Patents by Inventor John Sinclair
John Sinclair has filed for patents to protect the following inventions. This listing includes patent applications that are pending as well as patents that have already been granted by the United States Patent and Trademark Office (USPTO).
-
Publication number: 20180205757Abstract: A password breach registry is utilized to secure a service provided by a service provider. The password breach registry is a publicly accessible registry and includes password tokens written by breached service providers. The password tokens indicate passwords used to access breached service providers that may have been breached. A service provider can subscribe to the password breach registry and periodically query the password breach registry to determine if a password token corresponding to a user of a service provided by the service provider has been written to the password breach registry. This may indicate that the user of the service utilizes the same password on other services that have been breached. Upon determining that the password token has been written to the password breach registry, the user can be locked out from the service to prevent a malicious actor from gaining access to the account of the user.Type: ApplicationFiled: March 14, 2018Publication date: July 19, 2018Inventors: STEVEN CORNELIS VERSTEEG, NATHAN ALLIN HASTINGS, XIEN YAO, JOHN SINCLAIR BIRD
-
Publication number: 20180205712Abstract: A registry is utilized to identify personally identifiable information (PII) that has been breached. The registry is a distributed database shared by multiple organizations to track which PII has been breached in other organizations. A first service provider initially receives PII and corresponding signed descriptor from a user. The PII is used to verify an identity of the user and the signed descriptor describes the type of PII that is received. The first service provider queries the registry to determine if the signed descriptor of the user has been written to the registry by a second service provider, indicating that it has been breached at a service provided by the second service provider. If the first service provider uses the breached PII, the breached PII is invalidated by the first service provider.Type: ApplicationFiled: March 14, 2018Publication date: July 19, 2018Inventors: STEVEN CORNELIS VERSTEEG, NATHAN ALLIN HASTINGS, XIEN YAO, JOHN SINCLAIR BIRD
-
Publication number: 20180191824Abstract: A method, program product, and apparatus for managing profiles in an access management domain. In an embodiment, attribute field mapping rules are generated for an identity profile schema applied to a plurality of identity profiles and an account profile schema applied to a plurality of account profiles. Each of the identity profiles includes one or more identity attribute fields and each of the plurality of account profiles includes one or more account attribute fields. As part of generating attribute field mapping rules, a synchronization manager iteratively compares, using an edit distance function, data in each of the identity attribute fields with data in one or more of each of the account attribute fields. In response to detecting a match between data in a given identity attribute field and data in a given account attribute field, the synchronization manager increments an attribute correlation value that is associated with the given identity attribute field and the given account attribute field.Type: ApplicationFiled: February 28, 2018Publication date: July 5, 2018Inventors: Steven Cornelis Versteeg, Nathan Allin Hastings, Xien Yao, John Sinclair Bird
-
Patent number: 9942321Abstract: A method, program product, and apparatus for managing profiles in an access management domain. In an embodiment, attribute field mapping rules are generated for an identity profile schema applied to a plurality of identity profiles and an account profile schema applied to a plurality of account profiles. Each of the identity profiles includes one or more identity attribute fields and each of the plurality of account profiles includes one or more account attribute fields. As part of generating attribute field mapping rules, a synchronization manager iteratively compares data in each of the identity attribute fields with data in one or more of each of the account attribute fields. In response to detecting a match between data in a given identity attribute field and data in a given account attribute field, the synchronization manager increments an attribute correlation value that is associated with the given identity attribute field and the given account attribute field.Type: GrantFiled: January 6, 2016Date of Patent: April 10, 2018Assignee: CA, Inc.Inventors: Steven Cornelis Versteeg, Nathan Allin Hastings, Xien Yao, John Sinclair Bird
-
Publication number: 20180063189Abstract: A password breach registry is utilized to secure a service provided by a service provider. The password breach registry is a publicly accessible registry and includes password tokens written by breached service providers. The password tokens indicate passwords used to access breached service providers that may have been breached. A service provider can subscribe to the password breach registry and periodically query the password breach registry to determine if a password token corresponding to a user of a service provided by the service provider has been written to the password breach registry. This may indicate that the user of the service utilizes the same password on other services that have been breached. Upon determining that the password token has been written to the password breach registry, the user can be locked out from the service to prevent a malicious actor from gaining access to the account of the user.Type: ApplicationFiled: September 1, 2016Publication date: March 1, 2018Inventors: STEVEN CORNELIS VERSTEEG, NATHAN ALLIN HASTINGS, XIEN YAO, JOHN SINCLAIR BIRD
-
Publication number: 20180063099Abstract: A registry is utilized to identify personally identifiable information (PII) that has been breached. The registry is a distributed database shared by multiple organizations to track which PII has been breached in other organizations. A first service provider initially receives PII and corresponding signed descriptor from a user. The PII is used to verify an identity of the user and the signed descriptor describes the type of PII that is received. The first service provider queries the registry to determine if the signed descriptor of the user has been written to the registry by a second service provider, indicating that it has been breached at a service provided by the second service provider. If the first service provider uses the breached PII, the breached PII is invalidated by the first service provider.Type: ApplicationFiled: September 1, 2016Publication date: March 1, 2018Inventors: STEVEN CORNELIS VERSTEEG, NATHAN ALLIN HASTINGS, XIEN YAO, JOHN SINCLAIR BIRD
-
Patent number: 9891134Abstract: A long-distance fiber optic monitoring system having a sensing unit and an analyzer that is remotely located from the sensing unit is provided. The sensing unit comprises a source of optical energy for injecting optical energy into the fiber optical cable and an optical detector configured to detect an optical return signal from the optical fiber. The detected optical return signal is associated with an acoustic signal impinging on the optical fiber. The analyzer receives a signal from the remote sensing unit via the optical fiber that is representative of the optical return signal, and determines a location of a disturbance based at least on the received signal. The representative signal can be transmitted from the remote sensing unit to the analyzer as an optical signal or via a metallic wired included with the optical fiber.Type: GrantFiled: December 12, 2014Date of Patent: February 13, 2018Assignee: AT&T Intellectual Property I, L.P.Inventor: John Sinclair Huffman
-
Publication number: 20170357700Abstract: The present invention includes a system and process to visualize an event. The event visualization includes one or more physical entities that generate data experienced thereby and generate executable files related to their vantage points. A file manipulation engines normalizes data both existing in pure data form as well as data within the executable files. A visual display renders a representation of the data along with executable files that are correlated to the data. A relationship between two or more physical entities may be determined, and multimedia files of one entity that includes the other may be determined. Entities with no relationship between them, other than physical proximity (or other relationship) at a particular time, may offer multimedia files to the other entity that includes that entity.Type: ApplicationFiled: August 2, 2017Publication date: December 14, 2017Applicant: Sync Layer, LLCInventor: John Sinclair
-
Publication number: 20170254442Abstract: A submersible mixing and sampling apparatus with submersible supply systems (12, 14) for first and second liquid components such as a thermoset resin and a curing agent is disclosed. Each supply system has a respective submersible tank (24) for holding a respective one of the liquid components. Submersible mixers (46, 48, 50) downstream of the supply systems mix the liquid components underwater to form a curable mixture for injection into a subsea chamber such as a tee (102). Submersible sampling devices downstream of the mixers take samples (94) of the mixture underwater before, during and after injection, and optionally also at the surface. The samples may be cured and tested underwater or may be lifted to the surface for testing. The apparatus may be mounted on a subsea skid (100) or basket.Type: ApplicationFiled: September 10, 2015Publication date: September 7, 2017Inventors: Mick Fowkes, Paul Booth, Dan Quoc Vu, Stewart John Sinclair Munro, Catriona Rachel Ogg
-
Publication number: 20170235860Abstract: The present invention includes a system and process to visualize an event. The event visualization includes one or more physical entities that generate data experienced thereby and generate executable files related to their vantage points. A file manipulation engines normalizes data both existing in pure data form as well as data within the executable files. A visual display renders a representation of the data along with executable files that are correlated to the data. A relationship between two or more physical entities may be determined, and multimedia files of one entity that includes the other may be determined. Entities with no relationship between them, other than physical proximity (or other relationship) at a particular time, may offer multimedia files to the other entity that includes that entity.Type: ApplicationFiled: October 3, 2016Publication date: August 17, 2017Applicant: Sync Layer, LLCInventor: John Sinclair
-
Patent number: 9712647Abstract: In a method of managing a computing network, an expected behavior of a host is determined. The host is associated with a network resource, and is configured to be switched between active and inactive states. When the host is in the inactive state, a message is transmitted via the network on behalf of the host based on the expected behavior thereof such that the host appears to be in the active state. Related computer systems and computer program products are also discussed.Type: GrantFiled: June 2, 2014Date of Patent: July 18, 2017Assignee: CA, INC.Inventor: John Sinclair Bird
-
Publication number: 20170195415Abstract: A method, program product, and apparatus for managing profiles in an access management domain. In an embodiment, attribute field mapping rules are generated for an identity profile schema applied to a plurality of identity profiles and an account profile schema applied to a plurality of account profiles. Each of the identity profiles includes one or more identity attribute fields and each of the plurality of account profiles includes one or more account attribute fields. As part of generating attribute field mapping rules, a synchronization manager iteratively compares data in each of the identity attribute fields with data in one or more of each of the account attribute fields. In response to detecting a match between data in a given identity attribute field and data in a given account attribute field, the synchronization manager increments an attribute correlation value that is associated with the given identity attribute field and the given account attribute field.Type: ApplicationFiled: January 6, 2016Publication date: July 6, 2017Inventors: Steven Cornelis Versteeg, Nathan Allin Hastings, Xien Yao, John Sinclair Bird
-
Patent number: 9582399Abstract: In a service emulation method, a transaction library storing a plurality of messages communicated between a system under test and a target system upon which the system under test depends is accessed responsive to receiving a request from the system under test. One of the messages stored in the transaction library is identified as corresponding to the received request based on different weightings assigned to respective sections of the messages, and a response to the received request is generated using the one of the messages that was identified. Related systems and computer program products are also discussed.Type: GrantFiled: March 14, 2014Date of Patent: February 28, 2017Assignee: CA, Inc.Inventors: Steven Cornelis Versteeg, John Sinclair Bird, Nathan Allin Hastings, Miao Du, Jean-David Dahan
-
Patent number: 9460168Abstract: The present invention includes a system and process to visualize an event. The event visualization includes one or more physical entities that generate data experienced thereby and generate executable files related to their vantage points. A file manipulation engines normalizes data both existing in pure data form as well as data within the executable files. A visual display renders a representation of the data along with executable files that are correlated to the data.Type: GrantFiled: February 17, 2016Date of Patent: October 4, 2016Assignee: Synclayer, LLCInventor: John Sinclair
-
Publication number: 20160267170Abstract: In a computer-implemented method for endpoint management, a plurality of messages communicated between a target endpoint and a client are recorded, in a computer-readable memory. Ones of the messages are clustered into respective groups, where the respective groups correspond to respective operation types of the ones of the messages included therein. For the respective operation types, respective message structures used by the target endpoint are determined based on commonalities among the ones of the messages of the respective groups corresponding to the operation types. For one of the respective operation types, a request to the target endpoint is generated in accordance with a corresponding one of the respective message structures used by the target endpoint. Related computer systems and computer program products are also discussed.Type: ApplicationFiled: March 12, 2015Publication date: September 15, 2016Inventors: Nathan Allin Hastings, Steven Cornelis Versteeg, John Sinclair Bird, Xien Yao
-
Publication number: 20150350047Abstract: In a method of managing a computing network, an expected behavior of a host is determined. The host is associated with a network resource, and is configured to be switched between active and inactive states. When the host is in the inactive state, a message is transmitted via the network on behalf of the host based on the expected behavior thereof such that the host appears to be in the active state. Related computer systems and computer program products are also discussed.Type: ApplicationFiled: June 2, 2014Publication date: December 3, 2015Applicant: CA, INC.Inventor: John Sinclair Bird
-
Publication number: 20150261655Abstract: In a service emulation method, a transaction library storing a plurality of messages communicated between a system under test and a target system upon which the system under test depends is accessed responsive to receiving a request from the system under test. One of the messages stored in the transaction library is identified as corresponding to the received request based on different weightings assigned to respective sections of the messages, and a response to the received request is generated using the one of the messages that was identified. Related systems and computer program products are also discussed.Type: ApplicationFiled: March 14, 2014Publication date: September 17, 2015Applicant: CA,INC,Inventors: Steven Cornelis Versteeg, JOHN SINCLAIR BIRD, NATHAN ALLIN HASTINGS, MIAO DU, Jean-David Dahan
-
Publication number: 20150177096Abstract: A long-distance fiber optic monitoring system having a sensing unit and an analyzer that is remotely located from the sensing unit is provided. The sensing unit comprises a source of optical energy for injecting optical energy into the fiber optical cable and an optical detector configured to detect an optical return signal from the optical fiber. The detected optical return signal is associated with an acoustic signal impinging on the optical fiber. The analyzer receives a signal from the remote sensing unit via the optical fiber that is representative of the optical return signal, and determines a location of a disturbance based at least on the received signal. The representative signal can be transmitted from the remote sensing unit to the analyzer as an optical signal or via a metallic wired included with the optical fiber.Type: ApplicationFiled: December 12, 2014Publication date: June 25, 2015Applicant: AT&T Intellectual Property I, L.P.Inventor: John Sinclair Huffman
-
Patent number: 8937713Abstract: A long-distance fiber optic monitoring system having a sensing unit and an analyzer that is remotely located from the sensing unit is provided. The sensing unit comprises a source of optical energy for injecting optical energy into the fiber optical cable and an optical detector configured to detect an optical return signal from the optical fiber. The detected optical return signal is associated with an acoustic signal impinging on the optical fiber. The analyzer receives a signal from the remote sensing unit via the optical fiber that is representative of the optical return signal, and determines a location of a disturbance based at least on the received signal. The representative signal can be transmitted from the remote sensing unit to the analyzer as an optical signal or via a metallic wired included with the optical fiber.Type: GrantFiled: November 14, 2013Date of Patent: January 20, 2015Assignee: AT&T Intellectual Property I, L.P.Inventor: John Sinclair Huffman
-
Publication number: 20140090474Abstract: A long-distance fiber optic monitoring system having a sensing unit and an analyzer that is remotely located from the sensing unit is provided. The sensing unit comprises a source of optical energy for injecting optical energy into the fiber optical cable and an optical detector configured to detect an optical return signal from the optical fiber. The detected optical return signal is associated with an acoustic signal impinging on the optical fiber. The analyzer receives a signal from the remote sensing unit via the optical fiber that is representative of the optical return signal, and determines a location of a disturbance based at least on the received signal. The representative signal can be transmitted from the remote sensing unit to the analyzer as an optical signal or via a metallic wired included with the optical fiber.Type: ApplicationFiled: November 14, 2013Publication date: April 3, 2014Applicant: AT&T Intellectual Property I, L.P.Inventor: John Sinclair Huffman