Patents by Inventor Raymond Campbell

Raymond Campbell has filed for patents to protect the following inventions. This listing includes patent applications that are pending as well as patents that have already been granted by the United States Patent and Trademark Office (USPTO).

  • Publication number: 20190182381
    Abstract: In the field of government engagement management, an agent guide or script-flow in an employee desktop web client is implemented. In such a system and method, when agents create interactions with clients they can follow a script-flow which will guide the agent through the interaction through a series of menu selections and automated sets of instructions. This feature of the government engagement management system allows existing customer investment from the rich desktop client or non-web client in developing specific scripts, that can also now function in the web client atmosphere. This system and method also enables an agent to handle calls with the web client more efficiently, and allows agents on the web client to automatically classify.
    Type: Application
    Filed: December 6, 2018
    Publication date: June 13, 2019
    Applicant: Verint Systems UK Limited
    Inventors: Conor Adams, Raymond Campbell
  • Publication number: 20190109944
    Abstract: In the field of government engagement management, for users of an employee desktop web client, it is now possible, within the web client application, to search and read articles and/or knowledge content that has been authored to external locations. Due to this integration to external, third-party applications, content and/or articles can be displayed to an agent on the employee desktop web client graphical user interface. Agents can enter free text into a specific search field and review the results in summary form, and then select an article in HTML format to progress the current interaction with the client. An additional feature extending from this capability is to add an amount of coding to external knowledge content websites that are owned and/or operated by the owner of the system such that when the website is viewed through the third-party integration module, a button or icon appears within the website that when selected takes the agent to an appropriate form.
    Type: Application
    Filed: December 6, 2018
    Publication date: April 11, 2019
    Applicant: Verint Systems UK Limited
    Inventors: Conor Adams, Raymond Campbell
  • Publication number: 20190075097
    Abstract: A method includes receiving an electronic identifier. The electronic identifier includes compressed electronic information. The method further includes analyzing, by an electronic device, the electronic identifier. The method further includes verifying, by the electronic device, the identity of an individual associated with the electronic identifier. The method further includes verifying includes electronically analyzing the compressed information with stored electronic information. The method further includes sending one or more communications that include permission to post services associated with the individual.
    Type: Application
    Filed: January 10, 2018
    Publication date: March 7, 2019
    Applicant: KOLUMBO HOLDINGS LIMITED
    Inventor: Aaron Raymond Campbell
  • Publication number: 20190073469
    Abstract: A method includes receiving information about an identity of an individual. The method further includes analyzing, by an electronic device, the information. The method further includes verifying, by the electronic device, the identity of the individual. The verifying includes electronically analyzing one or more electronic communications associated with one or more websites. The method further includes electronically analyzing one or more electronic communications associated with one or more websites. The method further includes sending one or more communications that include permission to post services associated with the individual.
    Type: Application
    Filed: September 5, 2017
    Publication date: March 7, 2019
    Applicant: KOLUMBO HOLDINGS LIMITED
    Inventor: Aaron Raymond Campbell
  • Publication number: 20180004842
    Abstract: In the field of government engagement management, for users of an employee desktop web client, it is now possible, within the web client application, to search and read articles and/or knowledge content that has been authored to external locations. Due to this integration to external, third-party applications, content and/or articles can be displayed to an agent on the employee desktop web client graphical user interface. Agents can enter free text into a specific search field and review the results in summary form, and then select an article in HTML format to progress the current interaction with the client. An additional feature extending from this capability is to add an amount of coding to external knowledge content websites that are owned and/or operated by the owner of the system such that when the website is viewed through the third-party integration module, a button or icon appears within the website that when selected takes the agent to an appropriate form.
    Type: Application
    Filed: July 22, 2016
    Publication date: January 4, 2018
    Applicant: Verint Systems UK Limited
    Inventor: Raymond Campbell
  • Publication number: 20180005158
    Abstract: In the field of government engagement management, an agent guide or script-flow in an employee desktop web client is implemented. In such a system and method, when agents create interactions with clients they can follow a script-flow which will guide the agent through the interaction through a series of menu selections and automated sets of instructions. This feature of the government engagement management system allows existing customer investment from the rich desktop client or non-web client in developing specific scripts, that can also now function in the web client atmosphere. This system and method also enables an agent to handle calls with the web client more efficiently, and allows agents on the web client to automatically classify.
    Type: Application
    Filed: July 22, 2016
    Publication date: January 4, 2018
    Applicant: Verint Systems UK Limited
    Inventor: Raymond Campbell
  • Publication number: 20170360544
    Abstract: A tissue graft comprising two or more layers of material wherein each layer comprises extracellular matrix (ECM) or polymeric material and wherein the layers are laminated together by interlocking portions of one layer with portions of another layer. In one embodiment, a tissue graft comprises a first layer of material having multiple lugs and a second layer of material having multiple holes, each lug of the first layer being located through a hole in the second layer, the holes and the lugs having dimensions so that the lugs engage with a surface of the second layer and interlock the first layer with the second layer. In further embodiments, a method of preparing a tissue graft by laminating and interlocking two or more layers, the use of a tissue graft for replacing or repairing tissue in a human or animal, and an apparatus comprising a mould, a lug cutting means, a piercing means and a means for pushing lugs through piercings in layers of a tissue graft.
    Type: Application
    Filed: December 18, 2015
    Publication date: December 21, 2017
    Inventors: Brian Roderick WARD, Barnaby Charles Hough MAY, Andrew Raymond CAMPBELL
  • Patent number: 9825764
    Abstract: Systems and methods for enhanced security of media are provided. Media security may be enhanced by improving the setup of encryption and/or decryption, by improving the performance of encryption and/or decryption, or by improving both. The calls related to enhanced security of media from an application in an emulated environment to a security module in the operating system hosting the emulated environment may be combined to reduce the overhead of accessing a security module. An application handling secure shell (SSH) communications may execute multiple calls to a cryptographic module in the host operating system. Because many calls to the cryptographic module during SSH communications follow patterns, two or more related calls may be combined into a single combined call to the cryptographic module. For example, a call to generate a server-to-client key and a call to generate a client-to-server key may be combined into a single call.
    Type: Grant
    Filed: February 26, 2014
    Date of Patent: November 21, 2017
    Assignee: Unisys Corporation
    Inventors: Kevin Clayton, Peter Wilkes, Yuko Onishi, Raymond Campbell
  • Patent number: 9819493
    Abstract: Systems and methods for enhanced security of media are provided. Media security may be enhanced by improving the setup of encryption and/or decryption, by improving the performance of encryption and/or decryption, or by improving both. The calls related to enhanced security of media from an application in an emulated environment to a security module in the operating system hosting the emulated environment may be combined to reduce the overhead of accessing a security module. An application handling secure shell (SSH) communications may execute multiple calls to a cryptographic module in the host operating system. Because many calls to the cryptographic module during SSH communications follow patterns, two or more related calls may be combined into a single combined call to the cryptographic module. For example, a call to generate a server-to-client key and a call to generate a client-to-server key may be combined into a single call.
    Type: Grant
    Filed: February 26, 2014
    Date of Patent: November 14, 2017
    Assignee: Unisys Corporation
    Inventors: Kevin Clayton, Peter Wilkes, Yuko Onishi, Raymond Campbell
  • Patent number: 9519757
    Abstract: Systems and methods for enhanced security of media are provided. Media security may be enhanced by improving the setup of encryption and/or decryption, by improving the performance of encryption and/or decryption, or by improving both. The calls related to enhanced security of media from an application in an emulated environment to a security module in the operating system hosting the emulated environment may be combined to reduce the overhead of accessing a security module. An application handling secure shell (SSH) communications may execute multiple calls to a cryptographic module in the host operating system. Because many calls to the cryptographic module during SSH communications follow patterns, two or more related calls may be combined into a single combined call to the cryptographic module. For example, a call to generate a server-to-client key and a call to generate a client-to-server key may be combined into a single call.
    Type: Grant
    Filed: February 26, 2014
    Date of Patent: December 13, 2016
    Assignee: Unisys Corporation
    Inventors: Kevin Clayton, Peter Wilkes, Yuko Onishi, Raymond Campbell
  • Publication number: 20160087791
    Abstract: Hash values for a message may computed by a receiving computer as portions of the message are received. In one embodiment, an intermediate hash value is computed for a portion of the message and a new intermediate hash value computed for each received portion of the message based on a previous intermediate hash value and the contents of the new received portion. When all portions of the message have been received, the final calculated intermediate hash value is the hash value for the entire message. In one embodiment, such a method of calculating a hash value may be based on the SHA-256 hash algorithm or other known or later developed hash algorithms. In one embodiment, the hash calculation for portions of received messages may be applied to keyed-hashing for message authentication (HMAC).
    Type: Application
    Filed: September 24, 2014
    Publication date: March 24, 2016
    Applicant: UNISYS CORPORATION
    Inventor: Raymond Campbell
  • Publication number: 20160087798
    Abstract: Hash values for a message may be computed by a receiving computer as portions of the message are received. In one embodiment, an intermediate hash value is computed for a portion of the message and a new intermediate hash value computed for each received portion of the message based on a previous intermediate hash value and the contents of the new received portion. When all portions of the message have been received, the final calculated intermediate hash value is the hash value for the entire message. In one embodiment, such a method of calculating a hash value may be based on the SHA-256 hash algorithm or other known or later developed hash algorithms. In one embodiment, the hash calculation for portions of received messages may be applied to keyed-hashing for message authentication (HMAC).
    Type: Application
    Filed: September 24, 2014
    Publication date: March 24, 2016
    Applicant: Unisys Corporation
    Inventor: Raymond Campbell
  • Publication number: 20150244528
    Abstract: Systems and methods for enhanced security of media are provided. Media security may be enhanced by improving the setup of encryption and/or decryption, by improving the performance of encryption and/or decryption, or by improving both. The calls related to enhanced security of media from an application in an emulated environment to a security module in the operating system hosting the emulated environment may be combined to reduce the overhead of accessing a security module. An application handling secure shell (SSH) communications may execute multiple calls to a cryptographic module in the host operating system. Because many calls to the cryptographic module during SSH communications follow patterns, two or more related calls may be combined into a single combined call to the cryptographic module. For example, a call to generate a server-to-client key and a call to generate a client-to-server key may be combined into a single call.
    Type: Application
    Filed: February 26, 2014
    Publication date: August 27, 2015
    Applicant: Unisys Corporation
    Inventors: Kevin Clayton, Peter Wilkes, Yuko Onishi, Raymond Campbell
  • Publication number: 20150244530
    Abstract: Systems and methods for enhanced security of media are provided. Media security may be enhanced by improving the setup of encryption and/or decryption, by improving the performance of encryption and/or decryption, or by improving both. The calls related to enhanced security of media from an application in an emulated environment to a security module in the operating system hosting the emulated environment may be combined to reduce the overhead of accessing a security module. An application handling secure shell (SSH) communications may execute multiple calls to a cryptographic module in the host operating system. Because many calls to the cryptographic module during SSH communications follow patterns, two or more related calls may be combined into a single combined call to the cryptographic module. For example, a call to generate a server-to-client key and a call to generate a client-to-server key may be combined into a single call.
    Type: Application
    Filed: February 26, 2014
    Publication date: August 27, 2015
    Applicant: Unisys Corporation
    Inventors: Kevin Clayton, Peter Wilkes, Yuko Onishi, Raymond Campbell
  • Publication number: 20150244529
    Abstract: Systems and methods for enhanced security of media are provided. Media security may be enhanced by improving the setup of encryption and/or decryption, by improving the performance of encryption and/or decryption, or by improving both. The calls related to enhanced security of media from an application in an emulated environment to a security module in the operating system hosting the emulated environment may be combined to reduce the overhead of accessing a security module. An application handling secure shell (SSH) communications may execute multiple calls to a cryptographic module in the host operating system. Because many calls to the cryptographic module during SSH communications follow patterns, two or more related calls may be combined into a single combined call to the cryptographic module. For example, a call to generate a server-to-client key and a call to generate a client-to-server key may be combined into a single call.
    Type: Application
    Filed: February 26, 2014
    Publication date: August 27, 2015
    Applicant: Unisys Corporation
    Inventors: Kevin Clayton, Peter Wilkes, Yuko Onishi, Raymond Campbell
  • Patent number: 8751820
    Abstract: Calls from an application in an emulated environment to a module in the operating system hosting the emulated environment may be combined to reduce the overhead of accessing the module. An application handling secure shell (SSH) communications may execute multiple calls to a cryptographic module in the host operating system. Because many calls to the cryptographic module during SSH communications follow patterns, two or more related calls may be combined into a single combined call to the cryptographic module. For example, a call to generate a server-to-client key and a call to generate a client-to-server key may be combined into a single call.
    Type: Grant
    Filed: December 13, 2011
    Date of Patent: June 10, 2014
    Assignee: Unisys Corporation
    Inventors: Kevin F. Clayton, Yuko Onishi, Raymond Campbell
  • Patent number: 8479019
    Abstract: Calls from an application in an emulated environment to a module in the operating system hosting the emulated environment may be combined to reduce the overhead of accessing the module. An application handling secure shell (SSH) communications may execute multiple calls to a cryptographic module in the host operating system. Because many calls to the cryptographic module during SSH communications follow patterns, two or more related calls may be combined into a single combined call to the cryptographic module. For example, a call to generate a server-to-client key and a call to generate a client-to-server key may be combined into a single call.
    Type: Grant
    Filed: December 13, 2011
    Date of Patent: July 2, 2013
    Assignee: Unisys Corporation
    Inventors: Kevin F. Clayton, Yuko Onishi, Raymond Campbell
  • Publication number: 20130151843
    Abstract: Calls from an application in an emulated environment to a module in the operating system hosting the emulated environment may be combined to reduce the overhead of accessing the module. An application handling secure shell (SSH) communications may execute multiple calls to a cryptographic module in the host operating system. Because many calls to the cryptographic module during SSH communications follow patterns, two or more related calls may be combined into a single combined call to the cryptographic module. For example, a call to generate a server-to-client key and a call to generate a client-to-server key may be combined into a single call.
    Type: Application
    Filed: December 13, 2011
    Publication date: June 13, 2013
    Inventors: Kevin F. Clayton, Yuko Onishi, Raymond Campbell
  • Publication number: 20130151863
    Abstract: Calls from an application in an emulated environment to a module in the operating system hosting the emulated environment may be combined to reduce the overhead of accessing the module. An application handling secure shell (SSH) communications may execute multiple calls to a cryptographic module in the host operating system. Because many calls to the cryptographic module during SSH communications follow patterns, two or more related calls may be combined into a single combined call to the cryptographic module. For example, a call to generate a server-to-client key and a call to generate a client-to-server key may be combined into a single call.
    Type: Application
    Filed: December 13, 2011
    Publication date: June 13, 2013
    Inventors: Kevin F. Clayton, Yuko Onishi, Raymond Campbell
  • Patent number: D336364
    Type: Grant
    Filed: February 25, 1992
    Date of Patent: June 15, 1993
    Inventor: Raymond A. Campbell