Patents by Inventor Michael Price

Michael Price has filed for patents to protect the following inventions. This listing includes patent applications that are pending as well as patents that have already been granted by the United States Patent and Trademark Office (USPTO).

  • Publication number: 20150150137
    Abstract: Quantifying the risks of applications (“apps”) for mobile devices is disclosed. In some embodiments, quantifying the risks of apps for mobile devices includes receiving an application for a mobile device; performing an automated analysis of the application based on a risk profile; and generating a risk score based on the automated analysis of the application based on the risk profile.
    Type: Application
    Filed: November 13, 2014
    Publication date: May 28, 2015
    Inventors: Anthony John Bettini, Kevin Watkins, Domingo J. Guerra, Michael Price
  • Publication number: 20150143455
    Abstract: Techniques for off-device anti-malware protection for mobile devices are disclosed. In some embodiments, off-device anti-malware protection for mobile devices includes receiving a software inventory for a mobile device, in which the software inventory identifies a plurality of applications installed on the mobile device; and determining whether one or more of the plurality of applications identified in the software inventory are associated with malware based on a policy. In some embodiments, the off-device anti-malware protection for mobile devices further includes enforcing the policy on the mobile device. In some embodiments, the off-device anti-malware protection for mobile devices is provided as a cloud service.
    Type: Application
    Filed: November 13, 2014
    Publication date: May 21, 2015
    Inventors: Anthony John Bettini, Kevin Watkins, Domingo J. Guerra, Michael Price
  • Patent number: 9007380
    Abstract: Systems, methods, and computer storage mediums are provided for animating a static structure rendered in a three-dimensional environment. A method includes accessing mesh data associated with the static structure. The mesh data describes primitives used to render the static structure in the three-dimensional environment. Once the mesh data is accessed, the static structure is rendered in the three-dimensional environment such that the mesh data associated with the static structure is used to represent the static structure. Animation data associated with the static structure is also accessed. The animation data includes a transform that includes a motion type and a description of the group of primitives from the mesh data that the motion type is applied to. Once the animation data is accessed, the group of primitives is animated such that the motion type is applied to the group of primitives.
    Type: Grant
    Filed: May 1, 2012
    Date of Patent: April 14, 2015
    Assignee: Google Inc.
    Inventors: Quarup Barreirinhas, Paul Steven Strauss, Michael Price
  • Patent number: 8922375
    Abstract: Methods and apparatuses for configuring antennae of radio frequency identification reader systems. In one aspect of an embodiment, a radio frequency identification (RFID) reader system, includes: a receiver; a radio frequency (RF) source for signal transmission; and a switch matrix coupled with the receiver and the radio frequency sources to selectively couple the receiver and the radio frequency source to a plurality of non-collocated antennae. When in a first mode, the switch matrix connects the radio frequency source to a first one of the antennae for signal transmission and the receiver to a second one of the antennae for signal reception; and when in a second mode, the switch matrix connects the first one of the antennae for signal reception and, in one example, the second one or another one of the antennae to the RF source for signal transmission.
    Type: Grant
    Filed: December 28, 2012
    Date of Patent: December 30, 2014
    Assignee: Alien Technology, LLC
    Inventors: Curtis L. Carrender, John Michael Price
  • Patent number: 8918882
    Abstract: Quantifying the risks of applications (“apps”) for mobile devices is disclosed. In some embodiments, quantifying the risks of apps for mobile devices includes receiving an application for a mobile device; performing an automated analysis of the application based on a risk profile; and generating a risk score based on the automated analysis of the application based on the risk profile.
    Type: Grant
    Filed: March 11, 2014
    Date of Patent: December 23, 2014
    Assignee: Appthority, Inc.
    Inventors: Anthony John Bettini, Kevin Watkins, Domingo J. Guerra, Michael Price
  • Patent number: 8918881
    Abstract: Techniques for off-device anti-malware protection for mobile devices are disclosed. In some embodiments, off-device anti-malware protection for mobile devices includes receiving a software inventory for a mobile device, in which the software inventory identifies a plurality of applications installed on the mobile device; and determining whether one or more of the plurality of applications identified in the software inventory are associated with malware based on a policy. In some embodiments, the off-device anti-malware protection for mobile devices further includes enforcing the policy on the mobile device. In some embodiments, the off-device anti-malware protection for mobile devices is provided as a cloud service.
    Type: Grant
    Filed: January 11, 2013
    Date of Patent: December 23, 2014
    Assignee: Appthority, Inc.
    Inventors: Anthony John Bettini, Kevin Watkins, Domingo J. Guerra, Michael Price
  • Patent number: 8887896
    Abstract: A liquid-tight reciprocating floor construction or system includes a plurality of longitudinal sub-deck sections having at least one longitudinal guide beam and at least one longitudinal valley. A first longitudinal side edge of one longitudinal sub-deck section is preferably in a mating relationship with an adjacent second longitudinal side edge of another longitudinal sub-deck section. An internal sealing structure is preferably positioned between adjacent first and second longitudinal side edges to form a longitudinal liquid-tight sub-deck joint therebetween.
    Type: Grant
    Filed: October 22, 2010
    Date of Patent: November 18, 2014
    Assignee: Hallco Industries Inc.
    Inventors: Timothy M. Berthelsen, Brady L. Byers, Thomas Michael Price Almond
  • Publication number: 20140337241
    Abstract: Any of various comparisons of computer folders from different points in time is performed. Such comparisons provide the ability to discover missing documents or documents with modification dates that have changed when there would otherwise have been no need to change them and thus allows discovery of missing documents to discover fraud or to search for evidence after a fraud is suspected. In another embodiment, deltas in accounting system vendor invoice accounts are compared at different points in time, potentially exposing the practice of moving fraudulent vendor transactions into a large group of legitimate transactions for a legitimate vendor. Per period transaction totals for specific periods for legitimate vendors are compared over historical time for suspicious activity. A comparison of reports from the two different periods, using exact data and software from those separate periods (instead of reporting from “current” data), may raise a red flag otherwise missed.
    Type: Application
    Filed: July 29, 2014
    Publication date: November 13, 2014
    Inventors: Michael PRICE, Scott DeGRAFFENREID, Joseph DITO, Taylor PRICE
  • Publication number: 20140331281
    Abstract: Techniques for in-line filtering of insecure or unwanted mobile components or communications (e.g., insecure or unwanted behaviors associated with applications for mobile devices (“apps”), updates for apps, communications to/from apps, operating system components/updates for mobile devices, etc.) for mobile devices are disclosed. In some embodiments, in-line filtering of apps for mobile devices includes intercepting a request for downloading an application to a mobile device; and modifying a response to the request for downloading the application to the mobile device. In some embodiments, the response includes a notification that the application cannot be downloaded due to an application risk policy violation.
    Type: Application
    Filed: July 14, 2014
    Publication date: November 6, 2014
    Inventors: Anthony John Bettini, Kevin Watkins, Domingo J. Guerra, Michael Price
  • Patent number: 8850512
    Abstract: Each virtual machine in a set of virtual machines managed by the virtual machine manager is identified. For each virtual machine in the set, it is determined whether the respective virtual machine is online. For at least the virtual machines determined to be offline, a machine image is collected for each offline virtual machine. Security of the offline virtual machines is assessed from the collected images. For virtual machines identified as online, an agent is loaded on each online virtual machine in the set via the virtual machine manager. The loaded agents are used to assess security of the online virtual machines in the set.
    Type: Grant
    Filed: October 13, 2011
    Date of Patent: September 30, 2014
    Assignee: McAfee, Inc.
    Inventors: Michael Price, Anthony Bettini
  • Patent number: 8819772
    Abstract: Techniques for in-line filtering of insecure or unwanted mobile components or communications (e.g., insecure or unwanted behaviors associated with applications for mobile devices (“apps”), updates for apps, communications to/from apps, operating system components/updates for mobile devices, etc.) for mobile devices are disclosed. In some embodiments, in-line filtering of apps for mobile devices includes intercepting a request for downloading an application to a mobile device; and modifying a response to the request for downloading the application to the mobile device. In some embodiments, the response includes a notification that the application cannot be downloaded due to an application risk policy violation.
    Type: Grant
    Filed: January 11, 2013
    Date of Patent: August 26, 2014
    Assignee: Appthority, Inc.
    Inventors: Anthony John Bettini, Kevin Watkins, Domingo J. Guerra, Michael Price
  • Patent number: 8805925
    Abstract: Any of various comparisons of computer folders from different points in time is performed. Such comparisons provide the ability to discover missing documents or documents with modification dates that have changed when there would otherwise have been no need to change them and thus allows discovery of missing documents to discover fraud or to search for evidence after a fraud is suspected. In another embodiment, deltas in accounting system vendor invoice accounts are compared at different points in time, potentially exposing the practice of moving fraudulent vendor transactions into a large group of legitimate transactions for a legitimate vendor. Per period transaction totals for specific periods for legitimate vendors are compared over historical time for suspicious activity. A comparison of reports from the two different periods, using exact data and software from those separate periods (instead of reporting from “current’” data), may raise a red flag otherwise missed.
    Type: Grant
    Filed: November 19, 2010
    Date of Patent: August 12, 2014
    Assignee: Nbrella, Inc.
    Inventors: Michael Price, Scott Degraffenreid, Joseph Dito, Taylor Price
  • Patent number: 8779148
    Abstract: The present invention is directed to a new class of hydroxamic acid derivatives, their use as LpxC inhibitors and, more specifically, their use to treat bacterial infections.
    Type: Grant
    Filed: October 31, 2013
    Date of Patent: July 15, 2014
    Assignee: Pfizer Inc.
    Inventors: Usa Reilly, Michael Joseph Melnick, Matthew Frank Brown, Mark Stephen Plummer, Justin Ian Montgomery, Ye Che, Loren Michael Price
  • Publication number: 20140196150
    Abstract: Quantifying the risks of applications (“apps”) for mobile devices is disclosed. In some embodiments, quantifying the risks of apps for mobile devices includes receiving an application for a mobile device; performing an automated analysis of the application based on a risk profile; and generating a risk score based on the automated analysis of the application based on the risk profile.
    Type: Application
    Filed: March 11, 2014
    Publication date: July 10, 2014
    Applicant: Appthority, Inc.
    Inventors: Anthony John Bettini, Kevin Watkins, Domingo J. Guerra, Michael Price
  • Publication number: 20140154357
    Abstract: Emulsifier compositions comprising an emulsifier and lecithin are disclosed. The emulsifier compositions may be in a dry form and may be used to disperse compounds in water.
    Type: Application
    Filed: June 29, 2012
    Publication date: June 5, 2014
    Applicant: ARCHER DANIELS MIDLAND COMPANY
    Inventors: Shireen S. Baseeth, Michael Price, Bruce Sebree
  • Patent number: 8713684
    Abstract: Quantifying the risks of applications (“apps”) for mobile devices is disclosed. In some embodiments, quantifying the risks of apps for mobile devices includes receiving an application for a mobile device; performing an automated analysis of the application based on a risk profile; and generating a risk score based on the automated analysis of the application based on the risk profile.
    Type: Grant
    Filed: January 11, 2013
    Date of Patent: April 29, 2014
    Assignee: Appthority, Inc.
    Inventors: Anthony John Bettini, Kevin Watkins, Domingo J. Guerra, Michael Price
  • Publication number: 20140109526
    Abstract: A carboy has a rigid body forming an interior chamber for receiving a liquid. The chamber has a wall terminating at an opening and maintains a substantially constant shape at room temperature. The carboy also has a closure permanently secured to the opening for forming a sealed connection with the rigid body, and a plurality of tubes extending from the plurality of ports in the closure to fluidly connect with a carboy circuit. The closure has a plurality of ports for selectively providing access to the interior chamber, where at least one of the tubes extends out of the interior chamber. The at least one tube also extends inwardly from the closure and into the interior chamber.
    Type: Application
    Filed: October 23, 2012
    Publication date: April 24, 2014
    Applicant: ROUSH LIFE SCIENCES, LLC
    Inventors: Thomas Taylor, Michael Price, George Jordan
  • Publication number: 20140057919
    Abstract: The present invention is directed to a new class of hydroxamic acid derivatives, their use as LpxC inhibitors and, more specifically, their use to treat bacterial infections.
    Type: Application
    Filed: October 31, 2013
    Publication date: February 27, 2014
    Applicant: Pfizer Inc.
    Inventors: Usa Reilly, Michael Joseph Melnick, Matthew Frank Brown, Mark Stephen Plummer, Justin Ian Montgomery, Ye Che, Loren Michael Price
  • Publication number: 20130347094
    Abstract: Techniques for in-line filtering of insecure or unwanted mobile components or communications (e.g., insecure or unwanted behaviors associated with applications for mobile devices (“apps”), updates for apps, communications to/from apps, operating system components/updates for mobile devices, etc.) for mobile devices are disclosed. In some embodiments, in-line filtering of apps for mobile devices includes intercepting a request for downloading an application to a mobile device; and modifying a response to the request for downloading the application to the mobile device. In some embodiments, the response includes a notification that the application cannot be downloaded due to an application risk policy violation.
    Type: Application
    Filed: January 11, 2013
    Publication date: December 26, 2013
    Applicant: Appthority, Inc.
    Inventors: Anthony John Bettini, Kevin Watkins, Domingo J. Guerra, Michael Price
  • Publication number: 20130247133
    Abstract: Each virtual machine in a set of virtual machines managed by the virtual machine manager is identified. For each virtual machine in the set, it is determined whether the respective virtual machine is online. For at least the virtual machines determined to be offline, a machine image is collected for each offline virtual machine. Security of the offline virtual machines is assessed from the collected images. For virtual machines identified as online, an agent is loaded on each online virtual machine in the set via the virtual machine manager. The loaded agents are used to assess security of the online virtual machines in the set.
    Type: Application
    Filed: October 13, 2011
    Publication date: September 19, 2013
    Inventors: Michael Price, Anthony Bettini