Patents by Inventor Matthew A. Mills
Matthew A. Mills has filed for patents to protect the following inventions. This listing includes patent applications that are pending as well as patents that have already been granted by the United States Patent and Trademark Office (USPTO).
-
Patent number: 11995186Abstract: A method of detecting the onset of a ransomware attack is presented. In an example embodiment, file backup metadata for each of a plurality of computing devices is accessed and analyzed to detect anomalous file backup activity of individual ones of the computing devices. A determination is made as to whether the detected anomalous file backup activity of at least some of the computing devices is correlated in time. File description metadata for each of the computing devices is also accessed and analyzed to identify files in the computing devices that are anomalous to other files in the computing devices. A determination whether a ransomware attack has begun is based on a determination that the detected anomalous file backup activity of at least some of the computing devices is correlated in time, as well as on the identified anomalous files.Type: GrantFiled: December 22, 2022Date of Patent: May 28, 2024Assignee: CrashPlan Group LLCInventors: Ajaykumar Rajasekharan, Matthew Mills Parker, Daniel L. Sullivan
-
Patent number: 11934640Abstract: In some embodiments, an electronic device displays a user interface associated with a first record label. In some embodiments, the user interface includes one or more representations of artists associated with the first record label and one or more representations of content items, and does not include representations of content or artists not associated with the first record label. In some embodiments, in response to a selection of a representation of a first artist, the electronic device displays a user interface of the content playback application associated with the first artist, which includes one or more representations of content associated with the first artist, but not one or more representations of content associated with the second artist. In some embodiments, in response to a selection of a representation of a first content item, the electronic device initiates a process to access the first content item via the content playback application.Type: GrantFiled: January 27, 2022Date of Patent: March 19, 2024Assignee: Apple Inc.Inventors: Matthew J. Cielak, Evan Mills, Samer A. Harami
-
Publication number: 20240060422Abstract: A turbine dosing sealing arrangement is disclosed. The sealing arrangement comprises a sealing member and a conduit. The sealing member is configured to engage a turbine housing element at an interface. The conduit projects from the sealing member, the conduit defining at least part of a reductant fluid pathway across the interface.Type: ApplicationFiled: December 16, 2021Publication date: February 22, 2024Inventors: Thomas Ogilvie, Alan Haigh, Matthew Mills, David Scott, Billy Stylianou
-
Publication number: 20240052760Abstract: An adapter element for a turbine is disclosed. The adapter element defines a longitudinal axis and comprises a first connection portion, a second connection portion, an outer wall and a dosing structure. The first connection portion is configured to engage the turbine. The second connection portion is configured to engage a conduit. The outer wall extends between the first and second connection portions, the outer wall defining an inner surface and an outer surface. The dosing structure is configured to receive, and expel, reductant.Type: ApplicationFiled: December 16, 2021Publication date: February 15, 2024Inventors: Matthew Mills, Nicholas Kenneth SHARP, Alan HAIGH, Atif MAHMOOD, David SCOTT, Thomas OGILVIE
-
Patent number: 11794963Abstract: An indexable dispenser is provided for use with a supplements cartridge having a plurality of serving chambers each sealed by a membrane to store a volume of supplement. The dispenser has a housing, a lance, an electrical power source, and a wireless transmitting and receiving device.Type: GrantFiled: May 24, 2021Date of Patent: October 24, 2023Assignee: Tespo IP, LLCInventors: Jeffrey Thomas Linton, Chase Ryan Linton, Ted Matthew Mills
-
Publication number: 20230259623Abstract: A method of detecting the onset of a ransomware attack is presented. In an example embodiment, file backup metadata for each of a plurality of computing devices is accessed and analyzed to detect anomalous file backup activity of individual ones of the computing devices. A determination is made as to whether the detected anomalous file backup activity of at least some of the computing devices is correlated in time. File description metadata for each of the computing devices is also accessed and analyzed to identify files in the computing devices that are anomalous to other files in the computing devices. A determination whether a ransomware attack has begun is based on a determination that the detected anomalous file backup activity of at least some of the computing devices is correlated in time, as well as on the identified anomalous files.Type: ApplicationFiled: December 22, 2022Publication date: August 17, 2023Inventors: Ajaykumar Rajasekharan, Matthew Mills Parker, Daniel L. Sullivan
-
Publication number: 20230224316Abstract: Disclosed in some examples are systems, methods, and machine readable mediums for identifying insider threats by determining file system element activity models that correlate to undesirable behavior and then utilizing the determined model to detect insider threats. Events involving file system elements of a client computing device (e.g., a network endpoint) may be monitored by a file system element monitoring application on the client computing device. The values of these signals are aggregated across all events of the same type that have occurred within a predetermined time window (e.g., an hour) for a particular client computing device. Each time an aggregated signal has a value over the threshold, an anomaly is recorded. Anomaly counts for each signal are then calculated as the aggregate number of anomalies for a particular signal over a second time period, the span of which is determined by the generation of first anomaly to the close of an alert by the network monitor.Type: ApplicationFiled: March 8, 2023Publication date: July 13, 2023Inventors: Ajaykumar Rajasekharan, Matthew Mills Parker, Daniel Louis Sullivan
-
Publication number: 20230124510Abstract: A granulated nutritional supplement dispensing machine extracts single-serving doses from a multi-serving supplements cartridge for delivery as a drinkable solution. A lead serving chamber is pierced so that its powered contents drain into a mixing cup together with a metered quantity of water from an integrated water tank. A vibrator unit assists drainage of the granulated materials from the lead serving chamber. The mixing cup is rotated at high speed to blend the water and supplements into a slurry. The supplements cartridge is indexed after (or before) use so that an unopened serving chamber is presented each time for extracting its supplements. This enables partially-used supplements cartridges to be used in the machine, as is conducive in multiple-user households. The supplements cartridge is configured with read-write data capability to indicate whether or not the contents of each serving chamber have been emptied.Type: ApplicationFiled: September 16, 2022Publication date: April 20, 2023Inventors: Ted Matthew MILLS, Jeffrey Thomas LINTON, Chase Ryan LINTON
-
Publication number: 20230120304Abstract: A multi-serving cartridge assembly is provided with a frame defining serving chambers to receive a supplement. A plurality of trap doors is connected to the frame with each trap door associated with a respective one of the plurality of serving chambers and moveable between a first closed position to enclose the associated serving chamber and a second open position to dispense the supplement therefrom. A dispensing system is provided with a housing including a cartridge bay shaped to receive a cartridge with a plurality of unique identifiers, and a computer control system to read the unique identifier, open the serving chamber, and send a signal to a remote system. A method of dispensing supplement from a cartridge is also provided.Type: ApplicationFiled: March 20, 2021Publication date: April 20, 2023Applicant: TESPO IP, LLCInventors: Justin Michael GAUVIN, Ted Matthew MILLS, Chase Ryan LINTON, Jeffrey Thomas LINTON
-
Patent number: 11611574Abstract: Disclosed in some examples are systems, methods, and machine readable mediums for identifying insider threats by determining file system element activity models that correlate to undesirable behavior and then utilizing the determined model to detect insider threats. Events involving file system elements of a client computing device (e.g., a network endpoint) may be monitored by a file system element monitoring application on the client computing device. The values of these signals are aggregated across all events of the same type that have occurred within a predetermined time window (e.g., an hour) for a particular client computing device. Each time an aggregated signal has a value over the threshold, an anomaly is recorded. Anomaly counts for each signal are then calculated as the aggregate number of anomalies for a particular signal over a second time period, the span of which is determined by the generation of first anomaly to the close of an alert by the network monitor.Type: GrantFiled: August 2, 2017Date of Patent: March 21, 2023Assignee: Code42 Software, Inc.Inventors: Ajaykumar Rajasekharan, Matthew Mills Parker, Daniel L. Sullivan
-
Patent number: 11537713Abstract: A method of detecting the onset of a ransomware attack is presented. In an example embodiment, file backup metadata for each of a plurality of computing devices is accessed and analyzed to detect anomalous file backup activity of individual ones of the computing devices. A determination is made as to whether the detected anomalous file backup activity of at least some of the computing devices is correlated in time. File description metadata for each of the computing devices is also accessed and analyzed to identify files in the computing devices that are anomalous to other files in the computing devices. A determination whether a ransomware attack has begun is based on a determination that the detected anomalous file backup activity of at least some of the computing devices is correlated in time, as well as on the identified anomalous files.Type: GrantFiled: August 2, 2017Date of Patent: December 27, 2022Assignee: CRASHPLAN GROUP LLCInventors: Ajaykumar Rajasekharan, Matthew Mills Parker, Daniel L. Sullivan
-
Publication number: 20220324592Abstract: A method for filling a pod is provided. A pod is provided and has a housing defining a plurality of serving chambers arranged in an annular array and surrounding a drive hub. Data is received that is indicative of a customized nutritional supplement for the pod to a controller of an automated filling station. The customized nutritional supplement is filled into at least one of the plurality of serving chambers of the pod via the automated filling station by controlling a plurality of hoppers of the filling station to dispense the customized supplement into the plurality of serving chambers of the pod. Each hopper contains a corresponding ingredient available for the customized supplement.Type: ApplicationFiled: June 18, 2020Publication date: October 13, 2022Applicant: TESPO IP, LLCInventors: Ted Matthew MILLS, Jeffrey Thomas LINTON, Chase Ryan LINTON, Justin Michael GAUVIN
-
Patent number: 11447330Abstract: A granulated nutritional supplement dispensing machine extracts single-serving doses from a multi-serving supplements cartridge for delivery as a drinkable solution. A lead serving chamber is pierced so that its powered contents drain into a mixing cup together with a metered quantity of water from an integrated water tank. A vibrator unit assists drainage of the granulated materials from the lead serving chamber. The mixing cup is rotated at high speed to blend the water and supplements into a slurry. The supplements cartridge is indexed after (or before) use so that an unopened serving chamber is presented each time for extracting its supplements. This enables partially-used supplements cartridges to be used in the machine, as is conducive in multiple-user households. The supplements cartridge is configured with read-write data capability to indicate whether or not the contents of each serving chamber have been emptied.Type: GrantFiled: August 25, 2020Date of Patent: September 20, 2022Assignee: Tespo IP, LLCInventors: Ted Matthew Mills, Jeffrey Thomas Linton, Chase Ryan Linton
-
Patent number: 11372989Abstract: Systems and techniques for an automatic graph-based detection of unlikely file possession are described herein. In an example, a system for detecting unauthorized file possession is adapted to generate a networked computing environment graph for files and the devices which store the files. The detection system may be further adapted to identify a file in question and a device in question that is in possession of the file in question. The detection system may be further adapted to generate a set of connection paths from the device in question to the file in question based upon the edges of the graph. The detection system may be further adapted to determine the device in question should not have possession of the file in question based on a set of metrics derived from the connection paths. The detection system may be further adapted to generate an alert based on the determination.Type: GrantFiled: October 29, 2020Date of Patent: June 28, 2022Assignee: Code 42 Software, Inc.Inventor: Matthew Mills Parker
-
Publication number: 20210347541Abstract: An indexable dispenser is provided for use with a supplements cartridge having a plurality of serving chambers each sealed by a membrane to store a volume of supplement. The dispenser has a housing, a lance, an electrical power source, and a wireless transmitting and receiving device.Type: ApplicationFiled: May 24, 2021Publication date: November 11, 2021Inventors: Jeffrey Thomas LINTON, Chase Ryan LINTON, Ted Matthew MILLS
-
Patent number: 11014721Abstract: A manually indexable dispenser, a system, and a method are provided for use with dispensing a nutritional supplements cartridge having a plurality of serving chambers each sealed by a membrane to store a volume of granulated nutritional supplement. The dispenser, the system, and the method are configured to transmit a wireless signal indicative of dispensing of supplements and/or a time of dispensing, and receive a wireless signal containing data indicative of a user notification for a reminder for a user to take a supplement at a specified time.Type: GrantFiled: April 8, 2019Date of Patent: May 25, 2021Assignee: Life Boost Inc.Inventors: Jeffrey Thomas Linton, Chase Ryan Linton, Ted Matthew Mills
-
Publication number: 20210042432Abstract: Systems and techniques for an automatic graph-based detection of unlikely file possession are described herein. In an example, a system for detecting unauthorized file possession is adapted to generate a networked computing environment graph for files and the devices which store the files. The detection system may be further adapted to identify a file in question and a device in question that is in possession of the file in question. The detection system may be further adapted to generate a set of connection paths from the device in question to the file in question based upon the edges of the graph. The detection system may be further adapted to determine the device in question should not have possession of the file in question based on a set of metrics derived from the connection paths. The detection system may be further adapted to generate an alert based on the determination.Type: ApplicationFiled: October 29, 2020Publication date: February 11, 2021Inventor: Matthew Mills Parker
-
Publication number: 20200385203Abstract: A granulated nutritional supplement dispensing machine extracts single-serving doses from a multi-serving supplements cartridge for delivery as a drinkable solution. A lead serving chamber is pierced so that its powered contents drain into a mixing cup together with a metered quantity of water from an integrated water tank. A vibrator unit assists drainage of the granulated materials from the lead serving chamber. The mixing cup is rotated at high speed to blend the water and supplements into a slurry. The supplements cartridge is indexed after (or before) use so that an unopened serving chamber is presented each time for extracting its supplements. This enables partially-used supplements cartridges to be used in the machine, as is conducive in multiple-user households. The supplements cartridge is configured with read-write data capability to indicate whether or not the contents of each serving chamber have been emptied.Type: ApplicationFiled: August 25, 2020Publication date: December 10, 2020Inventors: Ted Matthew MILLS, Jeffrey Thomas LINTON, Chase Ryan LINTON
-
Publication number: 20200383903Abstract: A pod for dispensing a nutritional supplement, and a method if providing a nutritional supplement are provided. The pod has a housing defining a plurality of serving chambers arranged in an annular array and surrounding a drive hub. A nutritional supplement is provided within at least one of the plurality of serving chambers. The nutritional supplement has at least one active ingredient and an effervescent agent to form a gas when the nutritional supplement is dispensed from the pod and dissolved in a liquid. At least one sealing member is connected to the housing and extends over the plurality of serving chambers. The at least one sealing member is removable to open a selected one of the plurality of serving chambers to dispense supplement therein.Type: ApplicationFiled: June 5, 2020Publication date: December 10, 2020Inventors: Ted Matthew MILLS, Jeffrey Thomas LINTON, Chase Ryan LINTON, Justin Michael GAUVIN, Melissa Nicole DOBIES
-
Patent number: 10824749Abstract: Systems and techniques for an automatic graph-based detection of unlikely file possession are described herein. In an example, a system for detecting unauthorized file possession is adapted to generate a networked computing environment graph for files and the devices which store the files. The detection system may be further adapted to identify a file in question and a device in question that is in possession of the file in question. The detection system may be further adapted to generate a set of connection paths from the device in question to the file in question based upon the edges of the graph. The detection system may be further adapted to determine the device in question should not have possession of the file in question based on a set of metrics derived from the connection paths. The detection system may be further adapted to generate an alert based on the determination.Type: GrantFiled: September 28, 2018Date of Patent: November 3, 2020Assignee: Code 42 Software, Inc.Inventor: Matthew Mills Parker