Patents by Inventor Raymond Campbell
Raymond Campbell has filed for patents to protect the following inventions. This listing includes patent applications that are pending as well as patents that have already been granted by the United States Patent and Trademark Office (USPTO).
-
Publication number: 20190182381Abstract: In the field of government engagement management, an agent guide or script-flow in an employee desktop web client is implemented. In such a system and method, when agents create interactions with clients they can follow a script-flow which will guide the agent through the interaction through a series of menu selections and automated sets of instructions. This feature of the government engagement management system allows existing customer investment from the rich desktop client or non-web client in developing specific scripts, that can also now function in the web client atmosphere. This system and method also enables an agent to handle calls with the web client more efficiently, and allows agents on the web client to automatically classify.Type: ApplicationFiled: December 6, 2018Publication date: June 13, 2019Applicant: Verint Systems UK LimitedInventors: Conor Adams, Raymond Campbell
-
Publication number: 20190109944Abstract: In the field of government engagement management, for users of an employee desktop web client, it is now possible, within the web client application, to search and read articles and/or knowledge content that has been authored to external locations. Due to this integration to external, third-party applications, content and/or articles can be displayed to an agent on the employee desktop web client graphical user interface. Agents can enter free text into a specific search field and review the results in summary form, and then select an article in HTML format to progress the current interaction with the client. An additional feature extending from this capability is to add an amount of coding to external knowledge content websites that are owned and/or operated by the owner of the system such that when the website is viewed through the third-party integration module, a button or icon appears within the website that when selected takes the agent to an appropriate form.Type: ApplicationFiled: December 6, 2018Publication date: April 11, 2019Applicant: Verint Systems UK LimitedInventors: Conor Adams, Raymond Campbell
-
Publication number: 20190075097Abstract: A method includes receiving an electronic identifier. The electronic identifier includes compressed electronic information. The method further includes analyzing, by an electronic device, the electronic identifier. The method further includes verifying, by the electronic device, the identity of an individual associated with the electronic identifier. The method further includes verifying includes electronically analyzing the compressed information with stored electronic information. The method further includes sending one or more communications that include permission to post services associated with the individual.Type: ApplicationFiled: January 10, 2018Publication date: March 7, 2019Applicant: KOLUMBO HOLDINGS LIMITEDInventor: Aaron Raymond Campbell
-
Publication number: 20190073469Abstract: A method includes receiving information about an identity of an individual. The method further includes analyzing, by an electronic device, the information. The method further includes verifying, by the electronic device, the identity of the individual. The verifying includes electronically analyzing one or more electronic communications associated with one or more websites. The method further includes electronically analyzing one or more electronic communications associated with one or more websites. The method further includes sending one or more communications that include permission to post services associated with the individual.Type: ApplicationFiled: September 5, 2017Publication date: March 7, 2019Applicant: KOLUMBO HOLDINGS LIMITEDInventor: Aaron Raymond Campbell
-
Publication number: 20180004842Abstract: In the field of government engagement management, for users of an employee desktop web client, it is now possible, within the web client application, to search and read articles and/or knowledge content that has been authored to external locations. Due to this integration to external, third-party applications, content and/or articles can be displayed to an agent on the employee desktop web client graphical user interface. Agents can enter free text into a specific search field and review the results in summary form, and then select an article in HTML format to progress the current interaction with the client. An additional feature extending from this capability is to add an amount of coding to external knowledge content websites that are owned and/or operated by the owner of the system such that when the website is viewed through the third-party integration module, a button or icon appears within the website that when selected takes the agent to an appropriate form.Type: ApplicationFiled: July 22, 2016Publication date: January 4, 2018Applicant: Verint Systems UK LimitedInventor: Raymond Campbell
-
Publication number: 20180005158Abstract: In the field of government engagement management, an agent guide or script-flow in an employee desktop web client is implemented. In such a system and method, when agents create interactions with clients they can follow a script-flow which will guide the agent through the interaction through a series of menu selections and automated sets of instructions. This feature of the government engagement management system allows existing customer investment from the rich desktop client or non-web client in developing specific scripts, that can also now function in the web client atmosphere. This system and method also enables an agent to handle calls with the web client more efficiently, and allows agents on the web client to automatically classify.Type: ApplicationFiled: July 22, 2016Publication date: January 4, 2018Applicant: Verint Systems UK LimitedInventor: Raymond Campbell
-
Publication number: 20170360544Abstract: A tissue graft comprising two or more layers of material wherein each layer comprises extracellular matrix (ECM) or polymeric material and wherein the layers are laminated together by interlocking portions of one layer with portions of another layer. In one embodiment, a tissue graft comprises a first layer of material having multiple lugs and a second layer of material having multiple holes, each lug of the first layer being located through a hole in the second layer, the holes and the lugs having dimensions so that the lugs engage with a surface of the second layer and interlock the first layer with the second layer. In further embodiments, a method of preparing a tissue graft by laminating and interlocking two or more layers, the use of a tissue graft for replacing or repairing tissue in a human or animal, and an apparatus comprising a mould, a lug cutting means, a piercing means and a means for pushing lugs through piercings in layers of a tissue graft.Type: ApplicationFiled: December 18, 2015Publication date: December 21, 2017Inventors: Brian Roderick WARD, Barnaby Charles Hough MAY, Andrew Raymond CAMPBELL
-
Patent number: 9825764Abstract: Systems and methods for enhanced security of media are provided. Media security may be enhanced by improving the setup of encryption and/or decryption, by improving the performance of encryption and/or decryption, or by improving both. The calls related to enhanced security of media from an application in an emulated environment to a security module in the operating system hosting the emulated environment may be combined to reduce the overhead of accessing a security module. An application handling secure shell (SSH) communications may execute multiple calls to a cryptographic module in the host operating system. Because many calls to the cryptographic module during SSH communications follow patterns, two or more related calls may be combined into a single combined call to the cryptographic module. For example, a call to generate a server-to-client key and a call to generate a client-to-server key may be combined into a single call.Type: GrantFiled: February 26, 2014Date of Patent: November 21, 2017Assignee: Unisys CorporationInventors: Kevin Clayton, Peter Wilkes, Yuko Onishi, Raymond Campbell
-
Patent number: 9819493Abstract: Systems and methods for enhanced security of media are provided. Media security may be enhanced by improving the setup of encryption and/or decryption, by improving the performance of encryption and/or decryption, or by improving both. The calls related to enhanced security of media from an application in an emulated environment to a security module in the operating system hosting the emulated environment may be combined to reduce the overhead of accessing a security module. An application handling secure shell (SSH) communications may execute multiple calls to a cryptographic module in the host operating system. Because many calls to the cryptographic module during SSH communications follow patterns, two or more related calls may be combined into a single combined call to the cryptographic module. For example, a call to generate a server-to-client key and a call to generate a client-to-server key may be combined into a single call.Type: GrantFiled: February 26, 2014Date of Patent: November 14, 2017Assignee: Unisys CorporationInventors: Kevin Clayton, Peter Wilkes, Yuko Onishi, Raymond Campbell
-
Patent number: 9519757Abstract: Systems and methods for enhanced security of media are provided. Media security may be enhanced by improving the setup of encryption and/or decryption, by improving the performance of encryption and/or decryption, or by improving both. The calls related to enhanced security of media from an application in an emulated environment to a security module in the operating system hosting the emulated environment may be combined to reduce the overhead of accessing a security module. An application handling secure shell (SSH) communications may execute multiple calls to a cryptographic module in the host operating system. Because many calls to the cryptographic module during SSH communications follow patterns, two or more related calls may be combined into a single combined call to the cryptographic module. For example, a call to generate a server-to-client key and a call to generate a client-to-server key may be combined into a single call.Type: GrantFiled: February 26, 2014Date of Patent: December 13, 2016Assignee: Unisys CorporationInventors: Kevin Clayton, Peter Wilkes, Yuko Onishi, Raymond Campbell
-
Publication number: 20160087791Abstract: Hash values for a message may computed by a receiving computer as portions of the message are received. In one embodiment, an intermediate hash value is computed for a portion of the message and a new intermediate hash value computed for each received portion of the message based on a previous intermediate hash value and the contents of the new received portion. When all portions of the message have been received, the final calculated intermediate hash value is the hash value for the entire message. In one embodiment, such a method of calculating a hash value may be based on the SHA-256 hash algorithm or other known or later developed hash algorithms. In one embodiment, the hash calculation for portions of received messages may be applied to keyed-hashing for message authentication (HMAC).Type: ApplicationFiled: September 24, 2014Publication date: March 24, 2016Applicant: UNISYS CORPORATIONInventor: Raymond Campbell
-
Publication number: 20160087798Abstract: Hash values for a message may be computed by a receiving computer as portions of the message are received. In one embodiment, an intermediate hash value is computed for a portion of the message and a new intermediate hash value computed for each received portion of the message based on a previous intermediate hash value and the contents of the new received portion. When all portions of the message have been received, the final calculated intermediate hash value is the hash value for the entire message. In one embodiment, such a method of calculating a hash value may be based on the SHA-256 hash algorithm or other known or later developed hash algorithms. In one embodiment, the hash calculation for portions of received messages may be applied to keyed-hashing for message authentication (HMAC).Type: ApplicationFiled: September 24, 2014Publication date: March 24, 2016Applicant: Unisys CorporationInventor: Raymond Campbell
-
Publication number: 20150244528Abstract: Systems and methods for enhanced security of media are provided. Media security may be enhanced by improving the setup of encryption and/or decryption, by improving the performance of encryption and/or decryption, or by improving both. The calls related to enhanced security of media from an application in an emulated environment to a security module in the operating system hosting the emulated environment may be combined to reduce the overhead of accessing a security module. An application handling secure shell (SSH) communications may execute multiple calls to a cryptographic module in the host operating system. Because many calls to the cryptographic module during SSH communications follow patterns, two or more related calls may be combined into a single combined call to the cryptographic module. For example, a call to generate a server-to-client key and a call to generate a client-to-server key may be combined into a single call.Type: ApplicationFiled: February 26, 2014Publication date: August 27, 2015Applicant: Unisys CorporationInventors: Kevin Clayton, Peter Wilkes, Yuko Onishi, Raymond Campbell
-
Publication number: 20150244530Abstract: Systems and methods for enhanced security of media are provided. Media security may be enhanced by improving the setup of encryption and/or decryption, by improving the performance of encryption and/or decryption, or by improving both. The calls related to enhanced security of media from an application in an emulated environment to a security module in the operating system hosting the emulated environment may be combined to reduce the overhead of accessing a security module. An application handling secure shell (SSH) communications may execute multiple calls to a cryptographic module in the host operating system. Because many calls to the cryptographic module during SSH communications follow patterns, two or more related calls may be combined into a single combined call to the cryptographic module. For example, a call to generate a server-to-client key and a call to generate a client-to-server key may be combined into a single call.Type: ApplicationFiled: February 26, 2014Publication date: August 27, 2015Applicant: Unisys CorporationInventors: Kevin Clayton, Peter Wilkes, Yuko Onishi, Raymond Campbell
-
Publication number: 20150244529Abstract: Systems and methods for enhanced security of media are provided. Media security may be enhanced by improving the setup of encryption and/or decryption, by improving the performance of encryption and/or decryption, or by improving both. The calls related to enhanced security of media from an application in an emulated environment to a security module in the operating system hosting the emulated environment may be combined to reduce the overhead of accessing a security module. An application handling secure shell (SSH) communications may execute multiple calls to a cryptographic module in the host operating system. Because many calls to the cryptographic module during SSH communications follow patterns, two or more related calls may be combined into a single combined call to the cryptographic module. For example, a call to generate a server-to-client key and a call to generate a client-to-server key may be combined into a single call.Type: ApplicationFiled: February 26, 2014Publication date: August 27, 2015Applicant: Unisys CorporationInventors: Kevin Clayton, Peter Wilkes, Yuko Onishi, Raymond Campbell
-
Patent number: 8751820Abstract: Calls from an application in an emulated environment to a module in the operating system hosting the emulated environment may be combined to reduce the overhead of accessing the module. An application handling secure shell (SSH) communications may execute multiple calls to a cryptographic module in the host operating system. Because many calls to the cryptographic module during SSH communications follow patterns, two or more related calls may be combined into a single combined call to the cryptographic module. For example, a call to generate a server-to-client key and a call to generate a client-to-server key may be combined into a single call.Type: GrantFiled: December 13, 2011Date of Patent: June 10, 2014Assignee: Unisys CorporationInventors: Kevin F. Clayton, Yuko Onishi, Raymond Campbell
-
Patent number: 8479019Abstract: Calls from an application in an emulated environment to a module in the operating system hosting the emulated environment may be combined to reduce the overhead of accessing the module. An application handling secure shell (SSH) communications may execute multiple calls to a cryptographic module in the host operating system. Because many calls to the cryptographic module during SSH communications follow patterns, two or more related calls may be combined into a single combined call to the cryptographic module. For example, a call to generate a server-to-client key and a call to generate a client-to-server key may be combined into a single call.Type: GrantFiled: December 13, 2011Date of Patent: July 2, 2013Assignee: Unisys CorporationInventors: Kevin F. Clayton, Yuko Onishi, Raymond Campbell
-
Publication number: 20130151843Abstract: Calls from an application in an emulated environment to a module in the operating system hosting the emulated environment may be combined to reduce the overhead of accessing the module. An application handling secure shell (SSH) communications may execute multiple calls to a cryptographic module in the host operating system. Because many calls to the cryptographic module during SSH communications follow patterns, two or more related calls may be combined into a single combined call to the cryptographic module. For example, a call to generate a server-to-client key and a call to generate a client-to-server key may be combined into a single call.Type: ApplicationFiled: December 13, 2011Publication date: June 13, 2013Inventors: Kevin F. Clayton, Yuko Onishi, Raymond Campbell
-
Publication number: 20130151863Abstract: Calls from an application in an emulated environment to a module in the operating system hosting the emulated environment may be combined to reduce the overhead of accessing the module. An application handling secure shell (SSH) communications may execute multiple calls to a cryptographic module in the host operating system. Because many calls to the cryptographic module during SSH communications follow patterns, two or more related calls may be combined into a single combined call to the cryptographic module. For example, a call to generate a server-to-client key and a call to generate a client-to-server key may be combined into a single call.Type: ApplicationFiled: December 13, 2011Publication date: June 13, 2013Inventors: Kevin F. Clayton, Yuko Onishi, Raymond Campbell
-
Patent number: D336364Type: GrantFiled: February 25, 1992Date of Patent: June 15, 1993Inventor: Raymond A. Campbell