Patents by Inventor William Sutton
William Sutton has filed for patents to protect the following inventions. This listing includes patent applications that are pending as well as patents that have already been granted by the United States Patent and Trademark Office (USPTO).
-
Publication number: 20240106693Abstract: Novel tools and techniques are provided for implementing global Internet Protocol management system (“GIMS”) for monitoring network devices for fault management. In various embodiments, a computing system may receive a first alert associated with a first device among layer 2 and/or layer 3 devices disposed in a plurality of networks; may collect first alert data and/or first device data; may store the first alert together with the collected first alert data and/or first device data as first consolidated alert data in a first database; may perform, using an enrichment system, enrichment of the first alert, by retrieving first enrichment data from one or more second databases and adding the first enrichment data to the first consolidated alert data in the first database; and may send the first consolidated alert data to a fault management system for display to a user to facilitate addressing of the first alert by the user.Type: ApplicationFiled: July 25, 2023Publication date: March 28, 2024Inventors: Steve Toms, David Sutton, William E. Curd, II, Wayne L. Williams, Binu Baby, Michael Ogden, David Ho, Nashat Saqqa, Amer Khan, Ranjith Kumar Nooka, Keith Sebesta, Tim W. Kimpton, Shelley Goldner, Shelli L. Hurd
-
Publication number: 20230183284Abstract: The present invention relates to a 3?-ketoglycoside compound defined by formula (I) and its use for controlled release of alcohols, in particular alcohols showing an insect repellent effect. It relates also to a process for preparing the 3?-ketoglycoside compound of formula (I). It further relates to a composition comprising a 3?-ketoglycoside compound of formula (I). It relates also to the use of a 3?-ketoglycoside compound of formula (I) for the controlled release of alcohols. It related also to a method of use of such composition.Type: ApplicationFiled: February 10, 2021Publication date: June 15, 2023Applicant: GLYCOSCIENCE, S.L.Inventor: Peter William SUTTON
-
Patent number: 9978418Abstract: Systems and methods for automating testing of multiple SATA hard drives with multiple motherboards are described herein. In certain embodiments any number of SATA drives may be switchably connected to any number of motherboards, and any number of tests may be performed on combinations of the SATA drives and motherboards without or with only minimal manual intervention between tests. In one embodiment, the system may include an automated selector having a controller adapted to receive a testing instruction and transmit the received testing instruction and a mainboard in communication with the controller. The mainboard may include a logic device to receive the testing instruction from the controller and/or a switch for pairing and unpairing motherboards with SATA storage devices.Type: GrantFiled: October 19, 2015Date of Patent: May 22, 2018Assignee: Leidos, Inc.Inventors: Timothy William Estell, Bruce Allen Clark, Littleton Kent Riggins, Jeffrey Errol Cade, Ronald Franklin Cox, Martin William Sutton, Jr.
-
Patent number: 9609015Abstract: A cloud-based method, a behavioral analysis system, and a cloud-based security system can include a plurality of nodes communicatively coupled to one or more users, wherein the plurality of nodes each perform inline monitoring for one of the one or more users for security comprising malware detection and preclusion; and a behavioral analysis system communicatively coupled to the plurality of nodes, wherein the behavioral analysis system performs offline analysis for any suspicious content from the one or more users which is flagged by the plurality of nodes; wherein the plurality of nodes each comprise a set of known malware signatures for the inline monitoring that is periodically updated by the behavioral analysis system based on the offline analysis for the suspicious content.Type: GrantFiled: July 10, 2015Date of Patent: March 28, 2017Assignee: Zscaler, Inc.Inventors: Sriram Natarajan, Narinder Paul, Julien Sobrier, Karthikeyan Thamilarasu, Balakrishna Bayar, Michael Andrew William Sutton
-
Publication number: 20160042763Abstract: Systems and methods for automating testing of multiple SATA hard drives with multiple motherboards are described herein. In certain embodiments any number of SATA drives may be switchably connected to any number of motherboards, and any number of tests may be performed on combinations of the SATA drives and motherboards without or with only minimal manual intervention between tests. In one embodiment, the system may include an automated selector having a controller adapted to receive a testing instruction and transmit the received testing instruction and a mainboard in communication with the controller. The mainboard may include a logic device to receive the testing instruction from the controller and/or a switch for pairing and unpairing motherboards with SATA storage devices.Type: ApplicationFiled: October 19, 2015Publication date: February 11, 2016Applicant: Leidos, Inc.Inventors: Timothy William Estell, Bruce Allen Clark, Littleton Kent Riggins, Jeffrey Errol Cade, Ronald Franklin Cox, Martin William Sutton, JR.
-
Patent number: 9183071Abstract: Systems and methods for automating testing of multiple SATA hard drives with multiple motherboards are described herein. In certain embodiments any number of SATA drives may be switchably connected to any number of motherboards, and any number of tests may be performed on combinations of the SATA drives and motherboards without or with only minimal manual intervention between tests. In one embodiment, the system may include an automated selector having a controller adapted to receive a testing instruction and transmit the received testing instruction and a mainboard in communication with the controller. The mainboard may include a logic device to receive the testing instruction from the controller and/or a switch for pairing and unpairing motherboards with SATA storage devices.Type: GrantFiled: December 2, 2013Date of Patent: November 10, 2015Assignee: Leidos, Inc.Inventors: Timothy William Estell, Bruce Allen Clark, Littleton Kent Riggins, Jeffrey Errol Cade, Ronald Franklin Cox, Martin William Sutton, Jr.
-
Publication number: 20150319182Abstract: A cloud-based method, a behavioral analysis system, and a cloud-based security system can include a plurality of nodes communicatively coupled to one or more users, wherein the plurality of nodes each perform inline monitoring for one of the one or more users for security comprising malware detection and preclusion; and a behavioral analysis system communicatively coupled to the plurality of nodes, wherein the behavioral analysis system performs offline analysis for any suspicious content from the one or more users which is flagged by the plurality of nodes; wherein the plurality of nodes each comprise a set of known malware signatures for the inline monitoring that is periodically updated by the behavioral analysis system based on the offline analysis for the suspicious content.Type: ApplicationFiled: July 10, 2015Publication date: November 5, 2015Applicant: ZSCALER, INC.Inventors: Sriram NATARAJAN, Narinder PAUL, Julien SOBRIER, Karthikeyan THAMILARASU, Balakrishna BAYAR, Michael Andrew William SUTTON
-
Patent number: 9152789Abstract: A cloud-based method, a behavioral analysis system, and a cloud-based security system can include a plurality of nodes communicatively coupled to one or more users, wherein the plurality of nodes each perform inline monitoring for one of the one or more users for security comprising malware detection and preclusion; and a behavioral analysis system communicatively coupled to the plurality of nodes, wherein the behavioral analysis system performs offline analysis for any suspicious content from the one or more users which is flagged by the plurality of nodes; wherein the plurality of nodes each comprise a set of known malware signatures for the inline monitoring that is periodically updated by the behavioral analysis system based on the offline analysis for the suspicious content.Type: GrantFiled: March 26, 2014Date of Patent: October 6, 2015Assignee: Zscaler, Inc.Inventors: Sriram Natarajan, Narinder Paul, Julien Sobrier, Karthikeyan Thamilarasu, Balakrishna Bayar, Michael Andrew William Sutton
-
Publication number: 20140208426Abstract: A cloud-based method, a behavioral analysis system, and a cloud-based security system can include a plurality of nodes communicatively coupled to one or more users, wherein the plurality of nodes each perform inline monitoring for one of the one or more users for security comprising malware detection and preclusion; and a behavioral analysis system communicatively coupled to the plurality of nodes, wherein the behavioral analysis system performs offline analysis for any suspicious content from the one or more users which is flagged by the plurality of nodes; wherein the plurality of nodes each comprise a set of known malware signatures for the inline monitoring that is periodically updated by the behavioral analysis system based on the offline analysis for the suspicious content.Type: ApplicationFiled: March 26, 2014Publication date: July 24, 2014Applicant: ZSCALER, INC.Inventors: Sriram NATARAJAN, Narinder PAUL, Julien SOBRIER, Karthikeyan THAMILARASU, Balakrishna BAYAR, Michael Andrew William SUTTON
-
Patent number: 8763071Abstract: The present disclosure provides systems and methods for mobile application security classification and enforcement. In particular, the present invention includes a method, a mobile device, and a distributed security system (e.g., a “cloud”) that is utilized to enforce security on mobile devices communicatively coupled to external networks (i.e., the Internet). Advantageously, the present invention is platform independent allowing it to operate with any current or emerging mobile device. Specifically, preventing malicious applications from running on an end user's mobile device is challenging with potentially millions of applications and billions of user devices; the only effective way to enforce application security is through the network that applications use to communicate.Type: GrantFiled: March 18, 2011Date of Patent: June 24, 2014Assignee: Zscaler, Inc.Inventors: Amit Sinha, Michael Andrew William Sutton, Srikanth Devarajan
-
Patent number: 8413239Abstract: System and methods for injecting content into a response for improving client-side security. The system includes a content injection service external to network edges of at least one system. The content injection service receives a request from a client within the at least one system and identifies or anticipates a potential threat associated with the response. The content injection service is configured to determine an appropriate counter for the identified or anticipated potential threat and in response injects content into the response according to the potential or anticipated threat identified.Type: GrantFiled: February 22, 2009Date of Patent: April 2, 2013Assignee: Zscaler, Inc.Inventors: Michael Andrew William Sutton, Jeff Forristal
-
Publication number: 20110167474Abstract: The present disclosure provides systems and methods for mobile application security classification and enforcement. In particular, the present invention includes a method, a mobile device, and a distributed security system (e.g., a “cloud”) that is utilized to enforce security on mobile devices communicatively coupled to external networks (i.e., the Internet). Advantageously, the present invention is platform independent allowing it to operate with any current or emerging mobile device. Specifically, preventing malicious applications from running on an end user's mobile device is challenging with potentially millions of applications and billions of user devices; the only effective way to enforce application security is through the network that applications use to communicate.Type: ApplicationFiled: March 18, 2011Publication date: July 7, 2011Applicant: ZSCALER, INC.Inventors: Amit SINHA, Michael Andrew William SUTTON, Srikanth DEVARAJAN
-
Publication number: 20100218253Abstract: System and methods for injecting content into a response for improving client-side security. The system includes a content injection service external to network edges of at least one system. The content injection service receives a request from a client within the at least one system and identifies or anticipates a potential threat associated with the response. The content injection service is configured to determine an appropriate counter for the identified or anticipated potential threat and in response injects content into the response according to the potential or anticipated threat identified.Type: ApplicationFiled: February 22, 2009Publication date: August 26, 2010Applicant: zScalerInventors: Michael Andrew William Sutton, Jeff Forristal
-
Publication number: 20100101893Abstract: The invention provides an improved device for the lubrication of railway tracks in the form of grease distribution bar (1) of simplified construction, which may be machined from a single piece of suitable material. This is possible because the greaseways (3) are simple, without multiple bifurcations forming complex distribution trees, thus allowing the internal greaseways (3) to be drilled or machined rather than requiring construction by layering multiple blades. In further aspects, the invention provides improved channels (6) and nozzles (22) for grease delivery, and improved grease delivery using a progressive distributor system (10) and improved means of rapid attachment and disengagement of such a device from the rail to be lubricated.Type: ApplicationFiled: February 6, 2008Publication date: April 29, 2010Inventor: Charles William Sutton
-
Publication number: 20090150300Abstract: Automated foreclosure and asset disposition methods, systems, and computer program products are provided, such as for automating a property foreclosure matter. According to one aspect, the subject matter described can include providing a data inquiry for receiving user input relating to a foreclosure matter. In response to the data inquiry, information can be retrieved over a data network relating to the foreclosure matter and documents can be generated relating to the foreclosure matter either automatically or in response to a document request. Information can be presented such as, for example, tracking information relating to the foreclosure matter.Type: ApplicationFiled: February 17, 2009Publication date: June 11, 2009Inventors: William Sutton Cherry, JR., Dale Joel Lee, Ellen Margaret Kinsinger
-
Publication number: 20070287930Abstract: A system is provided including: a monitor for monitoring a user's sleep cycles; a processor which counts the sleep cycles to provide a sleep cycle count and which selects an awakening time according to a decision algorithm including the sleep cycle count as an input; and an alarm for awakening the user at the awakening time. Use of the sleep cycle count as an input to the decision algorithm advantageously enables a user to more fully control and optimize his or her personal sleeping behavior.Type: ApplicationFiled: April 20, 2007Publication date: December 13, 2007Inventor: William Sutton
-
Publication number: 20050256569Abstract: An annuloplasty ring (for use as a heart valve prosthesis) has a non-planar shape and different lateral flexibilities at different points as one proceeds annularly around the ring. These different lateral flexibilities may be achieved in different ways such as by changing the material and/or cross-sectional size, shape, or other stiffness-imparting characteristics of the cross section.Type: ApplicationFiled: May 10, 2005Publication date: November 17, 2005Inventors: Jyue Lim, William Sutton
-
Publication number: 20050256568Abstract: A prosthesis for a heart valve (e.g., the mitral valve) is generally C-shaped in plan view. Points at the top and bottom of the C lie in a plan view plane. The back of the C rises above the plan view plane between the top and bottom points. Free end portions of the C may also rise above the plan view plane. The prosthesis is accordingly saddle-shaped. The back of the C may have an indentation that extends toward the open side of the C. In use as a mitral valve prosthesis the top and bottom of the C are respectively adjacent the commissures of the valve, and the back of the C is adjacent the posterior section of the valve. The prosthesis may be rigid or semi-rigid.Type: ApplicationFiled: May 10, 2005Publication date: November 17, 2005Inventors: Jyue Lim, William Sutton
-
Publication number: 20050124836Abstract: The present invention is directed to a method of dissolving a gaseous hydrocarbon into a liquid hydrocarbon to re-circulate gaseous components, which have separated from the liquid fuel mixture, back into the liquid fuel mixture, as well as, a method for making batch or continuous process amounts of mixed hydrocarbon fuels. The mixed hydrocarbon fuel is produced by introducing a volume of a liquid hydrocarbon into a vessel, and introducing a volume of a gaseous hydrocarbon into the vessel by bubbling the gaseous hydrocarbon into the liquid hydrocarbon at a gravitational low point of the vessel such that the bubbled gaseous hydrocarbon is dissolved into the liquid hydrocarbon to produce a liquid fuel solution. The vessel may be a mixing tank from which the liquid fuel is pumped into a vehicle fuel tank, or the vessel may be the vehicle fuel tank.Type: ApplicationFiled: October 25, 2004Publication date: June 9, 2005Inventors: William Sutton, Carlos Borras, Mauricio Sanchez, Richard Mallinson
-
Publication number: 20050012622Abstract: A system is provided including: a monitor for monitoring a user's sleep cycles; a processor which counts the sleep cycles to provide a sleep cycle count and which selects an awakening time according to a decision algorithm including the sleep cycle count as an input; and an alarm for awakening the user at the awakening time. Use of the sleep cycle count as an input to the decision algorithm advantageously enables a user to more fully control and optimize his or her personal sleeping behavior.Type: ApplicationFiled: May 18, 2004Publication date: January 20, 2005Inventor: William Sutton