Patents by Inventor Brandon Hart
Brandon Hart has filed for patents to protect the following inventions. This listing includes patent applications that are pending as well as patents that have already been granted by the United States Patent and Trademark Office (USPTO).
-
Patent number: 11979388Abstract: A method of an authentication server may include receiving, from a recipient computer system, recipient metadata comprising recipient information from the recipient computing system and a recipient network address. Access to the encrypted payload is authenticated by the recipient computer system using the recipient metadata. A response is sent to the recipient computer system after authenticating the recipient computer system. The recipient computer system decrypts the encrypted payload to access the payload in response to receiving the response.Type: GrantFiled: September 18, 2020Date of Patent: May 7, 2024Assignee: Keyavi Data CorporationInventors: Cody Pollet, Charles Burgess, Courtney Roach, Brandon Hart
-
Publication number: 20240121363Abstract: An example implementation includes a device that includes a base infrastructure inspection unit and a plurality of modular sensor units attached to the base infrastructure inspection unit. The base infrastructure inspection unit includes a set of one or more processors and a memory device having code executable by the one or more processors. The executable code synchronizes the plurality of sensor units, captures two or more data streams of infrastructure inspection data, combines the data with metadata indicating synchronization between respective ones of the plurality of sensor units, and provides combined metadata and infrastructure inspection data for inclusion in a photorealistic image based on a three-dimensional (3D) model of the infrastructure.Type: ApplicationFiled: October 9, 2023Publication date: April 11, 2024Applicant: RedZone Robotics, Inc.Inventors: Jianan Lin, Brandon McGannon, Charles Hart, Jason Mizgorski
-
Patent number: 11876797Abstract: A method includes logging into a server and sending geolocation information to the server by a first device. The first device requests rights to decrypt a secure data file, and in response, the server sends a machine-readable optical label to the first device. The first device displays the machine-readable optical label. A second device logs into the server, and scans the machine-readable optical label displayed by the first device to create a scanned image. The second device decodes data from the scanned image to form decoded data. Geolocation information of the second device and the decoded data are submitted to the server. The decoded data and the geolocation information are validated by the server, and in response to successfully validating the geolocation information, a link completion status indicator is sent to the second device, and information to decrypt the secure data file is sent to the first device.Type: GrantFiled: March 26, 2021Date of Patent: January 16, 2024Assignee: Everything Blockchain Technology Corp.Inventors: Brandon Hart, Courtney Roach
-
Publication number: 20230239138Abstract: In one form, a method for a client to conduct a secure communication with a server includes negotiating a selected cryptographic algorithm for use in a new session with the server. A new server public key and the selected cryptographic algorithm is received from the server a using a data payload signed by an embedded key pair. A new client key pair including a new client public key and a new client private key is generated using the selected cryptographic algorithm. The new client public key is sent to the server. At least one server data payload is received from the server during the new session encrypted by a new session key generated from the new client public key.Type: ApplicationFiled: January 24, 2023Publication date: July 27, 2023Applicant: EVERYTHING BLOCKCHAIN TECHNOLOGY CORP.Inventors: Courtney Roach, Brandon Hart
-
Publication number: 20230158446Abstract: A carbon dioxide capture facility is disclosed comprising packing formed as a slab, and at least one liquid source. The slab has opposed dominant faces, the opposed dominant faces being at least partially wind penetrable to allow wind to flow through the packing. The at least one liquid source is oriented to direct carbon dioxide absorbent liquid into the packing to flow through the slab. The slab is disposed in a wind flow that has a non-zero incident angle with one of the opposed dominant faces. A method of carbon dioxide capture is also disclosed. Carbon dioxide absorbing liquid is applied into packing in a series of pulses. A gas containing carbon dioxide is flowed through the packing to at least partially absorb the carbon dioxide from the gas into the carbon dioxide absorbing liquid.Type: ApplicationFiled: November 21, 2022Publication date: May 25, 2023Inventors: David Keith, Maryam Mahmoudkhani, Alessandro Biglioli, Brandon Hart, Kenton Robert Heidel, Michal Foniok
-
Patent number: 11570155Abstract: Methods are described for a data creator to securely send a data payload to another device in a transient symmetric key technology (TSKT) system, and for the other device to securely receive the payload data. One method includes receiving a first seed and a formula from a command and control server. A second seed is generated, and the first seed and the second seed are combined using the formula to create a data seed. A first key is generated using the first seed, and the second seed is encrypted using the first key to form an encrypted second seed. A second key is generated using the data seed, and the data payload is encrypted using the second key to form an encrypted data payload. The encrypted data payload and the encrypted second seed are combined in a secure container, and subsequently all keys and seeds and the formula are destroyed.Type: GrantFiled: July 22, 2020Date of Patent: January 31, 2023Assignee: Everything Blockchain Technology Corp.Inventors: Brandon Hart, Courtney Roach
-
Patent number: 11504667Abstract: A carbon dioxide capture facility is disclosed comprising packing formed as a slab, and at least one liquid source. The slab has opposed dominant faces, the opposed dominant faces being at least partially wind penetrable to allow wind to flow through the packing. The at least one liquid source is oriented to direct carbon dioxide absorbent liquid into the packing to flow through the slab. The slab is disposed in a wind flow that has a non-zero incident angle with one of the opposed dominant faces. A method of carbon dioxide capture is also disclosed. Carbon dioxide absorbing liquid is applied into packing in a series of pulses. A gas containing carbon dioxide is flowed through the packing to at least partially absorb the carbon dioxide from the gas into the carbon dioxide absorbing liquid.Type: GrantFiled: April 15, 2019Date of Patent: November 22, 2022Assignee: Carbon Engineering Ltd.Inventors: David Keith, Maryam Mahmoudkhani, Alessandro Biglioli, Brandon Hart, Kenton Robert Heidel, Michal Foniok
-
Publication number: 20210306328Abstract: A method includes logging into a server and sending geolocation information to the server by a first device. The first device requests rights to decrypt a secure data file, and in response, the server sends a machine-readable optical label to the first device. The first device displays the machine-readable optical label. A second device logs into the server, and scans the machine-readable optical label displayed by the first device to create a scanned image. The second device decodes data from the scanned image to form decoded data. Geolocation information of the second device and the decoded data are submitted to the server. The decoded data and the geolocation information are validated by the server, and in response to successfully validating the geolocation information, a link completion status indicator is sent to the second device, and information to decrypt the secure data file is sent to the first device.Type: ApplicationFiled: March 26, 2021Publication date: September 30, 2021Applicant: Vengar Technologies, LLCInventors: Brandon Hart, Courtney Roach
-
Patent number: 11052330Abstract: The present invention provides a device and method for testing a material for the presence of DNA. The system includes a centrifuge, a microchip performing cell lysis and an enclosure that contains an isothermal ballast material and chromogenic agent that melts at a specific temperature and displays a color change, respectively.Type: GrantFiled: March 31, 2017Date of Patent: July 6, 2021Assignees: Board Of Trustees Of The University Of Arkansas, NowDiagnostics, Inc.Inventors: Robert Beitle, Christa N. Hestekin, Ahmed Elmasheiti, Kimberly Cribbs, Michael Rienisch, Bryce Cameron Jones, Allysa Swearingen, Brandon Hart, Kevin Clark, Vicki Thompson
-
Publication number: 20210058381Abstract: A method of an authentication server may include receiving, from a recipient computer system, recipient metadata comprising recipient information from the recipient computing system and a recipient network address. Access to the encrypted payload is authenticated by the recipient computer system using the recipient metadata. A response is sent to the recipient computer system after authenticating the recipient computer system. The recipient computer system decrypts the encrypted payload to access the payload in response to receiving the response.Type: ApplicationFiled: September 18, 2020Publication date: February 25, 2021Applicant: Keyavi Data CorporationInventors: Cody Pollet, Charles Burgess, Courtney Roach, Brandon Hart
-
Publication number: 20210046955Abstract: A hatch cover assembly for a hopper railroad car includes a door configured to move from an open position to a closed position, a running track configured to support the door in the open position, a roller assembly attached to the door and configured to move along the running track, a locking clip configured to engage a leading edge of the door, and an actuator configured to move the door between the open position and the closed position.Type: ApplicationFiled: August 14, 2019Publication date: February 18, 2021Inventors: Peter L. Jones, Brandon Hart, Matthew Matsen, Victor Mankarious
-
Publication number: 20210029096Abstract: In one form, a method for a data creator to securely send a data payload to another device in a transient symmetric key technology (TSKT) system includes receiving a first seed and a formula from a command and control server. A second seed is generated, and the first seed and the second seed are combined using the formula to create a data seed. A first key is generated using the first seed, and the second seed is encrypted using the first key to form an encrypted second seed. A second key is generated using the data seed, and the data payload is encrypted using the second key to form an encrypted data payload. The encrypted data payload and the encrypted second seed are combined in a secure container, and subsequently all keys and seeds and the formula are destroyed.Type: ApplicationFiled: July 22, 2020Publication date: January 28, 2021Applicant: Vengar Technologies, LLCInventors: Brandon Hart, Courtney Roach
-
Patent number: 10812456Abstract: In one embodiment, a method of secure network transmission is performed by a computer system. The method includes encrypting a payload via a first symmetric key and encrypting the first symmetric key via a second symmetric key. The method further includes encrypting an author header comprising the encrypted first symmetric key and a recipient list via a third symmetric key, wherein the recipient list comprises at least one recipient. The method also includes encrypting the third symmetric key via a public asymmetric key associated with an authentication server. Furthermore, the method includes transmitting the encrypted author header and the encrypted third symmetric key to the authentication server for use in recipient-initiated pre-access authentication. In addition, the method includes transmitting the encrypted payload and the second symmetric key over a computer network to the at least one recipient.Type: GrantFiled: October 31, 2019Date of Patent: October 20, 2020Assignee: Keyavi Data CorporationInventors: Cody Pollet, Charles Burgess, Courtney Roach, Brandon Hart
-
Publication number: 20200067892Abstract: In one embodiment, a method of secure network transmission is performed by a computer system. The method includes encrypting a payload via a first symmetric key and encrypting the first symmetric key via a second symmetric key. The method further includes encrypting an author header comprising the encrypted first symmetric key and a recipient list via a third symmetric key, wherein the recipient list comprises at least one recipient. The method also includes encrypting the third symmetric key via a public asymmetric key associated with an authentication server. Furthermore, the method includes transmitting the encrypted author header and the encrypted third symmetric key to the authentication server for use in recipient-initiated pre-access authentication. In addition, the method includes transmitting the encrypted payload and the second symmetric key over a computer network to the at least one recipient.Type: ApplicationFiled: October 31, 2019Publication date: February 27, 2020Applicant: Encryptics,LLCInventors: Cody POLLET, Charles Burgess, Courtney Roach, Brandon Hart
-
Patent number: 10498704Abstract: In one embodiment, a method of secure network transmission is performed by a computer system. The method includes encrypting a payload via a first symmetric key and encrypting the first symmetric key via a second symmetric key. The method further includes encrypting an author header comprising the encrypted first symmetric key and a recipient list via a third symmetric key, wherein the recipient list comprises at least one recipient. The method also includes encrypting the third symmetric key via a public asymmetric key associated with an authentication server. Furthermore, the method includes transmitting the encrypted author header and the encrypted third symmetric key to the authentication server for use in recipient-initiated pre-access authentication. In addition, the method includes transmitting the encrypted payload and the second symmetric key over a computer network to the at least one recipient.Type: GrantFiled: May 10, 2019Date of Patent: December 3, 2019Assignee: Encryptics, LLCInventors: Cody Pollet, Charles Burgess, Courtney Roach, Brandon Hart
-
Publication number: 20190336909Abstract: A carbon dioxide capture facility is disclosed comprising packing formed as a slab, and at least one liquid source. The slab has opposed dominant faces, the opposed dominant faces being at least partially wind penetrable to allow wind to flow through the packing. The at least one liquid source is oriented to direct carbon dioxide absorbent liquid into the packing to flow through the slab. The slab is disposed in a wind flow that has a non-zero incident angle with one of the opposed dominant faces. A method of carbon dioxide capture is also disclosed. Carbon dioxide absorbing liquid is applied into packing in a series of pulses. A gas containing carbon dioxide is flowed through the packing to at least partially absorb the carbon dioxide from the gas into the carbon dioxide absorbing liquid.Type: ApplicationFiled: April 15, 2019Publication date: November 7, 2019Inventors: David Keith, Maryam Mahmoudkhani, Alessandro Biglioli, Brandon Hart, Kenton Robert Heidel, Michal Foniok
-
Publication number: 20190334878Abstract: In one embodiment, a method of secure network transmission is performed by a computer system. The method includes encrypting a payload via a first symmetric key and encrypting the first symmetric key via a second symmetric key. The method further includes encrypting an author header comprising the encrypted first symmetric key and a recipient list via a third symmetric key, wherein the recipient list comprises at least one recipient. The method also includes encrypting the third symmetric key via a public asymmetric key associated with an authentication server. Furthermore, the method includes transmitting the encrypted author header and the encrypted third symmetric key to the authentication server for use in recipient-initiated pre-access authentication. In addition, the method includes transmitting the encrypted payload and the second symmetric key over a computer network to the at least one recipient.Type: ApplicationFiled: May 10, 2019Publication date: October 31, 2019Applicant: Encryptics, LLCInventors: Cody POLLET, Charles BURGESS, Courtney ROACH, Brandon HART
-
Patent number: 10298554Abstract: In one embodiment, a method of secure network transmission is performed by a computer system. The method includes encrypting a payload via a first symmetric key and encrypting the first symmetric key via a second symmetric key. The method further includes encrypting an author header comprising the encrypted first symmetric key and a recipient list via a third symmetric key, wherein the recipient list comprises at least one recipient. The method also includes encrypting the third symmetric key via a public asymmetric key associated with an authentication server. Furthermore, the method includes transmitting the encrypted author header and the encrypted third symmetric key to the authentication server for use in recipient-initiated pre-access authentication. In addition, the method includes transmitting the encrypted payload and the second symmetric key over a computer network to the at least one recipient.Type: GrantFiled: April 6, 2018Date of Patent: May 21, 2019Assignee: Encryptics, LLCInventors: Cody Pollet, Charles Burgess, Courtney Roach, Brandon Hart
-
Publication number: 20180295108Abstract: In one embodiment, a method of secure network transmission is performed by a computer system. The method includes encrypting a payload via a first symmetric key and encrypting the first symmetric key via a second symmetric key. The method further includes encrypting an author header comprising the encrypted first symmetric key and a recipient list via a third symmetric key, wherein the recipient list comprises at least one recipient. The method also includes encrypting the third symmetric key via a public asymmetric key associated with an authentication server. Furthermore, the method includes transmitting the encrypted author header and the encrypted third symmetric key to the authentication server for use in recipient-initiated pre-access authentication. In addition, the method includes transmitting the encrypted payload and the second symmetric key over a computer network to the at least one recipient.Type: ApplicationFiled: April 6, 2018Publication date: October 11, 2018Applicant: Encryptics, LLCInventors: Cody Pollet, Charles Burgess, Courtney Roach, Brandon Hart
-
Publication number: 20180243236Abstract: A method treating inflammation is described. The method includes using cannabidiol in an ingestible solution to naturally activate the body's endocannabinoid system and encourage activation of the cannabinoid receptors. The method may include formulating the ingestible solution, extracting cannabidiol in its natural form from a plant, and ingesting the solution into the body. The solution may include other additives that are simply mixed in with the cannabidiol. No adjustments to the natural molecular structure of the ingredients occurs.Type: ApplicationFiled: February 28, 2017Publication date: August 30, 2018Inventor: BRANDON HART