Patents by Inventor Matthew Knight
Matthew Knight has filed for patents to protect the following inventions. This listing includes patent applications that are pending as well as patents that have already been granted by the United States Patent and Trademark Office (USPTO).
-
Publication number: 20210032611Abstract: The present invention relates to plant-produced angiogenins, to related plant cells, plant calli, plants, seeds and other plant parts and products derived therefrom and to uses of plant-produced angiogenins. The present invention also relates to expression of angiogenin genes in plants and to related nucleic acids, constructs and methods.Type: ApplicationFiled: March 16, 2020Publication date: February 4, 2021Applicant: Agriculture Victoria Services PTY LTDInventors: German Spangenberg, Aidyn Mouradov, Jianghui Wang, Benjamin Graeme Cocks, Matthew Knight, Matthew McDonagh
-
Patent number: 10904175Abstract: A server receives a request for a business account with the messaging system that includes a business name and a contact point. The server determines whether users of the messaging system associate the business name with the contact point. The server also determines whether the business name and/or the contact point has characteristics consistent with the request originating from a genuine business. The business account is validated if users of the messaging system associate the business name with the contact point and at least one of the business name or the contact point have characteristics consistent with the request originating from a genuine business. The business account profile is updated to indicate it is verified. Client devices are adapted to display messages from the business account in conjunction with a visual indicator that the business account is verified.Type: GrantFiled: September 20, 2019Date of Patent: January 26, 2021Assignee: WHATSAPP INC.Inventors: Matthew Knight Jones, Apoorvavarsha Havanur, Nicole Laura Reid, Zhuo Li, Yue Zhang
-
Patent number: 10753196Abstract: A system or apparatus for use in downhole communication or detection comprises a downhole arrangement defining a throughbore and primary and secondary elements. One of the primary and secondary elements is provided on the downhole arrangement and the other of the primary and secondary elements is provided in the throughbore. The primary and secondary elements are configurable for coupling of an electromagnetic field therebetween. The primary or secondary element which is provided in the throughbore may be provided on a tool such as a shifting tool which is deployable through the throughbore. The secondary element may be configured to provide the electromagnetic field coupled between the first and second elements with one or more characteristic features. The system may be configured for use, in particular though not exclusively, for communicating information to and/or from a downhole tool in an oil or gas well.Type: GrantFiled: March 14, 2019Date of Patent: August 25, 2020Assignee: Weatherford Technology Holdings, LLCInventors: Hugh Clarkson, Daniel George Purkis, Matthew Knight
-
Patent number: 10733167Abstract: A system has data capture devices collecting data from different points in a network. The captured data is written to a data store and is directed to an output. The data from the different data capture devices can be delivered to a data analytics device. As long as the data analytics device is able to keep pace with the data that is directed to the output, that data is used by the analytics device. If the analytics device is not able to keep pace, the data written to the data store is retrieved and is used until the analytics device has caught up.Type: GrantFiled: June 26, 2015Date of Patent: August 4, 2020Assignee: XILINX, INC.Inventors: Steven L. Pope, David J. Riddoch, Matthew Knight
-
Patent number: 10721242Abstract: A server receives an instruction to verify that a contact point (e.g., a phone number) is associated with a name. A set of users that have the contact point stored in a contact list on the server is identified and client devices associated with the users in the set are sent a name verification query. The name verification query includes a representation of the name and the contact point. The server receives a set of one or more matching scores from each of at least a subset of the client devices. The set of matching scores received from a given client device indicates a degree to which a name stored in association with the contact point in the client device's local address book matches the representation of the name. A determination is made as to whether the contact point is associated with the name based on the received matching scores.Type: GrantFiled: May 31, 2018Date of Patent: July 21, 2020Assignee: Facebook, Inc.Inventors: Matthew Knight Jones, Yue Zhang
-
Patent number: 10655439Abstract: A method for injection of a lift gas into a wellbore production string comprises determining production pressure within the production string, and autonomously controlling a variable orifice gas lift valve in accordance with the determined production pressure, wherein the variable orifice gas lift valve controls the injection flow rate of the lift gas into the production string. A valve comprises a housing defining an inlet, an outlet and a flow path therebetween, and a valve member linearly moveable within the housing between first and second positions to vary flow along the flow path, wherein the valve member is prevented from rotation relative to the housing during linear movement between the first and second positions. The valve further includes a rotary drive and a transmission arrangement interposed between the rotary drive and the valve member for converting rotation of the rotary drive to linear movement of the valve member.Type: GrantFiled: May 12, 2016Date of Patent: May 19, 2020Assignee: Weatherford U.K. LimitedInventors: Euan Murdoch, Colin Gordon Rae, Richard Alastair Howard Dalzell, Matthew Knight, Quentin Lhussier
-
Publication number: 20200134271Abstract: A first RFID tag arrangement for actuating a downhole tool includes a non-metallic housing enclosing a passive RFID tag, power source, pulsed oscillator circuit, and energizer coil. The pulsed oscillator circuit drives the energizer coil to stimulate and activate the tag such that it can be read by an external reader. A second RFID tag arrangement includes a non-metallic housing enclosing a power source, a transmission circuit, and a transmitter coil. The transmission circuit can drive the transmitter coil to transmit a payload stored in the transmission circuit such that the payload is delivered to an external reader. A method of actuating a downhole tool includes placing the tool's RFID tag reader in listen only mode, introducing into the wellbore an active RFID tag that transmits its payload to the reader, and optionally configuring the reader to reprogram the tag when it receives the payload therefrom.Type: ApplicationFiled: December 30, 2019Publication date: April 30, 2020Inventors: John Ownby, Matthew Knight, Richard Dalzell, Rupa Sharma, Eric R. Evans, Jobby T. Jacob
-
Patent number: 10586083Abstract: A first RFID tag arrangement for actuating a downhole tool includes a non-metallic housing enclosing a passive RFID tag, power source, pulsed oscillator circuit, and energizer coil. The pulsed oscillator circuit drives the energizer coil to stimulate and activate the tag such that it can be read by an external reader. A second RFID tag arrangement includes a non-metallic housing enclosing a power source, a transmission circuit, and a transmitter coil. The transmission circuit can drive the transmitter coil to transmit a payload stored in the transmission circuit such that the payload is delivered to an external reader. A method of actuating a downhole tool includes placing the tool's RFID tag reader in listen only mode, introducing into the wellbore an active RFID tag that transmits its payload to the reader, and optionally configuring the reader to reprogram the tag when it receives the payload therefrom.Type: GrantFiled: July 27, 2016Date of Patent: March 10, 2020Assignee: Weatherford Technology Holdings, LLCInventors: John Ownby, Matthew Knight, Richard Dalzell, Rupa Sharma, Eric R. Evans, Jobby T. Jacob
-
Publication number: 20200042509Abstract: A system has data capture devices collecting data from different points in a network. The captured data is written to a data store and is directed to an output. The data from the different data capture devices can be delivered to a data analytics device. As long as the data analytics device is able to keep pace with the data that is directed to the output, that data is used by the analytics device. If the analytics device is not able to keep pace, the data written to the data store is retrieved and is used until the analytics device has caught up.Type: ApplicationFiled: October 8, 2019Publication date: February 6, 2020Applicant: SOLARFLARE COMMUNICATIONS, INC.Inventors: Steven L. Pope, David J. Riddoch, Matthew Knight
-
Publication number: 20190359960Abstract: The present invention relates to plant-produced angiogenins, to related plant cells, plant calli, plants, seeds and other plant parts and products derived therefrom and to uses of plant-produced angiogenins. The present invention also relates to expression of angiogenin genes in plants and to related nucleic acids, constructs and methods.Type: ApplicationFiled: May 21, 2019Publication date: November 28, 2019Applicant: Agriculture Victoria Services PTY LTDInventors: German Spangenberg, Aidyn Mouradov, Jianghui Wang, Benjamin Graeme Cocks, Matthew Knight, Matthew McDonagh
-
Patent number: 10462080Abstract: A server receives a request for a business account with the messaging system that includes a business name and a contact point. The server determines whether users of the messaging system associate the business name with the contact point. The server also determines whether the business name and/or the contact point has characteristics consistent with the request originating from a genuine business. The business account is validated if users of the messaging system associate the business name with the contact point and at least one of the business name or the contact point have characteristics consistent with the request originating from a genuine business. The business account profile is updated to indicate it is verified. Client devices are adapted to display messages from the business account in conjunction with a visual indicator that the business account is verified.Type: GrantFiled: May 31, 2018Date of Patent: October 29, 2019Assignee: WhatsApp Inc.Inventors: Matthew Knight Jones, Apoorvavarsha Havanur, Nicole Laura Reid, Zhuo Li, Yue Zhang
-
Publication number: 20190203584Abstract: A system or apparatus for use in downhole communication or detection comprises a downhole arrangement defining a throughbore and primary and secondary elements. One of the primary and secondary elements is provided on the downhole arrangement and the other of the primary and secondary elements is provided in the throughbore. The primary and secondary elements are configurable for coupling of an electromagnetic field therebetween. The primary or secondary element which is provided in the throughbore may be provided on a tool such as a shifting tool which is deployable through the throughbore. The secondary element may be configured to provide the electromagnetic field coupled between the first and second elements with one or more characteristic features. The system may be configured for use, in particular though not exclusively, for communicating information to and/or from a downhole tool in an oil or gas well.Type: ApplicationFiled: March 14, 2019Publication date: July 4, 2019Inventors: Hugh Clarkson, Daniel George Purkis, Matthew Knight
-
Patent number: 10294775Abstract: A system or apparatus for use in downhole communication or detection comprises a downhole arrangement defining a throughbore and primary and secondary elements. One of the primary and secondary elements is provided on the downhole arrangement and the other of the primary and secondary elements is provided in the throughbore. The primary and secondary elements are configurable for coupling of an electromagnetic field therebetween. The primary or secondary element which is provided in the throughbore may be provided on a tool such as a shifting tool which is deployable through the throughbore. The secondary element may be configured to provide the electromagnetic field coupled between the first and second elements with one or more characteristic features. The system may be configured for use, in particular though not exclusively, for communicating information to and/or from a downhole tool in an oil or gas well.Type: GrantFiled: February 28, 2014Date of Patent: May 21, 2019Assignee: Weatherford Technology Holdings, LLCInventors: Hugh Clarkson, Daniel George Purkis, Matthew Knight
-
Publication number: 20180328167Abstract: A system or apparatus for use in downhole communication or detection comprises a downhole arrangement defining a throughbore and primary and secondary elements. One of the primary and secondary elements is provided on the downhole arrangement and the other of the primary and secondary elements is provided in the throughbore. The primary and secondary elements are configurable for coupling of an electromagnetic field therebetween. The primary or secondary element which is provided in the throughbore may be provided on a tool such as a shifting tool which is deployable through the throughbore. The secondary element may be configured to provide the electromagnetic field coupled between the first and second elements with one or more characteristic features. The system may be configured for use, in particular though not exclusively, for communicating information to and/or from a downhole tool in an oil or gas well.Type: ApplicationFiled: July 11, 2018Publication date: November 15, 2018Inventors: Hugh Clarkson, Daniel George Purkis, Matthew Knight
-
Publication number: 20180225485Abstract: A first RFID tag arrangement for actuating a downhole tool includes a non-metallic housing enclosing a passive RFID tag, power source, pulsed oscillator circuit, and energizer coil. The pulsed oscillator circuit drives the energizer coil to stimulate and activate the tag such that it can be read by an external reader. A second RFID tag arrangement includes a non-metallic housing enclosing a power source, a transmission circuit, and a transmitter coil. The transmission circuit can drive the transmitter coil to transmit a payload stored in the transmission circuit such that the payload is delivered to an external reader. A method of actuating a downhole tool includes placing the tool's RFID tag reader in listen only mode, introducing into the wellbore an active RFID tag that transmits its payload to the reader, and optionally configuring the reader to reprogram the tag when it receives the payload therefrom.Type: ApplicationFiled: July 27, 2016Publication date: August 9, 2018Inventors: John Ownby, Matthew Knight, Richard Dalzell, Rupa Sharma, Eric R. Evans, Jobby T. Jacob
-
Publication number: 20180149002Abstract: A method for injection of a lift gas into a wellbore production string comprises determining production pressure within the production string, and autonomously controlling a variable orifice gas lift valve in accordance with the determined production pressure, wherein the variable orifice gas lift valve controls the injection flow rate of the lift gas into the production string. A valve comprises a housing defining an inlet, an outlet and a flow path therebetween, and a valve member linearly moveable within the housing between first and second positions to vary flow along the flow path, wherein the valve member is prevented from rotation relative to the housing during linear movement between the first and second positions. The valve further includes a rotary drive and a transmission arrangement interposed between the rotary drive and the valve member for converting rotation of the rotary drive to linear movement of the valve member.Type: ApplicationFiled: May 12, 2016Publication date: May 31, 2018Inventors: Euan MURDOCH, Colin Gordon RAE, Richard Alastair Howard DALZELL, Matthew KNIGHT, Quentin LHUSSIER
-
Patent number: 9942220Abstract: User login information submitted as part of an attempt to log into a computer system is evaluated for unauthorized or illegitimate use based on indicators of suspicious behavior. Example indicators of suspicious behavior include whether the login information is known to have been compromised, whether the login attempt originates from a network source or a physical source that has previously originated an attempt to log in using login information known to have been compromised, and whether multiple login attempts using the login information from multiple users has originated from the source. A suspicion index can be calculated based on the presence of the indicators of suspicious behavior. The system can require enhanced authentication based on the measurement of suspicious behavior.Type: GrantFiled: March 14, 2016Date of Patent: April 10, 2018Assignee: Facebook, Inc.Inventors: Andrei Bajenov, Jonathan H. Frank, Matthew Knight Jones, Alok Menghrajani, Christopher William Palow, Allan Stewart
-
Publication number: 20160357796Abstract: A system has data capture devices collecting data from different points in a network. The captured data is written to a data store and is directed to an output. The data from the different data capture devices can be delivered to a data analytics device. As long as the data analytics device is able to keep pace with the data that is directed to the output, that data is used by the analytics device. If the analytics device is not able to keep pace, the data written to the data store is retrieved and is used until the analytics device has caught up.Type: ApplicationFiled: June 26, 2015Publication date: December 8, 2016Applicant: SOLARFLARE COMMUNICATIONS, INC.Inventors: Steven L. Pope, David J. Riddoch, Matthew Knight
-
Publication number: 20160197907Abstract: User login information submitted as part of an attempt to log into a computer system is evaluated for unauthorized or illegitimate use based on indicators of suspicious behavior. Example indicators of suspicious behavior include whether the login information is known to have been compromised, whether the login attempt originates from a network source or a physical source that has previously originated an attempt to log in using login information known to have been compromised, and whether multiple login attempts using the login information from multiple users has originated from the source. A suspicion index can be calculated based on the presence of the indicators of suspicious behavior. The system can require enhanced authentication based on the measurement of suspicious behavior.Type: ApplicationFiled: March 14, 2016Publication date: July 7, 2016Inventors: Andrei Bajenov, Jonathan H. Frank, Matthew Knight Jones, Alok Mengharajani, Christopher William Palow, Allan Stewart
-
Publication number: 20160145999Abstract: A system or apparatus for use in downhole communication or detection comprises a downhole arrangement defining a throughbore and primary and secondary elements. One of the primary and secondary elements is provided on the downhole arrangement and the other of the primary and secondary elements is provided in the throughbore. The primary and secondary elements are configurable for coupling of an electromagnetic field therebetween. The primary or secondary element which is provided in the throughbore may be provided on a tool such as a shifting tool which is deployable through the throughbore. The secondary element may be configured to provide the electromagnetic field coupled between the first and second elements with one or more characteristic features. The system may be configured for use, in particular though not exclusively, for communicating information to and/or from a downhole tool in an oil or gas well.Type: ApplicationFiled: February 28, 2014Publication date: May 26, 2016Inventors: Hugh Clarkson, Daniel George Purkis, Matthew Knight