Patents by Inventor Kenneth Bell
Kenneth Bell has filed for patents to protect the following inventions. This listing includes patent applications that are pending as well as patents that have already been granted by the United States Patent and Trademark Office (USPTO).
-
Patent number: 11860092Abstract: A covered chamberless particulate detector includes a chamberless detector configured to produce a signal when particulate sensing events occurs, one or more optical emitters configured to emit one or more emitting cones of light, one or more optical sensors defining one or more receiving cones and configured to detect occurrence of particulate sensing events, and a protective cover defining an inside region and an outside region. Each of the one or more emitting cones of light is configured to overlap with each of the one or more receiving cones, thereby creating one or more sensing volumes which may be in the inside region, the outside region, or both regions. The protective cover can be transparent, partially transparent, or opaque, and can include apertures. The optical emitters and detectors can use one or more wavelengths, allowing discrimination of various airborne particulates.Type: GrantFiled: September 8, 2021Date of Patent: January 2, 2024Assignee: Kidde Technologies, Inc.Inventors: David L. Lincoln, Michael J. Birnkrant, Kenneth Bell, Peter R. Harris, Jennifer M. Alexander
-
Publication number: 20230344921Abstract: The present solution provides systems and methods for supporting network communication, including UDP network communication, between clients and servers at data centers, over a cloud VPN. An agent can receive a user datagram protocol (UDP) packet. The agent can generate a header for the UDP packet identifying a destination server at a data center of a plurality of data centers. The agent can establish a channel to a virtual private network (VPN) server of a cloud-based VPN as a service. The agent can encapsulate the UDP packet using the header and transmit, via the channel, the encapsulated UDP packet to the VPN server, the encapsulated UDP packet configured to identify the data center according to a table of the VPN server and content of the header.Type: ApplicationFiled: April 19, 2022Publication date: October 26, 2023Inventors: Pary Duraisamy, Pradeep Gaikwad, Kirankumar Alluvada, Jong Kann, Kenneth Bell
-
Patent number: 11726858Abstract: A computer system configured to identify errors in a session launch initiated by a client application is provided. The computer system includes a memory and at least one processor coupled to the memory. The at least one processor is configured to receive one or more events from one or more applications or devices involved in the session launch, wherein an event of the one or more events comprises information from an application or device call (e.g., an application programming interface (API) call) communicated during the session launch, the information comprising destination information; build a primary Directed Acyclic Graph (DAG) based on the information from the API call; determine an error identifier based on the primary DAG; retrieve a troubleshooting recommendation from a library based on the error identifier; and send the troubleshooting recommendation to the client application.Type: GrantFiled: January 20, 2022Date of Patent: August 15, 2023Assignee: Citrix Systems, Inc.Inventors: Himanshu Agarwal, Vikramjeet Singh Sandhu, Mukesh Garg, Kenneth Bell, Leo C. Singleton, IV, Balasubramanian Swaminathan, Vivek Koni Raghuveer, Aditya Ranjan
-
Publication number: 20230229547Abstract: A computer system configured to identify errors in a session launch initiated by a client application is provided. The computer system includes a memory and at least one processor coupled to the memory. The at least one processor is configured to receive one or more events from one or more applications or devices involved in the session launch, wherein an event of the one or more events comprises information from an application or device call (e.g., an application programming interface (API) call) communicated during the session launch, the information comprising destination information; build a primary Directed Acyclic Graph (DAG) based on the information from the API call; determine an error identifier based on the primary DAG; retrieve a troubleshooting recommendation from a library based on the error identifier; and send the troubleshooting recommendation to the client application.Type: ApplicationFiled: January 20, 2022Publication date: July 20, 2023Applicant: Citrix Systems, Inc.Inventors: Himanshu Agarwal, Vikramjeet Singh Sandhu, Mukesh Garg, Kenneth Bell, Leo C. Singleton, IV, Balasubramanian Swaminathan, Vivek Koni Raghuveer, Aditya Ranjan
-
Publication number: 20230179632Abstract: A method may include, at a computing device, receiving a token from an appliance operating as a gateway between a client computing device and the computing device, the token being generated based upon a key of the computing device, and establishing a first connection with the appliance based upon the token, with the first connection being persistent. The method may further include, at the computing device, receiving a request from the appliance via the first connection, the request being for a remote session, and responsive to receipt of the request, establishing a second connection with the appliance that enables the client computing device to access the session.Type: ApplicationFiled: December 7, 2021Publication date: June 8, 2023Inventors: PARY DURAISAMY, GEORGY MOMCHILOV, KENNETH BELL, LEO C. SINGLETON, IV, LIN CAO, MUKUND INGALE, KULDEEP SINGH
-
Patent number: 11652873Abstract: A method may include generating a proxy auto-configuration file including a function and a hash value associated with a resource. The hash value may be determined based on an identifier of the resource. The proxy auto-configuration file may include the hash value instead of a plaintext value of the identifier to obscure the plaintext value of the identifier. The proxy auto-configuration file including the function and the hash value may be sent to at least enable the function to be invoked by a web browser at one or more clients. The function may be configured to respond to being invoked by the web browser by determining, based on the hash value, whether to bypass a proxy server when accessing the resource. Related systems and computer program products are also provided.Type: GrantFiled: April 13, 2021Date of Patent: May 16, 2023Inventors: Jong Kann, Kenneth Bell
-
Publication number: 20220314694Abstract: A tire changing device for lifting and positioning a tire, providing rolling members allow for easy vertical adjustment of the tire and whose shape enables a tire to be conveniently rolled on, positioned and retained thereon. The tire mounting device for mounting a tire to a vehicle, includes a lower frame comprising caster wheels and raising and lowering devices which act in concert via a common control. The disclosed device also includes an upper platform in communication with a lower platform configured to be raised and lowered thereby to a height of a wheel hub to receive the tire via a scissor lift. The device further includes a pair of rollers having an adjustable space there between less than a diameter of a wheel to be mounted to a vehicle to enable a tire rotation to align wheel hub lugs to rim lug holes.Type: ApplicationFiled: March 23, 2022Publication date: October 6, 2022Inventor: Kenneth Bell
-
Publication number: 20220314693Abstract: A tire changing device for lifting and positioning a tire, providing rolling members allow for easy vertical adjustment of the tire and whose shape enables a tire to be conveniently rolled on, positioned and retained thereon. The tire mounting device for mounting a tire to a vehicle, includes a lower frame comprising caster wheels and raising and lowering devices which act in concert via a common control. The disclosed device also includes an upper platform in communication with the supporting pneumatic pistons and configured to be raised and lowered thereby to a height of a wheel hub to receive the tire. The device further includes a pair of rollers spaced apart an adjustable space there between less than a diameter of a wheel to be mounted to a vehicle, the pair of adjustable rollers enabling a tire rotation to align wheel hub lugs to rim lug holes.Type: ApplicationFiled: March 31, 2021Publication date: October 6, 2022Inventor: Kenneth Bell
-
Patent number: 11416643Abstract: Provided are embodiments for a system for designing a layout for a smoke detection system, the system include a storage medium, the storage medium being coupled to a computing engine. The computing engine is configured to receive one or more inputs, model transport and dispersion of smoke in an environment based on the one or more inputs, wherein the model is based on a computational fluid dynamics (CFD) function, and detect the smoke using a plurality of probes. The computing engine is also configured to define a layout of the smoke detectors based on the smoke detectors being able to detect the smoke in the environment, and provide a map of the smoke detectors for the layout. Also provided are embodiments for a method to design a layout for a smoke detection system.Type: GrantFiled: July 22, 2019Date of Patent: August 16, 2022Assignee: KIDDE TECHNOLOGIES, INC.Inventors: Amanda J. Daly, May L. Corn, Kalyana Gottiparthi, Vaidyanathan Sankaran, Changmin Cao, Terry Simpson, Kenneth Bell, Ke Wang
-
Patent number: 11257354Abstract: Provided are embodiments for a system for validating a smoke detection layout, where the system includes a memory and a processor. The processor is configured to receive one or more inputs, model transport and dispersion of smoke to a smoke detector of an environment based on the one or more inputs, wherein the model is based on computational fluid dynamics (CFD) function, and select a subset of input parameters from the one or more inputs to test. The processor is also configured to test the smoke detection system layout using the selected subset of input parameters, determine an alarm time probability using uncertainty quantifications for the selected subset of input parameters, and provide the alarm time probability and confidence level for the selected subset parameters. Also provided are embodiments for a method to validate a smoke detection system layout.Type: GrantFiled: July 22, 2019Date of Patent: February 22, 2022Assignee: KIDDE TECHNOLOGIES, INC.Inventors: Amanda J. Daly, Kenneth Bell, Terry Simpson, May L. Corn, Vaidyanathan Sankaran, Changmin Cao, Kalyana Gottiparthi, Ke Wang
-
Publication number: 20220046044Abstract: The present disclosure is related to systems and methods of monitoring data of a network application. An embedded browser of a client application on a client device may initiate a request to access a network application hosted on a server. The client application may, responsive to the request, establish a secure session to communicate data of the network application to the client application for rendering in a display region of the embedded browser. The client application may decrypt the data communicated via the established secure session to monitor the network application.Type: ApplicationFiled: October 25, 2021Publication date: February 10, 2022Applicant: Citrix Systems, Inc.Inventors: Christopher Fleck, Kenneth Bell
-
Publication number: 20210404955Abstract: A covered chamberless particulate detector includes a chamberless detector configured to produce a signal when particulate sensing events occurs, one or more optical emitters configured to emit one or more emitting cones of light, one or more optical sensors defining one or more receiving cones and configured to detect occurrence of particulate sensing events, and a protective cover defining an inside region and an outside region. Each of the one or more emitting cones of light is configured to overlap with each of the one or more receiving cones, thereby creating one or more sensing volumes which may be in the inside region, the outside region, or both regions. The protective cover can be transparent, partially transparent, or opaque, and can include apertures. The optical emitters and detectors can use one or more wavelengths, allowing discrimination of various airborne particulates.Type: ApplicationFiled: September 8, 2021Publication date: December 30, 2021Inventors: David L. Lincoln, Michael J. Birnkrant, Kenneth Bell, Peter R. Harris, Jennifer M. Alexander
-
Publication number: 20210377294Abstract: Implementations of the systems and methods discussed herein provide for distributed HTTP proxy services with synchronization of per-server or per-tenant resource allocation counters amongst the proxy devices, allowing devices to quickly identify denial of service attacks or other malicious or erroneous behavior. In some implementations, a database server may receive resource consumption notifications from each of a plurality of proxy devices and may aggregate the notifications or increment a counter on a per-server or per-tenant basis, and provide updated counter values to proxy devices via callbacks. Each proxy device may check the counter value before utilizing resources, and may disable or block proxy processing responsive to the counter exceeding a threshold.Type: ApplicationFiled: October 5, 2020Publication date: December 2, 2021Applicant: Citrix Systems, Inc.Inventors: Punit Gupta, Sandilya Sangabathula, Kenneth Bell
-
Patent number: 11159552Abstract: The present disclosure is related to systems and methods of monitoring data of a network application. An embedded browser of a client application on a client device may initiate a request to access a network application hosted on a server. The client application may, responsive to the request, establish a secure session to communicate data of the network application to the client application for rendering in a display region of the embedded browser. The client application may decrypt the data communicated via the established secure session to monitor the network application.Type: GrantFiled: May 3, 2019Date of Patent: October 26, 2021Assignee: Citrix Systems, Inc.Inventors: Christopher Fleck, Kenneth Bell
-
Publication number: 20210234924Abstract: A method may include generating a proxy auto-configuration file including a function and a hash value associated with a resource. The hash value may be determined based on an identifier of the resource. The proxy auto-configuration file may include the hash value instead of a plaintext value of the identifier to obscure the plaintext value of the identifier. The proxy auto-configuration file including the function and the hash value may be sent to at least enable the function to be invoked by a web browser at one or more clients. The function may be configured to respond to being invoked by the web browser by determining, based on the hash value, whether to bypass a proxy server when accessing the resource. Related systems and computer program products are also provided.Type: ApplicationFiled: April 13, 2021Publication date: July 29, 2021Inventors: Jong Kann, Kenneth Bell
-
Publication number: 20210234919Abstract: Described implementations provide systems and methods generating and using live performance maps of a network environment for selecting combinations of proxies and servers for fulfilling client device requests. Proxy devices or connectors may gather network telemetry data from actual network flows between client devices and application servers or other resources traversing the proxy devices or connectors, when available, or by generating synthetic transactions to measure network telemetry data when actual flows are unavailable. The telemetry data may be provided to a management service, which may generate a performance map. The performance map may be provided to the proxy devices and/or a cloud proxy service for selection of optimal combinations of connectors and resources for client requests. Incoming client requests may be steered or redirected to the selected optimal combination. The performance map may be dynamically regenerated as network conditions change and/or as servers are deployed or undeployed.Type: ApplicationFiled: January 23, 2020Publication date: July 29, 2021Inventors: Hrushikesh Shrinivas Paralikar, Kenneth Bell, Arkesh Kumar, Anil Kumar Gavini
-
Patent number: 11067457Abstract: A method of monitoring smoke, fire, and temperature conditions includes transmitting light through a first fiber optic cable, the fiber optic cable terminating at a node disposed to monitor a smoke or fire condition at one or more predetermined areas, transmitting light along a second fiber optic cable, the second fiber optic cable arranged to monitor a temperature condition at one or more predetermined areas, receiving scattered light from the first fiber optic cable and/or the second fiber optic cable at a control system, and analyzing the scattered light to determine at least one of the presence and magnitude of smoke, fire and/or a temperature condition along the fiber harness or at the node.Type: GrantFiled: November 10, 2017Date of Patent: July 20, 2021Assignee: KIDDE TECHNOLOGIES, INC.Inventors: Michael J. Birnkrant, Stefan Coreth, Kenneth Bell, Jennifer M. Alexander, Peter R. Harris, Antonio M. Vincitore
-
Patent number: 11005926Abstract: A method may include generating a proxy auto-configuration file including a function and a hash value associated with a resource. The hash value may be determined based on an identifier of the resource. The proxy auto-configuration file may include the hash value instead of a plaintext value of the identifier to obscure the plaintext value of the identifier. The proxy auto-configuration file including the function and the hash value may be sent to at least enable the function to be invoked by a web browser at one or more clients. The function may be configured to respond to being invoked by the web browser by determining, based on the hash value, whether to bypass a proxy server when accessing the resource. Related systems and computer program products are also provided.Type: GrantFiled: July 25, 2019Date of Patent: May 11, 2021Assignee: Citrix Systems, Inc.Inventors: Jong Kann, Kenneth Bell
-
Publication number: 20210058470Abstract: A method may include establishing a first direct route to a gateway appliance from session clients each associated with a respective Desktop as a Service (DaaS) session run by a virtual session controller within a computing network, and establishing a second direct route from the gateway appliance to a virtual session connector within at least one private enterprise computing network. The method may also include relaying private enterprise network data between the session clients and the virtual session connector through the gateway appliance via the first direct route to each session client and the second direct route to the virtual session connector.Type: ApplicationFiled: October 21, 2020Publication date: February 25, 2021Applicant: Citrix Systems, Inc.Inventors: Leo C. Singleton, IV, Kenneth Bell, Jitendra Deshpande
-
Publication number: 20210029197Abstract: A method may include generating a proxy auto-configuration file including a function and a hash value associated with a resource. The hash value may be determined based on an identifier of the resource. The proxy auto-configuration file may include the hash value instead of a plaintext value of the identifier to obscure the plaintext value of the identifier. The proxy auto-configuration file including the function and the hash value may be sent to at least enable the function to be invoked by a web browser at one or more clients. The function may be configured to respond to being invoked by the web browser by determining, based on the hash value, whether to bypass a proxy server when accessing the resource. Related systems and computer program products are also provided.Type: ApplicationFiled: July 25, 2019Publication date: January 28, 2021Inventors: Jong Kann, Kenneth Bell