Patents by Inventor Ray Brown

Ray Brown has filed for patents to protect the following inventions. This listing includes patent applications that are pending as well as patents that have already been granted by the United States Patent and Trademark Office (USPTO).

  • Patent number: 8468268
    Abstract: Techniques for identity and policy based routing are presented. A resource is initiated on a device with a resource identity and role assignments along with policies are obtained for the resource. A customized network is created for the resource using a device address for the device, the resource identity, the role assignments, and the policies.
    Type: Grant
    Filed: August 26, 2010
    Date of Patent: June 18, 2013
    Assignee: Novell, Inc.
    Inventors: Jeremy Ray Brown, Jason Allen Sabin, Nathaniel Brent Kranendonk, Kal A. Larsen, Lloyd Leon Burch, Stephen R Carter
  • Publication number: 20130111208
    Abstract: Techniques for authentication via a mobile device are provided. A mobile device is pre-registered for website authentication services. A user encounters a website displaying an embedded code as an image alongside a normal login process for that website. The image is identified by the mobile device, encrypted and signed by the mobile device and sent to a proxy. The proxy authenticates the code and associates it with the website. Credentials for the user are provided to the website to automatically authenticate the user for access to the website bypassing the normal login process associated with the website.
    Type: Application
    Filed: October 31, 2011
    Publication date: May 2, 2013
    Inventors: Jason Allen Sabin, Jeremy Ray Brown, Lloyd Leon Burch
  • Publication number: 20130111543
    Abstract: Techniques for controlling authentication are provided. An enterprise injects a control and/or audit manager into the enterprise environment to control and in some instances audit third-party authentication services. A user attempts to access a resource that uses a third-party authentication service. The attempt is intercepted and third-party authentication handled by the manager. After authentication, a session between the user and the resource is established during which auditing services may be enacted. The user authenticates to the enterprise environment and the manager provides authentication for the user to the resource via the third-party authentication service.
    Type: Application
    Filed: October 31, 2011
    Publication date: May 2, 2013
    Inventors: Jeremy Ray Brown, Jason Allen Sabin, Lloyd Leon Burch, Douglas Garry Earl
  • Publication number: 20130055265
    Abstract: Techniques for toxic workload mapping are provided. A state of a target workload is recorded along with a configuration and state of an environment that is processing the workload. Micro valuations are taken, via statistical sampling, for metrics associated with the workload and for different combinations of resources within the environment. The sampling taken at micro second intervals. The valuations are aggregated to form an index representing a toxic mapping for the workload within the environment. The toxic mapping is mined, in view of policy, to provide conditions and scenarios that may be deemed problematic within the workload and/or environment.
    Type: Application
    Filed: August 29, 2011
    Publication date: February 28, 2013
    Inventors: Jeremy Ray Brown, Jason Allen Sabin, Nathaniel Brent Kranendonk, Kal A. Larsen, Lloyd Leon Burch, Matthew Holt, Michael John Jorgensen, Michael Fairbanks, Chad Buttars
  • Publication number: 20130012820
    Abstract: An ultrasound probe acquires a 3D image dataset of a volumetric region of the body. The 3D image data is reformatted into a sequence of successive parallel image planes extending in one of three orthogonal directions through the volume. The sequence of images (74, 84, 94) is preferably formatted in accordance with the DICOM standard so that a clinician can review the 3D image data as a sequence of DICOM images on an image workstation.
    Type: Application
    Filed: March 17, 2011
    Publication date: January 10, 2013
    Applicant: KONINKLIJKE PHILIPS ELECTRONICS N.V.
    Inventors: Jimmy Ray Brown, Kevin Bradley
  • Publication number: 20130007840
    Abstract: Techniques for preventing information disclosure via dynamic secure cloud resources are provided. Data (information) remotely housed on a particular cloud resource of a particular cloud is periodically, randomly, and dynamically changed to a different cloud resource within the same cloud or to a different cloud resource within an entirely different cloud. A requesting principal for the data is dynamically authenticated and a current location for the data is dynamically resolved and the principal is securely and dynamically connected to the current cloud resource and current cloud hosting the data for access.
    Type: Application
    Filed: June 28, 2011
    Publication date: January 3, 2013
    Inventors: Jason Allen Sabin, Jeremy Ray Brown, Lloyd Leon Burch
  • Publication number: 20120318635
    Abstract: The present disclosure describes an ice vending machine with a water vending teller that is mounted on an exterior side of the ice vending machine.
    Type: Application
    Filed: June 19, 2012
    Publication date: December 20, 2012
    Inventor: Donald Ray Brown
  • Publication number: 20120324527
    Abstract: Techniques for spawning workloads are provided. A single repository is read once to obtain an image for a workload or files and resources for the image. The read operation spawns multiple, and in some cases, concurrent write operations, to instantiate the workload over a network as multiple occurrences or instances of the workload in multiple processing environments.
    Type: Application
    Filed: June 17, 2011
    Publication date: December 20, 2012
    Inventors: Jeremy Ray Brown, Jason Allen Sabin, Lloyd Leon Burch, Michael John Jorgensen
  • Publication number: 20120311344
    Abstract: Techniques for security auditing of cloud resources are provided. A virtual machine (VM) is captured and isolated when a session indicates that a session with the VM has terminated. Security checks are executed against the VM in the isolated environment. Results from the security checks are then reported.
    Type: Application
    Filed: May 31, 2011
    Publication date: December 6, 2012
    Inventors: Jason Allen Sabin, Michael John Jorgensen, Lloyd Leon Burch, Jeremy Ray Brown, Nathaniel Brent Kranendonk, Kal A. Larsen, Michael Fairbanks, Matthew Holt
  • Publication number: 20120271936
    Abstract: Techniques for auditing and controlling network services are provided. A proxy is interposed between a principal and a network service. Interactions between the principal and the service pass through the proxy. The proxy selectively raises events and evaluates policy based on the interactions for purposes of auditing and controlling the network service.
    Type: Application
    Filed: April 20, 2011
    Publication date: October 25, 2012
    Inventors: Lloyd Leon Burch, Jeremy Ray Brown, Jason Allen Sabin, Nathaniel Brent Kranendonk, Kal A. Larsen, Michael Fairbanks, Michael John Jorgensen, Thomas Larry Biggs
  • Publication number: 20120233625
    Abstract: Techniques for workload coordination are provided. An automated discovery service identifies resources with hardware and software specific dependencies for a workload. The dependencies are made generic and the workload and its configuration with the generic dependencies are packaged. At a target location, the packaged workload is presented and the generic dependencies automatically resolved with new hardware and software dependencies of the target location. The workload is then automatically populated in the target location.
    Type: Application
    Filed: March 11, 2011
    Publication date: September 13, 2012
    Inventors: Jason Allen Sabin, Jeremy Ray Brown, Lloyd Leon Burch, Michael John Jorgensen, Michael Fairbanks, Nathaniel Brent Kranendonk, Kal A. Larsen, Thomas Larry Biggs
  • Publication number: 20120222041
    Abstract: Techniques for automated and controlled cloud migration or bursting are provided. A schema for a first cloud in a first cloud processing environment is used to evaluate metrics against thresholds defined in the schema. When a threshold is reached other metrics for other clouds in second cloud processing environments are evaluated and a second cloud processing environment is selected. Next, a second cloud is cloned in the selected second cloud processing environment for the first cloud and traffic associated with the first cloud is automatically migrated to the cloned second cloud.
    Type: Application
    Filed: February 28, 2011
    Publication date: August 30, 2012
    Inventors: Jason Allen Sabin, Stephen R. Carter, Michael John Jorgensen, Nathaniel Brent Kranendonk, Kal A. Larsen, Jeremy Ray Brown
  • Publication number: 20120167118
    Abstract: Mobile computing device power consumption can be reduced by using expiration window timers, state-based timers and/or the coordination of keep-alive timers. Upon detecting a trigger event causing a mobile computing device to transition from a low-power state to an active state, the device can determine whether the trigger event occurs within the expiration window of a timer, and execute tasks associated with the trigger event and the timer. Tasks associated with state-based timers can be executed if the mobile computing device or a component thereof is in (or, alternatively, not in) a specified state. A mobile computing device can execute tasks associated with multiple keep-alive timers used for maintaining communication links between the device and cloud-based service providers in a single active state.
    Type: Application
    Filed: December 27, 2010
    Publication date: June 28, 2012
    Applicant: Microsoft Corporation
    Inventors: Sudeesh R. Pingili, Bharath Siravara, Martin Regen, Ray Brown, Justin Mann, Stephane Karoubi, Li Xu
  • Publication number: 20120151066
    Abstract: Techniques for distributed testing are provided. Resources are identified for performing tests over a network. The tests and policies are sent to the resources and a proxy. The proxy delivers data for the tests to the resources and enforces the policies during the tests. The proxy also gathers statistics and results from the resources, which are executing the tests, and the proxy reports the statistics and results to one or more third-party services for subsequent manipulation and analysis.
    Type: Application
    Filed: February 17, 2012
    Publication date: June 14, 2012
    Inventors: Jeremy Ray Brown, Lloyd Leon Burch
  • Publication number: 20120110329
    Abstract: A user authenticates a mobile device (MD) to a network-based service (NBS) for initial authentication. Policy is pushed from the NBS to the MD and the MD automatically obtains details about devices and attributes that are near or accessible to the MD in accordance with the policy. The details are pushed as a packet from the MD to the NBS and multifactor authentication is performed based on the details and the policy. If the multifactor authentication is successful, access privileges are set for the MD for accessing the NBS and perhaps for accessing local resources of the MD.
    Type: Application
    Filed: October 29, 2010
    Publication date: May 3, 2012
    Inventors: Jeremy Ray Brown, Jason Allen Sabin, Nathaniel Brent Kranendonk, Kal A. Larsen, Lloyd Leon Burch
  • Publication number: 20120087787
    Abstract: There is a turbofan jet engine including an engine core. The engine core includes a fan and a compressor. The engine core includes a combustion chamber and a turbine functionally coupled to the compressor. The engine core includes a nozzle in fluid communication with the turbine. The turbofan jet engine includes a nacelle. The nacelle includes a forward extension proximate the fan and extending forward therefrom. The forward extension is funnel shaped to impart radial momentum to intake air during operation. The nacelle includes a vortex device disposed inside the forward extension and shaped to impart angular momentum to intake air. The vortex device includes a fixed blade extending from the interior of the forward extension and set at a rotational angle. The vortex device is shaped and positioned to direct intake air substantially perpendicular to the blades of the fan.
    Type: Application
    Filed: October 6, 2010
    Publication date: April 12, 2012
    Inventor: Dewain Ray Brown
  • Publication number: 20120084844
    Abstract: Techniques for federated credential reset are presented. A principal requests a credential reset with a first service. The first service provides a link to a third party service previously selected by the principal. The principal separately authenticates to the third party service and cause the third party service to send a federated token to the first service. When the federated token is received by the first service, the first service permits the principal to reset an original credential to a new credential for purposes of accessing the first service.
    Type: Application
    Filed: September 30, 2010
    Publication date: April 5, 2012
    Inventors: Jeremy Ray Brown, Jason Allen Sabin, Nathaniel Brent Kranendonk, Kal A. Larsen, Lloyd Leon Burch, Douglas Garry Earl
  • Patent number: 8145450
    Abstract: Techniques for distributed testing are provided. Resources are identified for performing tests over a network. The tests and policies are sent to the resources and a proxy. The proxy delivers data for the tests to the resources and enforces the policies during the tests. The proxy also gathers statistics and results from the resources, which are executing the tests, and the proxy reports the statistics and results to one or more third-party services for subsequent manipulation and analysis.
    Type: Grant
    Filed: December 23, 2008
    Date of Patent: March 27, 2012
    Assignee: Novell, Inc.
    Inventors: Jeremy Ray Brown, Lloyd Leon Burch
  • Publication number: 20120054368
    Abstract: Techniques for identity and policy based routing are presented. A resource is initiated on a device with a resource identity and role assignments along with policies are obtained for the resource. A customized network is created for the resource using a device address for the device, the resource identity, the role assignments, and the policies.
    Type: Application
    Filed: August 26, 2010
    Publication date: March 1, 2012
    Inventors: Jeremy Ray Brown, Jason Allen Sabin, Nathaniel Brent Kranendonk, Kal A. Larsen, Lloyd Leon Burch, Stephen R Carter
  • Patent number: 8107736
    Abstract: System and method for mapping a location of each of a plurality of devices in a data center. In one embodiment, the method comprises receiving image data comprising an image of at least a portion of the data center from a source; processing the image data to locate visual identifiers displayed in the image, wherein each of the visual identifiers is associated with one of the devices or with a spatial reference point; extracting the located visual identifiers and determining spatial coordinates for each of the identified visual identifiers from the image; and determining the spatial reference points from the image.
    Type: Grant
    Filed: July 10, 2008
    Date of Patent: January 31, 2012
    Assignee: Novell, Inc.
    Inventors: Jeremy Ray Brown, Jason Allen Sabin, Daniel Robert Timpson