Patents by Inventor Nicholas Graf

Nicholas Graf has filed for patents to protect the following inventions. This listing includes patent applications that are pending as well as patents that have already been granted by the United States Patent and Trademark Office (USPTO).

  • Patent number: 10661935
    Abstract: A labeling device for a syringe that includes a first labeling subsystem adapted to print a first label having machine readable information and a second labeling subsystem adapted to print a second label having human readable information is disclosed. The first labeling subsystem includes a label applicator adapted to automatically apply the first label to a portion of the syringe. The first labeling subsystem includes a syringe clamp assembly that securely holds the syringe while the label applicator automatically applies a first label to the syringe. The second labeling subsystem includes a removal device adapted to automatically remove a backing material from the second label.
    Type: Grant
    Filed: January 15, 2019
    Date of Patent: May 26, 2020
    Assignee: Becton, Dickinson and Company
    Inventors: Austin Jason McKinnon, Scott William Gisler, Philip C. McNeill, Rahul Khurana, Drew Davidock, Robert Nicholas Graf, Kaushal Verma, Gary Stacey, Mark Rogers, Mark Ridley, David Stocks, Alistair Ward, Andrew Scholan, Keith Marshall
  • Publication number: 20190144154
    Abstract: A labeling device for a syringe that includes a first labeling subsystem adapted to print a first label having machine readable information and a second labeling subsystem adapted to print a second label having human readable information is disclosed. The first labeling subsystem includes a label applicator adapted to automatically apply the first label to a portion of the syringe. The first labeling subsystem includes a syringe clamp assembly that securely holds the syringe while the label applicator automatically applies a first label to the syringe. The second labeling subsystem includes a removal device adapted to automatically remove a backing material from the second label.
    Type: Application
    Filed: January 15, 2019
    Publication date: May 16, 2019
    Inventors: Austin Jason McKinnon, Scott William Gisler, Philip C. McNeill, Rahul Khurana, Drew Davidock, Robert Nicholas Graf, Kaushal Verma, Gary Stacey, Mark Rogers, Mark Ridley, David Stocks, Alistair Ward, Andrew Scholan, Keith Marshall
  • Patent number: 10220974
    Abstract: A labeling device for a syringe that includes a first labeling subsystem adapted to print a first label having machine readable information and a second labeling subsystem adapted to print a second label having human readable information is disclosed. The first labeling subsystem includes a label applicator adapted to automatically apply the first label to a portion of the syringe. The first labeling subsystem includes a syringe clamp assembly that securely holds the syringe while the label applicator automatically applies a first label to the syringe. The second labeling subsystem includes a removal device adapted to automatically remove a backing material from the second label.
    Type: Grant
    Filed: August 29, 2017
    Date of Patent: March 5, 2019
    Assignee: Becton, Dickinson and Company
    Inventors: Austin Jason McKinnon, Scott William Gisler, Philip C. McNeill, Rahul Khurana, Drew Davidock, Robert Nicholas Graf, Kaushal Verma, Gary Stacey, Mark Rogers, Mark Ridley, David Stocks, Alistair Ward, Andrew Scholan, Keith Marshall
  • Publication number: 20170361970
    Abstract: A labeling device for a syringe that includes a first labeling subsystem adapted to print a first label having machine readable information and a second labeling subsystem adapted to print a second label having human readable information is disclosed. The first labeling subsystem includes a label applicator adapted to automatically apply the first label to a portion of the syringe. The first labeling subsystem includes a syringe clamp assembly that securely holds the syringe while the label applicator automatically applies a first label to the syringe. The second labeling subsystem includes a removal device adapted to automatically remove a backing material from the second label.
    Type: Application
    Filed: August 29, 2017
    Publication date: December 21, 2017
    Inventors: Austin Jason McKinnon, Scott William Gisler, Philip C. McNeill, Rahul Khurana, Drew Davidock, Robert Nicholas Graf, Kaushal Verma, Gary Stacey, Mark Rogers, Mark Ridley, David Stocks, Alistair Ward, Andrew Scholan, Keith Marshall
  • Patent number: 9776757
    Abstract: A labeling device for a syringe that includes a first labeling subsystem adapted to print a first label having machine readable information and a second labeling subsystem adapted to print a second label having human readable information is disclosed. The first labeling subsystem includes a label applicator adapted to automatically apply the first label to a portion of the syringe. The first labeling subsystem includes a syringe clamp assembly that securely holds the syringe while the label applicator automatically applies a first label to the syringe. The second labeling subsystem includes a removal device adapted to automatically remove a backing material from the second label.
    Type: Grant
    Filed: October 8, 2015
    Date of Patent: October 3, 2017
    Assignee: Becton, Dickinson and Company
    Inventors: Austin Jason McKinnon, Scott William Gisler, Philip C. McNeill, Rahul Khurana, Drew Davidock, Robert Nicholas Graf, Kaushal Verma, Gary Stacey, Mark Rogers, Mark Ridley, David Stocks, Alistair Ward, Andrew Scholan, Keith Marshall
  • Patent number: 9733929
    Abstract: A method for restoring applications may include: 1) identifying an installation file that includes an application; 2) monitoring the installation file to identify a set of application files generated as a result of installing the application from the installation file; 3) assigning, to each application file in the set of application files, an application identifier that associates each application file in the set of application files with the application; 4) backing up the application by copying each application file in the set of application files to a backup storage system; 5) receiving a request to restore each application file in the set of application files; and 6) restoring the application by using the application identifier to locate each application file in the set of application files within the backup storage system. Various other methods, systems, and computer-readable media are also disclosed.
    Type: Grant
    Filed: July 20, 2010
    Date of Patent: August 15, 2017
    Assignee: Symantec Corporation
    Inventors: Nicholas Graf, Adam Glick, Spencer Smith
  • Patent number: 9661004
    Abstract: A computer-implemented method for using reputation information to evaluate the trustworthiness of files obtained via torrent transactions may include (1) identifying a torrent file that includes metadata for facilitating a torrent transaction for obtaining a target file via a peer-to-peer file-sharing protocol, (2) identifying at least one entity involved in the torrent transaction, (3) obtaining reputation information associated with the entity involved in the torrent transaction, wherein the reputation information identifies a community's opinion on the trustworthiness of the entity, (4) determining, based at least in part on the reputation information associated with the entity involved in the torrent transaction, that the target file represents a potential security risk, and then (5) performing a security action on the target file. Various other methods, systems, and computer-readable media are also disclosed.
    Type: Grant
    Filed: October 28, 2013
    Date of Patent: May 23, 2017
    Assignee: Symantec Corporation
    Inventors: Adam Glick, Nicholas Graf, Spencer Smith
  • Publication number: 20160101887
    Abstract: A labeling device for a syringe that includes a first labeling subsystem adapted to print a first label having machine readable information and a second labeling subsystem adapted to print a second label having human readable information is disclosed. The first labeling subsystem includes a label applicator adapted to automatically apply the first label to a portion of the syringe. The first labeling subsystem includes a syringe clamp assembly that securely holds the syringe while the label applicator automatically applies a first label to the syringe. The second labeling subsystem includes a removal device adapted to automatically remove a backing material from the second label.
    Type: Application
    Filed: October 8, 2015
    Publication date: April 14, 2016
    Inventors: Austin Jason McKinnon, Scott William Gisler, Philip C. McNeill, Rahul Khurana, Drew Davidock, Robert Nicholas Graf, Kaushal Verma, Gary Stacey, Mark Rogers, Mark Ridley, David Stocks, Alistair Ward, Andrew Scholan, Keith Marshall
  • Patent number: 9152790
    Abstract: A computer-implemented method for detecting fraudulent software applications that generate misleading notifications is disclosed. In one example, such a method may comprise: 1) detecting a notification generated by an application installed on the computing device, 2) accessing criteria for determining, based at least in part on characteristics of the notification, whether the application is trustworthy, 3) determining, by applying the criteria, that the application is untrustworthy, and then 4) performing a security operation on the application. Corresponding systems and computer-readable media are also disclosed.
    Type: Grant
    Filed: May 21, 2009
    Date of Patent: October 6, 2015
    Assignee: Symantec Corporation
    Inventors: Adam Glick, Nicholas Graf, Spencer Smith
  • Patent number: 8904538
    Abstract: A computer-implemented method for user-directed malware remediation may include 1) identifying a window within a graphical user interface of a computing environment, 2) identifying a user-directed interface event directed at the window, 3) determining, based at least in part on the user-directed interface event, that a process represented by the window poses a security risk, and 4) performing a remediation action on the process based on determining that the process poses the security risk. Various other methods, systems, and computer-readable media are also disclosed.
    Type: Grant
    Filed: March 13, 2012
    Date of Patent: December 2, 2014
    Assignee: Symantec Corporation
    Inventors: Adam Glick, Spencer Smith, Nicholas Graf
  • Patent number: 8844024
    Abstract: Computer-implemented methods and systems for using tiered signing certificates to manage the behavior of executables are disclosed. In one example, a method for performing such a task may include: 1) identifying an executable file, 2) identifying a signing certificate associated with the executable file, 3) identifying, within the signing certificate, a privilege level associated with the executable file, and then 4) managing behavior of the executable file in accordance with the privilege level associated with the executable file. Corresponding methods and systems for generating tiered signing certificates for executable files are also disclosed.
    Type: Grant
    Filed: March 23, 2009
    Date of Patent: September 23, 2014
    Assignee: Symantec Corporation
    Inventors: Nicholas Graf, Spencer Smith, Adam Glick
  • Patent number: 8782790
    Abstract: An endpoint on a network uses detection data to detect a malicious software attack. The endpoint identifies content associated with the attack, such as a component of a web page, and generates a description of the content. The endpoint sends the description to a security server. The security server analyzes the content and identifies characteristics of the content that are present when the content is carried by network traffic. The security server generates a traffic signature that specifies the identified characteristics and provides the traffic signature to inspection points. The inspection points, in turn, use the traffic signature to examine network traffic passing through the inspection points to detect network traffic carrying the content. The attack detection at the endpoint thus informs the traffic signature-based detection at the inspection points and reduces the spread of malicious software.
    Type: Grant
    Filed: February 19, 2010
    Date of Patent: July 15, 2014
    Assignee: Symantec Corporation
    Inventors: Spencer Smith, Adam Glick, Nicholas Graf, Uriel Mann
  • Patent number: 8776196
    Abstract: A computer-implemented method for automatically detecting and preventing phishing attacks may include (1) maintaining a credentials store for a user of the computing device that identifies both at least one known-legitimate website and credentials associated with the known-legitimate website, (2) detecting an attempt by the user to enter the same credentials that are associated with the known-legitimate website into a new website that is not associated with the credentials in the credentials store, and then, prior to allowing the credentials to pass to the new website, (3) automatically warning the user that the new website potentially represents an attempt to phish the credentials associated with the known-legitimate website from the user. Various other methods, systems, and computer-readable media are also disclosed.
    Type: Grant
    Filed: July 24, 2012
    Date of Patent: July 8, 2014
    Assignee: Symantec Corporation
    Inventors: Ian Oliver, Adam Glick, Nicholas Graf, Spencer Smith
  • Patent number: 8627463
    Abstract: A computer-implemented method for using reputation information to evaluate the trustworthiness of files obtained via torrent transactions may include (1) identifying a torrent file that includes metadata for facilitating a torrent transaction for obtaining a target file via a peer-to-peer file-sharing protocol, (2) identifying at least one entity involved in the torrent transaction, (3) obtaining reputation information associated with the entity involved in the torrent transaction, wherein the reputation information identifies a community's opinion on the trustworthiness of the entity, (4) determining, based at least in part on the reputation information associated with the entity involved in the torrent transaction, that the target file represents a potential security risk, and then (5) performing a security action on the target file. Various other methods, systems, and computer-readable media are also disclosed.
    Type: Grant
    Filed: September 13, 2010
    Date of Patent: January 7, 2014
    Assignee: Symantec Corporation
    Inventors: Adam Glick, Nicholas Graf, Spencer Smith
  • Patent number: 8621632
    Abstract: A computer-implemented method for locating malware may include identifying a malicious behavior in a computing system. The computer-implemented method may also include determining that the malicious behavior arises from a set of interrelated executable objects. The computer-implemented method may further include identifying an executable object recently added to the set of interrelated executable objects. The computer-implemented method may additionally include attributing the malicious behavior to the recently added executable object based on when the recently added executable object was added to the set of interrelated executable objects. The computer-implemented method may also include performing a security action on the recently added executable object. Various other methods, systems, and computer-readable media are also disclosed.
    Type: Grant
    Filed: May 21, 2009
    Date of Patent: December 31, 2013
    Assignee: Symantec Corporation
    Inventors: Spencer Smith, Adam Glick, Nicholas Graf
  • Patent number: 8418223
    Abstract: A computer-implemented method may include establishing, within a parental-control software system, an academic-performance policy that defines how academic performance of a student affects at least one parental-control setting enforced on a computing system accessible to the student. The computer-implemented method may also include receiving, via an electronic communication from a school of the student, grade information that indicates the student's academic performance. The computer-implemented method may further include applying the academic-performance policy by updating the parental-control setting commensurate with the student's academic performance. In addition, the computer-implemented method may include detecting an attempt by the student to access a resource of the computing system and applying the updated parental-control setting to control the student's access to the resource of the computing system.
    Type: Grant
    Filed: July 19, 2010
    Date of Patent: April 9, 2013
    Assignee: Symantec Corporation
    Inventors: Spencer Smith, Adam Glick, Nicholas Graf
  • Patent number: 8352409
    Abstract: Systems and methods for improving the effectiveness of decision trees are disclosed. In one example, an exemplary method for performing such a task may include: 1) receiving, from at least one computing device, a) a sample, b) a classification assigned to the sample by a decision tree employed by the computing device, and c) identification information for a branch configuration that resulted in the classification, 2) determining that the decision tree incorrectly classified the sample, and then 3) excluding the offending branch configuration from future decision trees. An exemplary method for dynamically adjusting the confidence of decision-tree classifications based on community-supplied data, along with corresponding systems and computer-readable media, are also described.
    Type: Grant
    Filed: June 30, 2009
    Date of Patent: January 8, 2013
    Assignee: Symantec Corporation
    Inventors: Sourabh Satish, Nicholas Graf, Lachlan Orr, Shane Pereira, Scott Sullivan
  • Patent number: 8336100
    Abstract: A computer-implemented method for using reputation data to detect packed malware may include: 1) identifying a file downloaded from a portal, 2) determining that the file has been packed, 3) obtaining community-based reputation data for the file, 4) determining, by analyzing the reputation data, that instances of the file have been encountered infrequently (or have never been encountered) within the community, and then 5) performing a security operation on the file (by, for example, quarantining or deleting the file).
    Type: Grant
    Filed: August 21, 2009
    Date of Patent: December 18, 2012
    Assignee: Symantec Corporation
    Inventors: Adam Glick, Nicholas Graf, Spencer Smith
  • Patent number: 7680957
    Abstract: System and method for generating modifiable representations of system hardware and software configurations and for transferring a system to another system using the configuration representations. A configuration representation may include a backup of a system's files. A configuration representation may be modified, and may be used to restore the system to hardware that may be different than the original system's hardware. In one embodiment, a configuration transfer mechanism is provided to perform the transfer of a configuration representation from a source system to a target system. One embodiment of a configuration transfer mechanism may use one or more servers coupled to the source and target systems via a network. Another embodiment of a configuration transfer mechanism may be used to restore a source system's configuration and files from a source system directly to a target system coupled to the source system without using servers.
    Type: Grant
    Filed: May 9, 2003
    Date of Patent: March 16, 2010
    Assignee: Symantec Operating Corporation
    Inventors: Thomas Ketterhagen, Bruce Bramhall, Nicholas Graf, Okan Okcu