Patents by Inventor Samuel Jones

Samuel Jones has filed for patents to protect the following inventions. This listing includes patent applications that are pending as well as patents that have already been granted by the United States Patent and Trademark Office (USPTO).

  • Publication number: 20210137966
    Abstract: The invention relates to virucidal compounds, virucidal compositions comprising thereof and uses thereof in treatment of viral infections, for sterilizations and for disinfections.
    Type: Application
    Filed: January 22, 2021
    Publication date: May 13, 2021
    Inventors: Samuel Jones, Francesco Stellacci
  • Patent number: 10963465
    Abstract: Systems and methods for rapid importation of data including temporally tracked object recognition. One of the methods includes receiving datasets each indicating information associated with one or more objects. Information indicating unique identifying information associated with the objects is accessed, and an updated dataset joining information from datasets that is associated with each object is generated. The updated dataset is maintained to include most recent versions of each of the datasets, with one or more datasets being replaced with more recent versions, and with one or more other datasets being propagated to be the most recent versions. Queries received from clients are responded to, with the queries indicating requests for specific information related to objects.
    Type: Grant
    Filed: November 2, 2017
    Date of Patent: March 30, 2021
    Assignee: Palantir Technologies Inc.
    Inventors: Samuel Jones, Sean Hacker
  • Publication number: 20200329064
    Abstract: A security system detects anomalous activity in a network. The system logs user activity, which can include ports used, compares users to find similar users, sorts similar users into cohorts, and compares new user activity to logged behavior of the cohort. The comparison can include a divergence calculation. Origins of user activity can also be used to determine anomalous network activity. The hostname, username, IP address, and timestamp can be used to calculate aggregate scores and convoluted scores.
    Type: Application
    Filed: June 25, 2020
    Publication date: October 15, 2020
    Inventors: Maxim Kesin, Samuel Jones
  • Patent number: 10735448
    Abstract: A security system detects anomalous activity in a network. The system logs user activity, which can include ports used, compares users to find similar users, sorts similar users into cohorts, and compares new user activity to logged behavior of the cohort. The comparison can include a divergence calculation. Origins of user activity can also be used to determine anomalous network activity. The hostname, username, IP address, and timestamp can be used to calculate aggregate scores and convoluted scores.
    Type: Grant
    Filed: August 22, 2018
    Date of Patent: August 4, 2020
    Assignee: Palantir Technologies Inc.
    Inventors: Maxim Kesin, Samuel Jones
  • Publication number: 20200204578
    Abstract: A method, apparatus, and computer program are disclosed. The method may be performed by one or more processors and may comprise receiving first data representing an infrastructure of a computer network, the first data comprising an indication of hosts which form at least part of the computer network and one or more software resources on respective hosts. The method may also comprise receiving second data from a vulnerability scanning software, the second data comprising an indication of one or more vulnerabilities detected in the one or more software resources provided on at least some of the hosts of the computer network. Using a combination of the first data and the second data, output data may be generated representing a risk profile of the computer network infrastructure, the output data indicating one or more subsets of hosts, determined as being at risk of being affected by the detected vulnerabilities by virtue of the software resources they provide for output on a user interface.
    Type: Application
    Filed: March 6, 2019
    Publication date: June 25, 2020
    Inventors: Elliot Colquhoun, Abhishek Agarwal, Andrew Eggleton, Brandon Helms, Carl Ambroselli, Cem Zorlular, Daniel Kelly, Gautam Punukollu, Jeffrey Tsui, Morten Kromann, Nikhil Seetharaman, Raj Krishnan, Samuel Jones, Tareq Alkhatib, Dayang Shi
  • Publication number: 20190275073
    Abstract: The invention relates to virucidal compounds, virucidal compositions comprising thereof and uses thereof in treatment of viral infections, for sterilizations and for disinfections.
    Type: Application
    Filed: July 20, 2017
    Publication date: September 12, 2019
    Applicant: Ecole Polytechnique Fédérale de Lausanne (EPFL)
    Inventors: Samuel JONES, Francesco STELLACCI
  • Publication number: 20190244485
    Abstract: Disclosed are social wagering systems creating a social wagering application for live sporting events comprising: software module configured to allow a user to create, update, and manage a player account; software module configured to allow the user to choose sporting teams and choose from in-play or upcoming sporting events; software module configured to allow the user to choose players as selected game-players for each sub-period; software module configured to award points to the user upon the chosen game-player's all positive and negative scoring player-events during each sub-period, and to calculate the user's total points for the whole chosen sporting event based on the sum of awarded points to the user of all sub-periods; and software module configured to rank the user among all users based on the total points, and to award the user one or more of prizes, experiences and wagering tokens based on the user's ranking.
    Type: Application
    Filed: July 21, 2017
    Publication date: August 8, 2019
    Inventor: Samuel JONES
  • Publication number: 20190081971
    Abstract: Methods, systems, and apparatus, including computer programs encoded on computer storage media, for network monitoring, user account compromise determination, and user behavior database system. The system monitors network actions of user accounts including user account access across multitudes of network accessible systems, determines user account transitions, and determines different types of high-risk user behavior indicative of compromise. Network actions can be obtained from generated information by the network accessible systems, and correlated across additional data sets including contextual ones. User interfaces are generated describing network actions of user accounts, and are configured for user interaction, which cause generation of updated user interfaces and access to electronic data sources to determine information relevant to the user interaction.
    Type: Application
    Filed: November 12, 2018
    Publication date: March 14, 2019
    Inventors: Samuel Jones, Timothy Yousaf, Drew Dennison, Vivek Lakshmanan, Joseph Staehle, Samuel Kremin, Maxim Kesin, Taylor Heroux
  • Publication number: 20190008856
    Abstract: The present invention relates to Ataxia-Telangiectasia Mutated and Rad3-related protein kinase (ATR) inhibitors for use in methods of treating BAF-complex deficient cancer. The present invention further provides methods for identifying ATR inhibitors for use in the treatment of BAF complex gene mutant or deficient cancers. Medical uses and methods relating to the treatment of synovial sarcoma using ATR inhibitors are also provided.
    Type: Application
    Filed: January 6, 2017
    Publication date: January 10, 2019
    Inventors: Christopher James Lord, Chris Williamson, Samuel Jones
  • Publication number: 20190007441
    Abstract: A security system detects anomalous activity in a network. The system logs user activity, which can include ports used, compares users to find similar users, sorts similar users into cohorts, and compares new user activity to logged behavior of the cohort. The comparison can include a divergence calculation. Origins of user activity can also be used to determine anomalous network activity. The hostname, username, IP address, and timestamp can be used to calculate aggregate scores and convoluted scores.
    Type: Application
    Filed: August 22, 2018
    Publication date: January 3, 2019
    Inventors: Maxim Kesin, Samuel Jones
  • Publication number: 20180351991
    Abstract: Methods, systems, and apparatus, including computer programs encoded on computer storage media, for computer network security risk assessment. One of the methods includes obtaining compromise likelihoods for user accounts. Information describing a network topology of a network is obtained, with the network topology being nodes each connected by an edge to other nodes, each node being associated with a compromise likelihood, and one or more nodes are high value nodes associated with a compromise value. Unique paths to each of the high value nodes are determined for a particular user account. An expected value for each path is determined based on the compromise likelihood of the particular user account, the compromise likelihood of each node included in the path, the communication weight of each edge included in the path, and the compromise value associated with the high value node. User interface data is generated describing at least one path.
    Type: Application
    Filed: July 16, 2018
    Publication date: December 6, 2018
    Inventors: Samuel Jones, Joseph Staehle, Lucy Cheng
  • Patent number: 10129282
    Abstract: Methods, systems, and apparatus, including computer programs encoded on computer storage media, for network monitoring, user account compromise determination, and user behavior database system. The system monitors network actions of user accounts including user account access across multitudes of network accessible systems, determines user account transitions, and determines different types of high-risk user behavior indicative of compromise. Network actions can be obtained from generated information by the network accessible systems, and correlated across additional data sets including contextual ones. User interfaces are generated describing network actions of user accounts, and are configured for user interaction, which cause generation of updated user interfaces and access to electronic data sources to determine information relevant to the user interaction.
    Type: Grant
    Filed: December 30, 2016
    Date of Patent: November 13, 2018
    Assignee: Palantir Technologies Inc.
    Inventors: Samuel Jones, Timothy Yousaf, Drew Dennison, Vivek Lakshmanan, Joseph Staehle, Samuel Kremin, Maxim Kesin, Taylor Heroux
  • Patent number: 10075464
    Abstract: A security system detects anomalous activity in a network. The system logs user activity, which can include ports used, compares users to find similar users, sorts similar users into cohorts, and compares new user activity to logged behavior of the cohort. The comparison can include a divergence calculation. Origins of user activity can also be used to determine anomalous network activity. The hostname, username, IP address, and timestamp can be used to calculate aggregate scores and convoluted scores.
    Type: Grant
    Filed: March 17, 2017
    Date of Patent: September 11, 2018
    Assignee: PALANTIR TECHNOLOGIES INC.
    Inventors: Maxim Kesin, Samuel Jones
  • Patent number: 10044745
    Abstract: Methods, systems, and apparatus, including computer programs encoded on computer storage media, for computer network security risk assessment. One of the methods includes obtaining compromise likelihoods for user accounts. Information describing a network topology of a network is obtained, with the network topology being nodes each connected by an edge to other nodes, each node being associated with a compromise likelihood, and one or more nodes are high value nodes associated with a compromise value. Unique paths to each of the high value nodes are determined for a particular user account. An expected value for each path is determined based on the compromise likelihood of the particular user account, the compromise likelihood of each node included in the path, the communication weight of each edge included in the path, and the compromise value associated with the high value node. User interface data is generated describing at least one path.
    Type: Grant
    Filed: July 11, 2016
    Date of Patent: August 7, 2018
    Assignee: Palantir Technologies, Inc.
    Inventors: Samuel Jones, Joseph Staehle, Lucy Cheng
  • Publication number: 20180035762
    Abstract: A measurement apparatus comprising a base for receiving an object to be measured is disclosed. The base is provided with a pattern that is visually different in different locations. An abutment element is moveable relative to the object and the pattern, the moveable abutment element being configured to partially cover the pattern from an imaging apparatus and provide at least one datum point for the imaging apparatus for determining measurement data for the object based on the at least one datum point and a part of the pattern remaining visible for the imaging apparatus. Methods, imaging apparatuses and a system for generating and processing measurement data are also disclosed.
    Type: Application
    Filed: February 8, 2016
    Publication date: February 8, 2018
    Inventors: Chris TOWNS, Peter RICKETT, Samuel JONES
  • Publication number: 20170195354
    Abstract: A security system detects anomalous activity in a network. The system logs user activity, which can include ports used, compares users to find similar users, sorts similar users into cohorts, and compares new user activity to logged behavior of the cohort. The comparison can include a divergence calculation. Origins of user activity can also be used to determine anomalous network activity. The hostname, username, IP address, and timestamp can be used to calculate aggregate scores and convoluted scores.
    Type: Application
    Filed: March 17, 2017
    Publication date: July 6, 2017
    Inventors: Maxim Kesin, Samuel Jones
  • Publication number: 20170111381
    Abstract: Methods, systems, and apparatus, including computer programs encoded on computer storage media, for network monitoring, user account compromise determination, and user behavior database system. The system monitors network actions of user accounts including user account access across multitudes of network accessible systems, determines user account transitions, and determines different types of high-risk user behavior indicative of compromise. Network actions can be obtained from generated information by the network accessible systems, and correlated across additional data sets including contextual ones. User interfaces are generated describing network actions of user accounts, and are configured for user interaction, which cause generation of updated user interfaces and access to electronic data sources to determine information relevant to the user interaction.
    Type: Application
    Filed: December 30, 2016
    Publication date: April 20, 2017
    Inventors: Samuel Jones, Timothy Yousaf, Drew Dennison, Vivek Lakshmanan, Joseph Staehle, Samuel Kremin, Maxim Kesin, Taylor Heroux
  • Patent number: 9628500
    Abstract: A security system detects anomalous activity in a network. The system logs user activity, which can include ports used, compares users to find similar users, sorts similar users into cohorts, and compares new user activity to logged behavior of the cohort. The comparison can include a divergence calculation. Origins of user activity can also be used to determine anomalous network activity. The hostname, username, IP address, and timestamp can be used to calculate aggregate scores and convoluted scores.
    Type: Grant
    Filed: July 29, 2016
    Date of Patent: April 18, 2017
    Assignee: Palantir Technologies Inc.
    Inventors: Maxim Kesin, Samuel Jones
  • Publication number: 20170099311
    Abstract: A security system detects anomalous activity in a network. The system logs user activity, which can include ports used, compares users to find similar users, sorts similar users into cohorts, and compares new user activity to logged behavior of the cohort. The comparison can include a divergence calculation. Origins of user activity can also be used to determine anomalous network activity. The hostname, username, IP address, and timestamp can be used to calculate aggregate scores and convoluted scores.
    Type: Application
    Filed: July 29, 2016
    Publication date: April 6, 2017
    Inventors: Maxim Kesin, Samuel Jones
  • Patent number: 9537880
    Abstract: Methods, systems, and apparatus, including computer programs encoded on computer storage media, for network monitoring, user account compromise determination, and user behavior database system. The system monitors network actions of user accounts including user account access across multitudes of network accessible systems, determines user account transitions, and determines different types of high-risk user behavior indicative of compromise. Network actions can be obtained from generated information by the network accessible systems, and correlated across additional data sets including contextual ones. User interfaces are generated describing network actions of user accounts, and are configured for user interaction, which cause generation of updated user interfaces and access to electronic data sources to determine information relevant to the user interaction.
    Type: Grant
    Filed: December 29, 2015
    Date of Patent: January 3, 2017
    Assignee: PALANTIR TECHNOLOGIES INC.
    Inventors: Samuel Jones, Timothy Yousaf, Drew Dennison, Vivek Lakshmanan, Joseph Staehle, Samuel Kremin, Maxim Kesin, Taylor Heroux