Patents by Inventor Kevin R. Borders

Kevin R. Borders has filed for patents to protect the following inventions. This listing includes patent applications that are pending as well as patents that have already been granted by the United States Patent and Trademark Office (USPTO).

  • Publication number: 20240329982
    Abstract: Method, system and computer program product for producing high-level report data from low-level data extracted from a version control system are provided. The method includes receiving sets of commit source data extracted from a repository of one or more software objects in the version control system. Each set of commit source data includes commit patches. The commit patches are processed to obtain hunk records. The hunk records are processed utilizing a commit-blame procedure to produce output records indicating history and original source of changes from the commit patches. The commit-blame procedure is performed on input commits and commit patches to produce intermediate data records. The intermediate data records are analyzed to obtain information relating to whether software code is still surviving in a software code base or when the software code was removed from the software code base. At least one report is produced by aggregating the information.
    Type: Application
    Filed: January 18, 2024
    Publication date: October 3, 2024
    Applicant: minware Inc.
    Inventor: Kevin R. Borders
  • Publication number: 20240330835
    Abstract: Method, system and computer program product for assessing labor efficiency of knowledge work such as software development work are provided. The method includes the step of receiving event data extracted from one or more data sources. The event data are related to activities conducted by knowledge workers to obtain event records. Each event record contains the identity of each knowledge worker associated with an event and either a time interval or a point in time when the event occurred. The method also includes calculating activity records associated with time intervals during a time period from the event records. The activity records contain information about what occurred based on the event records. The method further includes allocating work effort based on the time intervals from the activity records to associate a cost with the activities and to obtain an effort value indicating amount of effort for each time interval.
    Type: Application
    Filed: March 30, 2023
    Publication date: October 3, 2024
    Applicant: minware Inc.
    Inventor: Kevin R. Borders
  • Patent number: 10628628
    Abstract: A computer-implemented method, system and computer program product for arranging a plurality of objects or content into a plurality of regions to obtain a content-aware layout are provided. The method includes receiving region data which specifies properties for a plurality of regions and receiving object data which specifies properties for a plurality of objects. The method further includes processing the object and region data to produce an arrangement of the plurality of objects into the plurality of regions. The step of processing for at least one of the regions includes the steps of: generating a plurality of candidate object layouts, scoring the plurality of candidate object layouts, and selecting a layout from the candidate object layouts for the region based on the scores.
    Type: Grant
    Filed: May 19, 2016
    Date of Patent: April 21, 2020
    Assignee: Collage.com, Inc.
    Inventor: Kevin R. Borders
  • Publication number: 20170024362
    Abstract: A computer-implemented method, system and computer program product for arranging a plurality of objects or content into a plurality of regions to obtain a content-aware layout are provided. The method includes receiving region data which specifies properties for a plurality of regions and receiving object data which specifies properties for a plurality of objects. The method further includes processing the object and region data to produce an arrangement of the plurality of objects into the plurality of regions. The step of processing for at least one of the regions includes the steps of: generating a plurality of candidate object layouts, scoring the plurality of candidate object layouts, and selecting a layout from the candidate object layouts for the region based on the scores.
    Type: Application
    Filed: May 19, 2016
    Publication date: January 26, 2017
    Inventor: Kevin R. Borders
  • Patent number: 9275479
    Abstract: A method, system and computer program product for creating collages that visually resemble a particular shape or group of shapes are provided. The method is a computer-implemented method of creating a shape collage and includes receiving a shape specification signal which specifies at least one desired shape. Each desired shape has at least one shape boundary and an area. The method also includes receiving image data which represents a plurality of images and processing the signal and the data to obtain a shape collage of the images which at least partially covers and conforms to the area of the at least one desired shape. The step of processing includes the steps of evaluating whether each image is to be treated as being either within or without the area and removing or hiding any image that is evaluated as being outside the area.
    Type: Grant
    Filed: February 15, 2013
    Date of Patent: March 1, 2016
    Assignee: COLLAGE.COM, LLC
    Inventors: Kevin R. Borders, Joseph M. Golden
  • Patent number: 9055093
    Abstract: Method, system and computer program product for detecting at least one of security threats and undesirable computer files are provided. A first method includes receiving a data stream which represents outbound, application layer messages from a first computer process to at least one second computer process. The computer processes are implemented on one or more computers. The method further includes monitoring the data stream to detect a security threat based on a whitelist having entries which contain metadata. The whitelist describes legitimate application layer messages based on a set of heuristics. The method still further includes generating a signal if a security threat is detected. A second method includes comparing a set of computer files with a whitelist which characterizes all legitimate computer files. The whitelist contains one or more entries. Each of the entries describe a plurality of legitimate computer files.
    Type: Grant
    Filed: December 18, 2008
    Date of Patent: June 9, 2015
    Inventor: Kevin R. Borders
  • Patent number: 8976198
    Abstract: A method, system and computer program product for creating shape collages are provided. The method includes receiving a shape specification signal which specifies at least one desired shape having an area. The method further includes receiving image data which represents a plurality of images. The method still further includes processing the shape specification signal and the image data to obtain a shape collage of the images at least partially covering the area of the at least one desired shape. The step of processing may include the steps of at least partially covering the at least one desired shape with at least one shape primitive and placing at least one image over the at least one shape primitive to at least partially fill the at least one shape primitive.
    Type: Grant
    Filed: October 21, 2010
    Date of Patent: March 10, 2015
    Assignee: Collage.com, LLC
    Inventors: Kevin R. Borders, Joseph M. Golden
  • Patent number: 8515918
    Abstract: Method, system and computer program product for comparing or measuring information content in at least one data stream including one or more data segments is provided. In at least one embodiment of the invention, information leak capacity in network traffic is quantified. Instead of trying to detect the presence of sensitive data—an impossible task in the general case—one goal of the method, system and computer program product is to measure and constrain its maximum volume. Most network traffic is repeated or determined by external information, such as protocol specifications or messages sent by a server. By filtering this data, one can isolate and quantify true information flowing from a computer. Measurement algorithms for the Hypertext Transfer Protocol (HTTP), the main protocol for web browsing are provided. When applied to real web browsing traffic, the algorithms were able to discount 98.5% of measured bytes and effectively isolate information leaks.
    Type: Grant
    Filed: May 19, 2009
    Date of Patent: August 20, 2013
    Inventor: Kevin R. Borders
  • Patent number: 8079080
    Abstract: A method, system and computer program product detect attempts to send significant amounts of information out via HTTP tunnels to rogue Web servers from within an otherwise firewalled network. A related goal is to help detect spyware programs. Filters, based on the analysis of HTTP traffic over a training period, help detect anomalies in outbound HTTP traffic using metrics such as request regularity, bandwidth usage, inter-request delay time, and transaction size.
    Type: Grant
    Filed: October 21, 2005
    Date of Patent: December 13, 2011
    Inventor: Kevin R. Borders
  • Publication number: 20110096075
    Abstract: A method, system and computer program product for creating shape collages are provided. The method includes receiving a shape specification signal which specifies at least one desired shape having an area. The method further includes receiving image data which represents a plurality of images. The method still further includes processing the shape specification signal and the image data to obtain a shape collage of the images at least partially covering the area of the at least one desired shape. The step of processing may include the steps of at least partially covering the at least one desired shape with at least one shape primitive and placing at least one image over the at least one shape primitive to at least partially fill the at least one shape primitive.
    Type: Application
    Filed: October 21, 2010
    Publication date: April 28, 2011
    Applicant: ScrapWalls, LLC
    Inventors: Kevin R. Borders, Joseph M. Golden
  • Publication number: 20090287734
    Abstract: Method, system and computer program product for comparing or measuring information content in at least one data stream including one or more data segments is provided. In at least one embodiment of the invention, information leak capacity in network traffic is quantified. Instead of trying to detect the presence of sensitive data—an impossible task in the general case—one goal of the method, system and computer program product is to measure and constrain its maximum volume. Most network traffic is repeated or determined by external information, such as protocol specifications or messages sent by a server. By filtering this data, one can isolate and quantify true information flowing from a computer. Measurement algorithms for the Hypertext Transfer Protocol (HTTP), the main protocol for web browsing are provided. When applied to real web browsing traffic, the algorithms were able to discount 98.5% of measured bytes and effectively isolate information leaks.
    Type: Application
    Filed: May 19, 2009
    Publication date: November 19, 2009
    Inventor: Kevin R. Borders
  • Publication number: 20090158430
    Abstract: Method, system and computer program product for detecting at least one of security threats and undesirable computer files are provided. A first method includes receiving a data stream which represents outbound, application layer messages from a first computer process to at least one second computer process. The computer processes are implemented on one or more computers. The method further includes monitoring the data stream to detect a security threat based on a whitelist having entries which contain metadata. The whitelist describes legitimate application layer messages based on a set of heuristics. The method still further includes generating a signal if a security threat is detected. A second method includes comparing a set of computer files with a whitelist which characterizes all legitimate computer files. The whitelist contains one or more entries. Each of the entries describe a plurality of legitimate computer files.
    Type: Application
    Filed: December 18, 2008
    Publication date: June 18, 2009
    Inventor: Kevin R. Borders