Patents by Inventor Michael Swann

Michael Swann has filed for patents to protect the following inventions. This listing includes patent applications that are pending as well as patents that have already been granted by the United States Patent and Trademark Office (USPTO).

  • Patent number: 11958657
    Abstract: Disclosed is a lidded magazine (100) for holding plural generally flat sample collection cards (10) in spaced parallel relation, the magazine is open at its top and includes upstanding opposed side walls (110,120), each wall (110,120) further including plural opposed pairs of inwardly extending wall ribs (112,122) spaced along each wall (110,120) to provide therebetween card accepting slots, a first slot dimension (W) being defined by the spacing between an interior face (154) of each wall, the magazine being characterised in that the walls (110,120) at the top (152) of each slot (150) are tapered outwardly such that the first dimension (W) is greatest at the top of the slot (150).
    Type: Grant
    Filed: March 28, 2018
    Date of Patent: April 16, 2024
    Assignee: QIAGEN HEALTHCARE BIOTECHNOLOGIES SYSTEMS GmbH
    Inventors: Kathryn Louise Lamerton, Michael John Smith, Phillip Evans, Kristina Swann
  • Patent number: 10671708
    Abstract: The improved detection of malicious processes executing on a networked computing device is provided. An agent running on the networked computing device monitors the communications transmitted to devices outside of the network to determine whether the process is likely using a periodic beacon signal to communicate with an external control center associated with a potentially malicious party. The agent maintains a dictionary data structure of objects, identifiable by the process identifier and the remote device's address, to track a given process/destination group's communication history. The communication history is updated when new messages are identified for periodic patterns to be identified for the messages, which may be used to identify a process as potentially malicious.
    Type: Grant
    Filed: February 11, 2019
    Date of Patent: June 2, 2020
    Assignee: Microsoft Technology Licensing, LLC
    Inventors: Kyle Allan Reed, Matthew Michael Swann, Edward Chris Thayer
  • Publication number: 20190243947
    Abstract: The improved detection of malicious processes executing on a networked computing device is provided. An agent running on the networked computing device monitors the communications transmitted to devices outside of the network to determine whether the process is likely using a periodic beacon signal to communicate with an external control center associated with a potentially malicious party. The agent maintains a dictionary data structure of objects, identifiable by the process identifier and the remote device's address, to track a given process/destination group's communication history. The communication history is updated when new messages are identified for periodic patterns to be identified for the messages, which may be used to identify a process as potentially malicious.
    Type: Application
    Filed: February 11, 2019
    Publication date: August 8, 2019
    Applicant: Microsoft Technology Licensing, LLC
    Inventors: Kyle Allan Reed, Matthew Michael Swann, Edward Chris Thayer
  • Patent number: 10204214
    Abstract: The improved detection of malicious processes executing on a networked computing device is provided. An agent running on the networked computing device monitors the communications transmitted to devices outside of the network to determine whether the process is likely using a periodic beacon signal to communicate with an external control center associated with a potentially malicious party. The agent maintains a dictionary data structure of objects, identifiable by the process identifier and the remote device's address, to track a given process/destination group's communication history. The communication history is updated when new messages are identified for periodic patterns to be identified for the messages, which may be used to identify a process as potentially malicious.
    Type: Grant
    Filed: September 14, 2016
    Date of Patent: February 12, 2019
    Assignee: MICROSOFT TECHNOLOGY LICENSING, LLC
    Inventors: Kyle Allan Reed, Matthew Michael Swann, Edward Chris Thayer
  • Patent number: 10129280
    Abstract: A modular pipeline for event management in a computer environment is provided to enable the high volume of events that may be relevant to the security and stability of that environment to be gathered and analyzed for relevancy in a lower volume format. The modular pipeline enables event collection to meet various use cases so that the data comprising the events may be held and transmitted in a reduced volume format so that the relevancy of the events, rather than the events themselves, may be used by various systems with less transmission overhead and greater responsiveness. Aspects of the modular pipeline streamline and optimize the performance of a computing device within a network environment and provide for additional analytics of that environment.
    Type: Grant
    Filed: September 14, 2016
    Date of Patent: November 13, 2018
    Assignee: MICROSOFT TECHNOLOGY LICENSING, LLC.
    Inventors: Matthew Michael Swann, Henri-Bastien Lamontagne, Zachary Lynn Brown, Kyle Allan Reed
  • Publication number: 20180077183
    Abstract: A modular pipeline for event management in a computer environment is provided to enable the high volume of events that may be relevant to the security and stability of that environment to be gathered and analyzed for relevancy in a lower volume format. The modular pipeline enables event collection to meet various use cases so that the data comprising the events may be held and transmitted in a reduced volume format so that the relevancy of the events, rather than the events themselves, may be used by various systems with less transmission overhead and greater responsiveness. Aspects of the modular pipeline streamline and optimize the performance of a computing device within a network environment and provide for additional analytics of that environment.
    Type: Application
    Filed: September 14, 2016
    Publication date: March 15, 2018
    Applicant: Microsoft Technology Licensing, LLC.
    Inventors: Matthew Michael Swann, Henri-Bastien Lamontagne, Zachary Lynn Brown, Kyle Allan Reed
  • Publication number: 20180077177
    Abstract: The improved detection of malicious processes executing on a networked computing device is provided. An agent running on the networked computing device monitors the communications transmitted to devices outside of the network to determine whether the process is likely using a periodic beacon signal to communicate with an external control center associated with a potentially malicious party. The agent maintains a dictionary data structure of objects, identifiable by the process identifier and the remote device's address, to track a given process/destination group's communication history. The communication history is updated when new messages are identified for periodic patterns to be identified for the messages, which may be used to identify a process as potentially malicious.
    Type: Application
    Filed: September 14, 2016
    Publication date: March 15, 2018
    Applicant: Microsoft Technology Licensing, LLC.
    Inventors: Kyle Allan Reed, Matthew Michael Swann, Edward Chris Thayer
  • Patent number: 9191405
    Abstract: A canary value is used to validate a message from a non-web browser client application to a web server providing web services to mitigate cross-site forgery attacks. The canary value is generated by the server in party by applying a hash function to a user identifier and a time stamp. The server provides the canary value to the client application in response to receiving a message that does not have a canary or has an expired canary. The client application upon receiving an error message with a canary message will resend the prior message with the canary value present. The client application caches the canary value for subsequent messages until a new canary value is received. The canary value allows the server to ignore messages generated by the client application under control of an attacker.
    Type: Grant
    Filed: January 30, 2012
    Date of Patent: November 17, 2015
    Assignee: Microsoft Technology Licensing, LLC
    Inventors: Thomas Patrick Gallagher, Venkataramann Renganathan, Brian Thomas Carver, Muhammed Serdar Soran, Matthew Michael Swann, Trace David Ferrier
  • Patent number: 8892897
    Abstract: A method for creating a password on an electronic computing device is disclosed. On the electronic computing device, a first password is obtained. The first password comprises a string of one or more characters. A first character is appended to the first password to form a second password. A hash function is applied to the second password to generate a first hashed password. The first hashed password comprises a first bit string. A determination is made as to whether the first hashed password includes a predefined sequence of bits. When it is determined that the first hashed password includes the predefined sequence of bits, the second password is designated as an auditable password.
    Type: Grant
    Filed: August 24, 2011
    Date of Patent: November 18, 2014
    Assignee: Microsoft Corporation
    Inventors: Matthew Michael Swann, David Charles LeBlanc
  • Publication number: 20130198294
    Abstract: A canary value is used to validate a message from a non-web browser client application to a web server providing web services to mitigate cross-site forgery attacks. The canary value is generated by the server in party by applying a hash function to a user identifier and a time stamp. The server provides the canary value to the client application in response to receiving a message that does not have a canary or has an expired canary. The client application upon receiving an error message with a canary message will resend the prior message with the canary value present. The client application caches the canary value for subsequent messages until a new canary value is received. The canary value allows the server to ignore messages generated by the client application under control of an attacker.
    Type: Application
    Filed: January 30, 2012
    Publication date: August 1, 2013
    Applicant: Microsoft Corporation
    Inventors: Thomas Patrick Gallagher, Venkataramann Renganathan, Brian Thomas Carver, Muhammed Serdar Soran, Matthew Michael Swann, Trace David Ferrier
  • Publication number: 20130055380
    Abstract: A method for creating a password on an electronic computing device is disclosed. On the electronic computing device, a first password is obtained. The first password comprises a string of one or more characters. A first character is appended to the first password to form a second password. A hash function is applied to the second password to generate a first hashed password. The first hashed password comprises a first bit string. A determination is made as to whether the first hashed password includes a predefined sequence of bits. When it is determined that the first hashed password includes the predefined sequence of bits, the second password is designated as an auditable password.
    Type: Application
    Filed: August 24, 2011
    Publication date: February 28, 2013
    Applicant: MICROSOFT CORPORATION
    Inventors: Matthew Michael Swann, David Charles LeBlanc
  • Publication number: 20080095482
    Abstract: A tilting pad journal bearing, an annular housing for an array of arcuate bearing pads resiliently mounted by spring means which biases the pads against heads of restraining bosses that limit radial displacement and cause the bearing pads to define a shaft space. The pads have associated therewith support pegs secured to housing or pad at one end and movable relative to the pad or housing at the other, and the spring means comprises stacks of individually deflectable elements mounted between relatively moving pad, housing or peg and pre-loaded by adjusting the effective gap with the pads against the bosses. Relative_movement between springs provide friction damping. The_restraining bosses may be displaceable together to eliminate the shaft space clearance if the magnetic suspension fails or shows signs of failing.
    Type: Application
    Filed: December 18, 2007
    Publication date: April 24, 2008
    Inventors: Michael Swann, Nigel New
  • Patent number: D526111
    Type: Grant
    Filed: April 27, 2005
    Date of Patent: August 8, 2006
    Assignee: Frito-Lay North America, Inc.
    Inventors: Carmela Rivero-Jiménez, Michael Swann
  • Patent number: D496142
    Type: Grant
    Filed: September 30, 2003
    Date of Patent: September 21, 2004
    Assignee: Frito-Lay North America, Inc.
    Inventors: Carmela Rivero Jimenez, Michael Swann