Patents by Inventor John C. Munson
John C. Munson has filed for patents to protect the following inventions. This listing includes patent applications that are pending as well as patents that have already been granted by the United States Patent and Trademark Office (USPTO).
-
Publication number: 20100274362Abstract: Mixtures, such as gels or pastes, comprising freeze-milled cartilage particles and exogenous growth factors are used for repairing chondral defects. Such mixtures may be applied to constructs comprising cancellous bone for implantation at the defect site. Suitable growth factors include variants of FGF-2, particularly variants that include a sole amino acid substitution for asparagine at amino acid 111 of the ?8-?9 loop of the FGF-2 peptide. Such FGF-2 variants are released slowly and continuously at a constant rate from cartilage pastes. In other embodiments, the amino acid substituted for asparigine is glycine. Other variants that may be used include FGF-9 variants having truncated chains and a sole amino acid substitution in the ?8-?9 loop of the FGF-9 peptide either for tryptophan at amino acid 144 or for asparagine at amino acid 143.Type: ApplicationFiled: January 14, 2010Publication date: October 28, 2010Inventors: Avner Yayon, Katherine G. Truncale, Hilla Barkay-Olami, Alex B. Callahan, Arthur A. Gertzman, Yen-Chen Huang, Morris L. Jacobs, John C. Munson, Eric J. Semler, Roman Shikhanovich, Baruch Stern, Moon Hae Sunwoo, William W. Tomford, Judith I. Yannariello-Brown
-
Publication number: 20100218171Abstract: A computer executing a software process is monitored by a monitor engine that is coupled to one or more buses in the monitored computer and can be installed in the monitored computer or be separate. Software that is to be monitored is certified, i.e., its nominal “normal” operating parameters are determined. Thus, each certified software system running on the monitored computer will have one or more certificates or set points associated with it. An analytical component of the monitoring engine manages the set of certificates for each execution process on the monitored computer. The executing process is monitored by the analytical component and compared against the associated certificate for that process. At any point where the software process begins to diverge from its operational certificate, the analytical component will notify a final control element, or adaptive engine, which can terminate the process or attempt to correct the anomaly.Type: ApplicationFiled: February 26, 2009Publication date: August 26, 2010Applicant: Computer Measurement Laboratory, Inc.Inventors: John C. Munson, Rick P. Hoover, Jack L. Meador
-
Publication number: 20090319045Abstract: Constructs that are at least partially constructed of allograft cancellous bone are disclosed, along with cartilage particles that may be used with the constructs for repairing articular cartilage defects. A multi-piece construct includes a base member, a cap member and at least one pin that secures the cap member to the base member. The base member may be constructed of mineralized cancellous bone, and is used to replace the subchondral bone removed when a surgeon cuts a bore in the area of an adjacent cartilage defect. The base member includes a blind bore and first and second through-going transverse bores in opposite sides of a wall of the base member. The cap member includes an upper section that has a thickness that is similar to that of a patient's surrounding articular cartilage layer and a stem depending from the upper section that is dimensioned to be received in and by the blind bore of the base member.Type: ApplicationFiled: March 5, 2009Publication date: December 24, 2009Inventors: Katherine G. Truncale, Eric J. Semler, Arthur A. Gertzman, Moon Hae Sunwoo, William W. Tomford, Roman Shikhanovich, Alex B. Callahan, Judith I. Yannariello-Brown, Morris L. Jacobs, John C. Munson, Yen-Chen Huang
-
Patent number: 7571478Abstract: A real-time approach for detecting aberrant modes of system behavior induced by abnormal and unauthorized system activities that are indicative of an intrusive, undesired access of the system. This detection methodology is based on behavioral information obtained from a suitably instrumented computer program as it is executing. The theoretical foundation for the present invention is founded on a study of the internal behavior of the software system. As a software system is executing, it expresses a set of its many functionalities as sequential events. Each of these functionalities has a characteristic set of modules that is executed to implement the functionality. These module sets execute with clearly defined and measurable execution profiles, which change as the executed functionalities change. Over time, the normal behavior of the system will be defined by the boundary of the profiles.Type: GrantFiled: November 7, 2005Date of Patent: August 4, 2009Assignee: Reflex Security, Inc.Inventors: John C. Munson, Sebastian G. Elbaum
-
Publication number: 20090118713Abstract: A portable tissue cleaning apparatus comprising a housing with a base member and side walls mounted to the base member and a top cover having a motor contained within a housing. A manually operable switch assembly is mounted on the housing and is operable to control operation of the motor. A connector connects the motor to a rotatable basket assembly having a cylindrical container. A perforated basket is mounted in the cylindrical container and a cover mounted on the cylindrical container to provide a sealed fluid containment chamber. The perforated basket is cylindrical and has an impeller mounted on its bottom to direct fluid in a predetermined path when the same is rotated, and a divider comprising a tube with external slots formed therein and fin members mounted in the slots with the fin members extending outward towards an inner wall surface of the cylindrical perforated container to divide the perforated basket into sections.Type: ApplicationFiled: November 5, 2007Publication date: May 7, 2009Inventor: John C. Munson
-
Patent number: 7185367Abstract: Detecting abnormal activity of a software system is based on behavioral information obtained from an instrumented computer program while it executes. As the program executes, it expresses information about the sequence and frequency with which program modules are called. Over time, this sequence and frequency defines the normal behavior of the program, and the information expressed on any given run is compared to this normal behavior. Statistical analysis of the differences between the normal behavior and the current run can be used to detect unauthorized or abusive use of the program. Program modules whose behavior is highly correlated can be grouped into a smaller number of virtual modules. Comparison between current and normal program behavior can then be made on the (smaller number of) virtual modules, thereby reducing the dimensionality of the problem of analyzing the differences between current and normal program behavior.Type: GrantFiled: June 16, 2003Date of Patent: February 27, 2007Assignee: Cylant, Inc.Inventor: John C. Munson
-
Patent number: 7096499Abstract: A real-time approach to detecting aberrant modes of system behavior induced by abnormal and unauthorized system activities indicative of abnormal activity of a software system is based on behavioral information obtained from a suitably instrumented computer program as it is executing. The theoretical foundation is founded on a study of the internal behavior of the software system. As a software system is executing, it expresses a set of its many functionalities as sequential events. Each of these functionalities has a characteristic set of modules that is executed to implement the functionality. These module sets execute with defined and measurable execution profiles among the program modules and within the execution paths of the individual modules, which change as the executed functionalities change. Over time, the normal behavior of the system will be defined by the boundary of the profiles.Type: GrantFiled: March 15, 2002Date of Patent: August 22, 2006Assignee: Cylant, Inc.Inventor: John C. Munson
-
Patent number: 6963983Abstract: A real-time approach for detecting aberrant modes of system behavior induced by abnormal and unauthorized system activities that are indicative of an intrusive, undesired access of the system. This detection methodology is based on behavioral information obtained from a suitably instrumented computer program as it is executing. The theoretical foundation for the present invention is founded on a study of the internal behavior of the software system. As a software system is executing, it expresses a set of its many functionalities as sequential events. Each of these functionalities has a characteristic set of modules that is executed to implement the functionality. These module sets execute with clearly defined and measurable execution profiles, which change as the executed functionalities change. Over time, the normal behavior of the system will be defined by the boundary of the profiles.Type: GrantFiled: January 13, 2004Date of Patent: November 8, 2005Assignee: Cylant, Inc.Inventors: John C. Munson, Sebastian G. Elbaum
-
Publication number: 20040143756Abstract: A real-time approach for detecting aberrant modes of system behavior induced by abnormal and unauthorized system activities that are indicative of an intrusive, undesired access of the system. This detection methodology is based on behavioral information obtained from a suitably instrumented computer program as it is executing. The theoretical foundation for the present invention is founded on a study of the internal behavior of the software system. As a software system is executing, it expresses a set of its many functionalities as sequential events. Each of these functionalities has a characteristic set of modules that is executed to implement the functionality. These module sets execute with clearly defined and measurable execution profiles, which change as the executed functionalities change. Over time, the normal behavior of the system will be defined by the boundary of the profiles.Type: ApplicationFiled: January 13, 2004Publication date: July 22, 2004Inventors: John C. Munson, Sebastian G. Elbaum
-
Patent number: 6681331Abstract: A real-time approach for detecting aberrant modes of system behavior induced by abnormal and unauthorized system activities that are indicative of an intrusive, undesired access of the system. This detection methodology is based on behavioral information obtained from a suitably instrumented computer program as it is executing. The theoretical foundation for the present invention is founded on a study of the internal behavior of the software system. As a software system is executing, it expresses a set of its many functionalities as sequential events. Each of these functionalities has a characteristic set of modules that is executed to implement the functionality. These module sets execute with clearly defined and measurable execution profiles, which change as the executed functionalities change. Over time, the normal behavior of the system will be defined by the boundary of the profiles.Type: GrantFiled: May 11, 1999Date of Patent: January 20, 2004Assignee: Cylant, Inc.Inventors: John C. Munson, Sebastian G. Elbaum
-
Publication number: 20030200462Abstract: Detecting abnormal activity of a software system is based on behavioral information obtained from an instrumented computer program while it executes. As the program executes, it expresses information about the sequence and frequency with which program modules are called. Over time, this sequence and frequency defines the normal behavior of the program, and the information expressed on any given run is compared to this normal behavior. Statistical analysis of the differences between the normal behavior and the current run can be used to detect unauthorized or abusive use of the program. Program modules whose behavior is highly correlated can be grouped into a smaller number of virtual modules. Comparison between current and normal program behavior can then be made on the (smaller number of) virtual modules, thereby reducing the dimensionality of the problem of analyzing the differences between current and normal program behavior.Type: ApplicationFiled: June 16, 2003Publication date: October 23, 2003Applicant: Software Systems International LLCInventor: John C. Munson
-
Publication number: 20020138753Abstract: A real-time approach to detecting aberrant modes of system behavior induced by abnormal and unauthorized system activities indicative of abnormal activity of a software system is based on behavioral information obtained from a suitably instrumented computer program as it is executing. The theoretical foundation is founded on a study of the internal behavior of the software system. As a software system is executing, it expresses a set of its many functionalities as sequential events. Each of these functionalities has a characteristic set of modules that is executed to implement the functionality. These module sets execute with defined and measurable execution profiles among the program modules and within the execution paths of the individual modules, which change as the executed functionalities change. Over time, the normal behavior of the system will be defined by the boundary of the profiles.Type: ApplicationFiled: March 15, 2002Publication date: September 26, 2002Inventor: John C. Munson
-
Patent number: 6182357Abstract: A manufacturing method and apparatus for dicing printed circuit boards is disclosed that permits PCB's to be manufactured with greater component density and cut less expensively. The disclosed method includes forming a raw substrate to include conductive traces, mounting components on the substrate, testing the PCB and then cutting off the waste edges. The PCB can be formed and tested with components mounted on one or both sides of the PCB, and the waste edges can be cut off even with components mounted on both sides of the board. A workpiece fixture is provided that includes a recessed cavity into which PCB components extend. Double-sided boards can be cut using the disclosed workpiece fixture. The cavity includes a vacuum hole through which suction is provided to hold the PCB in place during cutting. Additional vacuum holes preferably are provided to hold the wings in place after they are removed.Type: GrantFiled: January 5, 1999Date of Patent: February 6, 2001Assignee: Intermedics Inc.Inventors: Philip H. Chen, John C. Munson, Timothy M. Gadd
-
Patent number: 4198704Abstract: 1. A system for locating a radiating source comprising a plurality of mutly spaced radiation detectors, first means for correlating the output of one of said detectors with the output of a second of said detectors, second means for correlating the output of the second of said detectors with the output of a third detector, means coupled to said first and second correlating means for separately integrating the outputs thereof to produce a pair of integrated signals, and means for delaying one of said integrated signals with respect to the other of said integrated signals, whereby the delay is indicative of the range of the source from the detectors when the maximum amplitude of the delayed integrated signal coincides with the maximum amplitude of the other integrated signal.Type: GrantFiled: March 27, 1959Date of Patent: April 15, 1980Assignee: The United States of America as represented by the Secretary of the NavyInventor: John C. Munson
-
Patent number: D523557Type: GrantFiled: June 3, 2004Date of Patent: June 20, 2006Assignee: Advanced Neuromodulation Systems, Inc.Inventors: Timothy S. Jones, Robert E. Jones, John C. Munson, Jr., Damon Black