Patents by Inventor John C. Munson

John C. Munson has filed for patents to protect the following inventions. This listing includes patent applications that are pending as well as patents that have already been granted by the United States Patent and Trademark Office (USPTO).

  • Publication number: 20100274362
    Abstract: Mixtures, such as gels or pastes, comprising freeze-milled cartilage particles and exogenous growth factors are used for repairing chondral defects. Such mixtures may be applied to constructs comprising cancellous bone for implantation at the defect site. Suitable growth factors include variants of FGF-2, particularly variants that include a sole amino acid substitution for asparagine at amino acid 111 of the ?8-?9 loop of the FGF-2 peptide. Such FGF-2 variants are released slowly and continuously at a constant rate from cartilage pastes. In other embodiments, the amino acid substituted for asparigine is glycine. Other variants that may be used include FGF-9 variants having truncated chains and a sole amino acid substitution in the ?8-?9 loop of the FGF-9 peptide either for tryptophan at amino acid 144 or for asparagine at amino acid 143.
    Type: Application
    Filed: January 14, 2010
    Publication date: October 28, 2010
    Inventors: Avner Yayon, Katherine G. Truncale, Hilla Barkay-Olami, Alex B. Callahan, Arthur A. Gertzman, Yen-Chen Huang, Morris L. Jacobs, John C. Munson, Eric J. Semler, Roman Shikhanovich, Baruch Stern, Moon Hae Sunwoo, William W. Tomford, Judith I. Yannariello-Brown
  • Publication number: 20100218171
    Abstract: A computer executing a software process is monitored by a monitor engine that is coupled to one or more buses in the monitored computer and can be installed in the monitored computer or be separate. Software that is to be monitored is certified, i.e., its nominal “normal” operating parameters are determined. Thus, each certified software system running on the monitored computer will have one or more certificates or set points associated with it. An analytical component of the monitoring engine manages the set of certificates for each execution process on the monitored computer. The executing process is monitored by the analytical component and compared against the associated certificate for that process. At any point where the software process begins to diverge from its operational certificate, the analytical component will notify a final control element, or adaptive engine, which can terminate the process or attempt to correct the anomaly.
    Type: Application
    Filed: February 26, 2009
    Publication date: August 26, 2010
    Applicant: Computer Measurement Laboratory, Inc.
    Inventors: John C. Munson, Rick P. Hoover, Jack L. Meador
  • Publication number: 20090319045
    Abstract: Constructs that are at least partially constructed of allograft cancellous bone are disclosed, along with cartilage particles that may be used with the constructs for repairing articular cartilage defects. A multi-piece construct includes a base member, a cap member and at least one pin that secures the cap member to the base member. The base member may be constructed of mineralized cancellous bone, and is used to replace the subchondral bone removed when a surgeon cuts a bore in the area of an adjacent cartilage defect. The base member includes a blind bore and first and second through-going transverse bores in opposite sides of a wall of the base member. The cap member includes an upper section that has a thickness that is similar to that of a patient's surrounding articular cartilage layer and a stem depending from the upper section that is dimensioned to be received in and by the blind bore of the base member.
    Type: Application
    Filed: March 5, 2009
    Publication date: December 24, 2009
    Inventors: Katherine G. Truncale, Eric J. Semler, Arthur A. Gertzman, Moon Hae Sunwoo, William W. Tomford, Roman Shikhanovich, Alex B. Callahan, Judith I. Yannariello-Brown, Morris L. Jacobs, John C. Munson, Yen-Chen Huang
  • Patent number: 7571478
    Abstract: A real-time approach for detecting aberrant modes of system behavior induced by abnormal and unauthorized system activities that are indicative of an intrusive, undesired access of the system. This detection methodology is based on behavioral information obtained from a suitably instrumented computer program as it is executing. The theoretical foundation for the present invention is founded on a study of the internal behavior of the software system. As a software system is executing, it expresses a set of its many functionalities as sequential events. Each of these functionalities has a characteristic set of modules that is executed to implement the functionality. These module sets execute with clearly defined and measurable execution profiles, which change as the executed functionalities change. Over time, the normal behavior of the system will be defined by the boundary of the profiles.
    Type: Grant
    Filed: November 7, 2005
    Date of Patent: August 4, 2009
    Assignee: Reflex Security, Inc.
    Inventors: John C. Munson, Sebastian G. Elbaum
  • Publication number: 20090118713
    Abstract: A portable tissue cleaning apparatus comprising a housing with a base member and side walls mounted to the base member and a top cover having a motor contained within a housing. A manually operable switch assembly is mounted on the housing and is operable to control operation of the motor. A connector connects the motor to a rotatable basket assembly having a cylindrical container. A perforated basket is mounted in the cylindrical container and a cover mounted on the cylindrical container to provide a sealed fluid containment chamber. The perforated basket is cylindrical and has an impeller mounted on its bottom to direct fluid in a predetermined path when the same is rotated, and a divider comprising a tube with external slots formed therein and fin members mounted in the slots with the fin members extending outward towards an inner wall surface of the cylindrical perforated container to divide the perforated basket into sections.
    Type: Application
    Filed: November 5, 2007
    Publication date: May 7, 2009
    Inventor: John C. Munson
  • Patent number: 7185367
    Abstract: Detecting abnormal activity of a software system is based on behavioral information obtained from an instrumented computer program while it executes. As the program executes, it expresses information about the sequence and frequency with which program modules are called. Over time, this sequence and frequency defines the normal behavior of the program, and the information expressed on any given run is compared to this normal behavior. Statistical analysis of the differences between the normal behavior and the current run can be used to detect unauthorized or abusive use of the program. Program modules whose behavior is highly correlated can be grouped into a smaller number of virtual modules. Comparison between current and normal program behavior can then be made on the (smaller number of) virtual modules, thereby reducing the dimensionality of the problem of analyzing the differences between current and normal program behavior.
    Type: Grant
    Filed: June 16, 2003
    Date of Patent: February 27, 2007
    Assignee: Cylant, Inc.
    Inventor: John C. Munson
  • Patent number: 7096499
    Abstract: A real-time approach to detecting aberrant modes of system behavior induced by abnormal and unauthorized system activities indicative of abnormal activity of a software system is based on behavioral information obtained from a suitably instrumented computer program as it is executing. The theoretical foundation is founded on a study of the internal behavior of the software system. As a software system is executing, it expresses a set of its many functionalities as sequential events. Each of these functionalities has a characteristic set of modules that is executed to implement the functionality. These module sets execute with defined and measurable execution profiles among the program modules and within the execution paths of the individual modules, which change as the executed functionalities change. Over time, the normal behavior of the system will be defined by the boundary of the profiles.
    Type: Grant
    Filed: March 15, 2002
    Date of Patent: August 22, 2006
    Assignee: Cylant, Inc.
    Inventor: John C. Munson
  • Patent number: 6963983
    Abstract: A real-time approach for detecting aberrant modes of system behavior induced by abnormal and unauthorized system activities that are indicative of an intrusive, undesired access of the system. This detection methodology is based on behavioral information obtained from a suitably instrumented computer program as it is executing. The theoretical foundation for the present invention is founded on a study of the internal behavior of the software system. As a software system is executing, it expresses a set of its many functionalities as sequential events. Each of these functionalities has a characteristic set of modules that is executed to implement the functionality. These module sets execute with clearly defined and measurable execution profiles, which change as the executed functionalities change. Over time, the normal behavior of the system will be defined by the boundary of the profiles.
    Type: Grant
    Filed: January 13, 2004
    Date of Patent: November 8, 2005
    Assignee: Cylant, Inc.
    Inventors: John C. Munson, Sebastian G. Elbaum
  • Publication number: 20040143756
    Abstract: A real-time approach for detecting aberrant modes of system behavior induced by abnormal and unauthorized system activities that are indicative of an intrusive, undesired access of the system. This detection methodology is based on behavioral information obtained from a suitably instrumented computer program as it is executing. The theoretical foundation for the present invention is founded on a study of the internal behavior of the software system. As a software system is executing, it expresses a set of its many functionalities as sequential events. Each of these functionalities has a characteristic set of modules that is executed to implement the functionality. These module sets execute with clearly defined and measurable execution profiles, which change as the executed functionalities change. Over time, the normal behavior of the system will be defined by the boundary of the profiles.
    Type: Application
    Filed: January 13, 2004
    Publication date: July 22, 2004
    Inventors: John C. Munson, Sebastian G. Elbaum
  • Patent number: 6681331
    Abstract: A real-time approach for detecting aberrant modes of system behavior induced by abnormal and unauthorized system activities that are indicative of an intrusive, undesired access of the system. This detection methodology is based on behavioral information obtained from a suitably instrumented computer program as it is executing. The theoretical foundation for the present invention is founded on a study of the internal behavior of the software system. As a software system is executing, it expresses a set of its many functionalities as sequential events. Each of these functionalities has a characteristic set of modules that is executed to implement the functionality. These module sets execute with clearly defined and measurable execution profiles, which change as the executed functionalities change. Over time, the normal behavior of the system will be defined by the boundary of the profiles.
    Type: Grant
    Filed: May 11, 1999
    Date of Patent: January 20, 2004
    Assignee: Cylant, Inc.
    Inventors: John C. Munson, Sebastian G. Elbaum
  • Publication number: 20030200462
    Abstract: Detecting abnormal activity of a software system is based on behavioral information obtained from an instrumented computer program while it executes. As the program executes, it expresses information about the sequence and frequency with which program modules are called. Over time, this sequence and frequency defines the normal behavior of the program, and the information expressed on any given run is compared to this normal behavior. Statistical analysis of the differences between the normal behavior and the current run can be used to detect unauthorized or abusive use of the program. Program modules whose behavior is highly correlated can be grouped into a smaller number of virtual modules. Comparison between current and normal program behavior can then be made on the (smaller number of) virtual modules, thereby reducing the dimensionality of the problem of analyzing the differences between current and normal program behavior.
    Type: Application
    Filed: June 16, 2003
    Publication date: October 23, 2003
    Applicant: Software Systems International LLC
    Inventor: John C. Munson
  • Publication number: 20020138753
    Abstract: A real-time approach to detecting aberrant modes of system behavior induced by abnormal and unauthorized system activities indicative of abnormal activity of a software system is based on behavioral information obtained from a suitably instrumented computer program as it is executing. The theoretical foundation is founded on a study of the internal behavior of the software system. As a software system is executing, it expresses a set of its many functionalities as sequential events. Each of these functionalities has a characteristic set of modules that is executed to implement the functionality. These module sets execute with defined and measurable execution profiles among the program modules and within the execution paths of the individual modules, which change as the executed functionalities change. Over time, the normal behavior of the system will be defined by the boundary of the profiles.
    Type: Application
    Filed: March 15, 2002
    Publication date: September 26, 2002
    Inventor: John C. Munson
  • Patent number: 6182357
    Abstract: A manufacturing method and apparatus for dicing printed circuit boards is disclosed that permits PCB's to be manufactured with greater component density and cut less expensively. The disclosed method includes forming a raw substrate to include conductive traces, mounting components on the substrate, testing the PCB and then cutting off the waste edges. The PCB can be formed and tested with components mounted on one or both sides of the PCB, and the waste edges can be cut off even with components mounted on both sides of the board. A workpiece fixture is provided that includes a recessed cavity into which PCB components extend. Double-sided boards can be cut using the disclosed workpiece fixture. The cavity includes a vacuum hole through which suction is provided to hold the PCB in place during cutting. Additional vacuum holes preferably are provided to hold the wings in place after they are removed.
    Type: Grant
    Filed: January 5, 1999
    Date of Patent: February 6, 2001
    Assignee: Intermedics Inc.
    Inventors: Philip H. Chen, John C. Munson, Timothy M. Gadd
  • Patent number: 4198704
    Abstract: 1. A system for locating a radiating source comprising a plurality of mutly spaced radiation detectors, first means for correlating the output of one of said detectors with the output of a second of said detectors, second means for correlating the output of the second of said detectors with the output of a third detector, means coupled to said first and second correlating means for separately integrating the outputs thereof to produce a pair of integrated signals, and means for delaying one of said integrated signals with respect to the other of said integrated signals, whereby the delay is indicative of the range of the source from the detectors when the maximum amplitude of the delayed integrated signal coincides with the maximum amplitude of the other integrated signal.
    Type: Grant
    Filed: March 27, 1959
    Date of Patent: April 15, 1980
    Assignee: The United States of America as represented by the Secretary of the Navy
    Inventor: John C. Munson
  • Patent number: D523557
    Type: Grant
    Filed: June 3, 2004
    Date of Patent: June 20, 2006
    Assignee: Advanced Neuromodulation Systems, Inc.
    Inventors: Timothy S. Jones, Robert E. Jones, John C. Munson, Jr., Damon Black