Jeremy Austin Brown
Burglar Alarm in Orem, UT

License number
Utah 8190150-6502
Issued Date
Jan 13, 2012
Expiration Date
Mar 31, 2013
Category
Burglar Alarm
Type
Burglar Alarm Company Agent
Address
Address
Orem, UT

Personal information

See more information about Jeremy Austin Brown at radaris.com
Name
Address
Phone
Jeremy Brown
504 S Main St, Logan, UT 84321
(435) 752-1196
Jeremy Brown, age 50
4486 S Early Duke St, Salt Lake City, UT 84120
Jeremy Brown, age 84
4667 Brandy Wood Dr, Salt Lake Cty, UT 84120
(801) 230-7051
Jeremy Brown
455 N 100 E, Monroe, UT 84754
(435) 527-4974

Professional information

See more information about Jeremy Austin Brown at trustoria.com
Jeremy Brown Photo 1
System And Method For Indicating Usage Of System Resources Using Taskbar Graphics

System And Method For Indicating Usage Of System Resources Using Taskbar Graphics

US Patent:
8522247, Aug 27, 2013
Filed:
Jul 30, 2007
Appl. No.:
11/830534
Inventors:
Jeremy Ray Brown - Orem UT, US
Jason Allen Sabin - Pleasant Grove UT, US
Assignee:
Novell Intellectual Property Holdings, Inc. - Seattle WA
International Classification:
G06F 9/46
US Classification:
718104, 715779
Abstract:
System and method for a method for indicating relative usage of a computer system resource by a plurality of applications each running in an active window, wherein each active window is represented on a taskbar element by a taskbar button, are described. In one embodiment, the method comprises, for each of the active windows, determining a resource usage rate for the application running in the active window, the resource usage rate comprising a percentage of a total system resource usage for which the application accounts; subsequent to the determining, ranking the applications in order of the determined resource usage rates thereof; and redisplaying the taskbar buttons to indicate, via at least one display characteristic, the relative system resource usage rates of the applications.


Jeremy Brown Photo 2
System And Method For Determining Fuzzy Cause And Effect Relationships In An Intelligent Workload Management System

System And Method For Determining Fuzzy Cause And Effect Relationships In An Intelligent Workload Management System

US Patent:
8620851, Dec 31, 2013
Filed:
Nov 23, 2010
Appl. No.:
12/952314
Inventors:
Jeremy Brown - Orem UT, US
Jason Allen Sabin - Lehi UT, US
Nathaniel Brent Kranendonk - Springville UT, US
Kal A. Larsen - Springville UT, US
Lloyd Leon Burch - Payson UT, US
Michael Fairbanks - Lindon UT, US
Michael Jorgensen - Mapleton UT, US
Thomas Larry Biggs - Payson UT, US
Assignee:
Novell, Inc. - Provo UT
International Classification:
G06N 5/02, G06N 7/02
US Classification:
706 52
Abstract:
The system and method for determining fuzzy cause and effect relationships in an intelligent workload management system described herein may combine potential causes and effects captured from various different sources associated with an information technology infrastructure with substantially instantaneous feedback mechanisms and other knowledge sources. As such, fuzzy correlation logic may then be applied to the combined information to determine potential cause and effect relationships and thereby diagnose problems and otherwise manage interactions that occur in the infrastructure. For example, information describing potential causes and potential effects associated with an operational state of the infrastructure may be captured and combined, and any patterns among the information that describes the multiple potential causes and effects may then be identified. As such, fuzzy logic may the be applied to any such patterns to determine possible relationships among the potential causes and the potential effects associated with the infrastructure operational state.


Jeremy Brown Photo 3
Techniques For Authentication Via A Mobile Device

Techniques For Authentication Via A Mobile Device

US Patent:
2013011, May 2, 2013
Filed:
Oct 31, 2011
Appl. No.:
13/285487
Inventors:
Jason Allen Sabin - Lehi UT, US
Jeremy Ray Brown - Orem UT, US
Lloyd Leon Burch - Payson UT, US
International Classification:
H04L 9/32, G06F 17/00
US Classification:
713171, 726 3, 726 5, 726 1, 713176
Abstract:
Techniques for authentication via a mobile device are provided. A mobile device is pre-registered for website authentication services. A user encounters a website displaying an embedded code as an image alongside a normal login process for that website. The image is identified by the mobile device, encrypted and signed by the mobile device and sent to a proxy. The proxy authenticates the code and associates it with the website. Credentials for the user are provided to the website to automatically authenticate the user for access to the website bypassing the normal login process associated with the website.


Jeremy Brown Photo 4
Techniques For Mobile Device Authentication

Techniques For Mobile Device Authentication

US Patent:
8639926, Jan 28, 2014
Filed:
Oct 29, 2010
Appl. No.:
12/915816
Inventors:
Jeremy Ray Brown - Orem UT, US
Jason Allen Sabin - Lehi UT, US
Nathaniel Brent Kranendonk - Springville UT, US
Kal A. Larsen - Springville UT, US
Lloyd Leon Burch - Payson UT, US
Assignee:
Novell, Inc. - Provo UT
International Classification:
H04L 29/06
US Classification:
713168, 726 1, 726 2, 726 4, 726 26, 726 34, 726 35, 715780, 713193, 713194, 455411
Abstract:
A user authenticates a mobile device (MD) to a network-based service (NBS) for initial authentication. Policy is pushed from the NBS to the MD and the MD automatically obtains details about devices and attributes that are near or accessible to the MD in accordance with the policy. The details are pushed as a packet from the MD to the NBS and multifactor authentication is performed based on the details and the policy. If the multifactor authentication is successful, access privileges are set for the MD for accessing the NBS and perhaps for accessing local resources of the MD.


Jeremy Brown Photo 5
Techniques For Cloud Bursting

Techniques For Cloud Bursting

US Patent:
2012022, Aug 30, 2012
Filed:
Feb 28, 2011
Appl. No.:
13/036854
Inventors:
Jason Allen Sabin - Lehi UT, US
Stephen R. Carter - Spanish Fork UT, US
Michael John Jorgensen - Mapleton UT, US
Nathaniel Brent Kranendonk - Springville UT, US
Kal A. Larsen - Springville UT, US
Jeremy Ray Brown - Orem UT, US
International Classification:
G06F 9/46
US Classification:
718105
Abstract:
Techniques for automated and controlled cloud migration or bursting are provided. A schema for a first cloud in a first cloud processing environment is used to evaluate metrics against thresholds defined in the schema. When a threshold is reached other metrics for other clouds in second cloud processing environments are evaluated and a second cloud processing environment is selected. Next, a second cloud is cloned in the selected second cloud processing environment for the first cloud and traffic associated with the first cloud is automatically migrated to the cloned second cloud.


Jeremy Brown Photo 6
Techniques For Controlling Authentication

Techniques For Controlling Authentication

US Patent:
2013011, May 2, 2013
Filed:
Oct 31, 2011
Appl. No.:
13/286013
Inventors:
Jeremy Ray Brown - Orem UT, US
Jason Allen Sabin - Lehi UT, US
Lloyd Leon Burch - Payson UT, US
Douglas Garry Earl - Orem UT, US
International Classification:
G06F 21/00
US Classification:
726 1, 726 7
Abstract:
Techniques for controlling authentication are provided. An enterprise injects a control and/or audit manager into the enterprise environment to control and in some instances audit third-party authentication services. A user attempts to access a resource that uses a third-party authentication service. The attempt is intercepted and third-party authentication handled by the manager. After authentication, a session between the user and the resource is established during which auditing services may be enacted. The user authenticates to the enterprise environment and the manager provides authentication for the user to the resource via the third-party authentication service.


Jeremy Brown Photo 7
Techniques For Distributed Testing

Techniques For Distributed Testing

US Patent:
8560273, Oct 15, 2013
Filed:
Feb 17, 2012
Appl. No.:
13/399714
Inventors:
Jeremy Ray Brown - Orem UT, US
Lloyd Leon Burch - Payson UT, US
Assignee:
Novell, Inc. - Provo UT
International Classification:
G06F 12/00
US Classification:
702186, 702182, 702183, 702187, 709223, 709224, 709226
Abstract:
Techniques for distributed testing are provided. Resources are identified for performing tests over a network. The tests and policies are sent to the resources and a proxy. The proxy delivers data for the tests to the resources and enforces the policies during the tests. The proxy also gathers statistics and results from the resources, which are executing the tests, and the proxy reports the statistics and results to one or more third-party services for subsequent manipulation and analysis.


Jeremy Brown Photo 8
System And Method For Providing An Importance Filter For Electronic Mail Messages

System And Method For Providing An Importance Filter For Electronic Mail Messages

US Patent:
2008019, Aug 14, 2008
Filed:
Feb 14, 2007
Appl. No.:
11/705930
Inventors:
Jeremy Ray Brown - Orem UT, US
Assignee:
Novell, Inc. - Provo UT
International Classification:
G06F 15/16
US Classification:
709207
Abstract:
A system and method for implementing an importance filter in an electronic mail message system are described. In one embodiment, the method comprises receiving an incoming email message; rating the received email message in accordance with at least one criterion; and responsive to the rating, displaying in the email inbox an entry corresponding to the received email message in a manner indicative of a result of the rating.


Jeremy Brown Photo 9
Techniques For Identity Authentication Of Virtualized Machines

Techniques For Identity Authentication Of Virtualized Machines

US Patent:
8561137, Oct 15, 2013
Filed:
Jul 23, 2008
Appl. No.:
12/177932
Inventors:
Jason Allen Sabin - Lehi UT, US
Jeremy Ray Brown - Orem UT, US
Lloyd Leon Burch - Payson UT, US
Assignee:
Oracle International Corporation - Redwood Shores CA
International Classification:
H04L 9/32, G06F 9/455
US Classification:
726 2, 718 1
Abstract:
Techniques for identity authentication of Virtual Machines (VM's) are provided. A VM is authenticated and once authenticated, each device interfaced to or accessible to the VM is also authenticated. When both the VM and each device are authenticated, the VM is granted access to a machine for installation thereon.


Jeremy Brown Photo 10
Identity Based Network Mapping

Identity Based Network Mapping

US Patent:
8091119, Jan 3, 2012
Filed:
Aug 22, 2007
Appl. No.:
11/843008
Inventors:
Jeremy Ray Brown - Orem UT, US
Lloyd Leon Burch - Payson UT, US
Assignee:
Novell, Inc. - Provo UT
International Classification:
G06F 7/04, G06F 17/30, G06F 15/16, G06F 15/173, H04J 1/00, H04L 9/30, G07B 17/00
US Classification:
726 4, 726 8, 726 27, 709218, 709224, 709225, 370480
Abstract:
Techniques for identity-based network mapping are provided. A principal is associated with a resource identifier via a mapping. Conditions of a network are dynamically evaluated in response to policy and actions taken against a resource associated with the resource identifier of the mapping. The principal and the hardware resource of a machine are associated with two different types of resources and the mapping is used to manage security and maintenance associated with a network for shutting down the principal from accessing the network when an issue is detected with the hardware resource and the hardware resource is shut down when the issue is with the principal.