Patents - stay tuned to the technology

Inventors list

Assignees list

Classification tree browser

Top 100 Inventors

Top 100 Assignees


Mcnamee

Alan Mcnamee, Drumcondra IE

Patent application numberDescriptionPublished
20120155389METHODS, SYSTEMS AND DEVICES FOR DYNAMIC CONTEXT-BASED ROUTING - Methods, servers and systems for performing dynamic context based routing operations in a telecommunications signaling network in which a dynamic context based router may receive a first message encoding signaling information from a source component, decode the message into an internal representation, perform application level routing operations using contextual information derived from the internal representation to identify a destination component, encode signaling information contained in the internal representation into a second message, and send the second message to the identified destination component. Application level routing operations using contextual information may include generating keys based on the internal representation, transmitting the generated keys to an external resource, receiving supplementary information in response to the generated keys, and using the supplementary information to identify the destination component. The information in the internal representation may be modified to send a subset or a superset of the information contained in the first message.06-21-2012
20120155470METHODS, SYSTEMS AND DEVICES FOR MULTIPHASE DECODING - The various embodiments include methods, servers and systems for communicating signaling information in a telecommunications signaling network that involves decoding a first portion of the received first message, determining if the decoded first portion identifies a destination component, determining if the destination component can be derived from the decoded first portion when the decoded first portion does not identify a destination component, recursively decoding subsequent portions of the received first message when previously decoded portions do not identify the destination component and that the destination component cannot be derived using the previously decoded portions, performing context-based routing operations using information extracted from the previously decoded portions to identify the destination component, packaging the previously decoded portions along with a remainder of the first message into a second message encoding signaling information, and sending the second message encoding signaling information to the identified destination component over a second communications link.06-21-2012
20120158872METHODS, SYSTEMS AND DEVICES FOR HORIZONTALLY SCALABLE HIGH-AVAILABILITY DYNAMIC CONTEXT-BASED ROUTING - Methods, servers and systems for communicating information in networks enable efficient expansion while maintaining high-availability. A first message associated with an entity may be received on a first server. An operation may be performed on certain information included in the first message associated with the entity to identify a first data repository in which information associated with the first message or the entity is to be stored. Information extracted from the first message may be stored in the identified first data repository. When a second message associated with the entity is received, the same operation may be performed on the same certain information included in the second message to identify the first data repository in which information associated with the first message or the entity is stored. The information related to the first message or the entity from the first data repository may then be used.06-21-2012
20120158993METHODS, SYSTEMS AND DEVICES FOR PIPELINE PROCESSING - Methods, servers and systems for communicating signaling information in a telecommunications signaling network implement methods that include receiving a first message encoding signaling information from a source component and processing the message using a fixed pipeline having a plurality of modules, each module having at least one procedure for performing a specific set of tasks. Application level routing operations may be performed to identify a suitable destination component. Information contained in the first message may be used to generate a second message encoding signaling information, which is sent to the identified destination component.06-21-2012
20120158994METHODS, SYSTEMS AND DEVICES FOR DYNAMIC CONTEXT-BASED ROUTING USING A TOPOLOGY TREE - Methods, servers and systems for communicating signaling information in a telecommunications signaling network may involve using a topology tree categorizing network nodes into groups, receiving a first message encoding signaling information from a source, decoding the received first message into an internal representation of the message, determining if the internal representation identifies a destination component in the topology tree, performing application level routing operations by hierarchy to determine if information contained in the internal representation identifies a destination component in the topology tree, packaging the information contained in the internal representation into a second message encoding signaling information, and sending the second message encoding signaling information to the identified destination component. The topology tree may include one or more domains as root nodes, a peer-group as an internal node for each of the one or more domains, and a peer as a terminal node for the at least one peer-group.06-21-2012
20120158995METHODS, SYSTEMS AND DEVICES FOR FORKED ROUTING - Methods, servers and systems for communicating signaling information in a policy and charging control network within a telecommunications signaling network, may include receiving a message encoding signaling information in a dynamic context router operating at the application layer. The dynamic context router may determine whether the received message is to be replicated, and if so, the dynamic context router may identify a primary destination to which the received message is to be sent and secondary destinations to which replicated messages (“fork-routed messages”) are to be sent. The message may be replicated into multiple fork-routed messages, with the original message sent to the primary destination and the fork-routed messages sent to secondary destination components. The replicated fork-routed messages may be the same as or different from the received message, and may be sent using the same protocol or different protocols.06-21-2012
20120233656Methods, Systems and Devices for the Detection and Prevention of Malware Within a Network - Methods, systems and devices examine data flows in a communication system control network for known malware threats and suspicious properties typically associated with malware threats. A policy management system inside the control network accesses a user repository and a charging network, and performs pattern matching and/or observed behavior detection methods to determine if the data flows carry content (e.g., malware) that poses a security risk to network or wireless devices. The policy management system generates policy rules based on user preferences and risk-level. The policy management system sends the generated policy rules to a gateway/PCEF, which blocks the data flows, allows the data flows, or restricts the data flow based on the policy rules.09-13-2012
20130151710SYSTEMS, DEVICES, AND METHODS OF ORCHESTRATION AND APPLICATION OF BUSINESS RULES FOR REAL-TIME CONTROL OF SUBSCRIBERS IN A TELECOMMUNICATIONS OPERATOR'S NETWORK - The various embodiments include methods, computing devices and communication systems for controlling services in a communications network. A communications server may be configured to receive bounding information from a first server, decision making information from a second server, and a request to generate a decision from any of a number of different systems or components. The communications server may define bounds for generating the decision based on the received bounding information, and generate the decision based on the received decision making information and defined bounds. The communication server may send the generated decision to a third server implementing a functional system, such as a server in policy management system, policy enforcement system, charging system, or mobile application server system.06-13-2013
20150100640METHODS, SYSTEMS AND DEVICES FOR PIPELINE PROCESSING - Methods, servers and systems for communicating signaling information in a telecommunications signaling network implement methods that include receiving a first message encoding signaling information from a source component and processing the message using a fixed pipeline having a plurality of modules, each module having at least one procedure for performing a specific set of tasks. Application level routing operations may be performed to identify a suitable destination component. Information contained in the first message may be used to generate a second message encoding signaling information, which is sent to the identified destination component.04-09-2015

Patent applications by Alan Mcnamee, Drumcondra IE

Alan Mcnamee, Dublin IE

Patent application numberDescriptionPublished
20100093336METHOD AND SYSTEM FOR CHARGING CONTROL IN TELECOMMUNICATIONS SERVICES - A method for charging control in a communications network comprises, at a policy manager, responsive to a request for policy regulations for a subscriber, a stimulus is provided to a control system to trigger pre-emptive retrieval of subscriber information. At the control system, responsive to the stimulus, subscriber information is retrieved, information is stored in a cache, and responsive to receiving a request from a party, the information in cache is consulted and a response is provided to the party based on the consultation.04-15-2010
20100185488METHOD AND SYSTEM FOR POLICY CONTROL IN TELECOMMUNICATIONS SERVICES - This disclosure relates to a method and system for policy control in telecommunications services.07-22-2010
20120140620METHOD AND SYSTEM FOR DETERMINING AND IMPLEMENTING POLICY CONTROLS IN A COMMUNICATIONS NETWORK - A computer-implemented method of determining policy control decisions in a telecommunications network. The method comprises the steps of receiving a predictive indicator from a forecasting system, wherein the predictive indicator includes predictive network resource utilization information, responsive to receiving a service request from a gateway, determining a policy decision based on the predictive indicator, and sending the policy decision to the gateway.06-07-2012
20120275377SYSTEMS, DEVICES AND METHODS OF CROWD-SOURCING ACROSS MULTIPLE DOMAINS - The various embodiments include methods, computers and communication systems for controlling services across multiple heterogeneous networks by collecting communication information from a plurality of telecommunications domains, generating a message based on the collected communication information, and sending the generated message to a public interface of a telecommunications domain to alter the functionality of the telecommunications domain component. The generated message may include information for altering a functionality of a telecommunications domain component. Generating a message based on the collected communication information may include crowd sourcing the collected information, which may include summing, averaging, aggregating, comparing and/or correlating the collected information.11-01-2012
20120275553SYSTEMS, DEVICES AND METHODS OF SYNCHRONIZING INFORMATION ACROSS MULTIPLE HETEROGENEOUS NETWORKS - The various embodiments include methods, computers and communication systems that enable synchronizing information in a telecommunications system, which may include receiving a first message including communication information to be synchronized from a first domain, receiving a second message including information associated with a communication on a component in a second telecommunication domain, synchronizing information included in the first message with information included in the second message, and sending the synchronized information to a public interface of the first domain. Synchronizing the information included in the first message with information included in the second message may include synchronizing one or more of metering, rating, charging, balance, policy, and contextual information.11-01-2012
20120275573SYSTEMS, DEVICES AND METHODS OF ESTABLISHING A CLOSED FEEDBACK CONTROL LOOP ACROSS MULTIPLE DOMAINS - The various embodiments include methods, computers and communication systems for establishing a closed feedback loop across multiple heterogeneous networks within a telecommunications system, which may include measuring a first attribute of a communication in a first telecommunications domain and sending a first request message including information relating to the measured first attribute to a server. The server may receive the first request message, identify a second telecommunications domain involved in the communication based on information in the first request message, generate a second request message that includes information for adjusting a second attribute of the communication, and send the second request message to the second telecommunications domain. A computing device in the second telecommunications domain may receive the second request message and adjust the second attribute of the communication to alter the first attribute of the communication in the first telecommunications domain.11-01-2012
20120276867SYSTEMS FOR ENABLING SUBSCRIBER MONITORING OF TELECOMMUNICATIONS NETWORK USAGE AND SERVICE PLANS - Methods, servers and systems for directly accessing and modify charging information maintained within a telecommunications operator's business and operating systems' infrastructure from user equipment. A mobile application server may receive a charging request from a user equipment, identify a relevant charging system based on the received request, send a charging request to the identified charging system for processing, receive a first response message including charging information from the identified charging system, generate a second response message based on the charging information included in the first response message, and send the generated second response message to the user equipment. The received charging request may include various types of information, including information for transferring cost or billing information from a first billing category to a second billing category.11-01-2012
20120278378SYSTEMS, DEVICES AND METHODS OF DECOMPOSING SERVICE REQUESTS INTO DOMAIN-SPECIFIC SERVICE REQUESTS - The various embodiments include methods, computers and communication systems that enable decomposing abstract service requests into resources rules, which may include receiving an abstract service request (e.g., a request specifying a functional requirement) via an exposed public interface, generating domain-specific resource rules based on the received abstract service request, identifying relevant components in a telecommunications domain for enforcing the generated domain-specific resource rules, and send the domain-specific resource rules to the identified components (e.g., online charging server, policy management server, etc.) for enforcement. Generating domain-specific resource rules based on the received abstract service request may include generating the rules consistent with the existing resource rules of the domain.11-01-2012
20120278430SYSTEMS, DEVICES, AND METHODS OF ORCHESTRATING RESOURCES AND SERVICES ACROSS MULTIPLE HETEROGENEOUS DOMAINS - The various embodiments include methods, computers and communication systems for controlling services across multiple heterogeneous networks, which may include receiving a service request, identifying two or more telecommunications domains required to fulfill the received service request, generating two or more domain specific service requests based on the received service request, associating at least one of the generated plurality of domain specific service requests with one of the identified telecommunications domains, and sending the associated domain specific service requests to exposed public interfaces of the associated telecommunications domains. A component in the telecommunications domain may receive the domain specific service request, decompose the request into resource rule(s), and send the resource rule(s) to a relevant component within the associated telecommunications domain for enforcement.11-01-2012
20120278464SYSTEMS, DEVICES AND METHODS OF DISTRIBUTING TELECOMMUNICATIONS FUNCTIONALITY ACROSS MULTIPLE HETEROGENEOUS DOMAINS - The various embodiments include methods, computers and communication systems for distributing telecommunications functionality across multiple heterogeneous domains within a telecommunications system, which may include determining policy-charging capabilities of a first telecommunications domain, determining policy-charging capabilities of a second telecommunications domain, determining policy-charging requirements required for a communication, partitioning the policy-charging requirements into a first group and a second group based on the determined policy-charging capabilities of the first and second telecommunications domains, sending a first message including the first group of policy-charging requirements to a public interface of the first domain, and sending a second message including the second group of policy-charging requirements to a public interface of the second domain.11-01-2012
20130196623System and Method For Enabling Interactions Between a Policy Decision Point and a Charging System - A system and method for telecommunications operators to enable group based dynamic policy controls for both pre-paid and post-paid subscribers, who are typically not managed in an Online Charging System (OCS), but rather in an Charging System or a Billing System. Examples of policy controls that may be enabled by this invention include tracking spending for post-paid subscribers, managing subscriber usage across fixed-line and mobile networks, and so on. This is achieved by introducing a new component called the Enhanced Charging System (ECS) and creating a new reference point and interface between the Policy Management System and the ECS.08-01-2013
20130325983System and Method for Communicating in a Telecommunication Network via Common Key Routing and Proxies - A combination of a common key routing (CKR) method and data proxy architecture (DPA) method may be used to route communication messages in a telecommunication network to achieve improved data locality and reduce secondary key lookups. A processor in a multiprocessor computing system may receive a first communication message that includes subscriber identifiers that uniquely identify a subscriber, generate a common key based on the subscriber identifiers, identify a first logical scalable unit that includes a first database memory that stores subscriber data relating to the subscriber via a database application programming interface (API) and the common key, store the first communication message in the first database memory included in the first logical scalable unit, and receive a second communication message in response to storing the first communication message in the first database memory and routing the second communication message to another component the telecommunication network.12-05-2013
20130325984System and Methods for Communicating in a Telecommunication Network Using Common Key Routing and Data Locality Tables - A combination of a common key routing (CKR) method and a data locality table (DLT) method may be used to route communication messages in a telecommunication network to achieve improved data locality and reduce secondary key lookups. A processor in a multiprocessor computing system may receive a first communication message that includes subscriber identifiers that uniquely identify a subscriber, generate a common key based on the subscriber identifiers included in the first communication message, and identify a first logical scalable unit that includes a first database memory that stores subscriber data relating to the subscriber by querying a data locality table with the common key. The processor may also identify a first application processor in the multiprocessor computing system that is part of the first logical scalable unit and send the first communication message to the first application processor.12-05-2013
20130325985System and Method for Communicating in a Telecommunication Network via Independent Key Routing and Data Locality Tables - A combination of an independent key routing (IKR) method and a data locality table (DLT) method may be used to route communication messages in a telecommunication network to achieve improved data locality and reduce secondary key lookups. A processor a multiprocessor computing system may receive a first communication message that includes subscriber identifiers that uniquely identify a subscriber, generate a plurality of keys for a plurality of message types based on the subscriber identifiers, identify a first logical scalable unit that includes a first database memory that stores a first type of data relating to the subscriber by using a first key of the plurality of keys to query a data locality table, identify a first application processor in the multiprocessor computing system that is part of the first logical scalable unit, and send the first communication message and the plurality of keys to the first application processor.12-05-2013
20130325986System and Methods for Communicating in a Telecommunication Network via Independent Key Routing and Proxies - A combination of an independent key routing (IKR) method and a data proxy architecture (DPA) method may be used to route communication messages in a telecommunication network to achieve improved data locality and reduce secondary key lookups. A processor may receive a first communication message that includes subscriber identifiers that uniquely identify a subscriber, generate a plurality of keys for a plurality of message types, identify a first logical scalable unit (LSU) that includes a first memory that stores a first type of data via a database API and a first key, identify a second LSU that includes a second memory that stores a second type of data relating to the subscriber via the database API and a second key of the plurality of keys, store the first communication message and the first key in the first database memory, and store the first key in the second database memory.12-05-2013
20130326058System and Method for Seamless Horizontal Scaling using Logical Scalable Units - The performance of a scalable computing environment in a telecommunication network may be improved by configuring a server computing system to monitor a level of traffic throughput within the telecommunication network to determine whether an increase in throughput capacity is needed or a decrease in throughput capacity is acceptable, and increasing a throughput capacity of the telecommunication network when an increase in throughput capacity is needed by adding a logical scalable unit to the telecommunication network. The logical scalable unit may including a minimum combination of logical components required to provide in a single multiprocessor system a complete set of telecommunication functionalities for a subset of users in the telecommunication network.12-05-2013
20140018036System and Method for Charging Future State Status Notifications - A telecommunication network may include a policy management system and a charging system. The charging system may be configured to receive a request for subscriber state information relating to a subscriber from the policy management system, retrieve current subscriber state information from memory, determine future subscriber state information for the subscriber, generate a communication message that includes the current subscriber state information and the future subscriber state information, and send the generated communication message to the server computing device.01-16-2014
20140038549System and Method for Controlling Advanced Triggering Operations in a Telecommunication Network - A network server may be configured to communicate triggers across a telecommunication network by receiving a trigger communication message that includes information suitable for causing a destination machine-to-machine device to perform operations in response to receiving the trigger communication message, receiving policy or charging information from a component in the telecommunication network, determining whether the trigger communication message should be sent to the destination machine-to-machine based on the received policy or charging information, and sending the trigger communication message to the destination component only when it is determined that the trigger communication message should be sent to the destination machine-to-machine based on the received policy or charging information.02-06-2014
20140073285System and Method for Performing Multi-Enforcement Point Charging - Systems and methods for accomplishing charging operations in telecommunications networks that include multiple charging and enforcement components may include configuring a first charging and enforcement component to receive user traffic, determine usage information associated with the received user traffic, send the associated usage information to a charging system component, and send the user traffic and the associated usage information to a second charging and enforcement component. The second charging and enforcement component may be configured to receive the user traffic and usage information, compute updated usage information, and send the updated usage information to the charging system component. The charging system may use this updated usage information to ensure that the subscriber accounts were billed correctly.03-13-2014
20150079929Systems and Methods for Enabling Subscriber Monitoring of Telecommunications Network Usage and Service Plans - Methods, servers and systems for directly accessing and modifying charging information maintained within a telecommunications operator's business and operating systems' infrastructure from user equipment. A mobile application server may receive a charging request from a user equipment, identify a relevant charging system based on the received request, send a charging request to the identified charging system for processing, receive a first response message including charging information from the identified charging system, generate a second response message based on the charging information included in the first response message, and send the generated second response message to the user equipment. The received charging request may include various types of information, including information for transferring cost or billing information from a first billing category to a second billing category.03-19-2015
20150094019Systems for Enabling Subscriber Monitoring of Telecommunications Network Usage and Service Plans - Methods, servers and systems for directly accessing and modifying charging information maintained within a telecommunications operator's business and operating systems' infrastructure from user equipment. A mobile application server may receive a charging request from a user equipment, identify a relevant charging system based on the received request, send a charging request to the identified charging system for processing, receive a first response message including charging information from the identified charging system, generate a second response message based on the charging information included in the first response message, and send the generated second response message to the user equipment. The received charging request may include various types of information, including information for transferring cost or billing information from a first billing category to a second billing category.04-02-2015
20150120668Method and System for Reducing Journaling Log Activity in Databases - Methods, devices and systems enable restoring a database system more efficiently. A server computing device may be configured to receive a database transaction request that includes information identifying a database operation, determine a priority value for the database operation, and add the database operation to a journaling log based on the determined priority value. After detecting a failure event, the server computing device may perform the database operations identified in the journaling log to restore the database system.04-30-2015
20150120673Method and System for Eliminating Backups in Databases - Methods, devices and systems enable restoring a database system more efficiently. A server computing device may be configured to determine a recovery time interval, periodically review database records to identify a database record that has not been updated within a most recent recovery time interval, add the identified database record to a journaling log, and update the identified database record to include information identifying a time at which the database record was last added to the journaling log. After detecting a failure event, the server computing device may perform the database operations identified in the journaling log to restore the database system.04-30-2015

Patent applications by Alan Mcnamee, Dublin IE

Desmond Mcnamee, Ottawa CA

Patent application numberDescriptionPublished
20130318574SYSTEM AND METHOD FOR GROUP VIDEO MESSAGING SERVICE - A group video messaging method stores user information identifying authorized users of a video messaging system, and provides a user interface to the video messaging system. The user interface permits authorized users to transfer video files to the video messaging system for storage and retrieval, and to identify criteria for other authorized users to access each transferred video file. The method also stores in the video messaging system the video files transferred to the system by the authorized users; stores information identifying the user that transferred each stored video file to the video messaging system, and the criteria for authorized users to access the stored video files; and stores information identifying different groups of the authorized users and which of the stored video files are to be accessible to each of the authorized users or authorized user groups.11-28-2013
20150181162SYSTEM AND METHOD FOR GROUP VIDEO MESSAGING SERVICE - A group video messaging method stores user information identifying authorized users of a video messaging system, and provides a user interface to the video messaging system. The user interface permits authorized users to transfer video files to the video messaging system for storage and retrieval, and to identify criteria for other authorized users to access each transferred video file. The method also stores in the video messaging system the video files transferred to the system by the authorized users; stores information identifying the user that transferred each stored video file to the video messaging system, and the criteria for authorized users to access the stored video files; and stores information identifying different groups of the authorized users and which of the stored video files are to be accessible to each of the authorized users or authorized user groups.06-25-2015

John Boden Mcnamee, New South Wales AU

Patent application numberDescriptionPublished
20090187509Methods of Facilitating the Use and Occupancy of Land07-23-2009

John Christopher Mcnamee, New South Wales AU

Patent application numberDescriptionPublished
20090187509Methods of Facilitating the Use and Occupancy of Land07-23-2009

Kelly Mcnamee, Toronto CA

Patent application numberDescriptionPublished
20080245352THERMO-ELECTRIC GENERATOR FOR USE WITH A STOVE - Disclosed is in combination, a stove and a thermoelectric generator, wherein the stove has a heating chamber and the generator has a hot side plate positioned in use within the heating chamber in a direct path of the heat therefrom. The generator may be incorporated with a door of the stove. Preferably, the generator has a cold side plate positioned in use to be exposed to ambient air close to the ground. The cold side plate may comprise cooling fins and the cooling fins may be positioned to be exposed to ambient air close to the ground. The generator may further comprise a protective mechanism to protect the generator from overheating, such as a grillwork guard or a shutter that closes to block the direct heat from the generator mechanism. The stove may be a wood stove or a coal stove. Generated power can be used to power cooling fans, charge an energy storage device and/or power external devices such as lights, fans or radios for example.10-09-2008

Kevin Mcnamee, Ottawa CA

Patent application numberDescriptionPublished
20080313708Data content matching - A method, device and system for matching data content, including identifying items of data that would be potentially harmful if transferred through a network, creating a list containing the identified items of potentially harmful data, deriving a hash value for each item of data on the list, receiving a data stream containing data packets, calculating a hash value for each data packet in the data stream, evaluating whether any of the hash values calculated for the data packets in the data stream match any of the hash values derived for each item of data on the list, discovering a hash value match between one of the data packets in the data stream and one of the items of data on the list, comparing the actual contents of the one data packet in the data stream to the actual contents of the one item of data on the list, confirming a match between the actual contents of the one data packet in the data stream and the one item of data on the list, and applying a filter policy that restricts a further transfer of the one data packet through the network. Some embodiments also include identifying a field of interest for each item of data on the list and for each data packet in the data stream.12-18-2008
20100154059NETWORK BASED MALWARE DETECTION AND REPORTING - An apparatus, system and method are described for use in detecting the presence of malware on subscribers computers. The apparatus, system and method are network based and may be deployed within an Internet Service Provider (ISP) network. The system may include a plurality of network sensors for receiving and analyzing network traffic to determine the presence of malware. An aggregating apparatus receives alerts of the presence of malware and translates a network identifier of the alert to a subscriber identifier. The aggregating apparatus aggregates alert information and forwards it to a reporting infrastructure that can generate notifications in order to notify a subscriber that malware has been detected on a computer associated with the subscriber.06-17-2010
20100180121METHOD AND APPARATUS FOR ENHANCING SECURITY IN NETWORK-BASED DATA COMMUNICATION - Various embodiments of a method and associated equipment for enhancing security in a network-based data communication are provided. In one embodiment, the method includes: a) maintaining at least access to data which a transmitting user may selectively transmit, b) providing a submit control associated with a recipient user to which the data may be selectively transmitted, c) in response to the transmitting user activating the submit control, presenting information to the transmitting user that identifies the recipient user to which the data is about to be sent, and d) in response to the transmitting user activating a verification control, transmitting the data to the recipient user. In one embodiment, the associated equipment includes a first computing device associated with a transmitting user, a second computing device associated with a recipient user; and a communication network through which the first computing device can operatively communicate with the second computing device.07-15-2010
20110197278CONTAINMENT MECHANISM FOR POTENTIALLY CONTAMINATED END SYSTEMS - A malware detection and response system based on traffic pattern anomalies detection is provided, whereby packets associated with a variety of protocols on each port of a network element are counted distinctly for each direction. Such packets include: ARP requests, TCP/SYN requests and acknowledgements, TCP/RST packets, DNS/NETBEUI name lookups, out-going ICMP packets, UDP packets, etc. When a packet causes an individual count or combination of counts to exceed a threshold, appropriate action is taken. The system can be incorporated into the fast path, that is, the data plane, enabling communications systems such as switches, routers, and DSLAMs to have built-in security at a very low cost.08-11-2011
20120255019METHOD AND SYSTEM FOR OPERATING SYSTEM IDENTIFICATION IN A NETWORK BASED SECURITY MONITORING SOLUTION - A method and system for providing network based malware detection in a service provider network is disclosed. Transmission control protocol (TCP) packets defining originating from an access device coupled to the service provider network defining a TCP session between a computing device coupled to the access device, and a destination coupled to the service provider network are received. An operating system identifier (OS ID) associated with the TCP session and the computing device is determined. If malware is present in the TCP session and an associated malware ID is determined by comparing a malware signature to the one or more TCP packets. An alert identifying a network address associated with the access device, the malware ID and the OS ID associated with TCP session that generated the alert can then be generated.10-04-2012
20140259168MALWARE IDENTIFICATION USING A HYBRID HOST AND NETWORK BASED APPROACH - Identifying malware on a user device allows corrective actions, such as removing the malware, to be taken. Malware can be detected using a hybrid approach that uses both network based devices and an agent running on the user device. The network based devices can detect network traffic associated with malware that is sent to or from the user device. A notification can be generated and sent to the user device, which uses information in the notification to identify possible malware on the user device.09-11-2014

Patent applications by Kevin Mcnamee, Ottawa CA

Pauline Mary Mcnamee, Camberley GB

Patent application numberDescriptionPublished
20160115424FRAGRANCE COMPOSITIONS COMPRISING IONIC LIQUIDS - The present invention relates to a fragrance composition comprising ionic liquids for enhanced evaporation of the perfume raw materials. The invention also relates to methods of use of the fragrance compositions for perfuming suitable substrates, particularly skin and hair.04-28-2016

Stephen Mcnamee, Rhode IE

Patent application numberDescriptionPublished
20130319664Inflow Control Device Having Externally Configurable Flow Ports - A completion joint 12-05-2013
20140238657Erosion Ports for Shunt Tubes - A gravel pack apparatus for a wellbore has a shunt tube disposed along the apparatus near a wellscreen. The shunt tube is typically composed of stainless steel and has an internal passage for conducting slurry. Along its length, the tube has flow ports for passing the conducted slurry into the wellbore. The exit ports can use erosion inserts composed of erodible material, barrier inserts having breakable barriers, flow nozzles with external sheaths or caps, erosion-resistant bushings disposed on the flow nozzles, etc. The tube can also include a tube body having the exit ports and flow nozzles integrally formed thereon. The tube body can couple end-to-end with sections of shunt tube.08-28-2014
20140262332Shunt Tube Connections for Wellscreen Assembly - A well screen assembly has a base pipe and one or more screen sections attached to the outer surface of the base pipe. The assembly also has one or more shunt tubes attached to the base pipe via top and bottom rings. The shunt tubes can be attached to the screen sections via B-rings and may be transport tubes or packing tubes. Connections are used for securing a jumper tube to adjoining shunt tubes of adjoining screen sections of the wellscreen assembly, which may be used in open or cased holes. At a well site, the joints of the wellscreens have timed threads so that the various shunt tubes can be aligned with one another along the assembly as the joints are made up. The connections of the present disclosure allow operators to install a jumper tubes between shunt tubes at the joint without needing to tighten fasteners or assembly components.09-18-2014
20150226040Leak-Off Assembly for Gravel Pack System - A gravel pack assembly for a borehole has first and second joints and a foil. The basepipes of the joints connect end-to-end, and both of the basepipes having filters for filtering fluid passage from a borehole into bores of the basepipes. Transport tubes are disposed along the first and second joint, and a jumper tube expands across the connected ends of the basepipes and connects the transport tubes together. The foil encloses an area across the connected ends. The foil has an external surface defining an annulus thereabout with the borehole. The foil has end rings abutting the filters of the joints. At least a section of the foil leaks fluid from the borehole to the area enclosed by the foil, and at least a filter portion of the assembly filters the leaked fluid from the area to at least one of the first and second bores.08-13-2015

Patent applications by Stephen Mcnamee, Rhode IE

Website © 2016 Advameg, Inc.