Patents by Inventor Steven A. Rogers

Steven A. Rogers has filed for patents to protect the following inventions. This listing includes patent applications that are pending as well as patents that have already been granted by the United States Patent and Trademark Office (USPTO).

  • Publication number: 20200137121
    Abstract: Methods and systems for protecting a secured network are presented. For example, one or more packet security gateways may be associated with a security policy management server. At each packet security gateway, a dynamic security policy may be received from the security policy management server, packets associated with a network protected by the packet security gateway may be received, and at least one of multiple packet transformation functions specified by the dynamic security policy may be performed on the packets. Performing the at least one of multiple packet transformation functions specified by the dynamic security policy on the packets may include performing at least one packet transformation function other than forwarding or dropping the packets.
    Type: Application
    Filed: December 27, 2019
    Publication date: April 30, 2020
    Inventors: Steven Rogers, Sean Moore
  • Patent number: 10567437
    Abstract: Methods and systems for protecting a secured network are presented. For example, one or more packet security gateways may be associated with a security policy management server. At each packet security gateway, a dynamic security policy may be received from the security policy management server, packets associated with a network protected by the packet security gateway may be received, and at least one of multiple packet transformation functions specified by the dynamic security policy may be performed on the packets. Performing the at least one of multiple packet transformation functions specified by the dynamic security policy on the packets may include performing at least one packet transformation function other than forwarding or dropping the packets.
    Type: Grant
    Filed: August 24, 2018
    Date of Patent: February 18, 2020
    Assignee: CENTRIPETAL NETWORKS, INC.
    Inventors: Steven Rogers, Sean Moore
  • Patent number: 10541972
    Abstract: In some variations, first and second rule sets may be received by a network protection device. The first and second rule sets may be preprocessed. The network protection device may be configured to process packets in accordance with the first rule set. Packets may be received by the network protection device. A first portion of the packets may be processed in accordance with the first rule set. The network protection device may be reconfigured to process packets in accordance with the second rule set. A second portion of the packets may be processed in accordance with the second rule set.
    Type: Grant
    Filed: March 19, 2019
    Date of Patent: January 21, 2020
    Assignee: Centripetal Networks, Inc.
    Inventors: David K. Ahn, Steven Rogers, Sean Moore
  • Publication number: 20200015035
    Abstract: A system is described that includes a transmitter for generating a magnetic field comprising a first detection region and a second detection region, wherein the first detection region is different than the second detection region. The system comprises a receiver configured to detect at a location of the receiver in the magnetic field a magnetic field vector, a polarity, and at least one additional vector. The system comprises the receiver configured to use the magnetic field vector, the polarity, and the at least one additional vector to determine a position of the receiver in the magnetic field.
    Type: Application
    Filed: July 10, 2019
    Publication date: January 9, 2020
    Inventors: Steven Roger Floyd, Duane A. Gerig, William P. Moore, Thomas Brandon Lee
  • Patent number: 10511572
    Abstract: In some variations, first and second rule sets may be received by a network protection device. The first and second rule sets may be preprocessed. The network protection device may be configured to process packets in accordance with the first rule set. Packets may be received by the network protection device. A first portion of the packets may be processed in accordance with the first rule set. The network protection device may be reconfigured to process packets in accordance with the second rule set. A second portion of the packets may be processed in accordance with the second rule set.
    Type: Grant
    Filed: July 22, 2019
    Date of Patent: December 17, 2019
    Assignee: Centripetal Networks, Inc.
    Inventors: David K. Ahn, Steven Rogers, Sean Moore
  • Patent number: 10504681
    Abstract: A particle-optical arrangement comprises a charged-particle source for generating a beam of charged particles; a multi-aperture plate arranged in a beam path of the beam of charged particles, wherein the multi-aperture plate has a plurality of apertures formed therein in a predetermined first array pattern, wherein a plurality of charged-particle beamlets is formed from the beam of charged particles downstream of the multi-aperture plate, and wherein a plurality of beam spots is formed in an image plane of the apparatus by the plurality of beamlets, the plurality of beam spots being arranged in a second array pattern; and a particle-optical element for manipulating the beam of charged particles and/or the plurality of beamlets; wherein the first array pattern has a first pattern regularity in a first direction, and the second array pattern has a second pattern regularity in a second direction electron-optically corresponding to the first direction, and wherein the second regularity is higher than the first re
    Type: Grant
    Filed: May 30, 2017
    Date of Patent: December 10, 2019
    Assignees: CARL ZEISS MICROSCOPY GMBH, APPLIED MATERIALS ISRAEL LTD.
    Inventors: Rainer Knippelmeyer, Oliver Kienzle, Thomas Kemen, Heiko Mueller, Stephan Uhlemann, Maximilian Haider, Antonio Casares, Steven Rogers
  • Publication number: 20190342265
    Abstract: In some variations, first and second rule sets may be received by a network protection device. The first and second rule sets may be preprocessed. The network protection device may be configured to process packets in accordance with the first rule set. Packets may be received by the network protection device. A first portion of the packets may be processed in accordance with the first rule set. The network protection device may be reconfigured to process packets in accordance with the second rule set. A second portion of the packets may be processed in accordance with the second rule set.
    Type: Application
    Filed: July 22, 2019
    Publication date: November 7, 2019
    Inventors: David K. Ahn, Steven Rogers, Sean Moore
  • Publication number: 20190334871
    Abstract: In some variations, first and second rule sets may be received by a network protection device. The first and second rule sets may be preprocessed. The network protection device may be configured to process packets in accordance with the first rule set. Packets may be received by the network protection device. A first portion of the packets may be processed in accordance with the first rule set. The network protection device may be reconfigured to process packets in accordance with the second rule set. A second portion of the packets may be processed in accordance with the second rule set.
    Type: Application
    Filed: March 19, 2019
    Publication date: October 31, 2019
    Inventors: David K. Ahn, Steven Rogers, Sean Moore
  • Publication number: 20190312911
    Abstract: Methods and systems for protecting a secured network are presented. For example, one or more packet security gateways may be associated with a security policy management server. At each packet security gateway, a dynamic security policy may be received from the security policy management server, packets associated with a network protected by the packet security gateway may be received, and at least one of multiple packet transformation functions specified by the dynamic security policy may be performed on the packets.
    Type: Application
    Filed: June 21, 2019
    Publication date: October 10, 2019
    Inventors: Steven Rogers, Sean Moore, David K. Ahn, Peter P. Geremia
  • Patent number: 10410126
    Abstract: A process for recommending choices to a user uses a first model representing the user's subconscious and a second model representing the user's consciousness. The process comprises receiving data and performing, using the second model, a simulation by modeling the user and a third party to derive a simulation result that determines how the user would react to a situation based at least in part on the received data. Using the first model and the simulation, a first set of recommendation choices based at least in part on the received data is derived, and a set of recommendation choices for presentation based on the first set of recommendation choices is determined and presented to the user. As the user is making a selection, the user is monitored for conscious decisions and subconscious reactions, which are used to update the first model and the second model.
    Type: Grant
    Filed: January 6, 2017
    Date of Patent: September 10, 2019
    Assignee: QUALE LLC
    Inventors: Steven Keith Rogers, Adam Steven Rogers
  • Patent number: 10397735
    Abstract: A system is described that includes a transmitter for generating a magnetic field comprising a first detection region and a second detection region, wherein the first detection region is different than the second detection region. The system comprises a receiver configured to detect at a location of the receiver in the magnetic field a magnetic field vector, a polarity, and at least one additional vector. The system comprises the receiver configured to use the magnetic field vector, the polarity, and the at least one additional vector to determine a position of the receiver in the magnetic field.
    Type: Grant
    Filed: February 27, 2018
    Date of Patent: August 27, 2019
    Assignee: RADIO SYSTEMS CORPORATION
    Inventors: Steven Roger Floyd, Duane A. Gerig, William P. Moore, Thomas Brandon Lee
  • Publication number: 20190230128
    Abstract: Methods and systems for protecting a secured network are presented. For example, one or more packet security gateways may be associated with a security policy management server. At each packet security gateway, a dynamic security policy may be received from the security policy management server, packets associated with a network protected by the packet security gateway may be received, and at least one of multiple packet transformation functions specified by the dynamic security policy may be performed on the packets. Performing the at least one of multiple packet transformation functions specified by the dynamic security policy on the packets may include performing at least one packet transformation function other than forwarding or dropping the packets.
    Type: Application
    Filed: August 24, 2018
    Publication date: July 25, 2019
    Inventors: Steven Rogers, Sean Moore
  • Patent number: 10284522
    Abstract: In some variations, first and second rule sets may be received by a network protection device. The first and second rule sets may be preprocessed. The network protection device may be configured to process packets in accordance with the first rule set. Packets may be received by the network protection device. A first portion of the packets may be processed in accordance with the first rule set. The network protection device may be reconfigured to process packets in accordance with the second rule set. A second portion of the packets may be processed in accordance with the second rule set.
    Type: Grant
    Filed: June 1, 2017
    Date of Patent: May 7, 2019
    Assignee: Centripetal Networks, Inc.
    Inventors: David K. Ahn, Steven Rogers, Sean Moore
  • Publication number: 20190124116
    Abstract: Methods and systems for protecting a secured network are presented. For example, one or more packet security gateways may be associated with a security policy management server. At each packet security gateway, a dynamic security policy may be received from the security policy management server, packets associated with a network protected by the packet security gateway may be received, and at least one of multiple packet transformation functions specified by the dynamic security policy may be performed on the packets.
    Type: Application
    Filed: October 12, 2018
    Publication date: April 25, 2019
    Inventors: Steven Rogers, Sean Moore, David K. Ahn, Peter P. Geremia
  • Publication number: 20190103696
    Abstract: A connector assembly includes a connector body with an elongated shape and a longitudinal axis. The connector body defines a port at a first end configured to receive a proximal portion of a lead or lead extension. Contact assemblies are axially spaced-apart within the connector body and collectively form a lumen that extends from the port along the longitudinal axis of the connector body. Each contact assembly includes a spring contact disposed within a contact housing. The spring contact has a contact region that extends diagonally with respect to the longitudinal axis of the connector body. The contact region is positioned within the contact housing so that insertion of the proximal portion of the lead or lead extension into the contact housing results in a bending deflection of the contact region of the spring contact while maintaining contact between the contact region and the lead or lead extension.
    Type: Application
    Filed: October 2, 2018
    Publication date: April 4, 2019
    Inventor: Steven Roger Conger
  • Patent number: 10142372
    Abstract: Methods and systems for protecting a secured network are presented. For example, one or more packet security gateways may be associated with a security policy management server. At each packet security gateway, a dynamic security policy may be received from the security policy management server, packets associated with a network protected by the packet security gateway may be received, and at least one of multiple packet transformation functions specified by the dynamic security policy may be performed on the packets.
    Type: Grant
    Filed: January 24, 2017
    Date of Patent: November 27, 2018
    Assignee: Centripetal Networks, Inc.
    Inventors: Steven Rogers, Sean Moore, David K. Ahn, Peter P. Geremia
  • Publication number: 20180295468
    Abstract: A system is described that includes a transmitter for generating a magnetic field comprising a first detection region and a second detection region, wherein the first detection region is different than the second detection region. The system comprises a receiver configured to detect at a location of the receiver in the magnetic field a magnetic field vector, a polarity, and at least one additional vector. The system comprises the receiver configured to use the magnetic field vector, the polarity, and the at least one additional vector to determine a position of the receiver in the magnetic field.
    Type: Application
    Filed: February 27, 2018
    Publication date: October 11, 2018
    Inventors: Steven Roger Floyd, Duane A. Gerig, William P. Moore, Thomas Brandon Lee
  • Patent number: 10091246
    Abstract: Methods and systems for protecting a secured network are presented. For example, one or more packet security gateways may be associated with a security policy management server. At each packet security gateway, a dynamic security policy may be received from the security policy management server, packets associated with a network protected by the packet security gateway may be received, and at least one of multiple packet transformation functions specified by the dynamic security policy may be performed on the packets. Performing the at least one of multiple packet transformation functions specified by the dynamic security policy on the packets may include performing at least one packet transformation function other than forwarding or dropping the packets.
    Type: Grant
    Filed: January 24, 2017
    Date of Patent: October 2, 2018
    Assignee: Centripetal Networks, Inc.
    Inventors: Steven Rogers, Sean Moore
  • Publication number: 20180115518
    Abstract: In some variations, first and second rule sets may be received by a network protection device. The first and second rule sets may be preprocessed. The network protection device may be configured to process packets in accordance with the first rule set. Packets may be received by the network protection device. A first portion of the packets may be processed in accordance with the first rule set. The network protection device may be reconfigured to process packets in accordance with the second rule set. A second portion of the packets may be processed in accordance with the second rule set.
    Type: Application
    Filed: June 1, 2017
    Publication date: April 26, 2018
    Inventors: David K. Ahn, Steven Rogers, Sean Moore
  • Publication number: 20180083522
    Abstract: A linear motor includes a forcer having a plurality of teeth spaced apart along a longitudinal axis of the forcer. At least some teeth arranged about a longitudinal center of the forcer are dimensioned different from at least some other teeth arranged at ends of the forcer distal from the longitudinal center. The teeth may be dimensioned to define a pocket relative to the longitudinal axis of the forcer.
    Type: Application
    Filed: January 15, 2016
    Publication date: March 22, 2018
    Inventor: Steven Roger HUARD