Patents by Inventor John Lindquist
John Lindquist has filed for patents to protect the following inventions. This listing includes patent applications that are pending as well as patents that have already been granted by the United States Patent and Trademark Office (USPTO).
-
Publication number: 20240078157Abstract: In connection with a data distribution architecture, client-side “deduplication” techniques may be utilized for data transfers occurring among various file system nodes. In some examples, these deduplication techniques involve fingerprinting file system elements that are being shared and transferred, and dividing each file into separate units referred to as “blocks” or “chunks.” These separate units may be used for independently rebuilding a file from local and remote collections, storage locations, or sources. The deduplication techniques may be applied to data transfers to prevent unnecessary data transfers, and to reduce the amount of bandwidth, processing power, and memory used to synchronize and transfer data among the file system nodes. The described deduplication concepts may also be applied for purposes of efficient file replication, data transfers, and file system events occurring within and among networks and file system nodes.Type: ApplicationFiled: October 31, 2023Publication date: March 7, 2024Inventors: Matthew Dornquast, Brian Bispala, Damon Allison, Brad Armstrong, Marshall Scorcio, Rory Lonergan, Peter John Lindquist, Christopher Parker
-
Publication number: 20240054105Abstract: A system for forensic file services is configured to receive data indicative of operations executed on a filesystem element stored on a computing resource associated with a first tenant, to and adjust the data according to an indicated database schema. The system is also configured to store the adjusted data in a record of a partition of a database, where the partition configured to store a history of operations executed on filesystem elements of computing resources associated with the first tenant. The system is further configured to receive a search request to search the database and to execute the search request on a second partition of the database to identify one or more matching records. The system is additionally configured to provide the identified records in response to the search request.Type: ApplicationFiled: October 23, 2023Publication date: February 15, 2024Inventors: Christopher Michael Montgomery, Peter John Lindquist, Brent Aethon McCullough, Vijay Ramanathan, Daniel Louis Sullivan
-
Patent number: 11829252Abstract: In connection with a data distribution architecture, client-side “deduplication” techniques may be utilized for data transfers occurring among various file system nodes. In some examples, these deduplication techniques involve fingerprinting file system elements that are being shared and transferred, and dividing each file into separate units referred to as “blocks” or “chunks.” These separate units may be used for independently rebuilding a file from local and remote collections, storage locations, or sources. The deduplication techniques may be applied to data transfers to prevent unnecessary data transfers, and to reduce the amount of bandwidth, processing power, and memory used to synchronize and transfer data among the file system nodes. The described deduplication concepts may also be applied for purposes of efficient file replication, data transfers, and file system events occurring within and among networks and file system nodes.Type: GrantFiled: October 12, 2022Date of Patent: November 28, 2023Assignee: CrashPlan Group LLCInventors: Matthew Dornquast, Brian Bispala, Damon Allison, Brad Armstrong, Marshall Scorcio, Rory Lonergan, Peter John Lindquist, Christopher Parker
-
Patent number: 11822514Abstract: A system for forensic file services is configured to receive data indicative of operations executed on a filesystem element stored on a computing resource associated with a first tenant, to and adjust the data according to an indicated database schema. The system is also configured to store the adjusted data in a record of a partition of a database, where the partition configured to store a history of operations executed on filesystem elements of computing resources associated with the first tenant. The system is further configured to receive a search request to search the database and to execute the search request on a second partition of the database to identify one or more matching records. The system is additionally configured to provide the identified records in response to the search request.Type: GrantFiled: March 21, 2019Date of Patent: November 21, 2023Assignee: Code42 Software, Inc.Inventors: Christopher Michael Montgomery, Peter John Lindquist, Brent Aethon McCullough, Vijay Ramanathan, Daniel Louis Sullivan
-
Patent number: 11799886Abstract: Systems and techniques for detecting suspicious file activity are described herein. System for identifying anomalous data events is adapted to monitor a networked file system and receive an indication of a suspicious event associated with a user and a file. The system is further adapted to perform a pattern of behavior analysis for the user, perform an adjacency by time analysis based on a set of events before the suspicious event and a set of events after the suspicious event, and perform an adjacency by location analysis using a set of files located in a location of the file. The system is further adapted to determine whether the suspicious event is an anomalous event based on the pattern of behavior analysis, the adjacency by time analysis, and the adjacency by location analysis and display a report for the user including the anomalous event.Type: GrantFiled: January 10, 2023Date of Patent: October 24, 2023Assignee: Code42 Software, Inc.Inventor: Peter John Lindquist
-
Patent number: 11611571Abstract: Systems and techniques for detecting suspicious file activity are described herein. System for identifying anomalous data events is adapted to monitor a networked file system and receive an indication of a suspicious event associated with a user and a file. The system is further adapted to perform a pattern of behavior analysis for the user, perform an adjacency by time analysis based on a set of events before the suspicious event and a set of events after the suspicious event, and perform an adjacency by location analysis using a set of files located in a location of the file. The system is further adapted to determine whether the suspicious event is an anomalous event based on the pattern of behavior analysis, the adjacency by time analysis, and the adjacency by location analysis and display a report for the user including the anomalous event.Type: GrantFiled: September 3, 2019Date of Patent: March 21, 2023Assignee: Code42 Software, Inc.Inventor: Peter John Lindquist
-
Publication number: 20230057277Abstract: In connection with a data distribution architecture, client-side “deduplication” techniques may be utilized for data transfers occurring among various file system nodes. In some examples, these deduplication techniques involve fingerprinting file system elements that are being shared and transferred, and dividing each file into separate units referred to as “blocks” or “chunks.” These separate units may be used for independently rebuilding a file from local and remote collections, storage locations, or sources. The deduplication techniques may be applied to data transfers to prevent unnecessary data transfers, and to reduce the amount of bandwidth, processing power, and memory used to synchronize and transfer data among the file system nodes. The described deduplication concepts may also be applied for purposes of efficient file replication, data transfers, and file system events occurring within and among networks and file system nodes.Type: ApplicationFiled: October 12, 2022Publication date: February 23, 2023Inventors: Matthew Dornquast, Brian Bispala, Damon Allison, Brad Armstrong, Marshall Scorcio, Rory Lonergan, Peter John Lindquist, Christopher Parker
-
Patent number: 11513903Abstract: In connection with a data distribution architecture, client-side “deduplication” techniques may be utilized for data transfers occurring among various file system nodes. In some examples, these deduplication techniques involve fingerprinting file system elements that are being shared and transferred, and dividing each file into separate units referred to as “blocks” or “chunks.” These separate units may be used for independently rebuilding a file from local and remote collections, storage locations, or sources. The deduplication techniques may be applied to data transfers to prevent unnecessary data transfers, and to reduce the amount of bandwidth, processing power, and memory used to synchronize and transfer data among the file system nodes. The described deduplication concepts may also be applied for purposes of efficient file replication, data transfers, and file system events occurring within and among networks and file system nodes.Type: GrantFiled: August 14, 2019Date of Patent: November 29, 2022Assignee: CrashPlan Group LLCInventors: Matthew Dornquast, Brian Bispala, Damon Allison, Brad Armstrong, Marshall Scorcio, Rory Lonergan, Peter John Lindquist, Christopher Parker
-
Patent number: 11470900Abstract: A garment cover for an adjustment fit bottom including apparatus, systems, and methods including an adjustment fit band secured by an adjustment fit attachment along the adjustment fit band. The adjustment fit attachment may be covered by a garment cover.Type: GrantFiled: August 9, 2019Date of Patent: October 18, 2022Assignee: Wrangler Apparel Corp.Inventor: John Lindquist
-
Patent number: 11436467Abstract: An asset identification tag having an adhesive region proximate a first end of the tag that has an adhesive disposed on at least a portion of a surface thereof, an extension region proximate a second end of the tag that has a radio-frequency identification (RFID) transponder disposed within the extension region, and an indicator disposed between the extension region and the adhesive region.Type: GrantFiled: July 29, 2020Date of Patent: September 6, 2022Assignees: VANGUARD IDENTIFICATION SYSTEMS, INC, ASSETVUE, LLCInventors: Sean Wm. Cotter, Alan J. Neves, John Lindquist, Greg Sawka, Richard O. Warther
-
Publication number: 20210067522Abstract: Systems and techniques for detecting suspicious file activity are described herein. System for identifying anomalous data events is adapted to monitor a networked file system and receive an indication of a suspicious event associated with a user and a file. The system is further adapted to perform a pattern of behavior analysis for the user, perform an adjacency by time analysis based on a set of events before the suspicious event and a set of events after the suspicious event, and perform an adjacency by location analysis using a set of files located in a location of the file. The system is further adapted to determine whether the suspicious event is an anomalous event based on the pattern of behavior analysis, the adjacency by time analysis, and the adjacency by location analysis and display a report for the user including the anomalous event.Type: ApplicationFiled: September 3, 2019Publication date: March 4, 2021Inventor: Peter John Lindquist
-
Publication number: 20210042598Abstract: The present invention is directed to an asset identification tag having an adhesive region proximate a first end of the tag that has an adhesive disposed on at least a portion of a surface thereof, an extension region proximate a second end of the tag that has a radio-frequency identification (RFID) transponder disposed within the extension region, and an indicator disposed between the extension region and the adhesive region.Type: ApplicationFiled: July 29, 2020Publication date: February 11, 2021Inventors: Sean Wm. COTTER, Alan J. NEVES, John LINDQUIST, Greg SAWKA, Richard O. WARTHER
-
Publication number: 20210011826Abstract: A system to generate historical usage data of a computing resource includes a module is configured to use at least one processor of the system to receive a query including a target and a time window and to retrieve historical file system data from backups of computing resources, where the historical file system data includes a file system object that was processed by the target during the time window. The module is further configured to use at least one processor of the system to generate historical usage data by converting the historical file system data to a temporally flat format that preserves a provenance of the file system object and to store the historical usage in a hierarchical data structure. The module is additionally configured to use at least one processor of the system to provide the hierarchical data structure in a response to the received query.Type: ApplicationFiled: July 12, 2019Publication date: January 14, 2021Inventor: Peter John Lindquist
-
Publication number: 20200301888Abstract: A system for forensic file services is configured to receive data indicative of operations executed on a filesystem element stored on a computing resource associated with a first tenant, to and adjust the data according to an indicated database schema. The system is also configured to store the adjusted data in a record of a partition of a database, where the partition configured to store a history of operations executed on filesystem elements of computing resources associated with the first tenant. The system is further configured to receive a search request to search the database and to execute the search request on a second partition of the database to identify one or more matching records. The system is additionally configured to provide the identified records in response to the search request.Type: ApplicationFiled: March 21, 2019Publication date: September 24, 2020Inventors: Christopher Michael Montgomery, Peter John Lindquist, Brent Aethon McCullough, Vijay Ramanathan, Daniel Louis Sullivan
-
Publication number: 20200081798Abstract: In connection with a data distribution architecture, client-side “deduplication” techniques may be utilized for data transfers occurring among various file system nodes. In some examples, these deduplication techniques involve fingerprinting file system elements that are being shared and transferred, and dividing each file into separate units referred to as “blocks” or “chunks.” These separate units may be used for independently rebuilding a file from local and remote collections, storage locations, or sources. The deduplication techniques may be applied to data transfers to prevent unnecessary data transfers, and to reduce the amount of bandwidth, processing power, and memory used to synchronize and transfer data among the file system nodes. The described deduplication concepts may also be applied for purposes of efficient file replication, data transfers, and file system events occurring within and among networks and file system nodes.Type: ApplicationFiled: August 14, 2019Publication date: March 12, 2020Inventors: Matthew Dornquast, Brian Bispala, Damon Allison, Brad Armstrong, Marshall Scorcio, Rory Lonergan, Peter John Lindquist, Christopher Parker
-
Publication number: 20190058720Abstract: A home security and control system for monitoring and controlling an external environment such as a home environment comprising: an Internet browser connectable to an extranet; an extranet located external to the home environment and accessible via the Internet browser; a communications server located in the extranet and adapted to interconnect on demand with one of a series of connection gateways located in predetermined home environments; and a connection gateway located in the home environment adapted to control and/or monitor the operation of at least one security device in the home environment; wherein upon accessing a predetermined address by the Internet browser on the extranet, the communications server connects to a predetermined one of the connection gateways to control and/or monitor the operation of the security device. The extranet can ideally be implemented as a Virtual Private Network (VPN) across an Internet substrate.Type: ApplicationFiled: April 30, 2018Publication date: February 21, 2019Inventors: Charles Cameron LINDQUIST, Timothy John LINDQUIST
-
Patent number: 9961097Abstract: A home security and control system for monitoring and controlling an external environment such as a home environment comprising: an Internet browser connectable to an extranet; an extranet located external to the home environment and accessible via the Internet browser; a communications server located in the extranet and adapted to interconnect on demand with one of a series of connection gateways located in predetermined home environments; and a connection gateway located in the home environment adapted to control and/or monitor the operation of at least one security device in the home environment; wherein upon accessing a predetermined address by the Internet browser on the extranet, the communications server connects to a predetermined one of the connection gateways to control and/or monitor the operation of the security device. The extranet can ideally be implemented as a Virtual Private Network (VPN) across an Internet substrate.Type: GrantFiled: November 10, 2014Date of Patent: May 1, 2018Assignee: Portus Singapore Pte LtdInventors: Charles Cameron Lindquist, Timothy John Lindquist
-
Patent number: 9872529Abstract: A garment having an improved pocket construction for easy retrieval of articles from its pocket. The garment includes a garment body and at least one pocket attached to the garment body. The pocket includes a pull having one end affixed inside the pocket and at least a portion the pull extending outside of the pocket, whereby the pull is adapted to retrieve an article from the pocket in response to the wearer pulling the portion of the pull extending outside of the pocket. In one embodiment, the pocket further includes a two-part construction. The garment may further include a closure.Type: GrantFiled: August 14, 2014Date of Patent: January 23, 2018Assignee: VF Jeanswear Limited PartnershipInventor: John Lindquist
-
Publication number: 20160330227Abstract: A home security and control system for monitoring and controlling an external environment such as a home environment comprising: an Internet browser connectable to an extranet; an extranet located external to the home environment and accessible via the Internet browser; a communications server located in the extranet and adapted to interconnect on demand with one of a series of connection gateways located in predetermined home environments; and a connection gateway located in the home environment adapted to control and/or monitor the operation of at least one security device in the home environment; wherein upon accessing a predetermined address by the Internet browser on the extranet, the communications server connects to a predetermined one of the connection gateways to control and/or monitor the operation of the security device. The extranet can ideally be implemented as a Virtual Private Network (VPN) across an Internet substrate.Type: ApplicationFiled: July 21, 2016Publication date: November 10, 2016Inventors: Charles Cameron LINDQUIST, Timothy John LINDQUIST
-
Publication number: 20150088983Abstract: A home security and control system for monitoring and controlling an external environment such as a home environment comprising: an Internet browser connectable to an extranet; an extranet located external to the home environment and accessible via the Internet browser; a communications server located in the extranet and adapted to interconnect on demand with one of a series of connection gateways located in predetermined home environments; and a connection gateway located in the home environment adapted to control and/or monitor the operation of at least one security device in the home environment; wherein upon accessing a predetermined address by the Internet browser on the extranet, the communications server connects to a predetermined one of the connection gateways to control and/or monitor the operation of the security device. The extranet can ideally be implemented as a Virtual Private Network (VPN) across an Internet substrate.Type: ApplicationFiled: November 10, 2014Publication date: March 26, 2015Applicant: PORTUS SINGAPORE PTE LTDInventors: Charles Cameron LINDQUIST, Timothy John LINDQUIST