Patents by Inventor Matthew Schmid

Matthew Schmid has filed for patents to protect the following inventions. This listing includes patent applications that are pending as well as patents that have already been granted by the United States Patent and Trademark Office (USPTO).

  • Patent number: 11789770
    Abstract: A system for creating surrogate models is provided. The system includes a user computing device including a user interface, a database, and a processor. The processor is configured to receive, from the user computing device, a workflow request, determine at least one application in the database required to complete the workflow request, retrieve, from the database, the at least one application and meta-data associated with the at least one application, and determine that a user has proper tenancies to use the at least one application. The processor is further configured to execute, using the at least one application on an external computing device, a workflow associated with the workflow request based at least in part on the meta-data, generate, based on execution of the workflow request, new meta-data associated with the at least one application, and transmit the new meta-data to the database.
    Type: Grant
    Filed: May 19, 2020
    Date of Patent: October 17, 2023
    Assignee: General Electric Company
    Inventors: James Albert Tallman, Eric James Tucker, Vincent Michael Russo, Andrew Louis Gallo, Jr., Richard Brownell Arthur, Jeffrey Michael Iannotti, Peter Matthew Schmid, Adam Franklin Stevenson, David Charles Harry Ward, Douglas Evan King
  • Publication number: 20210365286
    Abstract: A system for creating surrogate models is provided. The system includes a user computing device including a user interface, a database, and a processor. The processor is configured to receive, from the user computing device, a workflow request, determine at least one application in the database required to complete the workflow request, retrieve, from the database, the at least one application and meta-data associated with the at least one application, and determine that a user has proper tenancies to use the at least one application. The processor is further configured to execute, using the at least one application on an external computing device, a workflow associated with the workflow request based at least in part on the meta-data, generate, based on execution of the workflow request, new meta-data associated with the at least one application, and transmit the new meta-data to the database.
    Type: Application
    Filed: May 19, 2020
    Publication date: November 25, 2021
    Inventors: James Albert Tallman, Eric James Tucker, Vincent Michael Russo, Andrew Louis Gallo, JR., Richard Brownell Arthur, Jeffrey Michael Iannotti, Peter Matthew Schmid, Adam Franklin Stevenson, David Charles Harry Ward, Douglas Evan King
  • Publication number: 20060074763
    Abstract: A display kiosk which provides a recipe and generates a listing of ingredients along with the location of the ingredients. The kiosk able to print out the recipe along with related coupons as well as the cost of the ingredients in the recipe, as well as being enabled to transfer the recipe to a cart having a touch screen display and an infrared port where the kiosk enables the cart to locate the ingredients of the recipe. The ingredients locatable by an RF tag and a scanner on the touch screen.
    Type: Application
    Filed: September 27, 2004
    Publication date: April 6, 2006
    Inventor: Matthew Schmid
  • Publication number: 20050223238
    Abstract: Malicious software is identified in an executable file by identifying malicious structural features, decryption code, and cryptographic functions. A malicious structural feature is identified by comparing a known malicious structural feature to one or more instructions of the executable file. A malicious structural feature is also identified by graphically and statistically comparing windows of bytes or instructions in a section of the executable file. Cryptography is an indicator of malicious software. Decryption code is identified in an executable file by identifying a tight loop around a reversible instruction that writes to random access memory. Cryptographic functions are identified in an executable file be obtaining a known cryptographic function and performing a string comparison of the numeric constants of the known cryptographic function with the executable file.
    Type: Application
    Filed: September 24, 2004
    Publication date: October 6, 2005
    Inventors: Matthew Schmid, Adam Young, Michael Weber
  • Publication number: 20050064452
    Abstract: A system and method for the detection of an analyte using multiplexing of the sensing elements is described. In one embodiment, a sensor array includes sensing elements, and probes bound to one or more sensing elements. The sensor array is formed from a supporting member to which a plurality of sensing elements may be coupled. The sensing element may have a predefined shape, size or location. A signal may be produced when a target analyte interacts with a probe. In one embodiment, the identity of the target may be determined by the detection of the signals produced and the shapes of the sensing elements. Each analyte may be given a unique code that is represented by one or more sensing elements.
    Type: Application
    Filed: April 26, 2004
    Publication date: March 24, 2005
    Inventors: Matthew Schmid, C. Willson