Patents by Inventor Samuel Jones
Samuel Jones has filed for patents to protect the following inventions. This listing includes patent applications that are pending as well as patents that have already been granted by the United States Patent and Trademark Office (USPTO).
-
Publication number: 20210137966Abstract: The invention relates to virucidal compounds, virucidal compositions comprising thereof and uses thereof in treatment of viral infections, for sterilizations and for disinfections.Type: ApplicationFiled: January 22, 2021Publication date: May 13, 2021Inventors: Samuel Jones, Francesco Stellacci
-
Patent number: 10963465Abstract: Systems and methods for rapid importation of data including temporally tracked object recognition. One of the methods includes receiving datasets each indicating information associated with one or more objects. Information indicating unique identifying information associated with the objects is accessed, and an updated dataset joining information from datasets that is associated with each object is generated. The updated dataset is maintained to include most recent versions of each of the datasets, with one or more datasets being replaced with more recent versions, and with one or more other datasets being propagated to be the most recent versions. Queries received from clients are responded to, with the queries indicating requests for specific information related to objects.Type: GrantFiled: November 2, 2017Date of Patent: March 30, 2021Assignee: Palantir Technologies Inc.Inventors: Samuel Jones, Sean Hacker
-
Publication number: 20200329064Abstract: A security system detects anomalous activity in a network. The system logs user activity, which can include ports used, compares users to find similar users, sorts similar users into cohorts, and compares new user activity to logged behavior of the cohort. The comparison can include a divergence calculation. Origins of user activity can also be used to determine anomalous network activity. The hostname, username, IP address, and timestamp can be used to calculate aggregate scores and convoluted scores.Type: ApplicationFiled: June 25, 2020Publication date: October 15, 2020Inventors: Maxim Kesin, Samuel Jones
-
Patent number: 10735448Abstract: A security system detects anomalous activity in a network. The system logs user activity, which can include ports used, compares users to find similar users, sorts similar users into cohorts, and compares new user activity to logged behavior of the cohort. The comparison can include a divergence calculation. Origins of user activity can also be used to determine anomalous network activity. The hostname, username, IP address, and timestamp can be used to calculate aggregate scores and convoluted scores.Type: GrantFiled: August 22, 2018Date of Patent: August 4, 2020Assignee: Palantir Technologies Inc.Inventors: Maxim Kesin, Samuel Jones
-
Publication number: 20200204578Abstract: A method, apparatus, and computer program are disclosed. The method may be performed by one or more processors and may comprise receiving first data representing an infrastructure of a computer network, the first data comprising an indication of hosts which form at least part of the computer network and one or more software resources on respective hosts. The method may also comprise receiving second data from a vulnerability scanning software, the second data comprising an indication of one or more vulnerabilities detected in the one or more software resources provided on at least some of the hosts of the computer network. Using a combination of the first data and the second data, output data may be generated representing a risk profile of the computer network infrastructure, the output data indicating one or more subsets of hosts, determined as being at risk of being affected by the detected vulnerabilities by virtue of the software resources they provide for output on a user interface.Type: ApplicationFiled: March 6, 2019Publication date: June 25, 2020Inventors: Elliot Colquhoun, Abhishek Agarwal, Andrew Eggleton, Brandon Helms, Carl Ambroselli, Cem Zorlular, Daniel Kelly, Gautam Punukollu, Jeffrey Tsui, Morten Kromann, Nikhil Seetharaman, Raj Krishnan, Samuel Jones, Tareq Alkhatib, Dayang Shi
-
Publication number: 20190275073Abstract: The invention relates to virucidal compounds, virucidal compositions comprising thereof and uses thereof in treatment of viral infections, for sterilizations and for disinfections.Type: ApplicationFiled: July 20, 2017Publication date: September 12, 2019Applicant: Ecole Polytechnique Fédérale de Lausanne (EPFL)Inventors: Samuel JONES, Francesco STELLACCI
-
Publication number: 20190244485Abstract: Disclosed are social wagering systems creating a social wagering application for live sporting events comprising: software module configured to allow a user to create, update, and manage a player account; software module configured to allow the user to choose sporting teams and choose from in-play or upcoming sporting events; software module configured to allow the user to choose players as selected game-players for each sub-period; software module configured to award points to the user upon the chosen game-player's all positive and negative scoring player-events during each sub-period, and to calculate the user's total points for the whole chosen sporting event based on the sum of awarded points to the user of all sub-periods; and software module configured to rank the user among all users based on the total points, and to award the user one or more of prizes, experiences and wagering tokens based on the user's ranking.Type: ApplicationFiled: July 21, 2017Publication date: August 8, 2019Inventor: Samuel JONES
-
Publication number: 20190081971Abstract: Methods, systems, and apparatus, including computer programs encoded on computer storage media, for network monitoring, user account compromise determination, and user behavior database system. The system monitors network actions of user accounts including user account access across multitudes of network accessible systems, determines user account transitions, and determines different types of high-risk user behavior indicative of compromise. Network actions can be obtained from generated information by the network accessible systems, and correlated across additional data sets including contextual ones. User interfaces are generated describing network actions of user accounts, and are configured for user interaction, which cause generation of updated user interfaces and access to electronic data sources to determine information relevant to the user interaction.Type: ApplicationFiled: November 12, 2018Publication date: March 14, 2019Inventors: Samuel Jones, Timothy Yousaf, Drew Dennison, Vivek Lakshmanan, Joseph Staehle, Samuel Kremin, Maxim Kesin, Taylor Heroux
-
Publication number: 20190008856Abstract: The present invention relates to Ataxia-Telangiectasia Mutated and Rad3-related protein kinase (ATR) inhibitors for use in methods of treating BAF-complex deficient cancer. The present invention further provides methods for identifying ATR inhibitors for use in the treatment of BAF complex gene mutant or deficient cancers. Medical uses and methods relating to the treatment of synovial sarcoma using ATR inhibitors are also provided.Type: ApplicationFiled: January 6, 2017Publication date: January 10, 2019Inventors: Christopher James Lord, Chris Williamson, Samuel Jones
-
Publication number: 20190007441Abstract: A security system detects anomalous activity in a network. The system logs user activity, which can include ports used, compares users to find similar users, sorts similar users into cohorts, and compares new user activity to logged behavior of the cohort. The comparison can include a divergence calculation. Origins of user activity can also be used to determine anomalous network activity. The hostname, username, IP address, and timestamp can be used to calculate aggregate scores and convoluted scores.Type: ApplicationFiled: August 22, 2018Publication date: January 3, 2019Inventors: Maxim Kesin, Samuel Jones
-
Publication number: 20180351991Abstract: Methods, systems, and apparatus, including computer programs encoded on computer storage media, for computer network security risk assessment. One of the methods includes obtaining compromise likelihoods for user accounts. Information describing a network topology of a network is obtained, with the network topology being nodes each connected by an edge to other nodes, each node being associated with a compromise likelihood, and one or more nodes are high value nodes associated with a compromise value. Unique paths to each of the high value nodes are determined for a particular user account. An expected value for each path is determined based on the compromise likelihood of the particular user account, the compromise likelihood of each node included in the path, the communication weight of each edge included in the path, and the compromise value associated with the high value node. User interface data is generated describing at least one path.Type: ApplicationFiled: July 16, 2018Publication date: December 6, 2018Inventors: Samuel Jones, Joseph Staehle, Lucy Cheng
-
Patent number: 10129282Abstract: Methods, systems, and apparatus, including computer programs encoded on computer storage media, for network monitoring, user account compromise determination, and user behavior database system. The system monitors network actions of user accounts including user account access across multitudes of network accessible systems, determines user account transitions, and determines different types of high-risk user behavior indicative of compromise. Network actions can be obtained from generated information by the network accessible systems, and correlated across additional data sets including contextual ones. User interfaces are generated describing network actions of user accounts, and are configured for user interaction, which cause generation of updated user interfaces and access to electronic data sources to determine information relevant to the user interaction.Type: GrantFiled: December 30, 2016Date of Patent: November 13, 2018Assignee: Palantir Technologies Inc.Inventors: Samuel Jones, Timothy Yousaf, Drew Dennison, Vivek Lakshmanan, Joseph Staehle, Samuel Kremin, Maxim Kesin, Taylor Heroux
-
Patent number: 10075464Abstract: A security system detects anomalous activity in a network. The system logs user activity, which can include ports used, compares users to find similar users, sorts similar users into cohorts, and compares new user activity to logged behavior of the cohort. The comparison can include a divergence calculation. Origins of user activity can also be used to determine anomalous network activity. The hostname, username, IP address, and timestamp can be used to calculate aggregate scores and convoluted scores.Type: GrantFiled: March 17, 2017Date of Patent: September 11, 2018Assignee: PALANTIR TECHNOLOGIES INC.Inventors: Maxim Kesin, Samuel Jones
-
Patent number: 10044745Abstract: Methods, systems, and apparatus, including computer programs encoded on computer storage media, for computer network security risk assessment. One of the methods includes obtaining compromise likelihoods for user accounts. Information describing a network topology of a network is obtained, with the network topology being nodes each connected by an edge to other nodes, each node being associated with a compromise likelihood, and one or more nodes are high value nodes associated with a compromise value. Unique paths to each of the high value nodes are determined for a particular user account. An expected value for each path is determined based on the compromise likelihood of the particular user account, the compromise likelihood of each node included in the path, the communication weight of each edge included in the path, and the compromise value associated with the high value node. User interface data is generated describing at least one path.Type: GrantFiled: July 11, 2016Date of Patent: August 7, 2018Assignee: Palantir Technologies, Inc.Inventors: Samuel Jones, Joseph Staehle, Lucy Cheng
-
Publication number: 20180035762Abstract: A measurement apparatus comprising a base for receiving an object to be measured is disclosed. The base is provided with a pattern that is visually different in different locations. An abutment element is moveable relative to the object and the pattern, the moveable abutment element being configured to partially cover the pattern from an imaging apparatus and provide at least one datum point for the imaging apparatus for determining measurement data for the object based on the at least one datum point and a part of the pattern remaining visible for the imaging apparatus. Methods, imaging apparatuses and a system for generating and processing measurement data are also disclosed.Type: ApplicationFiled: February 8, 2016Publication date: February 8, 2018Inventors: Chris TOWNS, Peter RICKETT, Samuel JONES
-
Publication number: 20170195354Abstract: A security system detects anomalous activity in a network. The system logs user activity, which can include ports used, compares users to find similar users, sorts similar users into cohorts, and compares new user activity to logged behavior of the cohort. The comparison can include a divergence calculation. Origins of user activity can also be used to determine anomalous network activity. The hostname, username, IP address, and timestamp can be used to calculate aggregate scores and convoluted scores.Type: ApplicationFiled: March 17, 2017Publication date: July 6, 2017Inventors: Maxim Kesin, Samuel Jones
-
Publication number: 20170111381Abstract: Methods, systems, and apparatus, including computer programs encoded on computer storage media, for network monitoring, user account compromise determination, and user behavior database system. The system monitors network actions of user accounts including user account access across multitudes of network accessible systems, determines user account transitions, and determines different types of high-risk user behavior indicative of compromise. Network actions can be obtained from generated information by the network accessible systems, and correlated across additional data sets including contextual ones. User interfaces are generated describing network actions of user accounts, and are configured for user interaction, which cause generation of updated user interfaces and access to electronic data sources to determine information relevant to the user interaction.Type: ApplicationFiled: December 30, 2016Publication date: April 20, 2017Inventors: Samuel Jones, Timothy Yousaf, Drew Dennison, Vivek Lakshmanan, Joseph Staehle, Samuel Kremin, Maxim Kesin, Taylor Heroux
-
Patent number: 9628500Abstract: A security system detects anomalous activity in a network. The system logs user activity, which can include ports used, compares users to find similar users, sorts similar users into cohorts, and compares new user activity to logged behavior of the cohort. The comparison can include a divergence calculation. Origins of user activity can also be used to determine anomalous network activity. The hostname, username, IP address, and timestamp can be used to calculate aggregate scores and convoluted scores.Type: GrantFiled: July 29, 2016Date of Patent: April 18, 2017Assignee: Palantir Technologies Inc.Inventors: Maxim Kesin, Samuel Jones
-
Publication number: 20170099311Abstract: A security system detects anomalous activity in a network. The system logs user activity, which can include ports used, compares users to find similar users, sorts similar users into cohorts, and compares new user activity to logged behavior of the cohort. The comparison can include a divergence calculation. Origins of user activity can also be used to determine anomalous network activity. The hostname, username, IP address, and timestamp can be used to calculate aggregate scores and convoluted scores.Type: ApplicationFiled: July 29, 2016Publication date: April 6, 2017Inventors: Maxim Kesin, Samuel Jones
-
Patent number: 9537880Abstract: Methods, systems, and apparatus, including computer programs encoded on computer storage media, for network monitoring, user account compromise determination, and user behavior database system. The system monitors network actions of user accounts including user account access across multitudes of network accessible systems, determines user account transitions, and determines different types of high-risk user behavior indicative of compromise. Network actions can be obtained from generated information by the network accessible systems, and correlated across additional data sets including contextual ones. User interfaces are generated describing network actions of user accounts, and are configured for user interaction, which cause generation of updated user interfaces and access to electronic data sources to determine information relevant to the user interaction.Type: GrantFiled: December 29, 2015Date of Patent: January 3, 2017Assignee: PALANTIR TECHNOLOGIES INC.Inventors: Samuel Jones, Timothy Yousaf, Drew Dennison, Vivek Lakshmanan, Joseph Staehle, Samuel Kremin, Maxim Kesin, Taylor Heroux