Patents by Inventor Simon Tyler
Simon Tyler has filed for patents to protect the following inventions. This listing includes patent applications that are pending as well as patents that have already been granted by the United States Patent and Trademark Office (USPTO).
-
Patent number: 11893265Abstract: Methods, systems, apparatus, including computer programs encoded on computer storage media, for reclaiming storage space in a storage environment. In one aspect, the method includes actions of aggregating data that is indicative of access to one or more data objects, determining a future storage cost associated with each of a plurality of data objects, determining an access window for each of the plurality of data objects, identifying a data object based on (i) the future storage cost that satisfies a predetermined threshold and (ii) a data object access window, providing a notification to a user device that requests feedback from a user indicating whether the data object can be deleted, and in response to receiving data that indicates that the data object can be deleted, generating an instruction to cause deletion of the data object upon the expiration of the access window.Type: GrantFiled: March 26, 2022Date of Patent: February 6, 2024Assignee: Google LLCInventors: Konstantinos Nikoloudakis, Sven Koehler, Danyao Wang, Sahand Saba, Long Fei, Simon Tyler Wise, David Halladay Schneider
-
Publication number: 20230305733Abstract: Methods, systems, apparatus, including computer programs encoded on computer storage media, for reclaiming storage space in a storage environment. In one aspect, the method includes actions of aggregating data that is indicative of access to one or more data objects, determining a future storage cost associated with each of a plurality of data objects, determining an access window for each of the plurality of data objects, identifying a data object based on (i) the future storage cost that satisfies a predetermined threshold and (ii) a data object access window, providing a notification to a user device that requests feedback from a user indicating whether the data object can be deleted, and in response to receiving data that indicates that the data object can be deleted, generating an instruction to cause deletion of the data object upon the expiration of the access window.Type: ApplicationFiled: March 26, 2022Publication date: September 28, 2023Applicant: Google LLCInventors: Konstantinos Nikoloudakis, Sven Koehler, Danyao Wang, Sahand Saba, Long Fei, Simon Tyler Wise, David Halladay Schneider
-
Patent number: 11307978Abstract: Methods, systems, apparatus, including computer programs encoded on computer storage media, for reclaiming storage space in a storage environment. In one aspect, the method includes actions of aggregating data that is indicative of access to one or more data objects, determining a future storage cost associated with each of a plurality of data objects, determining an access window for each of the plurality of data objects, identifying a data object based on (i) the future storage cost that satisfies a predetermined threshold and (ii) a data object access window, providing a notification to a user device that requests feedback from a user indicating whether the data object can be deleted, and in response to receiving data that indicates that the data object can be deleted, generating an instruction to cause deletion of the data object upon the expiration of the access window.Type: GrantFiled: April 2, 2020Date of Patent: April 19, 2022Assignee: Google LLCInventors: Konstantinos Nikoloudakis, Sven Koehler, Danyao Wang, Sahand Saba, Long Fei, Simon Tyler Wise, David Halladay Schneider
-
Publication number: 20200371907Abstract: Methods, systems, apparatus, including computer programs encoded on computer storage media, for reclaiming storage space in a storage environment. In one aspect, the method includes actions of aggregating data that is indicative of access to one or more data objects, determining a future storage cost associated with each of a plurality of data objects, determining an access window for each of the plurality of data objects, identifying a data object based on (i) the future storage cost that satisfies a predetermined threshold and (ii) a data object access window, providing a notification to a user device that requests feedback from a user indicating whether the data object can be deleted, and in response to receiving data that indicates that the data object can be deleted, generating an instruction to cause deletion of the data object upon the expiration of the access window.Type: ApplicationFiled: April 2, 2020Publication date: November 26, 2020Inventors: Konstantinos Nikoloudakis, Sven Koehler, Danyao Wang, Sahand Saba, Long Fei, Simon Tyler Wise, David Halladay Schneider
-
Patent number: 10764316Abstract: A malware detection system based on stored data that analyzes an electronic message for threats by comparing it to previously received messages in a message archive or to a contacts list. Threat protection rules may be generated dynamically based on the message and contacts history. A message that appears suspicious may be blocked, or the system may insert warnings to the receiver not to provide personal information without verifying the message. Threat checks may look for unknown senders, senders with identities that are similar to but not identical to previous senders or to known contacts, or senders that were added only recently as contacts. Links embedded in messages may be checked by comparing them to links previously received or to domain names of known contacts. The system may flag messages as potential threats if they contradict previous messages, or if they appear unusual compared to the patterns of previous messages.Type: GrantFiled: May 11, 2017Date of Patent: September 1, 2020Assignee: Mimecast North America, Inc.Inventors: Jackie Maylor, Simon Tyler, Peter Bauer, Gilly Benamram, Paul Sowden, Steven Malone, Wayne Van Ry, Francisco Ribeiro
-
Patent number: 10621079Abstract: Methods, systems, apparatus, including computer programs encoded on computer storage media, for reclaiming storage space in a storage environment. In one aspect, the method includes actions of aggregating data that is indicative of access to one or more data objects, determining a future storage cost associated with each of a plurality of data objects, determining an access window for each of the plurality of data objects, identifying a data object based on (i) the future storage cost that satisfies a predetermined threshold and (ii) a data object access window, providing a notification to a user device that requests feedback from a user indicating whether the data object can be deleted, and in response to receiving data that indicates that the data object can be deleted, generating an instruction to cause deletion of the data object upon the expiration of the access window.Type: GrantFiled: November 16, 2018Date of Patent: April 14, 2020Assignee: Google LLCInventors: Konstantinos Nikoloudakis, Sven Koehler, Danyao Wang, Sahand Saba, Long Fei, Simon Tyler Wise, David Halladay Schneider
-
Publication number: 20190087320Abstract: Methods, systems, apparatus, including computer programs encoded on computer storage media, for reclaiming storage space in a storage environment. In one aspect, the method includes actions of aggregating data that is indicative of access to one or more data objects, determining a future storage cost associated with each of a plurality of data objects, determining an access window for each of the plurality of data objects, identifying a data object based on (i) the future storage cost that satisfies a predetermined threshold and (ii) a data object access window, providing a notification to a user device that requests feedback from a user indicating whether the data object can be deleted, and in response to receiving data that indicates that the data object can be deleted, generating an instruction to cause deletion of the data object upon the expiration of the access window.Type: ApplicationFiled: November 16, 2018Publication date: March 21, 2019Inventors: Konstantinos Nikoloudakis, Sven Koehler, Danyao Wang, Sahand Saba, Long Fei, Simon Tyler Wise, David Halladay Schneider
-
Patent number: 10133658Abstract: Methods, systems, apparatus, including computer programs encoded on computer storage media, for reclaiming storage space in a storage environment. In one aspect, the method includes actions of aggregating data that is indicative of access to one or more data objects, determining a future storage cost associated with each of a plurality of data objects, determining an access window for each of the plurality of data objects, identifying a data object based on (i) the future storage cost that satisfies a predetermined threshold and (ii) a data object access window, providing a notification to a user device that requests feedback from a user indicating whether the data object can be deleted, and in response to receiving data that indicates that the data object can be deleted, generating an instruction to cause deletion of the data object upon the expiration of the access window.Type: GrantFiled: June 6, 2017Date of Patent: November 20, 2018Assignee: Google LLCInventors: Konstantinos Nikoloudakis, Sven Koehler, Danyao Wang, Sahand Saba, Long Fei, Simon Tyler Wise, David Halladay Schneider
-
Publication number: 20180322040Abstract: Methods, systems, apparatus, including computer programs encoded on computer storage media, for reclaiming storage space in a storage environment. In one aspect, the method includes actions of aggregating data that is indicative of access to one or more data objects, determining a future storage cost associated with each of a plurality of data objects, determining an access window for each of the plurality of data objects, identifying a data object based on (i) the future storage cost that satisfies a predetermined threshold and (ii) a data object access window, providing a notification to a user device that requests feedback from a user indicating whether the data object can be deleted, and in response to receiving data that indicates that the data object can be deleted, generating an instruction to cause deletion of the data object upon the expiration of the access window.Type: ApplicationFiled: June 6, 2017Publication date: November 8, 2018Inventors: Konstantinos Nikoloudakis, Sven Koehler, Danyao Wang, Sahand Saba, Long Fei, Simon Tyler Wise, David Halladay Schneider
-
Publication number: 20170318049Abstract: A malware detection system based on stored data that analyzes an electronic message for threats by comparing it to previously received messages in a message archive or to a contacts list. Threat protection rules may be generated dynamically based on the message and contacts history. A message that appears suspicious may be blocked, or the system may insert warnings to the receiver not to provide personal information without verifying the message. Threat checks may look for unknown senders, senders with identities that are similar to but not identical to previous senders or to known contacts, or senders that were added only recently as contacts. Links embedded in messages may be checked by comparing them to links previously received or to domain names of known contacts. The system may flag messages as potential threats if they contradict previous messages, or if they appear unusual compared to the patterns of previous messages.Type: ApplicationFiled: May 11, 2017Publication date: November 2, 2017Inventors: Jackie Maylor, Simon Tyler, Peter Bauer, Gilly Benamram, Paul Sowden, Steven Malone, Wayne Van Ry, Francisco Ribeiro
-
Patent number: 9654492Abstract: A malware detection system based on stored data that analyzes an electronic message for threats by comparing it to previously received messages in a message archive or to a contacts list. Threat protection rules may be generated dynamically based on the message and contacts history. A message that appears suspicious may be blocked, or the system may insert warnings to the receiver not to provide personal information without verifying the message. Threat checks may look for unknown senders, senders with identities that are similar to but not identical to previous senders or to known contacts, or senders that were added only recently as contacts. Links embedded in messages may be checked by comparing them to links previously received or to domain names of known contacts. The system may flag messages as potential threats if they contradict previous messages, or if they appear unusual compared to the patterns of previous messages.Type: GrantFiled: January 29, 2016Date of Patent: May 16, 2017Assignee: MIMECAST NORTH AMERICA, INC.Inventors: Jackie Maylor, Simon Tyler, Peter Bauer, Gilly Benamram, Paul Sowden, Steven Malone, Wayne Van Ry, Francisco Ribeiro
-
Publication number: 20170078321Abstract: A malware detection system based on stored data that analyzes an electronic message for threats by comparing it to previously received messages in a message archive or to a contacts list. Threat protection rules may be generated dynamically based on the message and contacts history. A message that appears suspicious may be blocked, or the system may insert warnings to the receiver not to provide personal information without verifying the message. Threat checks may look for unknown senders, senders with identities that are similar to but not identical to previous senders or to known contacts, or senders that were added only recently as contacts. Links embedded in messages may be checked by comparing them to links previously received or to domain names of known contacts. The system may flag messages as potential threats if they contradict previous messages, or if they appear unusual compared to the patterns of previous messages.Type: ApplicationFiled: January 29, 2016Publication date: March 16, 2017Applicant: MIMECAST NORTH AMERICA, INC.Inventors: Jackie MAYLOR, Simon TYLER, Peter BAUER, Gilly BENAMRAM, Paul SOWDEN, Steven MALONE, Wayne VAN RY, Francisco RIBEIRO
-
Patent number: 9467435Abstract: An electronic message threat protection system that incorporates user authorization to ensure that only authorized users receive the benefits of the system's protection. The system protects against threats such as phishing attacks or malware embedded in attached files. References to resources in messages, such as links or attachments, are transformed into protected references that may for example insert a level of indirection between the user and the resource. Use of a protected reference triggers a user authorization check; if the user is an authorized user, the system provides access via a security mechanism that mitigates potential threats. Unauthorized users are denied access. A message recipient may deliberately or inadvertently distribute copies of the message or of the protected references; however, the authorization check ensures that recipients of the copies can only access resources via these copies if they are authorized users.Type: GrantFiled: September 15, 2015Date of Patent: October 11, 2016Assignee: MIMECAST NORTH AMERICA, INC.Inventors: Simon Tyler, Steven Malone, Jackie Maylor, Wayne Van Ry, Francisco Ribeiro
-
Patent number: 9049681Abstract: A router receives from a host service a message which is intended for delivery to a mobile device via a wireless network. The message includes an indication field which includes a return packet indication on whether to send a return packet to the host, an identifier field which includes an identifier which identifies the device, and a payload field which includes a payload of the message. When the indication is set to a first, setting and the message is not being delivered to the device, the router sends to the host a return packet which indicates that the message is not being delivered to the device. When the indication is set to a second setting and the message is not being delivered to the device, the router does not send to the host the return packet which indicates that the message is not being delivered to the device.Type: GrantFiled: January 18, 2013Date of Patent: June 2, 2015Assignee: Blackberry LimitedInventors: Ian Michael Patterson, Allan David Lewis, Alina Kushnir, Simon Tyler Wise
-
Patent number: 8457053Abstract: A router is operative to perform the following actions for each one of a plurality of wireless mobile devices operating in a wireless network. The router transmits to the wireless mobile device a number of data packets matched for a window size. The router changes the window size for the wireless mobile device based on whether a round trip time for communicating the data packets is within a threshold value. The router will update the threshold value based on the round trip times associated with traffic communicated via the router for all of the wireless mobile devices.Type: GrantFiled: July 6, 2012Date of Patent: June 4, 2013Assignee: Research In Motion LimitedInventors: Simon Tyler Wise, Marc Plumb, Ian Michael Patterson, Allan David Lewis
-
Patent number: 8385315Abstract: A router system receives from a host service a message which is intended for delivery to a mobile device via a wireless network. The message includes at least a first field having an identifier which identifies the mobile device, a second field having a payload of the message, and a third field having a return packet indication on whether to return a return packet to the host service. The router system examines the indication in the message and, if the indication is set to a first setting, the router system returns to the host service a return packet which indicates a status associated with the message for delivery to the mobile device. If the indication is set to a second setting, then the router system does not return to the host service the return packet which indicates the status associated with the message for delivery to the mobile device.Type: GrantFiled: April 12, 2012Date of Patent: February 26, 2013Assignee: Research In Motion LimitedInventors: Ian Michael Patterson, Allan David Lewis, Alina Kushnir, Simon Tyler Wise
-
Patent number: 8233438Abstract: A router is operative to perform the following actions for each one of a plurality of wireless devices operating in a wireless network. The router initially transmits a number of data packets matched for a window size which corresponds to a default window size. The router then measures a round trip time (RTT) associated with communication of each of the transmitted packets. The router increases the window size if the RTT associated with the communication of each of the transmitted packets is within a first threshold. On the other hand, the router decreases the window size if the RTT associated with the communication of any of the transmitted packets is more than the first threshold but less than a second threshold. The router sets or updates at least one of the first or the second thresholds based on traffic communicated to the plurality of wireless devices via the router.Type: GrantFiled: November 4, 2010Date of Patent: July 31, 2012Assignee: Research In Motion LimitedInventors: Simon Tyler Wise, Marc Plumb, Ian M. Patterson, Allan David Lewis
-
Publication number: 20060150176Abstract: A method of updating software and/or data in any one of a plurality of recipient computers, the update being provided to the recipient computer by a data owner computer. The recipient computer sends an update request as an e-mail message to the data owner computer. The update request specifies files to be updated and includes a message ID unique to the update request. The data owner computer automatically analyzes the update request to determine files to be updated and prepares a corresponding update in response to receiving the update request e-mail. The owner computer automatically sends the update to the recipient computer. The update comprises an email message having one or more files to be updated included as attachment files in the e-mail message; and including the unique message ID. The recipient computer automatically responds to the update by opening the attachment files and updating the software and/or data.Type: ApplicationFiled: November 28, 2005Publication date: July 6, 2006Inventors: Brian Dorricott, Simon Tyler