, Jun Liu, Mihir R. Shah, He Feng Su, Saurabh Tiwari
-
Publication number: 20090321550Abstract: Disclosed is an improved reel assembly for use in conjunction with an occupant restraint system. The assembly employs a dual locking arrangement whereby an occupant can be restrained during both major and minor incidents. After a major incident, the reel assembly remains locked until the occupant disengages the reel via a push button. After a minor incident, the reel assembly can be conveniently unlocked, without the need for accessing the push button, by applying counter tension to the webbing.Type: ApplicationFiled: January 29, 2009Publication date: December 31, 2009Inventors: John Boyer, Daniel Meggs, Alan Lane
-
Publication number: 20090193264Abstract: A strong authentication method and system using a Secure ICC component coupled with a Personal device, and relying on the existing cryptographic protocols and keys for managing the secure ICC to generate One-Time-Passwords when the necessary authentication keys or cryptographic protocols are not already present in the Secure ICC configuration for that purpose.Type: ApplicationFiled: September 22, 2008Publication date: July 30, 2009Applicant: ActivIdentity, Inc.Inventors: Dominique FEDRONIC, Eric LE SAINT, John BOYER, William BOGGESS
-
Publication number: 20090025074Abstract: A security framework for a host computer system which allows a host to control access to a compliant security token by ensuring enforcement of established security policies administered by a middleware application. Processing between the host computer system and the security token is performed using one or more modular security application agents. The modular security application agents are counterpart applications to security applications installed in the security token and may be retrieved and installed upon to ensure compatibility between counterpart token and host security applications. The security policies are a composite of host security policies and token security policies which are logically combined by the middleware application at the beginning of a session.Type: ApplicationFiled: November 13, 2007Publication date: January 22, 2009Applicant: ACTIVCARD IRELAND, LIMITEDInventors: Eric Le Saint, John Boyer
-
Patent number: 7372979Abstract: A method and apparatus for authenticating a user In dependence upon biometric Input information is disclosed. According to the method when a user is identified, their biometric information or data derived therefrom is automatically stored. The data is then used in subsequent user identification attempts as a template. The original templates are not replaced but those templates that are automatically stored are replaced at intervals.Type: GrantFiled: July 25, 2006Date of Patent: May 13, 2008Assignee: Activcard Ireland LimitedInventors: Robert Hillhouse, John Boyer