Patents by Inventor John Lindquist

John Lindquist has filed for patents to protect the following inventions. This listing includes patent applications that are pending as well as patents that have already been granted by the United States Patent and Trademark Office (USPTO).

  • Publication number: 20240078157
    Abstract: In connection with a data distribution architecture, client-side “deduplication” techniques may be utilized for data transfers occurring among various file system nodes. In some examples, these deduplication techniques involve fingerprinting file system elements that are being shared and transferred, and dividing each file into separate units referred to as “blocks” or “chunks.” These separate units may be used for independently rebuilding a file from local and remote collections, storage locations, or sources. The deduplication techniques may be applied to data transfers to prevent unnecessary data transfers, and to reduce the amount of bandwidth, processing power, and memory used to synchronize and transfer data among the file system nodes. The described deduplication concepts may also be applied for purposes of efficient file replication, data transfers, and file system events occurring within and among networks and file system nodes.
    Type: Application
    Filed: October 31, 2023
    Publication date: March 7, 2024
    Inventors: Matthew Dornquast, Brian Bispala, Damon Allison, Brad Armstrong, Marshall Scorcio, Rory Lonergan, Peter John Lindquist, Christopher Parker
  • Publication number: 20240054105
    Abstract: A system for forensic file services is configured to receive data indicative of operations executed on a filesystem element stored on a computing resource associated with a first tenant, to and adjust the data according to an indicated database schema. The system is also configured to store the adjusted data in a record of a partition of a database, where the partition configured to store a history of operations executed on filesystem elements of computing resources associated with the first tenant. The system is further configured to receive a search request to search the database and to execute the search request on a second partition of the database to identify one or more matching records. The system is additionally configured to provide the identified records in response to the search request.
    Type: Application
    Filed: October 23, 2023
    Publication date: February 15, 2024
    Inventors: Christopher Michael Montgomery, Peter John Lindquist, Brent Aethon McCullough, Vijay Ramanathan, Daniel Louis Sullivan
  • Patent number: 11829252
    Abstract: In connection with a data distribution architecture, client-side “deduplication” techniques may be utilized for data transfers occurring among various file system nodes. In some examples, these deduplication techniques involve fingerprinting file system elements that are being shared and transferred, and dividing each file into separate units referred to as “blocks” or “chunks.” These separate units may be used for independently rebuilding a file from local and remote collections, storage locations, or sources. The deduplication techniques may be applied to data transfers to prevent unnecessary data transfers, and to reduce the amount of bandwidth, processing power, and memory used to synchronize and transfer data among the file system nodes. The described deduplication concepts may also be applied for purposes of efficient file replication, data transfers, and file system events occurring within and among networks and file system nodes.
    Type: Grant
    Filed: October 12, 2022
    Date of Patent: November 28, 2023
    Assignee: CrashPlan Group LLC
    Inventors: Matthew Dornquast, Brian Bispala, Damon Allison, Brad Armstrong, Marshall Scorcio, Rory Lonergan, Peter John Lindquist, Christopher Parker
  • Patent number: 11822514
    Abstract: A system for forensic file services is configured to receive data indicative of operations executed on a filesystem element stored on a computing resource associated with a first tenant, to and adjust the data according to an indicated database schema. The system is also configured to store the adjusted data in a record of a partition of a database, where the partition configured to store a history of operations executed on filesystem elements of computing resources associated with the first tenant. The system is further configured to receive a search request to search the database and to execute the search request on a second partition of the database to identify one or more matching records. The system is additionally configured to provide the identified records in response to the search request.
    Type: Grant
    Filed: March 21, 2019
    Date of Patent: November 21, 2023
    Assignee: Code42 Software, Inc.
    Inventors: Christopher Michael Montgomery, Peter John Lindquist, Brent Aethon McCullough, Vijay Ramanathan, Daniel Louis Sullivan
  • Patent number: 11799886
    Abstract: Systems and techniques for detecting suspicious file activity are described herein. System for identifying anomalous data events is adapted to monitor a networked file system and receive an indication of a suspicious event associated with a user and a file. The system is further adapted to perform a pattern of behavior analysis for the user, perform an adjacency by time analysis based on a set of events before the suspicious event and a set of events after the suspicious event, and perform an adjacency by location analysis using a set of files located in a location of the file. The system is further adapted to determine whether the suspicious event is an anomalous event based on the pattern of behavior analysis, the adjacency by time analysis, and the adjacency by location analysis and display a report for the user including the anomalous event.
    Type: Grant
    Filed: January 10, 2023
    Date of Patent: October 24, 2023
    Assignee: Code42 Software, Inc.
    Inventor: Peter John Lindquist
  • Patent number: 11611571
    Abstract: Systems and techniques for detecting suspicious file activity are described herein. System for identifying anomalous data events is adapted to monitor a networked file system and receive an indication of a suspicious event associated with a user and a file. The system is further adapted to perform a pattern of behavior analysis for the user, perform an adjacency by time analysis based on a set of events before the suspicious event and a set of events after the suspicious event, and perform an adjacency by location analysis using a set of files located in a location of the file. The system is further adapted to determine whether the suspicious event is an anomalous event based on the pattern of behavior analysis, the adjacency by time analysis, and the adjacency by location analysis and display a report for the user including the anomalous event.
    Type: Grant
    Filed: September 3, 2019
    Date of Patent: March 21, 2023
    Assignee: Code42 Software, Inc.
    Inventor: Peter John Lindquist
  • Publication number: 20230057277
    Abstract: In connection with a data distribution architecture, client-side “deduplication” techniques may be utilized for data transfers occurring among various file system nodes. In some examples, these deduplication techniques involve fingerprinting file system elements that are being shared and transferred, and dividing each file into separate units referred to as “blocks” or “chunks.” These separate units may be used for independently rebuilding a file from local and remote collections, storage locations, or sources. The deduplication techniques may be applied to data transfers to prevent unnecessary data transfers, and to reduce the amount of bandwidth, processing power, and memory used to synchronize and transfer data among the file system nodes. The described deduplication concepts may also be applied for purposes of efficient file replication, data transfers, and file system events occurring within and among networks and file system nodes.
    Type: Application
    Filed: October 12, 2022
    Publication date: February 23, 2023
    Inventors: Matthew Dornquast, Brian Bispala, Damon Allison, Brad Armstrong, Marshall Scorcio, Rory Lonergan, Peter John Lindquist, Christopher Parker
  • Patent number: 11513903
    Abstract: In connection with a data distribution architecture, client-side “deduplication” techniques may be utilized for data transfers occurring among various file system nodes. In some examples, these deduplication techniques involve fingerprinting file system elements that are being shared and transferred, and dividing each file into separate units referred to as “blocks” or “chunks.” These separate units may be used for independently rebuilding a file from local and remote collections, storage locations, or sources. The deduplication techniques may be applied to data transfers to prevent unnecessary data transfers, and to reduce the amount of bandwidth, processing power, and memory used to synchronize and transfer data among the file system nodes. The described deduplication concepts may also be applied for purposes of efficient file replication, data transfers, and file system events occurring within and among networks and file system nodes.
    Type: Grant
    Filed: August 14, 2019
    Date of Patent: November 29, 2022
    Assignee: CrashPlan Group LLC
    Inventors: Matthew Dornquast, Brian Bispala, Damon Allison, Brad Armstrong, Marshall Scorcio, Rory Lonergan, Peter John Lindquist, Christopher Parker
  • Patent number: 11470900
    Abstract: A garment cover for an adjustment fit bottom including apparatus, systems, and methods including an adjustment fit band secured by an adjustment fit attachment along the adjustment fit band. The adjustment fit attachment may be covered by a garment cover.
    Type: Grant
    Filed: August 9, 2019
    Date of Patent: October 18, 2022
    Assignee: Wrangler Apparel Corp.
    Inventor: John Lindquist
  • Patent number: 11436467
    Abstract: An asset identification tag having an adhesive region proximate a first end of the tag that has an adhesive disposed on at least a portion of a surface thereof, an extension region proximate a second end of the tag that has a radio-frequency identification (RFID) transponder disposed within the extension region, and an indicator disposed between the extension region and the adhesive region.
    Type: Grant
    Filed: July 29, 2020
    Date of Patent: September 6, 2022
    Assignees: VANGUARD IDENTIFICATION SYSTEMS, INC, ASSETVUE, LLC
    Inventors: Sean Wm. Cotter, Alan J. Neves, John Lindquist, Greg Sawka, Richard O. Warther
  • Publication number: 20210067522
    Abstract: Systems and techniques for detecting suspicious file activity are described herein. System for identifying anomalous data events is adapted to monitor a networked file system and receive an indication of a suspicious event associated with a user and a file. The system is further adapted to perform a pattern of behavior analysis for the user, perform an adjacency by time analysis based on a set of events before the suspicious event and a set of events after the suspicious event, and perform an adjacency by location analysis using a set of files located in a location of the file. The system is further adapted to determine whether the suspicious event is an anomalous event based on the pattern of behavior analysis, the adjacency by time analysis, and the adjacency by location analysis and display a report for the user including the anomalous event.
    Type: Application
    Filed: September 3, 2019
    Publication date: March 4, 2021
    Inventor: Peter John Lindquist
  • Publication number: 20210042598
    Abstract: The present invention is directed to an asset identification tag having an adhesive region proximate a first end of the tag that has an adhesive disposed on at least a portion of a surface thereof, an extension region proximate a second end of the tag that has a radio-frequency identification (RFID) transponder disposed within the extension region, and an indicator disposed between the extension region and the adhesive region.
    Type: Application
    Filed: July 29, 2020
    Publication date: February 11, 2021
    Inventors: Sean Wm. COTTER, Alan J. NEVES, John LINDQUIST, Greg SAWKA, Richard O. WARTHER
  • Publication number: 20210011826
    Abstract: A system to generate historical usage data of a computing resource includes a module is configured to use at least one processor of the system to receive a query including a target and a time window and to retrieve historical file system data from backups of computing resources, where the historical file system data includes a file system object that was processed by the target during the time window. The module is further configured to use at least one processor of the system to generate historical usage data by converting the historical file system data to a temporally flat format that preserves a provenance of the file system object and to store the historical usage in a hierarchical data structure. The module is additionally configured to use at least one processor of the system to provide the hierarchical data structure in a response to the received query.
    Type: Application
    Filed: July 12, 2019
    Publication date: January 14, 2021
    Inventor: Peter John Lindquist
  • Publication number: 20200301888
    Abstract: A system for forensic file services is configured to receive data indicative of operations executed on a filesystem element stored on a computing resource associated with a first tenant, to and adjust the data according to an indicated database schema. The system is also configured to store the adjusted data in a record of a partition of a database, where the partition configured to store a history of operations executed on filesystem elements of computing resources associated with the first tenant. The system is further configured to receive a search request to search the database and to execute the search request on a second partition of the database to identify one or more matching records. The system is additionally configured to provide the identified records in response to the search request.
    Type: Application
    Filed: March 21, 2019
    Publication date: September 24, 2020
    Inventors: Christopher Michael Montgomery, Peter John Lindquist, Brent Aethon McCullough, Vijay Ramanathan, Daniel Louis Sullivan
  • Publication number: 20200081798
    Abstract: In connection with a data distribution architecture, client-side “deduplication” techniques may be utilized for data transfers occurring among various file system nodes. In some examples, these deduplication techniques involve fingerprinting file system elements that are being shared and transferred, and dividing each file into separate units referred to as “blocks” or “chunks.” These separate units may be used for independently rebuilding a file from local and remote collections, storage locations, or sources. The deduplication techniques may be applied to data transfers to prevent unnecessary data transfers, and to reduce the amount of bandwidth, processing power, and memory used to synchronize and transfer data among the file system nodes. The described deduplication concepts may also be applied for purposes of efficient file replication, data transfers, and file system events occurring within and among networks and file system nodes.
    Type: Application
    Filed: August 14, 2019
    Publication date: March 12, 2020
    Inventors: Matthew Dornquast, Brian Bispala, Damon Allison, Brad Armstrong, Marshall Scorcio, Rory Lonergan, Peter John Lindquist, Christopher Parker
  • Publication number: 20190058720
    Abstract: A home security and control system for monitoring and controlling an external environment such as a home environment comprising: an Internet browser connectable to an extranet; an extranet located external to the home environment and accessible via the Internet browser; a communications server located in the extranet and adapted to interconnect on demand with one of a series of connection gateways located in predetermined home environments; and a connection gateway located in the home environment adapted to control and/or monitor the operation of at least one security device in the home environment; wherein upon accessing a predetermined address by the Internet browser on the extranet, the communications server connects to a predetermined one of the connection gateways to control and/or monitor the operation of the security device. The extranet can ideally be implemented as a Virtual Private Network (VPN) across an Internet substrate.
    Type: Application
    Filed: April 30, 2018
    Publication date: February 21, 2019
    Inventors: Charles Cameron LINDQUIST, Timothy John LINDQUIST
  • Patent number: 9961097
    Abstract: A home security and control system for monitoring and controlling an external environment such as a home environment comprising: an Internet browser connectable to an extranet; an extranet located external to the home environment and accessible via the Internet browser; a communications server located in the extranet and adapted to interconnect on demand with one of a series of connection gateways located in predetermined home environments; and a connection gateway located in the home environment adapted to control and/or monitor the operation of at least one security device in the home environment; wherein upon accessing a predetermined address by the Internet browser on the extranet, the communications server connects to a predetermined one of the connection gateways to control and/or monitor the operation of the security device. The extranet can ideally be implemented as a Virtual Private Network (VPN) across an Internet substrate.
    Type: Grant
    Filed: November 10, 2014
    Date of Patent: May 1, 2018
    Assignee: Portus Singapore Pte Ltd
    Inventors: Charles Cameron Lindquist, Timothy John Lindquist
  • Patent number: 9872529
    Abstract: A garment having an improved pocket construction for easy retrieval of articles from its pocket. The garment includes a garment body and at least one pocket attached to the garment body. The pocket includes a pull having one end affixed inside the pocket and at least a portion the pull extending outside of the pocket, whereby the pull is adapted to retrieve an article from the pocket in response to the wearer pulling the portion of the pull extending outside of the pocket. In one embodiment, the pocket further includes a two-part construction. The garment may further include a closure.
    Type: Grant
    Filed: August 14, 2014
    Date of Patent: January 23, 2018
    Assignee: VF Jeanswear Limited Partnership
    Inventor: John Lindquist
  • Publication number: 20160330227
    Abstract: A home security and control system for monitoring and controlling an external environment such as a home environment comprising: an Internet browser connectable to an extranet; an extranet located external to the home environment and accessible via the Internet browser; a communications server located in the extranet and adapted to interconnect on demand with one of a series of connection gateways located in predetermined home environments; and a connection gateway located in the home environment adapted to control and/or monitor the operation of at least one security device in the home environment; wherein upon accessing a predetermined address by the Internet browser on the extranet, the communications server connects to a predetermined one of the connection gateways to control and/or monitor the operation of the security device. The extranet can ideally be implemented as a Virtual Private Network (VPN) across an Internet substrate.
    Type: Application
    Filed: July 21, 2016
    Publication date: November 10, 2016
    Inventors: Charles Cameron LINDQUIST, Timothy John LINDQUIST
  • Publication number: 20150088983
    Abstract: A home security and control system for monitoring and controlling an external environment such as a home environment comprising: an Internet browser connectable to an extranet; an extranet located external to the home environment and accessible via the Internet browser; a communications server located in the extranet and adapted to interconnect on demand with one of a series of connection gateways located in predetermined home environments; and a connection gateway located in the home environment adapted to control and/or monitor the operation of at least one security device in the home environment; wherein upon accessing a predetermined address by the Internet browser on the extranet, the communications server connects to a predetermined one of the connection gateways to control and/or monitor the operation of the security device. The extranet can ideally be implemented as a Virtual Private Network (VPN) across an Internet substrate.
    Type: Application
    Filed: November 10, 2014
    Publication date: March 26, 2015
    Applicant: PORTUS SINGAPORE PTE LTD
    Inventors: Charles Cameron LINDQUIST, Timothy John LINDQUIST