Patents by Inventor Michael Hudson
Michael Hudson has filed for patents to protect the following inventions. This listing includes patent applications that are pending as well as patents that have already been granted by the United States Patent and Trademark Office (USPTO).
-
Patent number: 12277446Abstract: According to certain embodiments, a method comprises monitoring a request for use of memory requested by a container manager application on behalf of a given one of a plurality of containers during runtime of the given container. The method further comprises determining that the request for use of memory has caused an exception. The exception indicates that the request has requested an invalid operation on a memory table or that the request has requested a previously not seen memory table. In response, the method further comprises determining an action to perform. The action depends on both first trustworthiness information associated with the given container and second trustworthiness information associated with the given container. The first trustworthiness information is obtained from a Third Party Reputation Service (TPRS). The second trustworthiness information is obtained based on monitoring the runtime behavior of the given container.Type: GrantFiled: March 16, 2021Date of Patent: April 15, 2025Assignee: CISCO TECHNOLOGY, INC.Inventors: John David White, Steven Joseph Rich, William Michael Hudson, Jr., Chris Allen Shenefiel
-
Patent number: 12217050Abstract: This disclosure relates to method and system for identifying suspicious code contribution of a user to a source code repository. The method includes receiving a plurality of updated code files of a source code repository from a user through an event. The method further includes extracting a plurality of user action parameters from the event corresponding to each of the plurality of updated code files. The method further includes storing the plurality of updated code files and the plurality of user action parameters from the event corresponding to each of the plurality of updated code files in a database. The method further includes identifying at least one of the set of user actions as a suspicious code contribution of the user for at least one of the plurality of updated code files of the source code based on the plurality of user action parameters.Type: GrantFiled: October 18, 2021Date of Patent: February 4, 2025Inventors: Michael Hudson, Michael Florio, Sunil Dandamudi, Samuel Dwumfour
-
Publication number: 20250033869Abstract: Single-serving beverage pods can include a first chamber operable to contain a dry beverage material and a second chamber operable to contain a second beverage material. A seal layer is disposed between the first chamber and the second chamber to prevent fluid communication between the first chamber and the second chamber. The seal layer can be operable to be breached by a brewing pin such that the brewing pin is received in the second chamber. The second beverage material can then be removed from the beverage pod via the brewing pin.Type: ApplicationFiled: August 5, 2024Publication date: January 30, 2025Inventors: Darren Joseph Footz, Seth Melvin Cronin, Zachary Michael Hudson, Kianoush Karimi Pour Kerman
-
Publication number: 20240399750Abstract: A printing unit includes: a unit chassis for mounting over a media feed path; first and second elongate printheads mounted on the unit chassis and positioned in an overlapping arrangement across the media feed path; a first aerosol extractor positioned downstream of the first printhead relative to the media feed direction; and a second aerosol extractor positioned downstream of the second printhead and the first aerosol extractor relative to the media feed direction. The first and second aerosol extractors are positioned at a same distance from their respective first and second printheads.Type: ApplicationFiled: May 9, 2024Publication date: December 5, 2024Inventors: Glenn Horrocks, Samuel Mallinson, Michael Hudson, Joseph Tharion
-
Publication number: 20240399749Abstract: A printing unit includes: a base plate defining an elongate slot extending across a media feed path; an elongate printhead positioned in the slot for printing onto print media fed along the media feed path; an aerosol extractor positioned downstream of the printhead relative to a media feed direction, the aerosol extractor providing an airflow through a print zone associated with the printhead; and air guides projecting from a lower surface of the base plate towards the media feed path. The air guides are positioned at opposite ends of the printhead and include respective guide walls for directing the airflow towards the aerosol extractor.Type: ApplicationFiled: May 9, 2024Publication date: December 5, 2024Inventors: Glenn Horrocks, Samuel Mallinson, Michael Hudson, Joseph Tharion
-
Publication number: 20240333747Abstract: In one aspect, a method includes creating a polymorphic variant of a sample of malware, analyzing the polymorphic variant of the sample of malware by a security management service to determine if the polymorphic variant of the sample of malware evades detection by the security management service, when the security management service fails to detect the polymorphic variant during the analysis of the polymorphic variant, detonating the polymorphic variant in a virtualized environment to identify characterizations of the polymorphic variant, and training the security management service to detect the polymorphic variant based on the characterizations.Type: ApplicationFiled: July 27, 2023Publication date: October 3, 2024Inventors: Vincent Parla, Andrew Zawadowskiy, Blake Anderson, Hugo Mike Latapie, Oleg Bessonov, David Arthur McGrew, Michael Roytman, Tian Bu, William Michael Hudson, JR., Nancy Cam-Winget
-
Publication number: 20240330481Abstract: A system and method are provided for predicting the method of exploitation and impact/scope of software vulnerabilities, thereby enabling improved remediation of the software vulnerabilities. A machine learning (ML) method receives threat-intelligence information of the software vulnerabilities and generates a threat vector based on a security category and a data or schema category of the software vulnerability. The ML method can include a first portion constrained to predict a first intermediary result corresponding to the security category of the software vulnerability. The ML method can include a second portion constrained to predict a second intermediary result corresponding to the data or schema category of the software vulnerability.Type: ApplicationFiled: October 25, 2023Publication date: October 3, 2024Inventors: Michael Roytman, Vincent Parla, Andrew Zawadowskiy, William Michael Hudson, JR.
-
Patent number: 12077370Abstract: Single-serving beverage pods can include a first chamber operable to contain a dry beverage material and a second chamber operable to contain a second beverage material. A seal layer is disposed between the first chamber and the second chamber to prevent fluid communication between the first chamber and the second chamber. The seal layer can be operable to be breached by a brewing pin such that the brewing pin is received in the second chamber. The second beverage material can then be removed from the beverage pod via the brewing pin.Type: GrantFiled: May 10, 2021Date of Patent: September 3, 2024Assignee: Nexe Innovations Inc.Inventors: Darren Joseph Footz, Seth Melvin Cronin, Zachary Michael Hudson, Kianoush Karimi Pour Kerman
-
Publication number: 20240200693Abstract: A reinforced thermoplastic pipe (RTP), RTP body, and a method of providing RTP body are disclosed. The method of providing RTP body for storage and/or transportation of a fluid, comprises providing a first pipe body layer; providing a further pipe body layer coaxial with the first pipe body layer; providing a plurality of helically wound wire elements disposed between the first pipe body layer and the further pipe body layer; heating surrounding precursor thermoplastic material via Joule heating of the wire elements thereby providing viscous state thermoplastic polymer at least one of a first interface location between the first pipe body layer and the further pipe body layer; and subsequently cooling the viscous state thermoplastic polymer for joint consolidation thereby consolidating RTP body over at least a portion of a whole length of the RTP body.Type: ApplicationFiled: December 20, 2022Publication date: June 20, 2024Inventors: Malcolm Rosenow, Canyon Headrick, Dillon Michael Hudson, Chase Jonathan Hogan, Jose Fernando Sanchez, Matthew Leonard Ryan
-
Patent number: 11951736Abstract: An inkjet printing system includes: (a) an inkjet printhead having a rigid elongate manifold with first and second parallel ink supply channels extending along a length of the manifold between respective ink ports positioned at opposite ends thereof; and a plurality of printhead chips mounted to a lower surface of the manifold, the ink supply channels supplying ink to the printhead chips via ink outlets defined in the lower surface. One end of the manifold has a first ink inlet port for the first ink supply channel and an ink outlet port for the second ink supply channel. The other end of the manifold has a first ink outlet port for the first ink supply channel and a second ink inlet port for the second ink supply channel. An ink delivery system is configured to flow ink along the first and second channels in opposite directions.Type: GrantFiled: June 22, 2022Date of Patent: April 9, 2024Assignee: Memjet Technology LimitedInventors: Michael Hudson, David Burke, Qing Chen, Graeme Lowe, Jason Mark Thelander, Ellaine Munton
-
Publication number: 20230124113Abstract: This disclosure relates to method and system for identifying suspicious code contribution of a user to a source code repository. The method includes receiving a plurality of updated code files of a source code repository from a user through an event. The method further includes extracting a plurality of user action parameters from the event corresponding to each of the plurality of updated code files. The method further includes storing the plurality of updated code files and the plurality of user action parameters from the event corresponding to each of the plurality of updated code files in a database. The method further includes identifying at least one of the set of user actions as a suspicious code contribution of the user for at least one of the plurality of updated code files of the source code based on the plurality of user action parameters.Type: ApplicationFiled: October 18, 2021Publication date: April 20, 2023Inventors: Michael Hudson, Michael Florio, Sunil Dandamudi, Samuel Dwumfour
-
Patent number: 11570166Abstract: In one embodiment, a device in a network observes traffic between a client and a server for an encrypted session. The device makes a determination that a server certificate should be obtained from the server. The device, based on the determination, sends a handshake probe to the server. The device extracts server certificate information from a handshake response from the server that the server sent in response to the handshake probe. The device uses the extracted server certificate information to analyze the traffic between the client and the server.Type: GrantFiled: April 17, 2020Date of Patent: January 31, 2023Assignee: Cisco Technology, Inc.Inventors: David McGrew, Blake Harrell Anderson, Subharthi Paul, William Michael Hudson, Jr., Philip Ryan Perricone
-
Publication number: 20220410565Abstract: An inkjet printing system includes: (a) an inkjet printhead having a rigid elongate manifold with first and second parallel ink supply channels extending along a length of the manifold between respective ink ports positioned at opposite ends thereof; and a plurality of printhead chips mounted to a lower surface of the manifold, the ink supply channels supplying ink to the printhead chips via ink outlets defined in the lower surface. One end of the manifold has a first ink inlet port for the first ink supply channel and an ink outlet port for the second ink supply channel. The other end of the manifold has a first ink outlet port for the first ink supply channel and a second ink inlet port for the second ink supply channel. An ink delivery system is configured to flow ink along the first and second channels in opposite directions.Type: ApplicationFiled: June 22, 2022Publication date: December 29, 2022Inventors: Michael HUDSON, David BURKE, Qing CHEN, Graeme LOWE, Jason Mark THELANDER, Ellaine MUNTON
-
Publication number: 20220370599Abstract: In the various aspects and embodiments, this disclosure provides messenger RNA (mRNA) constructs for therapeutic delivery, as well as methods for making such mRNA constructs and pharmaceutical compositions comprising the same (including mRNA vaccine compositions). In still other aspects, the invention provides methods for treating patients by expression of therapeutic proteins, including for preventing or reducing probability of infection by, or illness involving, a virus. Exemplary viruses include coronaviruses (such as SARS-CoV-2 and variants therefore) and influenza viruses, among others.Type: ApplicationFiled: May 2, 2022Publication date: November 24, 2022Inventors: James Robbins ABSHIRE, Christopher J.H. DAVITT, Ian HILL, Lorenzo AULISA, Marcelo SAMSA, Nabanita DE, Michael HUDSON, Rachit JAIN, Himanshu DHAMANKAR, William FARMER, Christopher GREGG
-
Publication number: 20220300330Abstract: According to certain embodiments, a method comprises monitoring a request for use of memory requested by a container manager application on behalf of a given one of a plurality of containers during runtime of the given container. The method further comprises determining that the request for use of memory has caused an exception. The exception indicates that the request has requested an invalid operation on a memory table or that the request has requested a previously not seen memory table. In response, the method further comprises determining an action to perform. The action depends on both first trustworthiness information associated with the given container and second trustworthiness information associated with the given container. The first trustworthiness information is obtained from a Third Party Reputation Service (TPRS). The second trustworthiness information is obtained based on monitoring the runtime behavior of the given container.Type: ApplicationFiled: March 16, 2021Publication date: September 22, 2022Inventors: John David White, Steven Joseph Rich, William Michael Hudson, JR., Chris Allen Shenefiel
-
Publication number: 20220245686Abstract: The disclosed method and system relate to generating recommendations for a user. In some embodiments, the method includes capturing organization data with respect to organizations and user data with respect to the user; determining news feed data and social feed data from online platforms, based on the organization data and the user data; analysing the news feed data and the social feed data to determine stand of the each organization and stand of the user on one or more socio-ethical causes; determining match data associated with the user for a predefined time period, based on the user data, the organization data, and the analysis of the news feed data and the social feed data; and controlling user equipment associated with the user during an online browsing session involving at least one of a product and a service offered by at least one of the organizations.Type: ApplicationFiled: January 29, 2021Publication date: August 4, 2022Inventors: Michael Hudson, John William Barrs II
-
Patent number: 11358395Abstract: An inkjet printhead includes: a fluid manifold having a base defining a plurality of fluid outlets and printhead chips attached to the base. Each printhead chip receives printing fluid from a set of the fluid outlets. All fluid outlets are flared with a respect to a width dimension of the printhead chips for facilitating removal of air bubbles.Type: GrantFiled: November 18, 2020Date of Patent: June 14, 2022Inventors: Garry Jackson, Norman Berry, Michael Hudson, Brian Brown, Samuel Mallinson, Geordie McBain
-
Patent number: 11316780Abstract: A verifier peer system transmits a request to an application of another peer system to obtain integrity data of the application. In response to the request, the verifier peer system obtains a response that includes kernel secure boot metrics of the other peer system and integrity data of the application and of any application dependencies. If the verifier peer system determines that the response is valid, the verifier peer system evaluates the integrity data and the kernel secure boot metrics against a set of Known Good Values to determine whether the integrity data and the kernel secure boot metrics are valid. If the integrity data and the kernel secure boot metrics are valid, the verifier peer system determines that the other peer system is trustworthy.Type: GrantFiled: March 27, 2020Date of Patent: April 26, 2022Assignee: CISCO TECHNOLOGY, INC.Inventors: David Delano Ward, Jakob Heitz, William Michael Hudson, Jr., Eric Voit
-
Patent number: 11314626Abstract: A method and system for coordinating continuous delivery pipeline testing against a singleton instance of an application is disclosed. The method may include identifying a set of unchanged components across a preceding build and a current build of the singleton instance, and identifying a first set of test cases from a plurality of test cases executed on at least one unchanged component. The method may further include performing execution of a second set of test cases on the remaining set of unchanged components in the current build, and performing execution of each of the plurality of test cases on at least one changed component in the current build. The method may further include reporting test results of executing the first set of test cases on the at least one unchanged component, the second set of test cases, and the plurality of test cases.Type: GrantFiled: June 20, 2020Date of Patent: April 26, 2022Assignee: HCL America Inc.Inventors: Michael Hudson, Bahram Sanaei, Asiyah Ahmad
-
Patent number: D1012671Type: GrantFiled: September 12, 2019Date of Patent: January 30, 2024Assignee: XIBIT, LLCInventors: Laurri Hudson, Michael Hudson