Patents by Inventor John T. Campbell
John T. Campbell has filed for patents to protect the following inventions. This listing includes patent applications that are pending as well as patents that have already been granted by the United States Patent and Trademark Office (USPTO).
-
Publication number: 20240099892Abstract: An apparatus includes a shaft, an expandable dilator, and at least one ventilation pathway. The shaft defines a longitudinal axis and includes a distal and proximal ends with at least one shaft lumen. The expandable dilator includes body with its own proximal and distal ends. The body is configured to transition between a contracted state and an expanded state. The body is configured to dilate a Eustachian tube of a patient in the expanded state. The at least one ventilation pathway is configured to provide ventilation from the distal end of the body to the proximal end of the body when the body is in the expanded state. In some examples, the ventilation pathway includes a set of transversely oriented vent openings formed through the shaft. In some other examples, the ventilation pathway includes a space defined between one or more radially outwardly protruding features of the expandable dilator.Type: ApplicationFiled: October 27, 2023Publication date: March 28, 2024Inventors: Peter F. Campbell, Daniel T. Harfe, Hung V. Ha, Ketan P. Muni, Andy Nguyen, Sivette Lam, John Y. Chang, Eric Goldfarb
-
Patent number: 11109249Abstract: Example aspects of the present disclosure are directed to systems and methods that generate simulated communications traffic to enable improved monitoring of the performance of a vehicle integration platform (VIP) associated with a service provider entity. For instance, the VIP can provide services to or otherwise communicate with a number of different clients (e.g., autonomous vehicles included in one or more fleets of autonomous vehicles). However, when, for various operational reasons, the one or more fleets of autonomous vehicle are not operating or otherwise communicating with the VIP, it can be difficult to assess whether the VIP is correctly operating. As such, according to an aspect of the present disclosure, a watchdog monitoring system can be included in or otherwise interoperate with the VIP.Type: GrantFiled: June 27, 2019Date of Patent: August 31, 2021Assignee: Uber Technologies, Inc.Inventors: John T. Campbell, Jr., Matthew James Way, Brent Justin Goldman
-
Publication number: 20210058354Abstract: An electronic device will identify an electronic message received by a messaging client that is associated with a first recipient, and it will analyze the electronic message to determine whether the electronic message is a simulated malicious message. Upon determining that electronic message is a simulated malicious message, the device will identify an actuatable element in the electronic message. The actuatable element will include a service address. The device will modify the electronic message by appending a user identifier of the first recipient to the service address of the actuatable element. Then, when the actuatable element is actuated, the system may determine whether the first recipient actuated the actuatable element or an alternate recipient did so based on whether the user identifier of the first recipient is still appended (or is the only user identifier appended) to the actuatable element.Type: ApplicationFiled: July 29, 2020Publication date: February 25, 2021Inventors: Kurt Wescoe, Trevor T. Hawthorn, Alan Himler, Patrick H. Veverka, John T. Campbell, Dustin D. Brungart, Norman Sadeh-Koniecpol
-
Publication number: 20200344622Abstract: Example aspects of the present disclosure are directed to systems and methods that generate simulated communications traffic to enable improved monitoring of the performance of a vehicle integration platform (VIP) associated with a service provider entity. For instance, the VIP can provide services to or otherwise communicate with a number of different clients (e.g., autonomous vehicles included in one or more fleets of autonomous vehicles). However, when, for various operational reasons, the one or more fleets of autonomous vehicle are not operating or otherwise communicating with the VIP, it can be difficult to assess whether the VIP is correctly operating. As such, according to an aspect of the present disclosure, a watchdog monitoring system can be included in or otherwise interoperate with the VIP.Type: ApplicationFiled: June 27, 2019Publication date: October 29, 2020Inventors: John T. Campbell, JR., Matthew James Way, Brent Justin Goldman
-
Patent number: 10778626Abstract: An electronic device will identify an electronic message received by a messaging client that is associated with a first recipient, and it will analyze the electronic message to determine whether the electronic message is a simulated malicious message. Upon determining that electronic message is a simulated malicious message, the device will identify an actuatable element in the electronic message. The actuatable element will include a service address. The device will modify the electronic message by appending a user identifier of the first recipient to the service address of the actuatable element. Then, when the actutable element is actuated, the system may determine whether the first recipient actuated the actuatable element or an alternate recipient did so based on whether the user identifier of the first recipient is still appended (or is the only user identifier appended) to the actuatable element.Type: GrantFiled: February 4, 2019Date of Patent: September 15, 2020Assignee: Proofpoint, Inc.Inventors: Kurt Wescoe, Trevor Tyler Hawthorn, Alan Himler, Patrick H. Veverka, John T. Campbell, Dustin D. Brungart, Norman Sadeh-Koniecpol
-
Publication number: 20190173819Abstract: An electronic device will identify an electronic message received by a messaging client that is associated with a first recipient, and it will analyze the electronic message to determine whether the electronic message is a simulated malicious message. Upon determining that electronic message is a simulated malicious message, the device will identify an actuatable element in the electronic message. The actuatable element will include a service address. The device will modify the electronic message by appending a user identifier of the first recipient to the service address of the actuatable element. Then, when the actutable element is actuated, the system may determine whether the first recipient actuated the actuatable element or an alternate recipient did so based on whether the user identifier of the first recipient is still appended (or is the only user identifier appended) to the actuatable element.Type: ApplicationFiled: February 4, 2019Publication date: June 6, 2019Inventors: Kurt Wescoe, Trevor T. Hawthorn, Alan Himler, Patrick H. Veverka, John T. Campbell, Dustin D. Brungart, Norman Sadeh-Koniecpol
-
Patent number: 10243904Abstract: An electronic device will identify an electronic message received by a messaging client that is associated with a first recipient, and it will analyze the electronic message to determine whether the electronic message is a simulated malicious message. Upon determining that electronic message is a simulated malicious message, the device will identify an actuatable element in the electronic message. The actuatable element will include a service address. The device will modify the electronic message by appending a user identifier of the first recipient to the service address of the actuatable element. Then, when the actutable element is actuated, the system may determine whether the first recipient actuated the actuatable element or an alternate recipient did so based on whether the user identifier of the first recipient is still appended (or is the only user identifier appended) to the actuatable element.Type: GrantFiled: May 26, 2017Date of Patent: March 26, 2019Assignee: WOMBAT SECURITY TECHNOLOGIES, INC.Inventors: Kurt Wescoe, Trevor T. Hawthorn, Alan Himler, Patrick H. Veverka, John T. Campbell, Dustin D. Brungart, Norman Sadeh-Koniecpol
-
Patent number: 10063584Abstract: A system manages computer security risks associated with message file attachments. When a user of an electronic device with a messaging client attempts to open an attachment to a message that is in the client's inbox, the system will analyze the message to determine whether the message is a legitimate message or a potentially malicious message without the need to actually process or analyze the attachment itself. If the system determines that the received message is a legitimate message, the system will permit the attachment to actuate on the client computing device. If the system determines that the received message is not or may not be a legitimate message, the system will continue preventing the attachment from actuating on the client computing device.Type: GrantFiled: January 24, 2018Date of Patent: August 28, 2018Assignee: WOMBAT SECURITY TECHNOLOGIES, INC.Inventors: Kurt Wescoe, John T. Campbell, Joseph A. Ferrara, Trevor T. Hawthorn, Alan Himler, Norman Sadeh-Koniecpol
-
Patent number: 10027701Abstract: A client electronic device of an electronic message analysis system receives a user activation action indicating that a user has reported a message received at the client device a potentially malicious. The client device then determines whether to forward the message to a remote service for analysis by assessing whether the received message originated from a trusted sender. If and only if the client device determines that the received message originated from a trusted sender, it will permit the client device to take other action on the received message and not report the received message to a remote service for further analysis. If the client device does not determine that the received message originated from a trusted sender, it will report the received message to a remote service for further analysis.Type: GrantFiled: August 11, 2017Date of Patent: July 17, 2018Assignee: WOMBAT SECURITY TECHNOLOGIES, INC.Inventors: Alan Himler, John T. Campbell, Joseph A. Ferrara, Trevor T. Hawthorn, Norman Sadeh-Koniecpol, Kurt Wescoe
-
Patent number: 9912687Abstract: A system manages computer security risks associated with message file attachments. When a user of an electronic device with a messaging client attempts to open an attachment to a message that is in the client's inbox, the system will analyze the message to determine whether the message is a legitimate message or a potentially malicious message without the need to actually process or analyze the attachment itself. If the system determines that the received message is a legitimate message, the system will permit the attachment to actuate on the client computing device. If the system determines that the received message is not or may not be a legitimate message, the system will continue preventing the attachment from actuating on the client computing device.Type: GrantFiled: August 17, 2016Date of Patent: March 6, 2018Assignee: WOMBAT SECURITY TECHNOLOGIES, INC.Inventors: Kurt Wescoe, John T. Campbell, Joseph A. Ferrara, Trevor T. Hawthorn, Alan Himler, Norman Sadeh-Koniecpol
-
Patent number: 9781149Abstract: An electronic message analysis system of a cybersecurity network assesses whether a received message is a mock malicious message in response to, receiving a user activation action that indicates that the user has reported the received message as a potentially malicious message. The system does this by determining whether any header field of a header section of the message starts with a predetermined key. For any header field that starts with the predetermined key, the system determines whether a value that follows the predetermined key satisfies a trusted sender rule. If the value that follows the predetermined key satisfies the trusted sender rule, the system determines that the received message originated from a trusted sender. If the value that immediately follows the predetermined key does not satisfy the trusted sender rule, the system determines that the received message did not originate from a trusted sender.Type: GrantFiled: August 17, 2016Date of Patent: October 3, 2017Assignee: WOMBAT SECURITY TECHNOLOGIES, INC.Inventors: Alan Himler, John T. Campbell, Joseph A. Ferrara, Trevor T. Hawthorn, Norman Sadeh-Koniecpol, Kurt Wescoe
-
Patent number: 9774626Abstract: In a cybersecurity network, a system identifies and classifies non-malicious messages by receiving a user notification indicating that the user has reported a received message as potentially malicious message, and determining whether the received message is legitimate or potentially malicious. When the system determines that the message is a legitimate, it further analyzes the message to assign a class that may include trusted internal sender, trusted external sender, or training a simulated phishing message. It will then cause the user's device to provide the user with information corresponding to the assigned class. The system may also quarantine a received message and release the message from the quarantine only after determining that the message is legitimate and receiving a user acknowledgment.Type: GrantFiled: August 17, 2016Date of Patent: September 26, 2017Assignee: WOMBAT SECURITY TECHNOLOGIES, INC.Inventors: Alan Himler, John T. Campbell, Joseph A. Ferrara, Trevor T. Hawthorn, Norman Sadeh-Koniecpol, Kurt Wescoe
-
Patent number: 8805760Abstract: Systems and methods that provide a historian integrated as part of an industrial unit and/or product manufactured by the industrial process. A historian integrated as part of the industrial unit itself, can increase data resolution and supply immediate and real time data regarding the industrial unit's operation—while mitigating short comings of conventional PC historians. Moreover, a locator component can detect embedded historians that are distributed on the back plane of an industrial network, and integrated as part thereof.Type: GrantFiled: April 18, 2011Date of Patent: August 12, 2014Assignee: Rockwell Automation Technologies, Inc.Inventors: John J. Baier, Taryl J. Jasper, John T. Campbell, Robert J. McGreevy, Frank Anthony Palmieri, Jr., Robert J. Herbst
-
Patent number: 8190284Abstract: Systems and methods that facilitate discovery of history data via a locator component associated with a plant embedded historian(s) of an industrial programmer (e.g., a controller device.) Such locator component can further detect micro historians that are distributed on the back plane of an industrial network. The locator component can be part of applications running on a control unit, which can function as a management control center for the industrial network system. A common data model can be employed to expose functionality and data of the organization to the embedded historian component.Type: GrantFiled: May 19, 2010Date of Patent: May 29, 2012Assignee: Rockwell Automation Technologies, Inc.Inventors: Robert J. Herbst, Frank Anthony Palmieri, Jr., Taryl J. Jasper, Robert J. McGreevy, John T. Campbell, John J. Baier
-
Publication number: 20110196528Abstract: Systems and methods that provide a historian integrated as part of an industrial unit and/or product manufactured by the industrial process. A historian integrated as part of the industrial unit itself, can increase data resolution and supply immediate and real time data regarding the industrial unit's operation—while mitigating short comings of conventional PC historians. Moreover, a locator component can detect embedded historians that are distributed on the back plane of an industrial network, and integrated as part thereof.Type: ApplicationFiled: April 18, 2011Publication date: August 11, 2011Applicant: ROCKWELL AUTOMATION TECHNOLOGIES, INC.Inventors: John J. Baier, Taryl J. Jasper, John T. Campbell, Robert J. McGreevy, Frank Anthony Palmieri, JR., Robert J. Herbst
-
Patent number: 7962440Abstract: Systems and methods that provide for adaptive processes in an industrial setting. Historian data, in conjunction with current collected data, can be converted into decision making information that is subsequently employed for modifying a process in real time. A process trend component, which is associated with a controller, can access historian data (e.g., trends collected via historians) to determine/predict an outcome of a current industrial process. Such enables a tight control and short reaction time to correcting process parameters.Type: GrantFiled: September 27, 2007Date of Patent: June 14, 2011Assignee: Rockwell Automation Technologies, Inc.Inventors: John J. Baier, Taryl J. Jasper, John T. Campbell, Robert J. McGreevy, Frank Anthony Palmieri, Jr., Robert J. Herbst
-
Patent number: 7933666Abstract: Systems and methods that can vary a data collection rate via a rate adjustment component, to collect data with different level of granularity. The rate adjustment component can further include an estimation component that can automatically predict a required sampling rate for a stage of an operation, based on statistical models and data collected for similar operations and/or history data. Such difference in the granularity level can initiate in part in response to fault detection, alert triggering, and the like. Accordingly, future trouble shooting efforts can be performed with respect to data that is typically collected at an adjustable rate.Type: GrantFiled: November 10, 2006Date of Patent: April 26, 2011Assignee: Rockwell Automation Technologies, Inc.Inventors: John T. Campbell, Robert J. McGreevy, Robert J. Herbst, John J. Baier, Taryl J. Jasper
-
Patent number: 7930639Abstract: Systems and methods that discover relations and correlates among disparate pieces of data, to infer possible relationships between the industrial process and historian data/events to improve industrial operations. A correlation component can employ heuristic models to capture process data/event data, and can further include an implicit correlation component and an explicit correlation component. Accordingly, relations among various parameters can be discovered (e.g., dynamically) and proper corrective adjustments supplied to the industrial process.Type: GrantFiled: September 26, 2007Date of Patent: April 19, 2011Assignee: Rockwell Automation Technologies, Inc.Inventors: John J. Baier, Taryl J. Jasper, John T. Campbell, Robert J. McGreevy, Frank Anthony Palmieri, Jr., Robert J. Herbst
-
Patent number: 7930261Abstract: Systems and methods that provide a historian integrated as part of an industrial unit and/or product manufactured by the industrial process. A historian integrated as part of the industrial unit itself, can increase data resolution and supply immediate and real time data regarding the industrial unit's operation—while mitigating short comings of conventional PC historians. Moreover, a locator component can detect embedded historians that are distributed on the back plane of an industrial network, and integrated as part thereof.Type: GrantFiled: September 26, 2007Date of Patent: April 19, 2011Assignee: Rockwell Automation Technologies, Inc.Inventors: John J. Baier, Taryl J. Jasper, John T. Campbell, Robert J. McGreevy, Frank Anthony Palmieri, Jr., Robert J. Herbst
-
Patent number: 7917857Abstract: Systems and methods that supply direct access (e.g., bypassing the controller) to embedded historian via a subscription and notification component. By modeling the notification related information (e.g., subscription queries, subscriber information, event information . . . ) as data and leveraging the power of database systems to perform set-oriented manipulations on this data efficiently, the subject innovation enables for a highly scalable and efficient subscription and notification system for direct access to the historians.Type: GrantFiled: September 26, 2007Date of Patent: March 29, 2011Assignee: Rockwell Automation Technologies, Inc.Inventors: John J. Baier, Taryl J. Jasper, John T. Campbell, Robert J. McGreevy, Frank Anthony Palmieri, Jr., Robert J. Herbst