Patents by Inventor Mark D. Harris

Mark D. Harris has filed for patents to protect the following inventions. This listing includes patent applications that are pending as well as patents that have already been granted by the United States Patent and Trademark Office (USPTO).

  • Publication number: 20240112115
    Abstract: In a threat management platform, a number of endpoints log events in an event data recorder. A local agent filters this data and feeds a filtered data stream to a central threat management facility. The central threat management facility can locally or globally tune filtering by local agents based on the current data stream, and can query local event data recorders for additional information where necessary or helpful in threat detection or forensic analysis. The central threat management facility also stores and deploys a number of security tools such as a web-based user interface supported by machine learning models to identify potential threats requiring human intervention and other models to provide human-readable context for evaluating potential threats.
    Type: Application
    Filed: August 3, 2023
    Publication date: April 4, 2024
    Inventors: Beata Ladnai, Mark D. Harris, Andrew G. P. Smith, Kenneth D. Ray, Andrew J. Thomas, Russell Humphries
  • Patent number: 11945804
    Abstract: Provided herein are 4-aminoisoindoline-1,3-dione compounds having the following structure: wherein R, Ring A, and n are as defined herein, compositions comprising an effective amount of a 4-aminoisoindoline-1,3-dione compound, and methods for treating or preventing disorders.
    Type: Grant
    Filed: May 12, 2022
    Date of Patent: April 2, 2024
    Assignee: Celgene Corporation
    Inventors: Matthew D. Alexander, Soraya Carrancio, Matthew D. Correa, Virginia Heather Sharron Grant, Joshua Hansen, Roy L. Harris, Dehua Huang, Timothy S. Kercher, Antonia Lopez-Girona, Mark A. Nagy, Veronique Plantevin-Krenitsky
  • Patent number: 11931034
    Abstract: A surgical instrument includes an anvil and an elongate channel. The elongate channel includes a plurality of first electrical contacts and a plurality of electrical connectors comprising a plurality of second electrical contacts, wherein the electrical connectors are spring-biased such that a gap is maintained between the first electrical contacts and the second electrical contacts. The surgical instrument further includes a staple cartridge releasably attachable to the elongate channel, wherein the staple cartridge has a cartridge body comprising a plurality of staple cavities, a plurality of staples deployable from the staple cavities into the tissue, and a plurality of third electrical contacts, wherein the attachment of the staple cartridge to the elongate channel moves the electrical connectors causing the second electrical contacts to bridge the gap and become electrically coupled to the first electrical contacts.
    Type: Grant
    Filed: January 12, 2021
    Date of Patent: March 19, 2024
    Assignee: Cilag GmbH International
    Inventors: Sol E. Posada, Mark D. Overmyer, Raymond E. Parfett, Brian D. Schings, Brett E. Swensgard, Richard L. Leimbach, Shane R. Adams, David C. Yates, Jason L. Harris, Frederick E. Shelton, IV, Kharyl Evenson George Stephens, Jason M. Rector
  • Publication number: 20240076781
    Abstract: Disclosed herein are systems and methods for treating a magnesium or a magnesium alloy substrate. The system includes a cleaning composition having a pH greater than 8.5 or a solvent, and a pretreatment composition comprising an organophosphate compound and/or an organophosphonate compound. The method includes contacting a substrate surface with the cleaning composition or the solvent, and contacting the surface with the pretreatment composition. Also disclosed are substrates treated with one of the systems or methods. Also disclosed are magnesium or magnesium alloy substrates wherein, between the air/substrate interface and 500 nm below the air/substrate interface (a) oxygen and magnesium are present in a combined amount of at least 70 atomic %; (b) carbon is present in an amount of no more than 30 atomic %; and/or (c) fluoride is present in an amount of no more than 8 atomic %, wherein atomic % is measured by XPS depth profiling.
    Type: Application
    Filed: August 10, 2020
    Publication date: March 7, 2024
    Applicant: PPG Industries Ohio, Inc.
    Inventors: Kristi M. Allen, Rachel D. Harris, Justin J. Martin, Steven J. Lemon, Silvia Bezer, Mark W. McMillen
  • Publication number: 20240072560
    Abstract: A surgical instrument is configured to compensate for battery pack and drivetrain failures. One method includes generating a firing sequence, determining whether a subset of rechargeable battery cells is damaged during the firing sequence, and stepping-up an output voltage of the battery pack to complete the firing sequence in response to a determination that a subset of the rechargeable battery cells is damaged. Another method includes generating a mechanical output to motivate a drivetrain to transmit a motion to a jaw assembly of the surgical instrument, activating a safe mode in response to an acute failure of the drivetrain, and activating a bailout mode in response to a catastrophic failure of the drivetrain. Another method includes driving a drivetrain, sensing and recording vibration information from the drivetrain, generating an output signal based on the vibration information, and determining a status of the surgical instrument based on the output signal.
    Type: Application
    Filed: November 7, 2023
    Publication date: February 29, 2024
    Inventors: Frederick E. Shelton, IV, Mark D. Overmyer, David C. Yates, Jason L. Harris
  • Publication number: 20240037477
    Abstract: An endpoint coupled in a communicating relationship with an enterprise network may include a data recorder configured to store an event stream of data indicating events on the endpoint including types of changes to computing objects, a filter configured to locally process the event stream into a filtered event stream including a subset of types of changes to the computing objects, and a local security agent. The local security agent may be configured to transmit the filtered event stream to a threat management facility, respond to a filter adjustment from the threat management facility by adjusting the filter to modify the subset of types of changes included in the filtered event stream, and respond to a query from the threat management facility by retrieving data stored in the data recorder over a time window before the query and excluded from the filtered event stream.
    Type: Application
    Filed: August 14, 2023
    Publication date: February 1, 2024
    Inventors: Beata Ladnai, Mark D. Harris, Andrew G. P. Smith, Kenneth D. Ray, Andrew J. Thomas, Russell Humphries
  • Patent number: 11716351
    Abstract: A honeypot file is cryptographically secured with a cryptographic key. The key, or related key material, is then placed on a central keystore and the file is placed on a data store within the enterprise network. Unauthorized access to the honeypot file can then be detecting by monitoring use of the associated key material, which usefully facilitates detection of file access at any time when, and from any location where, cryptographic access to the file is initiated.
    Type: Grant
    Filed: July 8, 2021
    Date of Patent: August 1, 2023
    Assignee: Sophos Limited
    Inventors: Harald Schütz, Andreas Berger, Russell Humphries, Mark D. Harris, Kenneth D. Ray
  • Publication number: 20210344715
    Abstract: A honeypot file is cryptographically secured with a cryptographic key. The key, or related key material, is then placed on a central keystore and the file is placed on a data store within the enterprise network. Unauthorized access to the honeypot file can then be detecting by monitoring use of the associated key material, which usefully facilitates detection of file access at any time when, and from any location where, cryptographic access to the file is initiated.
    Type: Application
    Filed: July 8, 2021
    Publication date: November 4, 2021
    Inventors: Harald Schütz, Andreas Berger, Russell Humphries, Mark D. Harris, Kenneth D. Ray
  • Patent number: 11089056
    Abstract: A honeypot file is cryptographically secured with a cryptographic key. The key, or related key material, is then placed on a central keystore and the file is placed on a data store within the enterprise network. Unauthorized access to the honeypot file can then be detecting by monitoring use of the associated key material, which usefully facilitates detection of file access at any time when, and from any location where, cryptographic access to the file is initiated.
    Type: Grant
    Filed: September 28, 2018
    Date of Patent: August 10, 2021
    Assignee: Sophos Limited
    Inventors: Harald Schütz, Andreas Berger, Russell Humphries, Mark D. Harris, Kenneth D. Ray
  • Patent number: 10841339
    Abstract: Threat detection instrumentation is simplified by providing and updating labels for computing objects in a context-sensitive manner. This may include simple labeling schemes to distinguish between objects, e.g., trusted/untrusted processes or corporate/private data. This may also include more granular labeling schemes such as a three-tiered scheme that identifies a category (e.g., financial, e-mail, game), static threat detection attributes (e.g., signatures, hashes, API calls), and explicit identification (e.g., what a file or process calls itself). By tracking such data for various computing objects and correlating these labels to malware occurrences, rules can be written for distribution to endpoints to facilitate threat detection based on, e.g., interactions of labeled objects, changes to object labels, and so forth.
    Type: Grant
    Filed: May 2, 2018
    Date of Patent: November 17, 2020
    Assignee: Sophos Limited
    Inventors: Kenneth D. Ray, Robert W. Cook, Andrew J. Thomas, Dmitri Samosseiko, Mark D. Harris
  • Patent number: 10778725
    Abstract: Threat detection instrumentation is simplified by providing and updating labels for computing objects in a context-sensitive manner. This may include simple labeling schemes to distinguish between objects, e.g., trusted/untrusted processes or corporate/private data. This may also include more granular labeling schemes such as a three-tiered scheme that identifies a category (e.g., financial, e-mail, game), static threat detection attributes (e.g., signatures, hashes, API calls), and explicit identification (e.g., what a file or process calls itself). By tracking such data for various computing objects and correlating these labels to malware occurrences, rules can be written for distribution to endpoints to facilitate threat detection based on, e.g., interactions of labeled objects, changes to object labels, and so forth.
    Type: Grant
    Filed: January 16, 2019
    Date of Patent: September 15, 2020
    Assignee: Sophos Limited
    Inventors: Kenneth D. Ray, Simon Neil Reed, Mark D. Harris, Neil Robert Tyndale Watkiss, Andrew J. Thomas, Robert W. Cook, Dmitri Samosseiko
  • Patent number: 10728269
    Abstract: A security agent conditionally hooks a process for malware monitoring based on a persistent hook state for the process that may be stored, for example, in a process cache. When a process launches in a backoff state indicating that the process previously crashed after hooking, the security agent may further conditionally hook the process based on a reputation of the process or any other relevant contextual information.
    Type: Grant
    Filed: May 3, 2018
    Date of Patent: July 28, 2020
    Assignee: Sophos Limited
    Inventors: Neil Robert Tyndale Watkiss, Mark D. Harris
  • Patent number: 10673902
    Abstract: Threat detection instrumentation is simplified by providing and updating labels for computing objects in a context-sensitive manner. This may include simple labeling schemes to distinguish between objects, e.g., trusted/untrusted processes or corporate/private data. This may also include more granular labeling schemes such as a three-tiered scheme that identifies a category (e.g., financial, e-mail, game), static threat detection attributes (e.g., signatures, hashes, API calls), and explicit identification (e.g., what a file or process calls itself). By tracking such data for various computing objects and correlating these labels to malware occurrences, rules can be written for distribution to endpoints to facilitate threat detection based on, e.g., interactions of labeled objects, changes to object labels, and so forth.
    Type: Grant
    Filed: April 26, 2018
    Date of Patent: June 2, 2020
    Assignee: Sophos Limited
    Inventors: Andrew J. Thomas, Mark D. Harris, Simon Neil Reed, Neil Robert Tyndale Watkiss, Kenneth D. Ray
  • Publication number: 20200106808
    Abstract: A honeypot file is cryptographically secured with a cryptographic key. The key, or related key material, is then placed on a central keystore and the file is placed on a data store within the enterprise network. Unauthorized access to the honeypot file can then be detecting by monitoring use of the associated key material, which usefully facilitates detection of file access at any time when, and from any location where, cryptographic access to the file is initiated.
    Type: Application
    Filed: September 28, 2018
    Publication date: April 2, 2020
    Inventors: Harald Schütz, Andreas Berger, Russell Humphries, Mark D. Harris, Kenneth D. Ray
  • Patent number: 10594717
    Abstract: A threat management facility that remotely stores global reputation information for network content can be used in combination with a recognition engine such as a machine learning classifier that is locally deployed on endpoints within an enterprise network. More specifically, the recognition engine can locally evaluate reputation for a network address being accessed by an endpoint, and this reputation information can be used to dynamically establish a timeout for a request from the endpoint to the threat management facility for corresponding global reputation information.
    Type: Grant
    Filed: May 3, 2018
    Date of Patent: March 17, 2020
    Assignee: Sophos Limited
    Inventors: Neil Robert Tyndale Watkiss, Emile Marcus Kenning, Mark D. Harris
  • Patent number: 10558800
    Abstract: Threat detection instrumentation is simplified by providing and updating labels for computing objects in a context-sensitive manner. This may include simple labeling schemes to distinguish between objects, e.g., trusted/untrusted processes or corporate/private data. This may also include more granular labeling schemes such as a three-tiered scheme that identifies a category (e.g., financial, e-mail, game), static threat detection attributes (e.g., signatures, hashes, API calls), and explicit identification (e.g., what a file or process calls itself). By tracking such data for various computing objects and correlating these labels to malware occurrences, rules can be written for distribution to endpoints to facilitate threat detection based on, e.g., interactions of labeled objects, changes to object labels, and so forth.
    Type: Grant
    Filed: May 3, 2018
    Date of Patent: February 11, 2020
    Assignee: Sophos Limited
    Inventors: Kenneth D. Ray, Daniel Salvatore Schiappa, Simon Neil Reed, Mark D. Harris, Neil Robert Tyndale Watkiss, Andrew J. Thomas, Robert W. Cook, Harald Schütz, John Edward Tyrone Shaw, Anthony John Merry
  • Publication number: 20190342313
    Abstract: A security agent conditionally hooks a process for malware monitoring based on a persistent hook state for the process that may be stored, for example, in a process cache. When a process launches in a backoff state indicating that the process previously crashed after hooking, the security agent may further conditionally hook the process based on a reputation of the process or any other relevant contextual information.
    Type: Application
    Filed: May 3, 2018
    Publication date: November 7, 2019
    Inventors: Neil Robert Tyndale Watkiss, Mark D. Harris
  • Publication number: 20190342312
    Abstract: A threat management facility that remotely stores global reputation information for network content can be used in combination with a recognition engine such as a machine learning classifier that is locally deployed on endpoints within an enterprise network. More specifically, the recognition engine can locally evaluate reputation for a network address being accessed by an endpoint, and this reputation information can be used to dynamically establish a timeout for a request from the endpoint to the threat management facility for corresponding global reputation information.
    Type: Application
    Filed: May 3, 2018
    Publication date: November 7, 2019
    Inventors: Neil Robert Tyndale Watkiss, Emile Marcus Kenning, Mark D. Harris
  • Patent number: 10447708
    Abstract: Threat detection is improved by monitoring variations in observable events and correlating these variations to malicious activity. The disclosed techniques can be usefully employed with any attribute or other metric that can be instrumented on an endpoint and tracked over time including observable events such as changes to files, data, software configurations, operating systems, and so forth. Correlations may be based on historical data for a particular machine, or a group of machines such as similarly configured endpoints. Similar inferences of malicious activity can be based on the nature of a variation, including specific patterns of variation known to be associated with malware and any other unexpected patterns that deviate from normal behavior. Embodiments described herein use variations in, e.g., server software updates or URL cache hits on an endpoint, but the techniques are more generally applicable to any endpoint attribute that varies in a manner correlated with malicious activity.
    Type: Grant
    Filed: June 26, 2018
    Date of Patent: October 15, 2019
    Assignee: Sophos Limited
    Inventors: Andrew J. Thomas, Kenneth D. Ray, Mark D. Harris
  • Patent number: 10382459
    Abstract: Threat detection instrumentation is simplified by providing and updating labels for computing objects in a context-sensitive manner. This may include simple labeling schemes to distinguish between objects, e.g., trusted/untrusted processes or corporate/private data. This may also include more granular labeling schemes such as a three-tiered scheme that identifies a category (e.g., financial, e-mail, game), static threat detection attributes (e.g., signatures, hashes, API calls), and explicit identification (e.g., what a file or process calls itself). By tracking such data for various computing objects and correlating these labels to malware occurrences, rules can be written for distribution to endpoints to facilitate threat detection based on, e.g., interactions of labeled objects, changes to object labels, and so forth.
    Type: Grant
    Filed: May 2, 2018
    Date of Patent: August 13, 2019
    Assignee: Sophos Limited
    Inventors: Mark D. Harris, Simon Neil Reed, Kenneth D. Ray, Neil Robert Tyndale Watkiss, Andrew J. Thomas, Robert W. Cook