Patents by Inventor Kenneth Bell

Kenneth Bell has filed for patents to protect the following inventions. This listing includes patent applications that are pending as well as patents that have already been granted by the United States Patent and Trademark Office (USPTO).

  • Patent number: 11860092
    Abstract: A covered chamberless particulate detector includes a chamberless detector configured to produce a signal when particulate sensing events occurs, one or more optical emitters configured to emit one or more emitting cones of light, one or more optical sensors defining one or more receiving cones and configured to detect occurrence of particulate sensing events, and a protective cover defining an inside region and an outside region. Each of the one or more emitting cones of light is configured to overlap with each of the one or more receiving cones, thereby creating one or more sensing volumes which may be in the inside region, the outside region, or both regions. The protective cover can be transparent, partially transparent, or opaque, and can include apertures. The optical emitters and detectors can use one or more wavelengths, allowing discrimination of various airborne particulates.
    Type: Grant
    Filed: September 8, 2021
    Date of Patent: January 2, 2024
    Assignee: Kidde Technologies, Inc.
    Inventors: David L. Lincoln, Michael J. Birnkrant, Kenneth Bell, Peter R. Harris, Jennifer M. Alexander
  • Publication number: 20230344921
    Abstract: The present solution provides systems and methods for supporting network communication, including UDP network communication, between clients and servers at data centers, over a cloud VPN. An agent can receive a user datagram protocol (UDP) packet. The agent can generate a header for the UDP packet identifying a destination server at a data center of a plurality of data centers. The agent can establish a channel to a virtual private network (VPN) server of a cloud-based VPN as a service. The agent can encapsulate the UDP packet using the header and transmit, via the channel, the encapsulated UDP packet to the VPN server, the encapsulated UDP packet configured to identify the data center according to a table of the VPN server and content of the header.
    Type: Application
    Filed: April 19, 2022
    Publication date: October 26, 2023
    Inventors: Pary Duraisamy, Pradeep Gaikwad, Kirankumar Alluvada, Jong Kann, Kenneth Bell
  • Patent number: 11726858
    Abstract: A computer system configured to identify errors in a session launch initiated by a client application is provided. The computer system includes a memory and at least one processor coupled to the memory. The at least one processor is configured to receive one or more events from one or more applications or devices involved in the session launch, wherein an event of the one or more events comprises information from an application or device call (e.g., an application programming interface (API) call) communicated during the session launch, the information comprising destination information; build a primary Directed Acyclic Graph (DAG) based on the information from the API call; determine an error identifier based on the primary DAG; retrieve a troubleshooting recommendation from a library based on the error identifier; and send the troubleshooting recommendation to the client application.
    Type: Grant
    Filed: January 20, 2022
    Date of Patent: August 15, 2023
    Assignee: Citrix Systems, Inc.
    Inventors: Himanshu Agarwal, Vikramjeet Singh Sandhu, Mukesh Garg, Kenneth Bell, Leo C. Singleton, IV, Balasubramanian Swaminathan, Vivek Koni Raghuveer, Aditya Ranjan
  • Publication number: 20230229547
    Abstract: A computer system configured to identify errors in a session launch initiated by a client application is provided. The computer system includes a memory and at least one processor coupled to the memory. The at least one processor is configured to receive one or more events from one or more applications or devices involved in the session launch, wherein an event of the one or more events comprises information from an application or device call (e.g., an application programming interface (API) call) communicated during the session launch, the information comprising destination information; build a primary Directed Acyclic Graph (DAG) based on the information from the API call; determine an error identifier based on the primary DAG; retrieve a troubleshooting recommendation from a library based on the error identifier; and send the troubleshooting recommendation to the client application.
    Type: Application
    Filed: January 20, 2022
    Publication date: July 20, 2023
    Applicant: Citrix Systems, Inc.
    Inventors: Himanshu Agarwal, Vikramjeet Singh Sandhu, Mukesh Garg, Kenneth Bell, Leo C. Singleton, IV, Balasubramanian Swaminathan, Vivek Koni Raghuveer, Aditya Ranjan
  • Publication number: 20230179632
    Abstract: A method may include, at a computing device, receiving a token from an appliance operating as a gateway between a client computing device and the computing device, the token being generated based upon a key of the computing device, and establishing a first connection with the appliance based upon the token, with the first connection being persistent. The method may further include, at the computing device, receiving a request from the appliance via the first connection, the request being for a remote session, and responsive to receipt of the request, establishing a second connection with the appliance that enables the client computing device to access the session.
    Type: Application
    Filed: December 7, 2021
    Publication date: June 8, 2023
    Inventors: PARY DURAISAMY, GEORGY MOMCHILOV, KENNETH BELL, LEO C. SINGLETON, IV, LIN CAO, MUKUND INGALE, KULDEEP SINGH
  • Patent number: 11652873
    Abstract: A method may include generating a proxy auto-configuration file including a function and a hash value associated with a resource. The hash value may be determined based on an identifier of the resource. The proxy auto-configuration file may include the hash value instead of a plaintext value of the identifier to obscure the plaintext value of the identifier. The proxy auto-configuration file including the function and the hash value may be sent to at least enable the function to be invoked by a web browser at one or more clients. The function may be configured to respond to being invoked by the web browser by determining, based on the hash value, whether to bypass a proxy server when accessing the resource. Related systems and computer program products are also provided.
    Type: Grant
    Filed: April 13, 2021
    Date of Patent: May 16, 2023
    Inventors: Jong Kann, Kenneth Bell
  • Publication number: 20220314694
    Abstract: A tire changing device for lifting and positioning a tire, providing rolling members allow for easy vertical adjustment of the tire and whose shape enables a tire to be conveniently rolled on, positioned and retained thereon. The tire mounting device for mounting a tire to a vehicle, includes a lower frame comprising caster wheels and raising and lowering devices which act in concert via a common control. The disclosed device also includes an upper platform in communication with a lower platform configured to be raised and lowered thereby to a height of a wheel hub to receive the tire via a scissor lift. The device further includes a pair of rollers having an adjustable space there between less than a diameter of a wheel to be mounted to a vehicle to enable a tire rotation to align wheel hub lugs to rim lug holes.
    Type: Application
    Filed: March 23, 2022
    Publication date: October 6, 2022
    Inventor: Kenneth Bell
  • Publication number: 20220314693
    Abstract: A tire changing device for lifting and positioning a tire, providing rolling members allow for easy vertical adjustment of the tire and whose shape enables a tire to be conveniently rolled on, positioned and retained thereon. The tire mounting device for mounting a tire to a vehicle, includes a lower frame comprising caster wheels and raising and lowering devices which act in concert via a common control. The disclosed device also includes an upper platform in communication with the supporting pneumatic pistons and configured to be raised and lowered thereby to a height of a wheel hub to receive the tire. The device further includes a pair of rollers spaced apart an adjustable space there between less than a diameter of a wheel to be mounted to a vehicle, the pair of adjustable rollers enabling a tire rotation to align wheel hub lugs to rim lug holes.
    Type: Application
    Filed: March 31, 2021
    Publication date: October 6, 2022
    Inventor: Kenneth Bell
  • Patent number: 11416643
    Abstract: Provided are embodiments for a system for designing a layout for a smoke detection system, the system include a storage medium, the storage medium being coupled to a computing engine. The computing engine is configured to receive one or more inputs, model transport and dispersion of smoke in an environment based on the one or more inputs, wherein the model is based on a computational fluid dynamics (CFD) function, and detect the smoke using a plurality of probes. The computing engine is also configured to define a layout of the smoke detectors based on the smoke detectors being able to detect the smoke in the environment, and provide a map of the smoke detectors for the layout. Also provided are embodiments for a method to design a layout for a smoke detection system.
    Type: Grant
    Filed: July 22, 2019
    Date of Patent: August 16, 2022
    Assignee: KIDDE TECHNOLOGIES, INC.
    Inventors: Amanda J. Daly, May L. Corn, Kalyana Gottiparthi, Vaidyanathan Sankaran, Changmin Cao, Terry Simpson, Kenneth Bell, Ke Wang
  • Patent number: 11257354
    Abstract: Provided are embodiments for a system for validating a smoke detection layout, where the system includes a memory and a processor. The processor is configured to receive one or more inputs, model transport and dispersion of smoke to a smoke detector of an environment based on the one or more inputs, wherein the model is based on computational fluid dynamics (CFD) function, and select a subset of input parameters from the one or more inputs to test. The processor is also configured to test the smoke detection system layout using the selected subset of input parameters, determine an alarm time probability using uncertainty quantifications for the selected subset of input parameters, and provide the alarm time probability and confidence level for the selected subset parameters. Also provided are embodiments for a method to validate a smoke detection system layout.
    Type: Grant
    Filed: July 22, 2019
    Date of Patent: February 22, 2022
    Assignee: KIDDE TECHNOLOGIES, INC.
    Inventors: Amanda J. Daly, Kenneth Bell, Terry Simpson, May L. Corn, Vaidyanathan Sankaran, Changmin Cao, Kalyana Gottiparthi, Ke Wang
  • Publication number: 20220046044
    Abstract: The present disclosure is related to systems and methods of monitoring data of a network application. An embedded browser of a client application on a client device may initiate a request to access a network application hosted on a server. The client application may, responsive to the request, establish a secure session to communicate data of the network application to the client application for rendering in a display region of the embedded browser. The client application may decrypt the data communicated via the established secure session to monitor the network application.
    Type: Application
    Filed: October 25, 2021
    Publication date: February 10, 2022
    Applicant: Citrix Systems, Inc.
    Inventors: Christopher Fleck, Kenneth Bell
  • Publication number: 20210404955
    Abstract: A covered chamberless particulate detector includes a chamberless detector configured to produce a signal when particulate sensing events occurs, one or more optical emitters configured to emit one or more emitting cones of light, one or more optical sensors defining one or more receiving cones and configured to detect occurrence of particulate sensing events, and a protective cover defining an inside region and an outside region. Each of the one or more emitting cones of light is configured to overlap with each of the one or more receiving cones, thereby creating one or more sensing volumes which may be in the inside region, the outside region, or both regions. The protective cover can be transparent, partially transparent, or opaque, and can include apertures. The optical emitters and detectors can use one or more wavelengths, allowing discrimination of various airborne particulates.
    Type: Application
    Filed: September 8, 2021
    Publication date: December 30, 2021
    Inventors: David L. Lincoln, Michael J. Birnkrant, Kenneth Bell, Peter R. Harris, Jennifer M. Alexander
  • Publication number: 20210377294
    Abstract: Implementations of the systems and methods discussed herein provide for distributed HTTP proxy services with synchronization of per-server or per-tenant resource allocation counters amongst the proxy devices, allowing devices to quickly identify denial of service attacks or other malicious or erroneous behavior. In some implementations, a database server may receive resource consumption notifications from each of a plurality of proxy devices and may aggregate the notifications or increment a counter on a per-server or per-tenant basis, and provide updated counter values to proxy devices via callbacks. Each proxy device may check the counter value before utilizing resources, and may disable or block proxy processing responsive to the counter exceeding a threshold.
    Type: Application
    Filed: October 5, 2020
    Publication date: December 2, 2021
    Applicant: Citrix Systems, Inc.
    Inventors: Punit Gupta, Sandilya Sangabathula, Kenneth Bell
  • Patent number: 11159552
    Abstract: The present disclosure is related to systems and methods of monitoring data of a network application. An embedded browser of a client application on a client device may initiate a request to access a network application hosted on a server. The client application may, responsive to the request, establish a secure session to communicate data of the network application to the client application for rendering in a display region of the embedded browser. The client application may decrypt the data communicated via the established secure session to monitor the network application.
    Type: Grant
    Filed: May 3, 2019
    Date of Patent: October 26, 2021
    Assignee: Citrix Systems, Inc.
    Inventors: Christopher Fleck, Kenneth Bell
  • Publication number: 20210234924
    Abstract: A method may include generating a proxy auto-configuration file including a function and a hash value associated with a resource. The hash value may be determined based on an identifier of the resource. The proxy auto-configuration file may include the hash value instead of a plaintext value of the identifier to obscure the plaintext value of the identifier. The proxy auto-configuration file including the function and the hash value may be sent to at least enable the function to be invoked by a web browser at one or more clients. The function may be configured to respond to being invoked by the web browser by determining, based on the hash value, whether to bypass a proxy server when accessing the resource. Related systems and computer program products are also provided.
    Type: Application
    Filed: April 13, 2021
    Publication date: July 29, 2021
    Inventors: Jong Kann, Kenneth Bell
  • Publication number: 20210234919
    Abstract: Described implementations provide systems and methods generating and using live performance maps of a network environment for selecting combinations of proxies and servers for fulfilling client device requests. Proxy devices or connectors may gather network telemetry data from actual network flows between client devices and application servers or other resources traversing the proxy devices or connectors, when available, or by generating synthetic transactions to measure network telemetry data when actual flows are unavailable. The telemetry data may be provided to a management service, which may generate a performance map. The performance map may be provided to the proxy devices and/or a cloud proxy service for selection of optimal combinations of connectors and resources for client requests. Incoming client requests may be steered or redirected to the selected optimal combination. The performance map may be dynamically regenerated as network conditions change and/or as servers are deployed or undeployed.
    Type: Application
    Filed: January 23, 2020
    Publication date: July 29, 2021
    Inventors: Hrushikesh Shrinivas Paralikar, Kenneth Bell, Arkesh Kumar, Anil Kumar Gavini
  • Patent number: 11067457
    Abstract: A method of monitoring smoke, fire, and temperature conditions includes transmitting light through a first fiber optic cable, the fiber optic cable terminating at a node disposed to monitor a smoke or fire condition at one or more predetermined areas, transmitting light along a second fiber optic cable, the second fiber optic cable arranged to monitor a temperature condition at one or more predetermined areas, receiving scattered light from the first fiber optic cable and/or the second fiber optic cable at a control system, and analyzing the scattered light to determine at least one of the presence and magnitude of smoke, fire and/or a temperature condition along the fiber harness or at the node.
    Type: Grant
    Filed: November 10, 2017
    Date of Patent: July 20, 2021
    Assignee: KIDDE TECHNOLOGIES, INC.
    Inventors: Michael J. Birnkrant, Stefan Coreth, Kenneth Bell, Jennifer M. Alexander, Peter R. Harris, Antonio M. Vincitore
  • Patent number: 11005926
    Abstract: A method may include generating a proxy auto-configuration file including a function and a hash value associated with a resource. The hash value may be determined based on an identifier of the resource. The proxy auto-configuration file may include the hash value instead of a plaintext value of the identifier to obscure the plaintext value of the identifier. The proxy auto-configuration file including the function and the hash value may be sent to at least enable the function to be invoked by a web browser at one or more clients. The function may be configured to respond to being invoked by the web browser by determining, based on the hash value, whether to bypass a proxy server when accessing the resource. Related systems and computer program products are also provided.
    Type: Grant
    Filed: July 25, 2019
    Date of Patent: May 11, 2021
    Assignee: Citrix Systems, Inc.
    Inventors: Jong Kann, Kenneth Bell
  • Publication number: 20210058470
    Abstract: A method may include establishing a first direct route to a gateway appliance from session clients each associated with a respective Desktop as a Service (DaaS) session run by a virtual session controller within a computing network, and establishing a second direct route from the gateway appliance to a virtual session connector within at least one private enterprise computing network. The method may also include relaying private enterprise network data between the session clients and the virtual session connector through the gateway appliance via the first direct route to each session client and the second direct route to the virtual session connector.
    Type: Application
    Filed: October 21, 2020
    Publication date: February 25, 2021
    Applicant: Citrix Systems, Inc.
    Inventors: Leo C. Singleton, IV, Kenneth Bell, Jitendra Deshpande
  • Publication number: 20210029197
    Abstract: A method may include generating a proxy auto-configuration file including a function and a hash value associated with a resource. The hash value may be determined based on an identifier of the resource. The proxy auto-configuration file may include the hash value instead of a plaintext value of the identifier to obscure the plaintext value of the identifier. The proxy auto-configuration file including the function and the hash value may be sent to at least enable the function to be invoked by a web browser at one or more clients. The function may be configured to respond to being invoked by the web browser by determining, based on the hash value, whether to bypass a proxy server when accessing the resource. Related systems and computer program products are also provided.
    Type: Application
    Filed: July 25, 2019
    Publication date: January 28, 2021
    Inventors: Jong Kann, Kenneth Bell