Patents by Inventor John Clifton
John Clifton has filed for patents to protect the following inventions. This listing includes patent applications that are pending as well as patents that have already been granted by the United States Patent and Trademark Office (USPTO).
-
Publication number: 20250014180Abstract: A coronary artery disease (CAD) analysis system is disclosed that comprises a CAD analysis device and a user interface. The CAD analysis device is arranged to analyse received patient CT scan data and produce CAD analysis data indicative of presence and characterisation of coronary artery disease in the patient CT scan data. The CAD analysis data is indicative of at least one individual stenosis lesion on a coronary artery and a characterisation of the stenosis lesion, and the CAD analysis system is arranged to identify a start location and an end location of the individual stenosis lesion on the coronary artery. The user interface displays a model of coronary arteries of a patient based on the patient CT scan data, and the model is configured to visually indicate an individual stenosis lesion and the individual stenosis lesion characterisation to a user so that the user is able to identify presence and characterisation of each individual stenosis lesion based on the visual indication.Type: ApplicationFiled: September 23, 2024Publication date: January 9, 2025Applicant: ARTRYA LIMITEDInventors: Abdul IHDAYHID, Casey CLIFTON, Girish DWIVEDI, Jack JOYNER, John KONSTANTOPOULOS, Julien FLACK
-
Publication number: 20250005744Abstract: A coronary artery disease (CAD) analysis system is disclosed that comprises a CAD analysis device and a user interface. The CAD analysis device is arranged to analyse received patient CT scan data and produce CAD analysis data indicative of presence and characterisation of coronary artery disease in the patient CT scan data. The CAD analysis data is indicative of at least one individual stenosis lesion on a coronary artery and a characterisation of the stenosis lesion, and the CAD analysis system is arranged to identify a start location and an end location of the individual stenosis lesion on the coronary artery. The user interface displays a model of coronary arteries of a patient based on the patient CT scan data, and the model is configured to visually indicate an individual stenosis lesion and the individual stenosis lesion characterisation to a user so that the user is able to identify presence and characterisation of each individual stenosis lesion based on the visual indication.Type: ApplicationFiled: July 12, 2022Publication date: January 2, 2025Applicant: ARTRYA LIMITEDInventors: Abdul IHDAYHID, Casey CLIFTON, Girish DWIVEDI, Jack JOYNER, John KONSTANTOPOULOS, Julien FLACK
-
Publication number: 20240389746Abstract: A hair styling assembly for forming a wave hairstyle includes a brush comprising a base and a plurality of bristles. Each one of the plurality of bristles is coupled to and extends away from the base and terminates in a free end. The plurality of bristles is positioned on the concave surface, and the free ends of all of the plurality of bristles forming a contour. A cover is removably coupled to the brush. The cover bounds an interior space in which the plurality of bristles and a portion of the base of the brush are positioned. The cover has an engagement wall lying adjacent to the free ends of the plurality of bristles which comprises a flexible material wherein the engagement wall conforms to the contour formed by the free ends of the plurality of bristles.Type: ApplicationFiled: May 23, 2023Publication date: November 28, 2024Inventor: John Clifton, JR.
-
Publication number: 20230222619Abstract: Apparatuses, systems, and techniques to indicate contextual information to be used by available logical processors. In at least one embodiment, one or more circuits are to perform an application programming interface (API) to indicate a first set of contextual information to be used by a first subset of available processors.Type: ApplicationFiled: January 13, 2022Publication date: July 13, 2023Inventors: David Anthony Fontaine, Maciej Marcin Piechotka, Kyrylo Perelygin, Lukasz Krystian Ligowski, Ashutosh Jain, Jitendra Pratap Singh Chauhan, Jaydeep Marathe, Magnus Strengert, Xiaonan Tian, Sebastian Piotr Jodlowski, John Clifton Woolley, JR.
-
Patent number: 11627149Abstract: Various embodiments of the present invention set forth techniques for security monitoring of a network connection, including analyzing network traffic data for a network connection associated with a computing device, identifying one or more network traffic metrics for the network connection based on the network traffic data, determining that the network connection corresponds to at least one network connection profile based on the one or more network traffic metrics, detecting a potential security threat for the network connection based on the one or more network traffic metrics and the at least one network connection profile, and initiating a mitigation action with respect to the network connection in response to detecting the potential security threat. Advantageously, the techniques allow detecting potential security threats based on network traffic metrics and categorizations, without requiring monitoring of the content or the total volume of all traffic exchanged via the connection.Type: GrantFiled: June 1, 2020Date of Patent: April 11, 2023Assignee: SPLUNK INC.Inventor: John Clifton Pierce
-
Patent number: 11463464Abstract: Techniques are described for analyzing data regarding activity in an IT environment to determine information regarding the entities associated with the activity and using the information to detect anomalous activity that may be indicative of malicious activity. In an embodiment, a plurality of events reflecting activity by a plurality of entities in an IT environment are processed to resolve the identities of the entities, discover how the entities fit within a topology of the IT environment, and determine what the entities are. This information is then used to generate an entity relationship graph that includes nodes representing the entities in the IT environment and edges connecting the nodes representing interaction relationships between the entities. In some embodiments, baselines are established by monitoring the activity between entities. This baseline information can be represented in the entity relationship graph in the form of directionality applied to the edges.Type: GrantFiled: May 26, 2020Date of Patent: October 4, 2022Assignee: SPLUNK INC.Inventors: Joseph Auguste Zadeh, Rodolfo Soto, George Apostolopoulos, John Clifton Pierce
-
Publication number: 20200366691Abstract: Various embodiments of the present invention set forth techniques for security monitoring of a network connection, including analyzing network traffic data for a network connection associated with a computing device, identifying one or more network traffic metrics for the network connection based on the network traffic data, determining that the network connection corresponds to at least one network connection profile based on the one or more network traffic metrics, detecting a potential security threat for the network connection based on the one or more network traffic metrics and the at least one network connection profile, and initiating a mitigation action with respect to the network connection in response to detecting the potential security threat. Advantageously, the techniques allow detecting potential security threats based on network traffic metrics and categorizations, without requiring monitoring of the content or the total volume of all traffic exchanged via the connection.Type: ApplicationFiled: June 1, 2020Publication date: November 19, 2020Inventor: John Clifton Pierce
-
Publication number: 20200287927Abstract: Techniques are described for analyzing data regarding activity in an IT environment to determine information regarding the entities associated with the activity and using the information to detect anomalous activity that may be indicative of malicious activity. In an embodiment, a plurality of events reflecting activity by a plurality of entities in an IT environment are processed to resolve the identities of the entities, discover how the entities fit within a topology of the IT environment, and determine what the entities are. This information is then used to generate an entity relationship graph that includes nodes representing the entities in the IT environment and edges connecting the nodes representing interaction relationships between the entities. In some embodiments, baselines are established by monitoring the activity between entities. This baseline information can be represented in the entity relationship graph in the form of directionality applied to the edges.Type: ApplicationFiled: May 26, 2020Publication date: September 10, 2020Inventors: Joseph Auguste Zadeh, Rodolfo Soto, George Apostolopoulos, John Clifton Pierce
-
Publication number: 20200202382Abstract: A system and process to determine the causal relationship between advertisement delivery data and sales data are disclosed. According to one embodiment, a method comprises importing advertisement data and sales data. The advertisement data and the sales data are joined to generate a joined data set. Customer journeys are generated for a timeframe from the joined data set. A first group of customers who saw an advertisement of interest are identified. A second group of customers who did not see the advertisement of interest are identified. Each customer of the first group is matched to a customer in the second group who is similar to the customer of the first group. An average treatment effect for the advertisement of interest is calculated.Type: ApplicationFiled: December 19, 2018Publication date: June 25, 2020Inventors: Yan Ping Chen, John Clifton Davis, Antonio Hudson, Alex Chin
-
Patent number: 10693900Abstract: Techniques are described for analyzing data regarding activity in an IT environment to determine information regarding the entities associated with the activity and using the information to detect anomalous activity that may be indicative of malicious activity. In an embodiment, a plurality of events reflecting activity by a plurality of entities in an IT environment are processed to resolve the identities of the entities, discover how the entities fit within a topology of the IT environment, and determine what the entities are. This information is then used to generate an entity relationship graph that includes nodes representing the entities in the IT environment and edges connecting the nodes representing interaction relationships between the entities. In some embodiments, baselines are established by monitoring the activity between entities. This baseline information can be represented in the entity relationship graph in the form of directionality applied to the edges.Type: GrantFiled: January 17, 2019Date of Patent: June 23, 2020Assignee: SPLUNK INC.Inventors: Joseph Auguste Zadeh, Rodolfo Soto, George Apostolopoulos, John Clifton Pierce
-
Patent number: 10673870Abstract: Various embodiments of the present invention set forth techniques for security monitoring of a network connection, including analyzing network traffic data for a network connection associated with a computing device, identifying one or more network traffic metrics for the network connection based on the network traffic data, determining that the network connection corresponds to at least one network connection profile based on the one or more network traffic metrics, detecting a potential security threat for the network connection based on the one or more network traffic metrics and the at least one network connection profile, and initiating a mitigation action with respect to the network connection in response to detecting the potential security threat. Advantageously, the techniques allow detecting potential security threats based on network traffic metrics and categorizations, without requiring monitoring of the content or the total volume of all traffic exchanged via the connection.Type: GrantFiled: January 27, 2017Date of Patent: June 2, 2020Assignee: SPLUNK INC.Inventor: John Clifton Pierce
-
Publication number: 20190220731Abstract: In one embodiment of the present invention, a convolution engine configures a parallel processing pipeline to perform multi-convolution operations. More specifically, the convolution engine configures the parallel processing pipeline to independently generate and process individual image tiles. In operation, for each image tile, the pipeline calculates source locations included in an input image batch based on one or more start addresses and one or more offsets. Subsequently, the pipeline copies data from the source locations to the image tile. The pipeline then performs matrix multiplication operations between the image tile and a filter tile to generate a contribution of the image tile to an output matrix. To optimize the amount of memory used, the pipeline creates each image tile in shared memory as needed. Further, to optimize the throughput of the matrix multiplication operations, the values of the offsets are precomputed by a convolution preprocessor.Type: ApplicationFiled: March 26, 2019Publication date: July 18, 2019Inventors: John Clifton WOOLLEY, JR., John TRAN
-
Publication number: 20190158524Abstract: Techniques are described for analyzing data regarding activity in an IT environment to determine information regarding the entities associated with the activity and using the information to detect anomalous activity that may be indicative of malicious activity. In an embodiment, a plurality of events reflecting activity by a plurality of entities in an IT environment are processed to resolve the identities of the entities, discover how the entities fit within a topology of the IT environment, and determine what the entities are. This information is then used to generate an entity relationship graph that includes nodes representing the entities in the IT environment and edges connecting the nodes representing interaction relationships between the entities. In some embodiments, baselines are established by monitoring the activity between entities. This baseline information can be represented in the entity relationship graph in the form of directionality applied to the edges.Type: ApplicationFiled: January 17, 2019Publication date: May 23, 2019Inventors: Joseph Auguste Zadeh, Rodolfo Soto, George Apostolopoulos, John Clifton Pierce
-
Patent number: 10255547Abstract: In one embodiment of the present invention, a convolution engine configures a parallel processing pipeline to perform multi-convolution operations. More specifically, the convolution engine configures the parallel processing pipeline to independently generate and process individual image tiles. In operation, for each image tile, the pipeline calculates source locations included in an input image batch based on one or more start addresses and one or more offsets. Subsequently, the pipeline copies data from the source locations to the image tile. The pipeline then performs matrix multiplication operations between the image tile and a filter tile to generate a contribution of the image tile to an output matrix. To optimize the amount of memory used, the pipeline creates each image tile in shared memory as needed. Further, to optimize the throughput of the matrix multiplication operations, the values of the offsets are precomputed by a convolution preprocessor.Type: GrantFiled: November 25, 2015Date of Patent: April 9, 2019Assignee: NVIDIA CORPORATIONInventors: John Clifton Woolley, Jr., John Tran
-
Patent number: 10237294Abstract: Techniques are described for analyzing data regarding activity in an IT environment to determine information regarding the entities associated with the activity and using the information to detect anomalous activity that may be indicative of malicious activity. In an embodiment, a plurality of events reflecting activity by a plurality of entities in an IT environment are processed to resolve the identities of the entities, discover how the entities fit within a topology of the IT environment, and determine what the entities are. This information is then used to generate a entity relationship graph that includes nodes representing the entities in the IT environment and edges connecting the nodes representing interaction relationships between the entities. In some embodiments, baselines are established by monitoring the activity between entities. This baseline information can be represented in the entity relationship graph in the form of directionality applied to the edges.Type: GrantFiled: January 30, 2017Date of Patent: March 19, 2019Assignee: SPLUNK INC.Inventors: Joseph Auguste Zadeh, Rodolfo Soto, George Apostolopoulos, John Clifton Pierce
-
Publication number: 20180219879Abstract: Various embodiments of the present invention set forth techniques for security monitoring of a network connection, including analyzing network traffic data for a network connection associated with a computing device, identifying one or more network traffic metrics for the network connection based on the network traffic data, determining that the network connection corresponds to at least one network connection profile based on the one or more network traffic metrics, detecting a potential security threat for the network connection based on the one or more network traffic metrics and the at least one network connection profile, and initiating a mitigation action with respect to the network connection in response to detecting the potential security threat. Advantageously, the techniques allow detecting potential security threats based on network traffic metrics and categorizations, without requiring monitoring of the content or the total volume of all traffic exchanged via the connection.Type: ApplicationFiled: January 27, 2017Publication date: August 2, 2018Inventor: John Clifton Pierce
-
Patent number: 9961096Abstract: Systems and methods for detecting behavior-based anomalies are described herein. In various embodiments, the system includes a context engine for creating behavioral vectors that are transmitted to a long term data store, to behavioral engines configured to create baselines based on historical data, and to sensors configured to observe system resources. According to particular embodiments, the system is configured to collect data regarding the system resources (e.g., via the sensors) and compare the collected data to baselines to determine whether anomalies have occurred.Type: GrantFiled: September 17, 2014Date of Patent: May 1, 2018Assignee: Cisco Technology, Inc.Inventor: John Clifton Pierce
-
Patent number: 9927090Abstract: Articles of manufacture and processes for generating articles of manufacture are disclosed. The articles of manufacture may serve as keepsakes and are shaped to include at least one three-dimensional representation of a subject, such as the subject's profile, that is obtained from a two-dimensional representation of the subject.Type: GrantFiled: February 3, 2016Date of Patent: March 27, 2018Inventor: John Clifton Cobb, III
-
Patent number: 9804826Abstract: System and method for pseudo-random number generation based on a recursion with significantly increased multithreaded parallelism. A single pseudo-random generator program is assigned with multiple threads to process in parallel. N state elements indexed incrementally are arranged into a matrix comprising x rows, where a respective adjacent pair of state elements in a same column are related by g=(M+j)mod N, wherein j and g represent indexes of the pair of state elements. x can be determined through an modular manipulative inverse of M and N. The matrix can be divided into sections with each section having a number of columns, and each thread is assigned with a section. In this manner, the majority of the requisite interactions among the state elements occur without expensive inter-thread communications, and further each thread may only need to communicate with a single other thread for a small number of times.Type: GrantFiled: December 5, 2014Date of Patent: October 31, 2017Assignee: Nvidia CorporationInventors: Przemyslaw Tredak, John Clifton Woolley, Jr.
-
Patent number: 9433191Abstract: The present invention relates to a device that integrates a manually operable fluid dispenser for dispensing and applying a contained fluid to clean and/or disinfect a surface or care for a pet's fur coat. The device is preferably equipped with washable and reusable cleaning pads or various combing and brushing appliances thus obviating the need for a separate cleaning cloth or brush/comb.Type: GrantFiled: June 26, 2013Date of Patent: September 6, 2016Assignee: New Way Manufacturing CorporationInventor: John Clifton Frye