Patents by Inventor Nicholas Read

Nicholas Read has filed for patents to protect the following inventions. This listing includes patent applications that are pending as well as patents that have already been granted by the United States Patent and Trademark Office (USPTO).

  • Publication number: 20220178690
    Abstract: A system which includes a mobile device and a server. The mobile device captures images of the survey site. A pose sensor detects the pose of the mobile device. The captured images are transferred to a data processor running a 3D reconstruction algorithm. The 3D reconstruction algorithm generates 3D survey data based on the images which is used to develop a local 3D model. The data processor also uses the images to create processed data. A transceiver transmits the processed data and/or pose data to the server. The server receives the 3D survey data and develops a server site 3D model.
    Type: Application
    Filed: March 10, 2020
    Publication date: June 9, 2022
    Applicant: ROVCO Limited
    Inventors: Iain Wallace, Lyndon Hill, Pep Lluis Negre Carrasco, Nicholas Read
  • Patent number: 9832134
    Abstract: One embodiment includes a firewall, intrusion prevention, or other device that automatically and dynamically adjusts packets subjected to certain rate limiting based on the reputation level associated with these packets (e.g., based on the reputation score of the source of a packet). In response to measured traffic, one embodiment automatically adjusts the range of reputation scores determining which packets are subjected to this rate limiting (e.g., which packets are possibly dropped), such as, but not limited to increase or decrease the measured traffic. For example, packet traffic with a worse reputation can be singled out for this rate limiting during a period of increased traffic, and then when the measured traffic subsides, the range of reputation scores can be correspondingly changed to allow more measured traffic.
    Type: Grant
    Filed: June 30, 2014
    Date of Patent: November 28, 2017
    Assignee: Cisco Technology, Inc
    Inventors: Nicholas Read Leavy, James William Heary
  • Publication number: 20160253378
    Abstract: A system, computer-readable media, and methods are disclosed for searching a data stream for one or more regular expressions. The method can include receiving a data stream and a regular expression and parsing the regular expression to create a prefix portion and a suffix portion. The method can also include executing a first search of at least a portion of the data stream for the prefix portion using a first search algorithm, the first search algorithm being stored in a computer readable medium and executed by a processor. The method also include executing a second search of at least a portion of the data stream for the suffix portion using a second search algorithm, the second search algorithm being stored in a computer readable medium and executed by a processor. Further, the method includes determining whether the data stream contains the regular expression based on the first search and the second search.
    Type: Application
    Filed: February 26, 2015
    Publication date: September 1, 2016
    Inventors: Itay Marom, Hanoch Haim, Nicholas Read Leavy, Kobi Kobi Vaknin
  • Patent number: 9246676
    Abstract: Embodiments generally provide techniques for managing data security. One embodiment includes providing, at a client system, an encrypted private key that can be decrypted using a locker key. Encrypted data is received from a remote system, and embodiment determine that the received encrypted data can be decrypted using a private key recovered by decrypting the encrypted private key. A request is transmitted to the remote system for the locker key corresponding to the encrypted private key, and the requested locker key is received from the remote system. Embodiments decrypt the encrypted private key using the received locker key to recover the private key, and decrypt the encrypted data, using the private key.
    Type: Grant
    Filed: November 22, 2013
    Date of Patent: January 26, 2016
    Assignee: Cisco Technology, Inc.
    Inventors: Nicholas Read Leavy, Venkata Krishna Sashank Dara
  • Publication number: 20150149772
    Abstract: Embodiments generally provide techniques for managing data security. One embodiment includes providing, at a client system, an encrypted private key that can be decrypted using a locker key. Encrypted data is received from a remote system, and embodiment determine that the received encrypted data can be decrypted using a private key recovered by decrypting the encrypted private key. A request is transmitted to the remote system for the locker key corresponding to the encrypted private key, and the requested locker key is received from the remote system. Embodiments decrypt the encrypted private key using the received locker key to recover the private key, and decrypt the encrypted data, using the private key.
    Type: Application
    Filed: November 22, 2013
    Publication date: May 28, 2015
    Applicant: Cisco Technology, Inc.
    Inventors: Nicholas Read Leavy, Venkata Krishna Sashank Dara
  • Publication number: 20140313891
    Abstract: One embodiment includes a firewall, intrusion prevention, or other device that automatically and dynamically adjusts packets subjected to certain rate limiting based on the reputation level associated with these packets (e.g., based on the reputation score of the source of a packet). In response to measured traffic, one embodiment automatically adjusts the range of reputation scores determining which packets are subjected to this rate limiting (e.g., which packets are possibly dropped), such as, but not limited to increase or decrease the measured traffic. For example, packet traffic with a worse reputation can be singled out for this rate limiting during a period of increased traffic, and then when the measured traffic subsides, the range of reputation scores can be correspondingly changed to allow more measured traffic.
    Type: Application
    Filed: June 30, 2014
    Publication date: October 23, 2014
    Applicant: Cisco Technology, Inc., a corporation of California
    Inventors: Nicholas Read Leavy, James William Heary
  • Patent number: 8797866
    Abstract: A firewall, intrusion prevention or other device automatically and dynamically adjusts packets subjected to certain rate limiting based on the reputation level associated with their source. When measured traffic increases beyond a desired amount, the range of reputation scores causing their associated packets to be subjected to this rate limiting is adjusted to throttle the measured traffic to fall within desired limits. In this manner, packet traffic with a worse reputation can be singled out for this rate limiting during a period of increased traffic. When the measured traffic subsides, the range of reputation scores can be correspondingly changed to allow more measured traffic.
    Type: Grant
    Filed: February 12, 2010
    Date of Patent: August 5, 2014
    Assignee: Cisco Technology, Inc.
    Inventors: Nicholas Read Leavy, James William Heary
  • Publication number: 20130209386
    Abstract: An antibacterial or anti-acne formulation containing (a) tropone or a substituted tropone and (b) a metal or metal salt selected from copper, copper salts, bismuth, bismuth salts, silver, silver salts, and mixtures thereof, for use in the treatment of either acne or body odour. The substituted tropone may be for example tropolone or hinokitiol.
    Type: Application
    Filed: July 25, 2011
    Publication date: August 15, 2013
    Applicant: EVOCUTIS PLC
    Inventors: Jonathan Cove, Daniel Fitzgerald, Nicholas Read
  • Publication number: 20110199902
    Abstract: A firewall, intrusion prevention or other device automatically and dynamically adjusts packets subjected to certain rate limiting based on the reputation level associated with their source. When measured traffic increases beyond a desired amount, the range of reputation scores causing their associated packets to be subjected to this rate limiting is adjusted to throttle the measured traffic to fall within desired limits. In this manner, packet traffic with a worse reputation can be singled out for this rate limiting during a period of increased traffic. When the measured traffic subsides, the range of reputation scores can be correspondingly changed to allow more measured traffic.
    Type: Application
    Filed: February 12, 2010
    Publication date: August 18, 2011
    Applicant: Cisco Technology, Inc., a corporation of California
    Inventors: Nicholas Read Leavy, James William Heary