Patents by Inventor William Burrell
William Burrell has filed for patents to protect the following inventions. This listing includes patent applications that are pending as well as patents that have already been granted by the United States Patent and Trademark Office (USPTO).
-
Publication number: 20240129323Abstract: Embodiments detect cyberattack campaigns against multiple cloud tenants by analyzing activity data to find sharing anomalies. Data that appears benign in a single tenant's activities may indicate an attack when the same or similar data is also found for additional tenants. Attack detection may depend on activity time frames, on how similar certain activities of different tenants are to one another, on how unusual it is for different tenants to share an activity, and on other factors. Sharing anomaly analysis may utilize hypergeometric probabilities or other statistical measures. Detection avoidance attempts using digital entity randomization are revealed and thwarted. Authorized vendors may be recognized, mooting anomalousness. Although data from multiple tenants is analyzed together for sharing anomalies while monitoring for attacks, tenant confidentiality and privacy are respected through technical and legal mechanisms. Mitigation is performed in response to an attack indication.Type: ApplicationFiled: December 6, 2023Publication date: April 18, 2024Inventors: Yaakov GARYANI, Moshe ISRAEL, Hani Hana NEUVIRTH, Ely ABRAMOVITCH, Amir KEREN, Timothy William BURRELL
-
Patent number: 11888870Abstract: Embodiments detect cyberattack campaigns against multiple cloud tenants by analyzing activity data to find sharing anomalies. Data that appears benign in a single tenant's activities may indicate an attack when the same or similar data is also found for additional tenants. Attack detection may depend on activity time frames, on how similar certain activities of different tenants are to one another, on how unusual it is for different tenants to share an activity, and on other factors. Sharing anomaly analysis may utilize hypergeometric probabilities or other statistical measures. Detection avoidance attempts using entity randomization are revealed and thwarted. Authorized vendors may be recognized, mooting anomalousness. Although data from multiple tenants is analyzed together for sharing anomalies while monitoring for attacks, tenant confidentiality and privacy are respected through technical and legal mechanisms. Mitigation is performed in response to an attack indication.Type: GrantFiled: October 4, 2021Date of Patent: January 30, 2024Assignee: Microsoft Technology Licensing, LLCInventors: Yaakov Garyani, Moshe Israel, Hani Hana Neuvirth, Ely Abramovitch, Amir Keren, Timothy William Burrell
-
Publication number: 20230107335Abstract: Embodiments detect cyberattack campaigns against multiple cloud tenants by analyzing activity data to find sharing anomalies. Data that appears benign in a single tenant's activities may indicate an attack when the same or similar data is also found for additional tenants. Attack detection may depend on activity time frames, on how similar certain activities of different tenants are to one another, on how unusual it is for different tenants to share an activity, and on other factors. Sharing anomaly analysis may utilize hypergeometric probabilities or other statistical measures. Detection avoidance attempts using entity randomization are revealed and thwarted. Authorized vendors may be recognized, mooting anomalousness. Although data from multiple tenants is analyzed together for sharing anomalies while monitoring for attacks, tenant confidentiality and privacy are respected through technical and legal mechanisms. Mitigation is performed in response to an attack indication.Type: ApplicationFiled: October 4, 2021Publication date: April 6, 2023Inventors: Yaakov GARYANI, Moshe ISRAEL, Hani Hana NEUVIRTH, Ely ABRAMOVITCH, Amir KEREN, Timothy William BURRELL
-
Publication number: 20210326153Abstract: Various technologies described herein pertain to enforcing control flow integrity by adding instrumentation when source code is compiled or binary code is rewritten. An indirect call to a control transfer target (e.g., in the source code, in the binary code, etc.) can be identified. Moreover, the instrumentation can be inserted prior to the indirect call. The instrumentation can use a bit from a bitmap maintained by a runtime to verify whether the control transfer target is valid. When an executable image that includes the inserted instrumentation runs, execution can be terminated and/or other appropriate actions can be taken when the control transfer target is determined to be invalid; alternatively, execution can continue when the control transfer target is determined to be valid.Type: ApplicationFiled: April 30, 2021Publication date: October 21, 2021Inventors: Richard John Black, Timothy William Burrell, Miguel Oom Temudo de Castro, Manuel Silverio da Silva Costa, Kenneth Johnson, Matthew Ryan Miller
-
Patent number: 11003464Abstract: Various technologies described herein pertain to enforcing control flow integrity by adding instrumentation when source code is compiled or binary code is rewritten. An indirect call to a control transfer target (e.g., in the source code, in the binary code, etc.) can be identified. Moreover, the instrumentation can be inserted prior to the indirect call. The instrumentation can use a bit from a bitmap maintained by a runtime to verify whether the control transfer target is valid. When an executable image that includes the inserted instrumentation runs, execution can be terminated and/or other appropriate actions can be taken when the control transfer target is determined to be invalid; alternatively, execution can continue when the control transfer target is determined to be valid.Type: GrantFiled: April 19, 2012Date of Patent: May 11, 2021Assignee: Microsoft Technology Licensing, LLCInventors: Richard John Black, Timothy William Burrell, Miguel Oom Temudo de Castro, Manuel Silverio da Silva Costa, Kenneth Johnson, Matthew Ryan Miller
-
Patent number: 10843558Abstract: A drive train system includes a source of rotational energy, a viscous coupling and power take off assembly that is rotatably driven by the source of rotational energy, and a rotatably driven device that is rotatably driven by the viscous coupling and power take off assembly. The viscous coupling and power take off assembly may include a power take off that is rotatably driven by the source of rotational energy and a viscous coupling that is rotatably driven by the power take off. Alternatively, the viscous coupling and power take off assembly may include a viscous coupling that is rotatably driven by the source of rotational energy and a power take off that is rotatably driven by the viscous coupling. Lastly, the viscous coupling and power take off assembly may include a combined viscous coupling and power take off assembly that is integrated into a single housing.Type: GrantFiled: January 30, 2017Date of Patent: November 24, 2020Assignee: Parker-Hannifin CorporationInventors: John William Burrell, William J. Barton, Christopher Frederick Heuer, Jr.
-
Patent number: 10505954Abstract: Graph-based detection systems and techniques are provided to identify potential malicious lateral movement paths. System and security events may be used to generate a network connection graph and detect remote file executions and/or other detections, for use in tracking malicious lateral movement across a computer network, such as a compromised computer network. Lateral movement determination across a computer network may be divided into two subproblems: forensic analysis and general detection. With forensic analysis, given a malicious node, possible lateral movement leading into or out of the node is identified. General detection identifies previously unknown malicious lateral movement on a network using a remote file execution detector, and/or other detectors, and a rare path anomaly detection algorithm.Type: GrantFiled: June 14, 2017Date of Patent: December 10, 2019Assignee: Microsoft Technology Licensing, LLCInventors: Jack Wilson Stokes, III, Robert James Mead, Tim William Burrell, Ian Hellen, John Joseph Lambert, Weidong Cui, Andrey Marochko, Qingyun Liu
-
Patent number: 10286779Abstract: A power take-off unit includes a housing, an input mechanism mounted at least partially within the housing and configured for attachment to a source of rotational energy, and an output mechanism is configured for attachment to a driven accessory. The power take-off unit also includes a clutch assembly configured to selectively connect the output mechanism to the input mechanism. A pneumatic valve manifold is attached to the housing and is configured to provide pressurized air to the clutch assembly.Type: GrantFiled: January 6, 2016Date of Patent: May 14, 2019Assignee: Parker-Hannifin CorporationInventors: John William Burrell, Gregory Friend
-
Publication number: 20190031024Abstract: A drive train system includes a source of rotational energy, a viscous coupling and power take off assembly that is rotatably driven by the source of rotational energy, and a rotatably driven device that is rotatably driven by the viscous coupling and power take off assembly. The viscous coupling and power take off assembly may include a power take off that is rotatably driven by the source of rotational energy and a viscous coupling that is rotatably driven by the power take off. Alternatively, the viscous coupling and power take off assembly may include a viscous coupling that is rotatably driven by the source of rotational energy and a power take off that is rotatably driven by the viscous coupling. Lastly, the viscous coupling and power take off assembly may include a combined viscous coupling and power take off assembly that is integrated into a single housing.Type: ApplicationFiled: January 30, 2017Publication date: January 31, 2019Applicant: Parker-Hannifin CorporationInventors: John William BURRELL, William J. BARTON, Christopher Frederick HEUER, JR.
-
Publication number: 20180367548Abstract: Graph-based detection systems and techniques are provided to identify potential malicious lateral movement paths. System and security events may be used to generate a network connection graph and detect remote file executions and/or other detections, for use in tracking malicious lateral movement across a computer network, such as a compromised computer network. Lateral movement determination across a computer network may be divided into two subproblems: forensic analysis and general detection. With forensic analysis, given a malicious node, possible lateral movement leading into or out of the node is identified. General detection identifies previously unknown malicious lateral movement on a network using a remote file execution detector, and/or other detectors, and a rare path anomaly detection algorithm.Type: ApplicationFiled: June 14, 2017Publication date: December 20, 2018Inventors: Jack Wilson STOKES, III, Robert James MEAD, Tim William BURRELL, Ian HELLEN, John Joseph LAMBERT, Weidong CUI, Andrey MAROCHKO, Qingyun LIU
-
Publication number: 20170361705Abstract: A power take-off unit includes a housing portion, an input mechanism mounted at least partially within the housing and configured for attachment to a source of rotational energy, and an output mechanism is configured for attachment to a driven accessory. The power take-off unit also includes a clutch assembly configured to selectively connect the output mechanism to the input mechanism. A pneumatic valve manifold is attached to the housing portion and is configured to provide pressurized air to the clutch assembly.Type: ApplicationFiled: January 6, 2016Publication date: December 21, 2017Applicant: Parker-Hannifin CorporationInventors: John William Burrell, Gregory Friend
-
Patent number: 9494227Abstract: A power take-off that significantly reduces the amount of undesirable noise that is transmitted therethrough during operation includes a housing, an input mechanism, and an output mechanism. The input mechanism is disposed within the housing and is adapted to be connected to a source of rotational energy. The output mechanism is also disposed within the housing and is adapted to be connected to a driven device. The output mechanism is adapted to be rotatably driven by the input mechanism. At least one of the input mechanism and the output mechanism includes a shaft having at least one portion that is supported on the housing by a vibration damping material.Type: GrantFiled: February 7, 2014Date of Patent: November 15, 2016Assignee: PARKER-HANNIFIN CORPORATIONInventors: Robert McPherson, Greg Friend, John William Burrell
-
Publication number: 20150362058Abstract: A power take-off that significantly reduces the amount of undesirable noise that is transmitted therethrough during operation includes a housing, an input mechanism, and an output mechanism. The input mechanism is disposed within the housing and is adapted to be connected to a source of rotational energy. The output mechanism is also disposed within the housing and is adapted to be connected to a driven device. The output mechanism is adapted to be rotatably driven by the input mechanism. At least one of the input mechanism and the output mechanism includes a shaft having at least one portion that is supported on the housing by a vibration damping material.Type: ApplicationFiled: February 7, 2014Publication date: December 17, 2015Applicant: Parker-Hannifin CorporationInventors: Robert McPherson, Greg Friend, John William Burrell
-
Patent number: 8683583Abstract: The subject disclosure is directed towards preventing the exploitation by malicious code of object state corruption vulnerabilities, such as use-after-free vulnerabilities. An object class is configured with a secret cookie in a virtual function table of the object, e.g., inserted at compile time. An instrumentation check inserted in the program code evaluates the secret cookie to determine whether the object state has been corrupted before object access (e.g., a call to one of the object's methods) is allowed. If corrupted, access to the object is prevented by the instrumentation check. Another instrumentation check may be used to determine whether the object's virtual table pointer points to a location outside of the module that contains the legitimate virtual function table; if so, object access is prevented.Type: GrantFiled: December 2, 2010Date of Patent: March 25, 2014Assignee: Microsoft CorporationInventors: Matthew R. Miller, Kenneth D. Johnson, Timothy William Burrell
-
Publication number: 20130283245Abstract: Various technologies described herein pertain to enforcing control flow integrity by adding instrumentation when source code is compiled or binary code is rewritten. An indirect call to a control transfer target (e.g., in the source code, in the binary code, etc.) can be identified. Moreover, the instrumentation can be inserted prior to the indirect call. The instrumentation can use a bit from a bitmap maintained by a runtime to verify whether the control transfer target is valid. When an executable image that includes the inserted instrumentation runs, execution can be terminated and/or other appropriate actions can be taken when the control transfer target is determined to be invalid; alternatively, execution can continue when the control transfer target is determined to be valid.Type: ApplicationFiled: April 19, 2012Publication date: October 24, 2013Applicant: Microsoft CorporationInventors: Richard John Black, Timothy William Burrell, Miguel Oom Temudo de Castro, Manuel Silverio da Silva Costa, Kenneth Johnson, Matthew Ryan Miller
-
Publication number: 20110191848Abstract: A method disclosed herein includes acts of receiving code at a Just-in-Time compiler executing in an application on a computing device and compiling the code to generate machine code and causing the machine code to be placed on at least one page that is accessible by at least one processor on the computing device, wherein the Just-in-Time compiler compiles the code utilizing at least one technique for preventing a Just-in-Time spraying attack.Type: ApplicationFiled: February 3, 2010Publication date: August 4, 2011Applicant: Microsoft CorporationInventors: Benjamin Goth Zorn, Benjamin Livshits, Reid Borsuk, John Joseph Lambert, Matthew Ryan Miller, Louis Lafreniere, Peter Stuart Beck, Joshua Theodore Goodman, Timothy William Burrell, Steven Edward Lucco
-
Publication number: 20060043108Abstract: A hand held tube squeezer facilitates emptying a tube of its contents. The squeezer has a gripping action on the tube to which it is applied, thus preventing rearward slipping of the squeezer. Top and bottom plates of the squeezer are connected by a loop which has a slot through which a tube extends when it is being emptied. Portions of the loop at opposite ends of the slot function as a line hinge between the top and bottom plates. The squeezer and a roller are packaged in a clear plastic wrap film.Type: ApplicationFiled: August 30, 2004Publication date: March 2, 2006Inventor: William Burrell
-
Patent number: 6573893Abstract: A voxel transfer circuit that implements high-speed voxel transfer operations. When implemented in a 2D or 3D texture mapping circuit of a graphics system, or in a graphics card adapter of a workstation, the voxel transfer circuit provides a comprehensive, accelerated volume rendering capability to the existing imaging pipeline. For each voxel in a volume data set, the voxel transfer circuit generates a texel having an opacity value and a color value based on one or more properties of the voxel including the local gradient magnitude and a lighting model. The relationship between these values is referred to herein as a classification or transfer function. In the present invention, the voxel transfer circuit implements a transfer function that employs a gradient-influenced classification. Such a transfer function generates opacity and color values of structures with excellent edge and surface discrimination.Type: GrantFiled: November 1, 2000Date of Patent: June 3, 2003Assignee: Hewlett-Packard Development Company, L.P.Inventors: Hasan Shahzad Naqvi, Jeff William Burrell, Barthold Lichtenbelt
-
Publication number: 20030014766Abstract: Apparatus for distributing radio frequency (RF) modulated broadcast television signals from a broadcast signal source to networked appliances connected to the source through a plurality of single conductor coaxial cables, simultaneously with distributing unmodulated digital signals and RF modulated video signals exchanged between the networked appliances over the same network coaxial cables.Type: ApplicationFiled: August 30, 2002Publication date: January 16, 2003Applicant: Peracom Networks, Inc.Inventors: John M. Dinwiddie, William Burrell Nunnery, Jack S. Chorpenning
-
Patent number: D772508Type: GrantFiled: August 4, 2015Date of Patent: November 22, 2016Inventors: William Burrell, Ronda Burrell