Patents by Inventor John Clifton

John Clifton has filed for patents to protect the following inventions. This listing includes patent applications that are pending as well as patents that have already been granted by the United States Patent and Trademark Office (USPTO).

  • Publication number: 20230222619
    Abstract: Apparatuses, systems, and techniques to indicate contextual information to be used by available logical processors. In at least one embodiment, one or more circuits are to perform an application programming interface (API) to indicate a first set of contextual information to be used by a first subset of available processors.
    Type: Application
    Filed: January 13, 2022
    Publication date: July 13, 2023
    Inventors: David Anthony Fontaine, Maciej Marcin Piechotka, Kyrylo Perelygin, Lukasz Krystian Ligowski, Ashutosh Jain, Jitendra Pratap Singh Chauhan, Jaydeep Marathe, Magnus Strengert, Xiaonan Tian, Sebastian Piotr Jodlowski, John Clifton Woolley, JR.
  • Patent number: 11627149
    Abstract: Various embodiments of the present invention set forth techniques for security monitoring of a network connection, including analyzing network traffic data for a network connection associated with a computing device, identifying one or more network traffic metrics for the network connection based on the network traffic data, determining that the network connection corresponds to at least one network connection profile based on the one or more network traffic metrics, detecting a potential security threat for the network connection based on the one or more network traffic metrics and the at least one network connection profile, and initiating a mitigation action with respect to the network connection in response to detecting the potential security threat. Advantageously, the techniques allow detecting potential security threats based on network traffic metrics and categorizations, without requiring monitoring of the content or the total volume of all traffic exchanged via the connection.
    Type: Grant
    Filed: June 1, 2020
    Date of Patent: April 11, 2023
    Assignee: SPLUNK INC.
    Inventor: John Clifton Pierce
  • Patent number: 11463464
    Abstract: Techniques are described for analyzing data regarding activity in an IT environment to determine information regarding the entities associated with the activity and using the information to detect anomalous activity that may be indicative of malicious activity. In an embodiment, a plurality of events reflecting activity by a plurality of entities in an IT environment are processed to resolve the identities of the entities, discover how the entities fit within a topology of the IT environment, and determine what the entities are. This information is then used to generate an entity relationship graph that includes nodes representing the entities in the IT environment and edges connecting the nodes representing interaction relationships between the entities. In some embodiments, baselines are established by monitoring the activity between entities. This baseline information can be represented in the entity relationship graph in the form of directionality applied to the edges.
    Type: Grant
    Filed: May 26, 2020
    Date of Patent: October 4, 2022
    Assignee: SPLUNK INC.
    Inventors: Joseph Auguste Zadeh, Rodolfo Soto, George Apostolopoulos, John Clifton Pierce
  • Publication number: 20200366691
    Abstract: Various embodiments of the present invention set forth techniques for security monitoring of a network connection, including analyzing network traffic data for a network connection associated with a computing device, identifying one or more network traffic metrics for the network connection based on the network traffic data, determining that the network connection corresponds to at least one network connection profile based on the one or more network traffic metrics, detecting a potential security threat for the network connection based on the one or more network traffic metrics and the at least one network connection profile, and initiating a mitigation action with respect to the network connection in response to detecting the potential security threat. Advantageously, the techniques allow detecting potential security threats based on network traffic metrics and categorizations, without requiring monitoring of the content or the total volume of all traffic exchanged via the connection.
    Type: Application
    Filed: June 1, 2020
    Publication date: November 19, 2020
    Inventor: John Clifton Pierce
  • Publication number: 20200287927
    Abstract: Techniques are described for analyzing data regarding activity in an IT environment to determine information regarding the entities associated with the activity and using the information to detect anomalous activity that may be indicative of malicious activity. In an embodiment, a plurality of events reflecting activity by a plurality of entities in an IT environment are processed to resolve the identities of the entities, discover how the entities fit within a topology of the IT environment, and determine what the entities are. This information is then used to generate an entity relationship graph that includes nodes representing the entities in the IT environment and edges connecting the nodes representing interaction relationships between the entities. In some embodiments, baselines are established by monitoring the activity between entities. This baseline information can be represented in the entity relationship graph in the form of directionality applied to the edges.
    Type: Application
    Filed: May 26, 2020
    Publication date: September 10, 2020
    Inventors: Joseph Auguste Zadeh, Rodolfo Soto, George Apostolopoulos, John Clifton Pierce
  • Publication number: 20200202382
    Abstract: A system and process to determine the causal relationship between advertisement delivery data and sales data are disclosed. According to one embodiment, a method comprises importing advertisement data and sales data. The advertisement data and the sales data are joined to generate a joined data set. Customer journeys are generated for a timeframe from the joined data set. A first group of customers who saw an advertisement of interest are identified. A second group of customers who did not see the advertisement of interest are identified. Each customer of the first group is matched to a customer in the second group who is similar to the customer of the first group. An average treatment effect for the advertisement of interest is calculated.
    Type: Application
    Filed: December 19, 2018
    Publication date: June 25, 2020
    Inventors: Yan Ping Chen, John Clifton Davis, Antonio Hudson, Alex Chin
  • Patent number: 10693900
    Abstract: Techniques are described for analyzing data regarding activity in an IT environment to determine information regarding the entities associated with the activity and using the information to detect anomalous activity that may be indicative of malicious activity. In an embodiment, a plurality of events reflecting activity by a plurality of entities in an IT environment are processed to resolve the identities of the entities, discover how the entities fit within a topology of the IT environment, and determine what the entities are. This information is then used to generate an entity relationship graph that includes nodes representing the entities in the IT environment and edges connecting the nodes representing interaction relationships between the entities. In some embodiments, baselines are established by monitoring the activity between entities. This baseline information can be represented in the entity relationship graph in the form of directionality applied to the edges.
    Type: Grant
    Filed: January 17, 2019
    Date of Patent: June 23, 2020
    Assignee: SPLUNK INC.
    Inventors: Joseph Auguste Zadeh, Rodolfo Soto, George Apostolopoulos, John Clifton Pierce
  • Patent number: 10673870
    Abstract: Various embodiments of the present invention set forth techniques for security monitoring of a network connection, including analyzing network traffic data for a network connection associated with a computing device, identifying one or more network traffic metrics for the network connection based on the network traffic data, determining that the network connection corresponds to at least one network connection profile based on the one or more network traffic metrics, detecting a potential security threat for the network connection based on the one or more network traffic metrics and the at least one network connection profile, and initiating a mitigation action with respect to the network connection in response to detecting the potential security threat. Advantageously, the techniques allow detecting potential security threats based on network traffic metrics and categorizations, without requiring monitoring of the content or the total volume of all traffic exchanged via the connection.
    Type: Grant
    Filed: January 27, 2017
    Date of Patent: June 2, 2020
    Assignee: SPLUNK INC.
    Inventor: John Clifton Pierce
  • Publication number: 20190220731
    Abstract: In one embodiment of the present invention, a convolution engine configures a parallel processing pipeline to perform multi-convolution operations. More specifically, the convolution engine configures the parallel processing pipeline to independently generate and process individual image tiles. In operation, for each image tile, the pipeline calculates source locations included in an input image batch based on one or more start addresses and one or more offsets. Subsequently, the pipeline copies data from the source locations to the image tile. The pipeline then performs matrix multiplication operations between the image tile and a filter tile to generate a contribution of the image tile to an output matrix. To optimize the amount of memory used, the pipeline creates each image tile in shared memory as needed. Further, to optimize the throughput of the matrix multiplication operations, the values of the offsets are precomputed by a convolution preprocessor.
    Type: Application
    Filed: March 26, 2019
    Publication date: July 18, 2019
    Inventors: John Clifton WOOLLEY, JR., John TRAN
  • Publication number: 20190158524
    Abstract: Techniques are described for analyzing data regarding activity in an IT environment to determine information regarding the entities associated with the activity and using the information to detect anomalous activity that may be indicative of malicious activity. In an embodiment, a plurality of events reflecting activity by a plurality of entities in an IT environment are processed to resolve the identities of the entities, discover how the entities fit within a topology of the IT environment, and determine what the entities are. This information is then used to generate an entity relationship graph that includes nodes representing the entities in the IT environment and edges connecting the nodes representing interaction relationships between the entities. In some embodiments, baselines are established by monitoring the activity between entities. This baseline information can be represented in the entity relationship graph in the form of directionality applied to the edges.
    Type: Application
    Filed: January 17, 2019
    Publication date: May 23, 2019
    Inventors: Joseph Auguste Zadeh, Rodolfo Soto, George Apostolopoulos, John Clifton Pierce
  • Patent number: 10255547
    Abstract: In one embodiment of the present invention, a convolution engine configures a parallel processing pipeline to perform multi-convolution operations. More specifically, the convolution engine configures the parallel processing pipeline to independently generate and process individual image tiles. In operation, for each image tile, the pipeline calculates source locations included in an input image batch based on one or more start addresses and one or more offsets. Subsequently, the pipeline copies data from the source locations to the image tile. The pipeline then performs matrix multiplication operations between the image tile and a filter tile to generate a contribution of the image tile to an output matrix. To optimize the amount of memory used, the pipeline creates each image tile in shared memory as needed. Further, to optimize the throughput of the matrix multiplication operations, the values of the offsets are precomputed by a convolution preprocessor.
    Type: Grant
    Filed: November 25, 2015
    Date of Patent: April 9, 2019
    Assignee: NVIDIA CORPORATION
    Inventors: John Clifton Woolley, Jr., John Tran
  • Patent number: 10237294
    Abstract: Techniques are described for analyzing data regarding activity in an IT environment to determine information regarding the entities associated with the activity and using the information to detect anomalous activity that may be indicative of malicious activity. In an embodiment, a plurality of events reflecting activity by a plurality of entities in an IT environment are processed to resolve the identities of the entities, discover how the entities fit within a topology of the IT environment, and determine what the entities are. This information is then used to generate a entity relationship graph that includes nodes representing the entities in the IT environment and edges connecting the nodes representing interaction relationships between the entities. In some embodiments, baselines are established by monitoring the activity between entities. This baseline information can be represented in the entity relationship graph in the form of directionality applied to the edges.
    Type: Grant
    Filed: January 30, 2017
    Date of Patent: March 19, 2019
    Assignee: SPLUNK INC.
    Inventors: Joseph Auguste Zadeh, Rodolfo Soto, George Apostolopoulos, John Clifton Pierce
  • Publication number: 20180219879
    Abstract: Various embodiments of the present invention set forth techniques for security monitoring of a network connection, including analyzing network traffic data for a network connection associated with a computing device, identifying one or more network traffic metrics for the network connection based on the network traffic data, determining that the network connection corresponds to at least one network connection profile based on the one or more network traffic metrics, detecting a potential security threat for the network connection based on the one or more network traffic metrics and the at least one network connection profile, and initiating a mitigation action with respect to the network connection in response to detecting the potential security threat. Advantageously, the techniques allow detecting potential security threats based on network traffic metrics and categorizations, without requiring monitoring of the content or the total volume of all traffic exchanged via the connection.
    Type: Application
    Filed: January 27, 2017
    Publication date: August 2, 2018
    Inventor: John Clifton Pierce
  • Patent number: 9961096
    Abstract: Systems and methods for detecting behavior-based anomalies are described herein. In various embodiments, the system includes a context engine for creating behavioral vectors that are transmitted to a long term data store, to behavioral engines configured to create baselines based on historical data, and to sensors configured to observe system resources. According to particular embodiments, the system is configured to collect data regarding the system resources (e.g., via the sensors) and compare the collected data to baselines to determine whether anomalies have occurred.
    Type: Grant
    Filed: September 17, 2014
    Date of Patent: May 1, 2018
    Assignee: Cisco Technology, Inc.
    Inventor: John Clifton Pierce
  • Patent number: 9927090
    Abstract: Articles of manufacture and processes for generating articles of manufacture are disclosed. The articles of manufacture may serve as keepsakes and are shaped to include at least one three-dimensional representation of a subject, such as the subject's profile, that is obtained from a two-dimensional representation of the subject.
    Type: Grant
    Filed: February 3, 2016
    Date of Patent: March 27, 2018
    Inventor: John Clifton Cobb, III
  • Patent number: 9804826
    Abstract: System and method for pseudo-random number generation based on a recursion with significantly increased multithreaded parallelism. A single pseudo-random generator program is assigned with multiple threads to process in parallel. N state elements indexed incrementally are arranged into a matrix comprising x rows, where a respective adjacent pair of state elements in a same column are related by g=(M+j)mod N, wherein j and g represent indexes of the pair of state elements. x can be determined through an modular manipulative inverse of M and N. The matrix can be divided into sections with each section having a number of columns, and each thread is assigned with a section. In this manner, the majority of the requisite interactions among the state elements occur without expensive inter-thread communications, and further each thread may only need to communicate with a single other thread for a small number of times.
    Type: Grant
    Filed: December 5, 2014
    Date of Patent: October 31, 2017
    Assignee: Nvidia Corporation
    Inventors: Przemyslaw Tredak, John Clifton Woolley, Jr.
  • Patent number: 9433191
    Abstract: The present invention relates to a device that integrates a manually operable fluid dispenser for dispensing and applying a contained fluid to clean and/or disinfect a surface or care for a pet's fur coat. The device is preferably equipped with washable and reusable cleaning pads or various combing and brushing appliances thus obviating the need for a separate cleaning cloth or brush/comb.
    Type: Grant
    Filed: June 26, 2013
    Date of Patent: September 6, 2016
    Assignee: New Way Manufacturing Corporation
    Inventor: John Clifton Frye
  • Publication number: 20160223156
    Abstract: Articles of manufacture and processes for generating articles of manufacture are disclosed. The articles of manufacture may serve as keepsakes and are shaped to include at least one three-dimensional representation of a subject, such as the subject's profile, that is obtained from a two-dimensional representation of the subject.
    Type: Application
    Filed: February 3, 2016
    Publication date: August 4, 2016
    Inventor: John Clifton Cobb, III
  • Patent number: 9398997
    Abstract: The present invention is a foldable sexual device that includes a handle, a seat frame that includes a plurality of rollers and is rotated by a user while utilizing the foldable sexual device, a seat bar that allows the user to rotate the seat frame up or down and a pivot hinge point that allows the seat frame to rotate on the pivot hinge point. The device also includes a first support leg and a second leg support to support and stabilize the foldable sexual device, a phallus that moves upward and downward above and through the seat frame to provide sexual pleasure to the user, a seat that is disposed on the seat frame, a pair of corresponding arms that includes a slip bushing and a phallus base that is moved upward and downward by the pair of corresponding arms and the slip bushing.
    Type: Grant
    Filed: January 29, 2012
    Date of Patent: July 26, 2016
    Inventor: John Clifton Lindholm
  • Publication number: 20160182199
    Abstract: A communications device transmits/receives data to/from a mobile communications network including one or more network elements forming a wireless access interface for transmitting/receiving the data. An up-link includes a shared channel for transmitting the data to the mobile communications network. A controller controls a transmitter and receiver to transmit to the mobile communications network a request to transmit data in a smaller number of frequency division multiplexed symbols than available on the shared channel, to receive from the mobile communications network an indication of a sub-set of the predetermined number of frequency division multiplexed symbols in which the communications device should transmit the data on the shared channel, and to transmit signals representing the data in the shared channel to occupy a smaller number of frequency division multiplexed symbols than the number of the predetermined number of frequency division multiplexed symbols of the time period of the shared channel.
    Type: Application
    Filed: July 16, 2014
    Publication date: June 23, 2016
    Applicant: SONY CORPORATION
    Inventors: Matthew William WEBB, John CLIFTON