Patents by Inventor Simon Tyler

Simon Tyler has filed for patents to protect the following inventions. This listing includes patent applications that are pending as well as patents that have already been granted by the United States Patent and Trademark Office (USPTO).

  • Patent number: 11893265
    Abstract: Methods, systems, apparatus, including computer programs encoded on computer storage media, for reclaiming storage space in a storage environment. In one aspect, the method includes actions of aggregating data that is indicative of access to one or more data objects, determining a future storage cost associated with each of a plurality of data objects, determining an access window for each of the plurality of data objects, identifying a data object based on (i) the future storage cost that satisfies a predetermined threshold and (ii) a data object access window, providing a notification to a user device that requests feedback from a user indicating whether the data object can be deleted, and in response to receiving data that indicates that the data object can be deleted, generating an instruction to cause deletion of the data object upon the expiration of the access window.
    Type: Grant
    Filed: March 26, 2022
    Date of Patent: February 6, 2024
    Assignee: Google LLC
    Inventors: Konstantinos Nikoloudakis, Sven Koehler, Danyao Wang, Sahand Saba, Long Fei, Simon Tyler Wise, David Halladay Schneider
  • Publication number: 20230305733
    Abstract: Methods, systems, apparatus, including computer programs encoded on computer storage media, for reclaiming storage space in a storage environment. In one aspect, the method includes actions of aggregating data that is indicative of access to one or more data objects, determining a future storage cost associated with each of a plurality of data objects, determining an access window for each of the plurality of data objects, identifying a data object based on (i) the future storage cost that satisfies a predetermined threshold and (ii) a data object access window, providing a notification to a user device that requests feedback from a user indicating whether the data object can be deleted, and in response to receiving data that indicates that the data object can be deleted, generating an instruction to cause deletion of the data object upon the expiration of the access window.
    Type: Application
    Filed: March 26, 2022
    Publication date: September 28, 2023
    Applicant: Google LLC
    Inventors: Konstantinos Nikoloudakis, Sven Koehler, Danyao Wang, Sahand Saba, Long Fei, Simon Tyler Wise, David Halladay Schneider
  • Patent number: 11307978
    Abstract: Methods, systems, apparatus, including computer programs encoded on computer storage media, for reclaiming storage space in a storage environment. In one aspect, the method includes actions of aggregating data that is indicative of access to one or more data objects, determining a future storage cost associated with each of a plurality of data objects, determining an access window for each of the plurality of data objects, identifying a data object based on (i) the future storage cost that satisfies a predetermined threshold and (ii) a data object access window, providing a notification to a user device that requests feedback from a user indicating whether the data object can be deleted, and in response to receiving data that indicates that the data object can be deleted, generating an instruction to cause deletion of the data object upon the expiration of the access window.
    Type: Grant
    Filed: April 2, 2020
    Date of Patent: April 19, 2022
    Assignee: Google LLC
    Inventors: Konstantinos Nikoloudakis, Sven Koehler, Danyao Wang, Sahand Saba, Long Fei, Simon Tyler Wise, David Halladay Schneider
  • Publication number: 20200371907
    Abstract: Methods, systems, apparatus, including computer programs encoded on computer storage media, for reclaiming storage space in a storage environment. In one aspect, the method includes actions of aggregating data that is indicative of access to one or more data objects, determining a future storage cost associated with each of a plurality of data objects, determining an access window for each of the plurality of data objects, identifying a data object based on (i) the future storage cost that satisfies a predetermined threshold and (ii) a data object access window, providing a notification to a user device that requests feedback from a user indicating whether the data object can be deleted, and in response to receiving data that indicates that the data object can be deleted, generating an instruction to cause deletion of the data object upon the expiration of the access window.
    Type: Application
    Filed: April 2, 2020
    Publication date: November 26, 2020
    Inventors: Konstantinos Nikoloudakis, Sven Koehler, Danyao Wang, Sahand Saba, Long Fei, Simon Tyler Wise, David Halladay Schneider
  • Patent number: 10764316
    Abstract: A malware detection system based on stored data that analyzes an electronic message for threats by comparing it to previously received messages in a message archive or to a contacts list. Threat protection rules may be generated dynamically based on the message and contacts history. A message that appears suspicious may be blocked, or the system may insert warnings to the receiver not to provide personal information without verifying the message. Threat checks may look for unknown senders, senders with identities that are similar to but not identical to previous senders or to known contacts, or senders that were added only recently as contacts. Links embedded in messages may be checked by comparing them to links previously received or to domain names of known contacts. The system may flag messages as potential threats if they contradict previous messages, or if they appear unusual compared to the patterns of previous messages.
    Type: Grant
    Filed: May 11, 2017
    Date of Patent: September 1, 2020
    Assignee: Mimecast North America, Inc.
    Inventors: Jackie Maylor, Simon Tyler, Peter Bauer, Gilly Benamram, Paul Sowden, Steven Malone, Wayne Van Ry, Francisco Ribeiro
  • Patent number: 10621079
    Abstract: Methods, systems, apparatus, including computer programs encoded on computer storage media, for reclaiming storage space in a storage environment. In one aspect, the method includes actions of aggregating data that is indicative of access to one or more data objects, determining a future storage cost associated with each of a plurality of data objects, determining an access window for each of the plurality of data objects, identifying a data object based on (i) the future storage cost that satisfies a predetermined threshold and (ii) a data object access window, providing a notification to a user device that requests feedback from a user indicating whether the data object can be deleted, and in response to receiving data that indicates that the data object can be deleted, generating an instruction to cause deletion of the data object upon the expiration of the access window.
    Type: Grant
    Filed: November 16, 2018
    Date of Patent: April 14, 2020
    Assignee: Google LLC
    Inventors: Konstantinos Nikoloudakis, Sven Koehler, Danyao Wang, Sahand Saba, Long Fei, Simon Tyler Wise, David Halladay Schneider
  • Publication number: 20190087320
    Abstract: Methods, systems, apparatus, including computer programs encoded on computer storage media, for reclaiming storage space in a storage environment. In one aspect, the method includes actions of aggregating data that is indicative of access to one or more data objects, determining a future storage cost associated with each of a plurality of data objects, determining an access window for each of the plurality of data objects, identifying a data object based on (i) the future storage cost that satisfies a predetermined threshold and (ii) a data object access window, providing a notification to a user device that requests feedback from a user indicating whether the data object can be deleted, and in response to receiving data that indicates that the data object can be deleted, generating an instruction to cause deletion of the data object upon the expiration of the access window.
    Type: Application
    Filed: November 16, 2018
    Publication date: March 21, 2019
    Inventors: Konstantinos Nikoloudakis, Sven Koehler, Danyao Wang, Sahand Saba, Long Fei, Simon Tyler Wise, David Halladay Schneider
  • Patent number: 10133658
    Abstract: Methods, systems, apparatus, including computer programs encoded on computer storage media, for reclaiming storage space in a storage environment. In one aspect, the method includes actions of aggregating data that is indicative of access to one or more data objects, determining a future storage cost associated with each of a plurality of data objects, determining an access window for each of the plurality of data objects, identifying a data object based on (i) the future storage cost that satisfies a predetermined threshold and (ii) a data object access window, providing a notification to a user device that requests feedback from a user indicating whether the data object can be deleted, and in response to receiving data that indicates that the data object can be deleted, generating an instruction to cause deletion of the data object upon the expiration of the access window.
    Type: Grant
    Filed: June 6, 2017
    Date of Patent: November 20, 2018
    Assignee: Google LLC
    Inventors: Konstantinos Nikoloudakis, Sven Koehler, Danyao Wang, Sahand Saba, Long Fei, Simon Tyler Wise, David Halladay Schneider
  • Publication number: 20180322040
    Abstract: Methods, systems, apparatus, including computer programs encoded on computer storage media, for reclaiming storage space in a storage environment. In one aspect, the method includes actions of aggregating data that is indicative of access to one or more data objects, determining a future storage cost associated with each of a plurality of data objects, determining an access window for each of the plurality of data objects, identifying a data object based on (i) the future storage cost that satisfies a predetermined threshold and (ii) a data object access window, providing a notification to a user device that requests feedback from a user indicating whether the data object can be deleted, and in response to receiving data that indicates that the data object can be deleted, generating an instruction to cause deletion of the data object upon the expiration of the access window.
    Type: Application
    Filed: June 6, 2017
    Publication date: November 8, 2018
    Inventors: Konstantinos Nikoloudakis, Sven Koehler, Danyao Wang, Sahand Saba, Long Fei, Simon Tyler Wise, David Halladay Schneider
  • Publication number: 20170318049
    Abstract: A malware detection system based on stored data that analyzes an electronic message for threats by comparing it to previously received messages in a message archive or to a contacts list. Threat protection rules may be generated dynamically based on the message and contacts history. A message that appears suspicious may be blocked, or the system may insert warnings to the receiver not to provide personal information without verifying the message. Threat checks may look for unknown senders, senders with identities that are similar to but not identical to previous senders or to known contacts, or senders that were added only recently as contacts. Links embedded in messages may be checked by comparing them to links previously received or to domain names of known contacts. The system may flag messages as potential threats if they contradict previous messages, or if they appear unusual compared to the patterns of previous messages.
    Type: Application
    Filed: May 11, 2017
    Publication date: November 2, 2017
    Inventors: Jackie Maylor, Simon Tyler, Peter Bauer, Gilly Benamram, Paul Sowden, Steven Malone, Wayne Van Ry, Francisco Ribeiro
  • Patent number: 9654492
    Abstract: A malware detection system based on stored data that analyzes an electronic message for threats by comparing it to previously received messages in a message archive or to a contacts list. Threat protection rules may be generated dynamically based on the message and contacts history. A message that appears suspicious may be blocked, or the system may insert warnings to the receiver not to provide personal information without verifying the message. Threat checks may look for unknown senders, senders with identities that are similar to but not identical to previous senders or to known contacts, or senders that were added only recently as contacts. Links embedded in messages may be checked by comparing them to links previously received or to domain names of known contacts. The system may flag messages as potential threats if they contradict previous messages, or if they appear unusual compared to the patterns of previous messages.
    Type: Grant
    Filed: January 29, 2016
    Date of Patent: May 16, 2017
    Assignee: MIMECAST NORTH AMERICA, INC.
    Inventors: Jackie Maylor, Simon Tyler, Peter Bauer, Gilly Benamram, Paul Sowden, Steven Malone, Wayne Van Ry, Francisco Ribeiro
  • Publication number: 20170078321
    Abstract: A malware detection system based on stored data that analyzes an electronic message for threats by comparing it to previously received messages in a message archive or to a contacts list. Threat protection rules may be generated dynamically based on the message and contacts history. A message that appears suspicious may be blocked, or the system may insert warnings to the receiver not to provide personal information without verifying the message. Threat checks may look for unknown senders, senders with identities that are similar to but not identical to previous senders or to known contacts, or senders that were added only recently as contacts. Links embedded in messages may be checked by comparing them to links previously received or to domain names of known contacts. The system may flag messages as potential threats if they contradict previous messages, or if they appear unusual compared to the patterns of previous messages.
    Type: Application
    Filed: January 29, 2016
    Publication date: March 16, 2017
    Applicant: MIMECAST NORTH AMERICA, INC.
    Inventors: Jackie MAYLOR, Simon TYLER, Peter BAUER, Gilly BENAMRAM, Paul SOWDEN, Steven MALONE, Wayne VAN RY, Francisco RIBEIRO
  • Patent number: 9467435
    Abstract: An electronic message threat protection system that incorporates user authorization to ensure that only authorized users receive the benefits of the system's protection. The system protects against threats such as phishing attacks or malware embedded in attached files. References to resources in messages, such as links or attachments, are transformed into protected references that may for example insert a level of indirection between the user and the resource. Use of a protected reference triggers a user authorization check; if the user is an authorized user, the system provides access via a security mechanism that mitigates potential threats. Unauthorized users are denied access. A message recipient may deliberately or inadvertently distribute copies of the message or of the protected references; however, the authorization check ensures that recipients of the copies can only access resources via these copies if they are authorized users.
    Type: Grant
    Filed: September 15, 2015
    Date of Patent: October 11, 2016
    Assignee: MIMECAST NORTH AMERICA, INC.
    Inventors: Simon Tyler, Steven Malone, Jackie Maylor, Wayne Van Ry, Francisco Ribeiro
  • Patent number: 9049681
    Abstract: A router receives from a host service a message which is intended for delivery to a mobile device via a wireless network. The message includes an indication field which includes a return packet indication on whether to send a return packet to the host, an identifier field which includes an identifier which identifies the device, and a payload field which includes a payload of the message. When the indication is set to a first, setting and the message is not being delivered to the device, the router sends to the host a return packet which indicates that the message is not being delivered to the device. When the indication is set to a second setting and the message is not being delivered to the device, the router does not send to the host the return packet which indicates that the message is not being delivered to the device.
    Type: Grant
    Filed: January 18, 2013
    Date of Patent: June 2, 2015
    Assignee: Blackberry Limited
    Inventors: Ian Michael Patterson, Allan David Lewis, Alina Kushnir, Simon Tyler Wise
  • Patent number: 8457053
    Abstract: A router is operative to perform the following actions for each one of a plurality of wireless mobile devices operating in a wireless network. The router transmits to the wireless mobile device a number of data packets matched for a window size. The router changes the window size for the wireless mobile device based on whether a round trip time for communicating the data packets is within a threshold value. The router will update the threshold value based on the round trip times associated with traffic communicated via the router for all of the wireless mobile devices.
    Type: Grant
    Filed: July 6, 2012
    Date of Patent: June 4, 2013
    Assignee: Research In Motion Limited
    Inventors: Simon Tyler Wise, Marc Plumb, Ian Michael Patterson, Allan David Lewis
  • Patent number: 8385315
    Abstract: A router system receives from a host service a message which is intended for delivery to a mobile device via a wireless network. The message includes at least a first field having an identifier which identifies the mobile device, a second field having a payload of the message, and a third field having a return packet indication on whether to return a return packet to the host service. The router system examines the indication in the message and, if the indication is set to a first setting, the router system returns to the host service a return packet which indicates a status associated with the message for delivery to the mobile device. If the indication is set to a second setting, then the router system does not return to the host service the return packet which indicates the status associated with the message for delivery to the mobile device.
    Type: Grant
    Filed: April 12, 2012
    Date of Patent: February 26, 2013
    Assignee: Research In Motion Limited
    Inventors: Ian Michael Patterson, Allan David Lewis, Alina Kushnir, Simon Tyler Wise
  • Patent number: 8233438
    Abstract: A router is operative to perform the following actions for each one of a plurality of wireless devices operating in a wireless network. The router initially transmits a number of data packets matched for a window size which corresponds to a default window size. The router then measures a round trip time (RTT) associated with communication of each of the transmitted packets. The router increases the window size if the RTT associated with the communication of each of the transmitted packets is within a first threshold. On the other hand, the router decreases the window size if the RTT associated with the communication of any of the transmitted packets is more than the first threshold but less than a second threshold. The router sets or updates at least one of the first or the second thresholds based on traffic communicated to the plurality of wireless devices via the router.
    Type: Grant
    Filed: November 4, 2010
    Date of Patent: July 31, 2012
    Assignee: Research In Motion Limited
    Inventors: Simon Tyler Wise, Marc Plumb, Ian M. Patterson, Allan David Lewis
  • Publication number: 20060150176
    Abstract: A method of updating software and/or data in any one of a plurality of recipient computers, the update being provided to the recipient computer by a data owner computer. The recipient computer sends an update request as an e-mail message to the data owner computer. The update request specifies files to be updated and includes a message ID unique to the update request. The data owner computer automatically analyzes the update request to determine files to be updated and prepares a corresponding update in response to receiving the update request e-mail. The owner computer automatically sends the update to the recipient computer. The update comprises an email message having one or more files to be updated included as attachment files in the e-mail message; and including the unique message ID. The recipient computer automatically responds to the update by opening the attachment files and updating the software and/or data.
    Type: Application
    Filed: November 28, 2005
    Publication date: July 6, 2006
    Inventors: Brian Dorricott, Simon Tyler