Patents by Inventor Mark D. Harris
Mark D. Harris has filed for patents to protect the following inventions. This listing includes patent applications that are pending as well as patents that have already been granted by the United States Patent and Trademark Office (USPTO).
-
Publication number: 20240112115Abstract: In a threat management platform, a number of endpoints log events in an event data recorder. A local agent filters this data and feeds a filtered data stream to a central threat management facility. The central threat management facility can locally or globally tune filtering by local agents based on the current data stream, and can query local event data recorders for additional information where necessary or helpful in threat detection or forensic analysis. The central threat management facility also stores and deploys a number of security tools such as a web-based user interface supported by machine learning models to identify potential threats requiring human intervention and other models to provide human-readable context for evaluating potential threats.Type: ApplicationFiled: August 3, 2023Publication date: April 4, 2024Inventors: Beata Ladnai, Mark D. Harris, Andrew G. P. Smith, Kenneth D. Ray, Andrew J. Thomas, Russell Humphries
-
Patent number: 11945804Abstract: Provided herein are 4-aminoisoindoline-1,3-dione compounds having the following structure: wherein R, Ring A, and n are as defined herein, compositions comprising an effective amount of a 4-aminoisoindoline-1,3-dione compound, and methods for treating or preventing disorders.Type: GrantFiled: May 12, 2022Date of Patent: April 2, 2024Assignee: Celgene CorporationInventors: Matthew D. Alexander, Soraya Carrancio, Matthew D. Correa, Virginia Heather Sharron Grant, Joshua Hansen, Roy L. Harris, Dehua Huang, Timothy S. Kercher, Antonia Lopez-Girona, Mark A. Nagy, Veronique Plantevin-Krenitsky
-
Patent number: 11931034Abstract: A surgical instrument includes an anvil and an elongate channel. The elongate channel includes a plurality of first electrical contacts and a plurality of electrical connectors comprising a plurality of second electrical contacts, wherein the electrical connectors are spring-biased such that a gap is maintained between the first electrical contacts and the second electrical contacts. The surgical instrument further includes a staple cartridge releasably attachable to the elongate channel, wherein the staple cartridge has a cartridge body comprising a plurality of staple cavities, a plurality of staples deployable from the staple cavities into the tissue, and a plurality of third electrical contacts, wherein the attachment of the staple cartridge to the elongate channel moves the electrical connectors causing the second electrical contacts to bridge the gap and become electrically coupled to the first electrical contacts.Type: GrantFiled: January 12, 2021Date of Patent: March 19, 2024Assignee: Cilag GmbH InternationalInventors: Sol E. Posada, Mark D. Overmyer, Raymond E. Parfett, Brian D. Schings, Brett E. Swensgard, Richard L. Leimbach, Shane R. Adams, David C. Yates, Jason L. Harris, Frederick E. Shelton, IV, Kharyl Evenson George Stephens, Jason M. Rector
-
Publication number: 20240076781Abstract: Disclosed herein are systems and methods for treating a magnesium or a magnesium alloy substrate. The system includes a cleaning composition having a pH greater than 8.5 or a solvent, and a pretreatment composition comprising an organophosphate compound and/or an organophosphonate compound. The method includes contacting a substrate surface with the cleaning composition or the solvent, and contacting the surface with the pretreatment composition. Also disclosed are substrates treated with one of the systems or methods. Also disclosed are magnesium or magnesium alloy substrates wherein, between the air/substrate interface and 500 nm below the air/substrate interface (a) oxygen and magnesium are present in a combined amount of at least 70 atomic %; (b) carbon is present in an amount of no more than 30 atomic %; and/or (c) fluoride is present in an amount of no more than 8 atomic %, wherein atomic % is measured by XPS depth profiling.Type: ApplicationFiled: August 10, 2020Publication date: March 7, 2024Applicant: PPG Industries Ohio, Inc.Inventors: Kristi M. Allen, Rachel D. Harris, Justin J. Martin, Steven J. Lemon, Silvia Bezer, Mark W. McMillen
-
Publication number: 20240072560Abstract: A surgical instrument is configured to compensate for battery pack and drivetrain failures. One method includes generating a firing sequence, determining whether a subset of rechargeable battery cells is damaged during the firing sequence, and stepping-up an output voltage of the battery pack to complete the firing sequence in response to a determination that a subset of the rechargeable battery cells is damaged. Another method includes generating a mechanical output to motivate a drivetrain to transmit a motion to a jaw assembly of the surgical instrument, activating a safe mode in response to an acute failure of the drivetrain, and activating a bailout mode in response to a catastrophic failure of the drivetrain. Another method includes driving a drivetrain, sensing and recording vibration information from the drivetrain, generating an output signal based on the vibration information, and determining a status of the surgical instrument based on the output signal.Type: ApplicationFiled: November 7, 2023Publication date: February 29, 2024Inventors: Frederick E. Shelton, IV, Mark D. Overmyer, David C. Yates, Jason L. Harris
-
Publication number: 20240037477Abstract: An endpoint coupled in a communicating relationship with an enterprise network may include a data recorder configured to store an event stream of data indicating events on the endpoint including types of changes to computing objects, a filter configured to locally process the event stream into a filtered event stream including a subset of types of changes to the computing objects, and a local security agent. The local security agent may be configured to transmit the filtered event stream to a threat management facility, respond to a filter adjustment from the threat management facility by adjusting the filter to modify the subset of types of changes included in the filtered event stream, and respond to a query from the threat management facility by retrieving data stored in the data recorder over a time window before the query and excluded from the filtered event stream.Type: ApplicationFiled: August 14, 2023Publication date: February 1, 2024Inventors: Beata Ladnai, Mark D. Harris, Andrew G. P. Smith, Kenneth D. Ray, Andrew J. Thomas, Russell Humphries
-
Patent number: 11716351Abstract: A honeypot file is cryptographically secured with a cryptographic key. The key, or related key material, is then placed on a central keystore and the file is placed on a data store within the enterprise network. Unauthorized access to the honeypot file can then be detecting by monitoring use of the associated key material, which usefully facilitates detection of file access at any time when, and from any location where, cryptographic access to the file is initiated.Type: GrantFiled: July 8, 2021Date of Patent: August 1, 2023Assignee: Sophos LimitedInventors: Harald Schütz, Andreas Berger, Russell Humphries, Mark D. Harris, Kenneth D. Ray
-
Publication number: 20210344715Abstract: A honeypot file is cryptographically secured with a cryptographic key. The key, or related key material, is then placed on a central keystore and the file is placed on a data store within the enterprise network. Unauthorized access to the honeypot file can then be detecting by monitoring use of the associated key material, which usefully facilitates detection of file access at any time when, and from any location where, cryptographic access to the file is initiated.Type: ApplicationFiled: July 8, 2021Publication date: November 4, 2021Inventors: Harald Schütz, Andreas Berger, Russell Humphries, Mark D. Harris, Kenneth D. Ray
-
Patent number: 11089056Abstract: A honeypot file is cryptographically secured with a cryptographic key. The key, or related key material, is then placed on a central keystore and the file is placed on a data store within the enterprise network. Unauthorized access to the honeypot file can then be detecting by monitoring use of the associated key material, which usefully facilitates detection of file access at any time when, and from any location where, cryptographic access to the file is initiated.Type: GrantFiled: September 28, 2018Date of Patent: August 10, 2021Assignee: Sophos LimitedInventors: Harald Schütz, Andreas Berger, Russell Humphries, Mark D. Harris, Kenneth D. Ray
-
Patent number: 10841339Abstract: Threat detection instrumentation is simplified by providing and updating labels for computing objects in a context-sensitive manner. This may include simple labeling schemes to distinguish between objects, e.g., trusted/untrusted processes or corporate/private data. This may also include more granular labeling schemes such as a three-tiered scheme that identifies a category (e.g., financial, e-mail, game), static threat detection attributes (e.g., signatures, hashes, API calls), and explicit identification (e.g., what a file or process calls itself). By tracking such data for various computing objects and correlating these labels to malware occurrences, rules can be written for distribution to endpoints to facilitate threat detection based on, e.g., interactions of labeled objects, changes to object labels, and so forth.Type: GrantFiled: May 2, 2018Date of Patent: November 17, 2020Assignee: Sophos LimitedInventors: Kenneth D. Ray, Robert W. Cook, Andrew J. Thomas, Dmitri Samosseiko, Mark D. Harris
-
Patent number: 10778725Abstract: Threat detection instrumentation is simplified by providing and updating labels for computing objects in a context-sensitive manner. This may include simple labeling schemes to distinguish between objects, e.g., trusted/untrusted processes or corporate/private data. This may also include more granular labeling schemes such as a three-tiered scheme that identifies a category (e.g., financial, e-mail, game), static threat detection attributes (e.g., signatures, hashes, API calls), and explicit identification (e.g., what a file or process calls itself). By tracking such data for various computing objects and correlating these labels to malware occurrences, rules can be written for distribution to endpoints to facilitate threat detection based on, e.g., interactions of labeled objects, changes to object labels, and so forth.Type: GrantFiled: January 16, 2019Date of Patent: September 15, 2020Assignee: Sophos LimitedInventors: Kenneth D. Ray, Simon Neil Reed, Mark D. Harris, Neil Robert Tyndale Watkiss, Andrew J. Thomas, Robert W. Cook, Dmitri Samosseiko
-
Patent number: 10728269Abstract: A security agent conditionally hooks a process for malware monitoring based on a persistent hook state for the process that may be stored, for example, in a process cache. When a process launches in a backoff state indicating that the process previously crashed after hooking, the security agent may further conditionally hook the process based on a reputation of the process or any other relevant contextual information.Type: GrantFiled: May 3, 2018Date of Patent: July 28, 2020Assignee: Sophos LimitedInventors: Neil Robert Tyndale Watkiss, Mark D. Harris
-
Patent number: 10673902Abstract: Threat detection instrumentation is simplified by providing and updating labels for computing objects in a context-sensitive manner. This may include simple labeling schemes to distinguish between objects, e.g., trusted/untrusted processes or corporate/private data. This may also include more granular labeling schemes such as a three-tiered scheme that identifies a category (e.g., financial, e-mail, game), static threat detection attributes (e.g., signatures, hashes, API calls), and explicit identification (e.g., what a file or process calls itself). By tracking such data for various computing objects and correlating these labels to malware occurrences, rules can be written for distribution to endpoints to facilitate threat detection based on, e.g., interactions of labeled objects, changes to object labels, and so forth.Type: GrantFiled: April 26, 2018Date of Patent: June 2, 2020Assignee: Sophos LimitedInventors: Andrew J. Thomas, Mark D. Harris, Simon Neil Reed, Neil Robert Tyndale Watkiss, Kenneth D. Ray
-
Publication number: 20200106808Abstract: A honeypot file is cryptographically secured with a cryptographic key. The key, or related key material, is then placed on a central keystore and the file is placed on a data store within the enterprise network. Unauthorized access to the honeypot file can then be detecting by monitoring use of the associated key material, which usefully facilitates detection of file access at any time when, and from any location where, cryptographic access to the file is initiated.Type: ApplicationFiled: September 28, 2018Publication date: April 2, 2020Inventors: Harald Schütz, Andreas Berger, Russell Humphries, Mark D. Harris, Kenneth D. Ray
-
Patent number: 10594717Abstract: A threat management facility that remotely stores global reputation information for network content can be used in combination with a recognition engine such as a machine learning classifier that is locally deployed on endpoints within an enterprise network. More specifically, the recognition engine can locally evaluate reputation for a network address being accessed by an endpoint, and this reputation information can be used to dynamically establish a timeout for a request from the endpoint to the threat management facility for corresponding global reputation information.Type: GrantFiled: May 3, 2018Date of Patent: March 17, 2020Assignee: Sophos LimitedInventors: Neil Robert Tyndale Watkiss, Emile Marcus Kenning, Mark D. Harris
-
Patent number: 10558800Abstract: Threat detection instrumentation is simplified by providing and updating labels for computing objects in a context-sensitive manner. This may include simple labeling schemes to distinguish between objects, e.g., trusted/untrusted processes or corporate/private data. This may also include more granular labeling schemes such as a three-tiered scheme that identifies a category (e.g., financial, e-mail, game), static threat detection attributes (e.g., signatures, hashes, API calls), and explicit identification (e.g., what a file or process calls itself). By tracking such data for various computing objects and correlating these labels to malware occurrences, rules can be written for distribution to endpoints to facilitate threat detection based on, e.g., interactions of labeled objects, changes to object labels, and so forth.Type: GrantFiled: May 3, 2018Date of Patent: February 11, 2020Assignee: Sophos LimitedInventors: Kenneth D. Ray, Daniel Salvatore Schiappa, Simon Neil Reed, Mark D. Harris, Neil Robert Tyndale Watkiss, Andrew J. Thomas, Robert W. Cook, Harald Schütz, John Edward Tyrone Shaw, Anthony John Merry
-
Publication number: 20190342313Abstract: A security agent conditionally hooks a process for malware monitoring based on a persistent hook state for the process that may be stored, for example, in a process cache. When a process launches in a backoff state indicating that the process previously crashed after hooking, the security agent may further conditionally hook the process based on a reputation of the process or any other relevant contextual information.Type: ApplicationFiled: May 3, 2018Publication date: November 7, 2019Inventors: Neil Robert Tyndale Watkiss, Mark D. Harris
-
Publication number: 20190342312Abstract: A threat management facility that remotely stores global reputation information for network content can be used in combination with a recognition engine such as a machine learning classifier that is locally deployed on endpoints within an enterprise network. More specifically, the recognition engine can locally evaluate reputation for a network address being accessed by an endpoint, and this reputation information can be used to dynamically establish a timeout for a request from the endpoint to the threat management facility for corresponding global reputation information.Type: ApplicationFiled: May 3, 2018Publication date: November 7, 2019Inventors: Neil Robert Tyndale Watkiss, Emile Marcus Kenning, Mark D. Harris
-
Patent number: 10447708Abstract: Threat detection is improved by monitoring variations in observable events and correlating these variations to malicious activity. The disclosed techniques can be usefully employed with any attribute or other metric that can be instrumented on an endpoint and tracked over time including observable events such as changes to files, data, software configurations, operating systems, and so forth. Correlations may be based on historical data for a particular machine, or a group of machines such as similarly configured endpoints. Similar inferences of malicious activity can be based on the nature of a variation, including specific patterns of variation known to be associated with malware and any other unexpected patterns that deviate from normal behavior. Embodiments described herein use variations in, e.g., server software updates or URL cache hits on an endpoint, but the techniques are more generally applicable to any endpoint attribute that varies in a manner correlated with malicious activity.Type: GrantFiled: June 26, 2018Date of Patent: October 15, 2019Assignee: Sophos LimitedInventors: Andrew J. Thomas, Kenneth D. Ray, Mark D. Harris
-
Patent number: 10382459Abstract: Threat detection instrumentation is simplified by providing and updating labels for computing objects in a context-sensitive manner. This may include simple labeling schemes to distinguish between objects, e.g., trusted/untrusted processes or corporate/private data. This may also include more granular labeling schemes such as a three-tiered scheme that identifies a category (e.g., financial, e-mail, game), static threat detection attributes (e.g., signatures, hashes, API calls), and explicit identification (e.g., what a file or process calls itself). By tracking such data for various computing objects and correlating these labels to malware occurrences, rules can be written for distribution to endpoints to facilitate threat detection based on, e.g., interactions of labeled objects, changes to object labels, and so forth.Type: GrantFiled: May 2, 2018Date of Patent: August 13, 2019Assignee: Sophos LimitedInventors: Mark D. Harris, Simon Neil Reed, Kenneth D. Ray, Neil Robert Tyndale Watkiss, Andrew J. Thomas, Robert W. Cook