Patents by Inventor Andrew Cottrell
Andrew Cottrell has filed for patents to protect the following inventions. This listing includes patent applications that are pending as well as patents that have already been granted by the United States Patent and Trademark Office (USPTO).
-
Publication number: 20240136019Abstract: Provided herein are methods for discovery of epitope specific monoclonal antibodies to pathogens directly from immune sera for immunotherapeutic use. Further provided herein are methods to determine molecular structure of antibodies targeting an antigen from convalescent or vaccinated individuals for the purpose of rational vaccine design.Type: ApplicationFiled: February 24, 2022Publication date: April 25, 2024Inventors: Andrew B. Ward, Aleksandar Antanasijevic, Charles Bowman, Christopher Cottrell, Gabriel Ozorowski, Robert Kirchdoerfer
-
Patent number: 11964010Abstract: Coronavirus S ectodomain trimers stabilized in a prefusion conformation, nucleic acid molecules and vectors encoding these proteins, and methods of their use and production are disclosed. In several embodiments, the coronavirus S ectodomain trimers and/or nucleic acid molecules can be used to generate an immune response to coronavirus in a subject. In additional embodiments, the therapeutically effective amount of the coronavirus S ectodomain trimers and/or nucleic acid molecules can be administered to a subject in a method of treating or preventing coronavirus infection.Type: GrantFiled: March 8, 2021Date of Patent: April 23, 2024Assignees: The United States of America, as represented by the Secretary, Department of Health and Human Services, The Scripps Research Institute, Trustees of Dartmouth CollegeInventors: Barney Graham, Jason Mclellan, Andrew Ward, Robert Kirchdoerfer, Christopher Cottrell, Michael Gordon Joyce, Masaru Kanekiyo, Nianshuang Wang, Jesper Pallesen, Hadi Yassine, Hannah Turner, Kizzmekia Corbett
-
Publication number: 20120036569Abstract: An import address table (IAT) and dynamic linked libraries (DLLs) security mender process is configured to store nominal IAT table entries and in-process binary images, from either a priori data and/or from computed values. Particular IAT table entries and in-process binary images are fetched for comparison with expected values. These particular IAT table entries and/or in-process binary images are then overwritten with nominal values for the IAT table entries and in-process binary images. The IAT-DLL security mender runs in parallel with the operating system and has access to its IAT and inline code in system memory.Type: ApplicationFiled: October 20, 2011Publication date: February 9, 2012Inventors: Andrew Cottrell, Juan Gamez
-
Publication number: 20070199053Abstract: To authenticate a user of a communications network, credentials from the user are centrally receiving. An authentication sequence is retrieved from a plurality of retrievable authentication sequences, and the retrieved authentication sequence is performed to authenticate the user based on the received credentials.Type: ApplicationFiled: February 12, 2007Publication date: August 23, 2007Applicant: TRICIPHER, INC.Inventors: Ravi Sandhu, Ravi Ganesan, Andrew Cottrell, Timothy Renshaw, Brett Schoppert, Kyle Austin
-
Publication number: 20070186095Abstract: A user network station transmits a cookie that includes a user identifier and an augmenting factor transformed with one key of a first asymmetric crypto-key or with a symmetric crypto-key. An authenticating entity network station recovers the augmenting factor from the transformed augmenting factor included in the transmitted cookie, with the other key of the first asymmetric crypto-key or with the symmetric crypto-key, and transmits a customized login page corresponding to the user identifier. The user network station transmits a factor responsive to the transmitted customized login page. The authenticating entity network station generates a first key portion based on the transmitted factor and the recovered augmenting factor, and validates the generated first key portion based on a second key portion of one key of a second asymmetric crypto-key associated with the user and on the other key of the second asymmetric crypto-key, to thereby authenticate the user.Type: ApplicationFiled: May 31, 2006Publication date: August 9, 2007Applicant: TRICIPHER, INC.Inventors: Ravi GANESAN, Ravinderpal Sandhu, Andrew Cottrell, Kyle Austin
-
Publication number: 20070033393Abstract: A user network station transmits a cookie including a user identifier and an augmenting factor transformed with one key of a first asymmetric crypto-key or with a symmetric crypto-key. A authenticating entity network station recovers the augmenting factor from the transformed augmenting factor with the other key of the first asymmetric crypto-key or with the symmetric crypto-key, and transmits a customized login page corresponding to the user identifier included in the received cookie. The user network station transmits a factor responsive to the transmitted customized login page. The authenticating entity network station generates a first key portion based on the transmitted factor, and validates the generated first key portion based on a second key portion of one key of a second asymmetric crypto-key associated with the user and on the other key of the second asymmetric crypto-key, and the recovered augmenting factor, to thereby authenticate the user.Type: ApplicationFiled: May 31, 2006Publication date: February 8, 2007Applicant: TRICIPHER, INC.Inventors: RAVI GANESAN, Ravinderpal SANDHU, ANDREW COTTRELL, KYLE AUSTIN
-
Publication number: 20070033392Abstract: To establish credentials, a user network station transmits a first value. An authenticating entity network station generates a first key portion based on the transmitted first value and a second value unknown to the user, splits one of a private key and a public key of a user asymmetric crypto-key into the first key portion and a second key portion, stores the second key portion of the one key so as to be accessible only to the authenticating entity network device, generates a cookie including the second value, transmits the generated cookie to the user network station, and destroys the transmitted first value, the second value, the one key, and the first key portion of the one key. The first value represents a first and the second value included in the transmitted cookie represents a second user credential useable to authenticate the user.Type: ApplicationFiled: May 31, 2006Publication date: February 8, 2007Applicant: TRICIPHER, INC.Inventors: Ravi Ganesan, Ravinderpal Sandhu, Andrew Cottrell, Kyle Austin
-
Publication number: 20070033642Abstract: To authenticate a user having an associated asymmetric crypto-key having a private/public key pair (D,E) based on a one-time-password, the user partially signs a symmetric session key with the first portion D1 of the private key D. The authenticating entity receives the partially signed symmetric session key via the network and completes the signature with the second private key portion D2 to recover the symmetric session key. The user also encrypts a one-time-password with the symmetric session key. The authenticating entity also receives the encrypted one-time-password via the network, and decrypts the received encrypted one-time-password with the recovered symmetric session key to authenticate the user.Type: ApplicationFiled: May 2, 2006Publication date: February 8, 2007Applicant: TRICIPHER, INC.Inventors: Ravi Ganesan, Ravinderpal Sandhu, Andrew Cottrell, Brett Schoppert, Mihir Bellare
-
Publication number: 20060143600Abstract: A secure firmware update method includes receiving a firmware update image, for example, firmware code including corrected or updated functionality. Next, the firmware update image and the source of the firmware update image are authenticated. After the firmware update image and the source of the firmware update image have been authenticated, the current firmware image is replaced by the firmware update image. If either of the new firmware image or the firmware update module is not authorized, the memory remains locked; thereby, preventing the unauthorized firmware image from being flashed into the memory. An electronic device includes a processor and a memory. The memory maintains instructions that when executed by the processor, causes the processor to receive a firmware update image. Next, the instructions cause the processor to authenticate the firmware update image and the source of the image.Type: ApplicationFiled: December 29, 2004Publication date: June 29, 2006Inventors: Andrew Cottrell, Jithendra Bethur, Timothy Markey, M. Srikant, Lakshmanan Srinivasan
-
Patent number: 7024328Abstract: Structures and methods for non-intrusive testing of communication signals exchanged between two circuit boards via an intermediate interconnect board. In one aspect hereof, the functional signal normally exchanged between the circuits is latched during the exchange of test signals and the latched functional signal is utilized within the circuit that normally receives the functional signal to continue normal operations. In another aspect hereof, the test signals are exchanged over a dedicated test signal path between the two circuits. In another aspect hereof, the test signals are exchanged over the functional signal paths as out of band signals.Type: GrantFiled: January 27, 2004Date of Patent: April 4, 2006Assignee: LSI Logic CorporationInventors: Keith W. Holt, Jeremy D. Stover, Andrew A Cottrell
-
Publication number: 20050210266Abstract: A status arbiter includes a first input operative to receive at least one of a server public key and an agent public key. A second input is operative to receive a secure confirmation signal, where the secure confirmation signal may include an encrypted signal indicating of the state of an underlying device. An authenticating means for determining the state of the underlying device is coupled to the private key input, which provides for the release of digital credentials indicating that the underlying device is secure. A secure device operating method includes receiving an authentication request. Next, providing a device credential in response to the authentication request, where the device credential is provided in response to a secure confirmation signal indicating that the underlying device is authorized to perform the authentication request.Type: ApplicationFiled: September 27, 2004Publication date: September 22, 2005Inventors: Andrew Cottrell, Karen Zelenko
-
Publication number: 20050165572Abstract: Structures and methods for non-intrusive testing of communication signals exchanged between two circuit boards via an intermediate interconnect board. In one aspect hereof, test signals are exchanged between the two circuit boards without requiring active circuits on the interconnect board. In another aspect hereof, the functional signal normally exchanged between the circuits is latched during the exchange of test signals and the latched functional signal is utilized within the circuit that normally receives the functional signal to continue normal operations. In another aspect hereof, the test signals are exchanged over a dedicated test signal path between the two circuits. In another aspect hereof, the test signals are exchanged over the functional signal paths as out of band signals.Type: ApplicationFiled: January 27, 2004Publication date: July 28, 2005Inventors: Keith Holt, Jeremy Stover, Andrew Cottrell
-
Patent number: D718736Type: GrantFiled: January 9, 2012Date of Patent: December 2, 2014Assignee: Imation Corp.Inventors: Katie Thompson, Andrew Cottrell, Rick Kogler
-
Patent number: D834044Type: GrantFiled: July 27, 2016Date of Patent: November 20, 2018Assignee: Beckman Coulter, Inc.Inventors: Nicholas Everhart, Dana Vajen Habig, Shaohui Qiu, Andrew Cottrell, Daniel Sunoh Choe
-
Patent number: D898054Type: GrantFiled: October 9, 2018Date of Patent: October 6, 2020Assignee: BECKMAN COULTER, INC.Inventors: Nicholas Everhart, Dana Vajen Habig, Shaohui Qiu, Andrew Cottrell, Daniel Sunoh Choe
-
Patent number: D918253Type: GrantFiled: August 27, 2018Date of Patent: May 4, 2021Assignee: BECKMAN COULTER, INC.Inventors: Daniel Sunoh Choe, Andrew Cottrell, Nicholas Clifton Everhart, Dana Vajen Habig, Shaohui Qiu
-
Patent number: D928194Type: GrantFiled: July 28, 2018Date of Patent: August 17, 2021Assignee: BECKMAN COULTER, INC.Inventors: Brittany R. Baker, Daniel Sunoh Choe, Andrew Cottrell, Dana Vajen Habig, Tony J. Riley, Brandon S. Roseen, Mindie Seh Wha Te, XiaoYin Wang, Chad M. Weber
-
Patent number: D957416Type: GrantFiled: October 6, 2020Date of Patent: July 12, 2022Assignee: BECKMAN COULTER, INC.Inventors: Nicholas Everhart, Dana Vajen Habig, Shaohui Qiu, Andrew Cottrell, Daniel Sunoh Choe
-
Patent number: D962976Type: GrantFiled: July 19, 2021Date of Patent: September 6, 2022Assignee: Beckman Coulter, Inc.Inventors: Brittany R. Baker, Daniel Sunoh Choe, Andrew Cottrell, Dana Vajen Habig, Tony J. Riley, Mindie Seh-wha Te, XiaoYin Wang, Chad M. Weber