Patents by Inventor Michael W. Green

Michael W. Green has filed for patents to protect the following inventions. This listing includes patent applications that are pending as well as patents that have already been granted by the United States Patent and Trademark Office (USPTO).

  • Publication number: 20190226781
    Abstract: A firearm magazine loader and method are disclosed herein. The firearm magazine loader, in an embodiment, has a receptacle configured to receive a plurality of ammunition units. The firearm magazine loader also has a body that defines or includes a loading structure. The loading structure is configured to be coupled to a plurality of different types of magazine adapters. Each one of the magazine adapters is configured to be coupled to one of a plurality of different types of firearm magazines.
    Type: Application
    Filed: January 22, 2019
    Publication date: July 25, 2019
    Applicant: MagPump, LLC
    Inventors: Michael W. Derus, Kenneth P. Green
  • Publication number: 20190177933
    Abstract: The present disclosure provides for a directional surface marking that provides directional messaging to users based on their direction of travel on a base surface, such as a roadway, walkway, or interior flooring, as non-limiting examples. In some aspects, the directional messaging may comprise different colors, text, or symbols, wherein a user may view different directional messaging on a directional surface marking dependent on direction of travel. In some embodiments, directional surface markings may comprise a profile layer, wherein the profile layer may comprise a plurality of profiles, which may provide a topography that allows for directional messaging utilizing surface colors on the topography.
    Type: Application
    Filed: January 18, 2019
    Publication date: June 13, 2019
    Inventors: Gregory W. Driskell, Michael D. Green
  • Patent number: 9882876
    Abstract: A method is provided in one example embodiment that includes receiving metadata from a host over a metadata channel. The metadata may be correlated with a network flow and a network policy may be applied to the connection. In other embodiments, a network flow may be received from a host without metadata associated with the flow, and a discovery redirect may be sent to the host. Metadata may then be received and correlated with the flow to identify a network policy action to apply to the flow.
    Type: Grant
    Filed: May 28, 2016
    Date of Patent: January 30, 2018
    Assignee: McAfee, LLC
    Inventors: Geoffrey Cooper, Michael W. Green, John Richard Guzik
  • Publication number: 20170374030
    Abstract: A method is provided in one example embodiment that includes receiving metadata from a host over a metadata channel. The metadata may be correlated with a network flow and a network policy may be applied to the connection. In other embodiments, a network flow may be received from a host without metadata associated with the flow, and a discovery redirect may be sent to the host. Metadata may then be received and correlated with the flow to identify a network policy action to apply to the flow.
    Type: Application
    Filed: August 24, 2017
    Publication date: December 28, 2017
    Applicant: McAfee, Inc.
    Inventors: Geoffrey Cooper, Michael W. Green, John Richard Guzik
  • Patent number: 9516062
    Abstract: A method in an example embodiment includes correlating a first set of event data from a private network and determining a local reputation score of a host in the private network based on correlating the first set of event data. The method further includes providing the local reputation score of the host to a security node, which applies a policy, based on the local reputation score of the host, to a network communication associated with the host. In specific embodiments, the local reputation score of the host is mapped to a network address of the host. In further embodiments, the first set of event data includes one or more event indicators representing one or more events, respectively, in the private network. In more specific embodiments, the method includes determining a local reputation score of a user and providing the local reputation score of the user to the security node.
    Type: Grant
    Filed: December 22, 2014
    Date of Patent: December 6, 2016
    Assignee: McAfee, Inc.
    Inventors: Geoffrey Howard Cooper, David Frederick Diehl, Michael W. Green, Robert Ma
  • Publication number: 20160352683
    Abstract: A method is provided in one example embodiment that includes receiving metadata from a host over a metadata channel. The metadata may be correlated with a network flow and a network policy may be applied to the connection. In other embodiments, a network flow may be received from a host without metadata associated with the flow, and a discovery redirect may be sent to the host. Metadata may then be received and correlated with the flow to identify a network policy action to apply to the flow.
    Type: Application
    Filed: May 28, 2016
    Publication date: December 1, 2016
    Applicant: McAfee, Inc.
    Inventors: Geoffrey Cooper, Michael W. Green, John Richard Guzik
  • Publication number: 20160228590
    Abstract: The present disclosure is directed to a system and method for disinfecting medical waste. The method includes shredding the medical waste via a shredder until the medical waste has a predetermined particle size. Further steps include spreading the medical waste onto a heating conveyor and conveying the shredded medical waste through a heating chamber via a heating conveyor. Thus, within the heating chamber, the shredded medical waste is heated via one or more infrared heating elements and at least one additional heating source, e.g. induction heating, such that the medical waste is heated from a plurality of directions. The resulting treated medical waste is biologically inert and clean and can be disposed of in standard commercial garbage or roll-off bins, which are typically located at medical facilities.
    Type: Application
    Filed: February 9, 2015
    Publication date: August 11, 2016
    Inventors: Eugene W. Waldenmaier, H. Eugene W. Waldenmaier, Michael W. Green
  • Patent number: 9356909
    Abstract: A method is provided in one example embodiment that includes receiving metadata from a host over a metadata channel. The metadata may be correlated with a network flow and a network policy may be applied to the connection. In other embodiments, a network flow may be received from a host without metadata associated with the flow, and a discovery redirect may be sent to the host. Metadata may then be received and correlated with the flow to identify a network policy action to apply to the flow.
    Type: Grant
    Filed: April 28, 2014
    Date of Patent: May 31, 2016
    Assignee: McAfee, Inc.
    Inventors: Geoffrey Cooper, Michael W. Green, John Richard Guzik
  • Publication number: 20150180903
    Abstract: A method in an example embodiment includes correlating a first set of event data from a private network and determining a local reputation score of a host in the private network based on correlating the first set of event data. The method further includes providing the local reputation score of the host to a security node, which applies a policy, based on the local reputation score of the host, to a network communication associated with the host. In specific embodiments, the local reputation score of the host is mapped to a network address of the host. In further embodiments, the first set of event data includes one or more event indicators representing one or more events, respectively, in the private network. In more specific embodiments, the method includes determining a local reputation score of a user and providing the local reputation score of the user to the security node.
    Type: Application
    Filed: December 22, 2014
    Publication date: June 25, 2015
    Inventors: Geoffrey Howard Cooper, David Frederick Diehl, Michael W. Green, Robert Ma
  • Patent number: 8931043
    Abstract: A method in an example embodiment includes correlating a first set of event data from a private network and determining a local reputation score of a host in the private network based on correlating the first set of event data. The method further includes providing the local reputation score of the host to a security node, which applies a policy, based on the local reputation score of the host, to a network communication associated with the host. In specific embodiments, the local reputation score of the host is mapped to a network address of the host. In further embodiments, the first set of event data includes one or more event indicators representing one or more events, respectively, in the private network. In more specific embodiments, the method includes determining a local reputation score of a user and providing the local reputation score of the user to the security node.
    Type: Grant
    Filed: April 10, 2012
    Date of Patent: January 6, 2015
    Assignee: McAfee Inc.
    Inventors: Geoffrey Howard Cooper, David Frederick Diehl, Michael W. Green, Robert Ma
  • Publication number: 20140237584
    Abstract: A method is provided in one example embodiment that includes receiving metadata from a host over a metadata channel. The metadata may be correlated with a network flow and a network policy may be applied to the connection. In other embodiments, a network flow may be received from a host without metadata associated with the flow, and a discovery redirect may be sent to the host. Metadata may then be received and correlated with the flow to identify a network policy action to apply to the flow.
    Type: Application
    Filed: April 28, 2014
    Publication date: August 21, 2014
    Inventors: Geoffrey Cooper, Michael W. Green, John Richard Guzik
  • Patent number: 8800024
    Abstract: A method is provided in one example embodiment that includes intercepting a network flow to a destination node having a network address and sending a discovery query based on a discovery action associated with the network address in a firewall cache. A discovery result may be received and metadata associated with the flow may be sent to a firewall before releasing the network flow. In other embodiments, a discovery query may be received from a source node and a discovery result sent to the source node, wherein the discovery result identifies a firewall for managing a route to a destination node. Metadata may be received from the source node over a metadata channel. A network flow from the source node to the destination node may be intercepted, and the metadata may be correlated with the network flow to apply a network policy to the network flow.
    Type: Grant
    Filed: October 17, 2011
    Date of Patent: August 5, 2014
    Assignee: McAfee, Inc.
    Inventors: Geoffrey Cooper, Michael W. Green, John Richard Guzik
  • Patent number: 8713668
    Abstract: A method is provided in one example embodiment that includes receiving metadata from a host over a metadata channel. The metadata may be correlated with a network flow and a network policy may be applied to the connection. In other embodiments, a network flow may be received from a host without metadata associated with the flow, and a discovery redirect may be sent to the host. Metadata may then be received and correlated with the flow to identify a network policy action to apply to the flow.
    Type: Grant
    Filed: October 17, 2011
    Date of Patent: April 29, 2014
    Assignee: McAfee, Inc.
    Inventors: Geoffrey Cooper, Michael W. Green, John Richard Guzik
  • Patent number: 8561129
    Abstract: A computer network device comprises an intrusion prevention rule set comprising a plurality of rules, each of the plurality of rules associated with two or more rule classification parameters, and an intrusion prevention module that is operable to use two or more of the classification parameters associated with the plurality of intrusion protection rules to selectively apply the rules to provide network intrusion protection of network traffic.
    Type: Grant
    Filed: February 28, 2008
    Date of Patent: October 15, 2013
    Assignee: McAfee, Inc
    Inventors: David Diehl, Ramnath Venugopalan, Stevan Markovic, Michael W. Green
  • Publication number: 20130268994
    Abstract: A method in an example embodiment includes correlating a first set of event data from a private network and determining a local reputation score of a host in the private network based on correlating the first set of event data. The method further includes providing the local reputation score of the host to a security node, which applies a policy, based on the local reputation score of the host, to a network communication associated with the host. In specific embodiments, the local reputation score of the host is mapped to a network address of the host. In further embodiments, the first set of event data includes one or more event indicators representing one or more events, respectively, in the private network. In more specific embodiments, the method includes determining a local reputation score of a user and providing the local reputation score of the user to the security node.
    Type: Application
    Filed: April 10, 2012
    Publication date: October 10, 2013
    Inventors: Geoffrey Howard Cooper, David Frederick Diehl, Michael W. Green, Robert Ma
  • Patent number: 8429736
    Abstract: A proxy device such as a firewall uses an internal socket namespace such as a text string such that connection requests must be explicitly redirected to a listening socket in the alternate namespace in order to connect to a service. Because external connections cannot directly address the listening socket or service, greater security is provided than with traditional firewall or proxy devices. To receive a redirected proxy connection, a service process creates a listening socket and binds a name in an alternate namespace to the socket before listening for connections.
    Type: Grant
    Filed: May 7, 2008
    Date of Patent: April 23, 2013
    Assignee: McAfee, Inc.
    Inventors: Michael W. Green, David Diehl, Michael J. Karels
  • Publication number: 20130097658
    Abstract: A method is provided in one example embodiment that includes receiving metadata from a host over a metadata channel. The metadata may be correlated with a network flow and a network policy may be applied to the connection. In other embodiments, a network flow may be received from a host without metadata associated with the flow, and a discovery redirect may be sent to the host. Metadata may then be received and correlated with the flow to identify a network policy action to apply to the flow.
    Type: Application
    Filed: October 17, 2011
    Publication date: April 18, 2013
    Inventors: Geoffrey Cooper, Michael W. Green, John Richard Guzik
  • Publication number: 20130097692
    Abstract: A method is provided in one example embodiment that includes intercepting a network flow to a destination node having a network address and sending a discovery query based on a discovery action associated with the network address in a firewall cache. A discovery result may be received and metadata associated with the flow may be sent to a firewall before releasing the network flow. In other embodiments, a discovery query may be received from a source node and a discovery result sent to the source node, wherein the discovery result identifies a firewall for managing a route to a destination node. Metadata may be received from the source node over a metadata channel. A network flow from the source node to the destination node may be intercepted, and the metadata may be correlated with the network flow to apply a network policy to the network flow.
    Type: Application
    Filed: October 17, 2011
    Publication date: April 18, 2013
    Inventors: Geoffrey Cooper, Michael W. Green, John Richard Guzik
  • Publication number: 20090282471
    Abstract: A proxy device such as a firewall uses an internal socket namespace such as a text string such that connection requests must be explicitly redirected to a listening socket in the alternate namespace in order to connect to a service. Because external connections cannot directly address the listening socket or service, greater security is provided than with traditional firewall or proxy devices. To receive a redirected proxy connection, a service process creates a listening socket and binds a name in an alternate namespace to the socket before listening for connections.
    Type: Application
    Filed: May 7, 2008
    Publication date: November 12, 2009
    Applicant: Secure Computing Corporation
    Inventors: Michael W. Green, David Diehl, Michael J. Karels
  • Patent number: D691547
    Type: Grant
    Filed: June 12, 2012
    Date of Patent: October 15, 2013
    Assignee: Empirical Systems Aerospace, Inc.
    Inventors: David W. Hall, Darold B. Cummings, Benjamin T. Schiltgen, Andrew R. Gibson, Michael W. Green