Patents by Inventor Andrew James Thomas
Andrew James Thomas has filed for patents to protect the following inventions. This listing includes patent applications that are pending as well as patents that have already been granted by the United States Patent and Trademark Office (USPTO).
-
Publication number: 20250220003Abstract: A mobile device securely communicates with an electronic device within an automobile. The mobile device transmits encrypted spatial state information, and the electronic device provides commands to the automobile in response. Spatial state information may include location, motion, or the like. Commands to the automobile may include door unlock commands, remote start commands, horn honk commands, or the like.Type: ApplicationFiled: March 21, 2025Publication date: July 3, 2025Applicant: SideAssure, Inc.Inventors: Siva G. Narendra, Pradeep H. Rajashekarappa, Andrew James Thomas
-
Patent number: 12261830Abstract: A mobile device securely communicates with an electronic device within an automobile. The mobile device transmits encrypted spatial state information and the electronic device provides commands to the automobile in response. Spatial state information may include location, motion, or the like. Commands to the automobile may include door unlock commands, remote start commands, horn honk commands, or the like.Type: GrantFiled: November 20, 2023Date of Patent: March 25, 2025Assignee: SideAssure, Inc.Inventors: Siva G. Narendra, Pradeep H. Rajashekarappa, Andrew James Thomas
-
Publication number: 20240422007Abstract: A computer-implemented method includes identifying one or more software processes that execute on the endpoint device and that perform at least one file operation including opening a file, reading the file, writing the file, or transmitting the file over a network. The method further includes storing for each software process of the one or more software processes identification information about the file. The method further includes responsive to determining that a triggering event has occurred, performing one or more actions including: preventing deletion of the file, determining one or more attributes of a suspicious process that accessed the file, requesting that a separate component analyze event journal records in relation to a time interval that overlaps with when the suspicious process accessed the file, or transmitting a cryptographic hash of the file to a server.Type: ApplicationFiled: June 14, 2023Publication date: December 19, 2024Applicant: SOPHOS LIMITEDInventors: Daniel Montaque Teal, Steven Braggs, Andrew James Thomas
-
Publication number: 20240411877Abstract: Various aspects related to methods, systems, and computer readable media for detection and blocking of security threats for network-accessible devices. Methods may include receiving an indication of a security threat to a user device of the plurality of user devices, the indication of security threat associated with a device threat type, determining that the device threat type is a threat type that requires elevated security measures, responsive to the determining that the device threat type requires elevated security measures, elevating security measures associated with the user device for a first time period, and, after the elevating, automatically remediating the security threat on the user device within the first time period.Type: ApplicationFiled: January 26, 2024Publication date: December 12, 2024Applicant: SOPHOS LIMITEDInventors: Dmitry Samosseiko, Fraser Peter Howard, Michael David Wood, Andrew James Thomas, Benjamin James Humphrey, Xiaochuan Zhang, Paul Barrie Ducklin, Anand Ajjan
-
Publication number: 20240414176Abstract: Various aspects related to methods, systems, and computer readable media for detection and blocking of security threats for network-accessible devices. Methods can include monitoring network traffic on a computer network, detecting an indication of a security threat to at least one endpoint, determining that the device threat type is a threat type that requires elevated security measures, responsive to the determining that the device threat type requires elevated security measures, updating a network-access policy for the plurality of endpoints with the threat type, and after the updating, automatically remediating the security threat on the at least one endpoint within a first time period.Type: ApplicationFiled: January 26, 2024Publication date: December 12, 2024Applicant: SOPHOS LIMITEDInventors: Dmitry Samosseiko, Fraser Peter Howard, Michael David Wood, Andrew James Thomas, Benjamin James Humphrey, Xiaochuan Zhang, Paul Barrie Ducklin, Anand Ajjan
-
Publication number: 20240414189Abstract: Various aspects related to methods, systems, and computer readable media for detection and blocking of security threats for network-accessible devices. Methods may include receiving an indication of a security threat to the user device, the indication of security threat associated with a device threat type, determining that the device threat type is a threat type that requires elevated security measures, responsive to the determining that the device threat type requires elevated security measures, restricting execution of a subset of software available on the user device for a first time period, and, after the elevating, automatically remediating the security threat on the user device within the first time period.Type: ApplicationFiled: January 26, 2024Publication date: December 12, 2024Applicant: SOPHOS LIMITEDInventors: Dmitry Samosseiko, Fraser Peter Howard, Michael David Wood, Andrew James Thomas, Benjamin James Humphrey, Xiaochuan Zhang, Paul Barrie Ducklin, Anand Ajjan
-
Publication number: 20240411878Abstract: Various aspects related to methods, systems, and computer readable media for detection and blocking of security threats for network-accessible devices. Methods may include monitoring a plurality of processes executing on the user device to identify a pre-execution flag associated with at least one process of the plurality of processes, and, responsive to identifying the pre-execution flag: receiving an indication of a security threat to the user device, the indication of security threat associated with the at least one process and a device threat type, responsive to the receiving the indication of the security threat, elevating security measures associated with the user device for a first time period, and after the elevating, automatically remediating the security threat on the user device within the first time period.Type: ApplicationFiled: January 26, 2024Publication date: December 12, 2024Applicant: SOPHOS LIMITEDInventors: Dmitry Samosseiko, Fraser Peter Howard, Michael David Wood, Andrew James Thomas, Benjamin James Humphrey, Xiaochuan Zhang, Paul Barrie Ducklin, Anand Ajjan
-
Publication number: 20240348587Abstract: A mobile device securely communicates with an electronic device within an automobile. The mobile device transmits encrypted spatial state information and the electronic device provides commands to the automobile in response. Spatial state information may include location, motion, or the like. Commands to the automobile may include door unlock commands, remote start commands, horn honk commands, or the like.Type: ApplicationFiled: November 20, 2023Publication date: October 17, 2024Applicant: SideAssure Inc.Inventors: Siva G. Narendra, Pradeep H. Rajashekarappa, Andrew James Thomas
-
Patent number: 11824843Abstract: A mobile device securely communicates with an electronic device within an automobile. The mobile device transmits encrypted spatial state information and the electronic device provides commands to the automobile in response. Spatial state information may include location, motion, or the like. Commands to the automobile may include door unlock commands, remote start commands, horn honk commands, or the like.Type: GrantFiled: September 16, 2022Date of Patent: November 21, 2023Assignee: SIDEASSURE INC.Inventors: Siva G. Narendra, Pradeep H. Rajashekarappa, Andrew James Thomas
-
Publication number: 20230009018Abstract: A mobile device securely communicates with an electronic device within an automobile. The mobile device transmits encrypted spatial state information and the electronic device provides commands to the automobile in response. Spatial state information may include location, motion, or the like. Commands to the automobile may include door unlock commands, remote start commands, horn honk commands, or the like.Type: ApplicationFiled: September 16, 2022Publication date: January 12, 2023Applicant: SideAssure Inc.Inventors: Siva G. Narendra, Pradeep H. Rajashekarappa, Andrew James Thomas
-
Patent number: 11496445Abstract: A mobile device securely communicates with an electronic device within an automobile. The mobile device transmits encrypted spatial state information and the electronic device provides commands to the automobile in response. Spatial state information may include location, motion, or the like. Commands to the automobile may include door unlock commands, remote start commands, horn honk commands, or the like.Type: GrantFiled: May 23, 2018Date of Patent: November 8, 2022Assignee: SideAssure, Inc.Inventors: Siva G. Narendra, Pradeep H. Rajashekarappa, Andrew James Thomas
-
Patent number: 11037451Abstract: A method for coordinating a plurality of vehicles (102, 104) comprising: defining, as a command vehicle (C), a vehicle in the plurality; storing, by one or more storage devices (204) located on one or more of the vehicles (102, 104), a list of capabilities of each vehicle (102, 104); receiving, by one or more processors (202) on the command vehicle (C), a specification of a goal; based on the stored vehicle capabilities, allocating, by the one or more processors (202), to one or more of the vehicles (102, 104), one or more tasks, the one or more tasks being such that, if each of those tasks was to be performed, the goal would be accomplished; and sending, from the command vehicle (C), to each vehicle (102, 104) to which a task has been allocated, a specification of the one or more tasks allocated to that vehicle (102, 104).Type: GrantFiled: December 4, 2017Date of Patent: June 15, 2021Assignee: BAE Systems plcInventors: Roderick Buchanan, Richard Charles Freeman, David William Thomas Clark, Andrew James Thomas
-
Publication number: 20200082728Abstract: A method for coordinating a plurality of vehicles (102, 104) comprising: defining, as a command vehicle (C), a vehicle in the plurality; storing, by one or more storage devices (204) located on one or more of the vehicles (102, 104), a list of capabilities of each vehicle (102, 104); receiving, by one or more processors (202) on the command vehicle (C), a specification of a goal; based on the stored vehicle capabilities, allocating, by the one or more processors (202), to one or more of the vehicles (102, 104), one or more tasks, the one or more tasks being such that, if each of those tasks was to be performed, the goal would be accomplished; and sending, from the command vehicle (C), to each vehicle (102, 104) to which a task has been allocated, a specification of the one or more tasks allocated to that vehicle (102, 104).Type: ApplicationFiled: December 4, 2017Publication date: March 12, 2020Applicant: BAE Systems plcInventors: Roderick Buchanan, Richard Charles Freeman, David William Thomas Clark, Andrew James Thomas
-
Patent number: 10541001Abstract: In one embodiment, a method includes accessing a video; detecting one or more objects in one or more frames of the video; identifying one or more of the detected objects; determining a relevance score for each of the one or more of the identified objects with respect to a user the video is to be presented to; selecting one or more frames of the video based on the determined relevance scores for the identified objects in the frames; and providing for presentation to the user one or more of the selected frames of the video.Type: GrantFiled: December 27, 2017Date of Patent: January 21, 2020Assignee: Facebook, Inc.Inventors: Vincent Charles Cheung, Hermes Germi Pique Corchs, Maria Chiara Cacciani, Andrew James Thomas Buckley, Stef Marc Smet, Milen Georgiev Ozhumerov, Mircea-Gabriel Suciu, Muhammed Elsayed Muhammed Elsayed Ibrahim, Cunpu Bo
-
Publication number: 20190364022Abstract: A mobile device securely communicates with an electronic device within an automobile. The mobile device transmits encrypted spatial state information and the electronic device provides commands to the automobile in response. Spatial state information may include location, motion, or the like. Commands to the automobile may include door unlock commands, remote start commands, horn honk commands, or the like.Type: ApplicationFiled: May 23, 2018Publication date: November 28, 2019Applicant: Tyfone, Inc.Inventors: Siva G. Narendra, Pradeep H. Rajashekarappa, Andrew James Thomas
-
Publication number: 20190198057Abstract: In one embodiment, a method includes accessing a video; detecting one or more objects in one or more frames of the video; identifying one or more of the detected objects; determining a relevance score for each of the one or more of the identified objects with respect to a user the video is to be presented to; selecting one or more frames of the video based on the determined relevance scores for the identified objects in the frames; and providing for presentation to the user one or more of the selected frames of the video.Type: ApplicationFiled: December 27, 2017Publication date: June 27, 2019Inventors: Vincent Charles Cheung, Hermes Germi Pique Corchs, Maria Chiara Cacciani, Andrew James Thomas Buckley, Stef Marc Smet, Milen Georgiev Dzhumerov, Mircea-Gabriel Suciu, Muhammed Elsayed Muhammed Elsayed Ibrahim, Cunpu Bo
-
Patent number: 10013535Abstract: A program controller is arranged to automatically authorize or configure or upgrade a program for a customer replaceable card of a system, the controller being arranged to manage the program automatically, according to a licence agreement, and according to a stored history of use of the hardware module. A supplier can track customer changes and enforce more easily different conditions for authorizing the program on, different modules from different sources, having different levels of capability. There can be less interaction with the supplier to get specific authorizations. The history can be stored on the module. It can be used to ease inventory tracking and generate billing information.Type: GrantFiled: November 21, 2003Date of Patent: July 3, 2018Assignee: Ciena CorporationInventors: Andrew James Thomas, Mark Skrebels, Stewart Irvine
-
Patent number: 8608144Abstract: An assembly of a cable gripper and a cable that has an outer protective layer formed from plastically deformable material, over an inner tensile strength portion). The cable gripper includes at least one gripper member having a supported outer end and an active inner end penetrating the outer protective layer and gripping the inner tensile strength portion beneath the outer protective layer. The active inner end includes a material of sufficient hardness to penetrate the outer protective layer by movement of the gripper member through the outer layer from an inoperative to an operative position.Type: GrantFiled: January 9, 2007Date of Patent: December 17, 2013Assignee: Ocean Cable Technologies LimitedInventors: Andrew James Thomas, Jeremy John Richard Featherstone
-
Patent number: 8286255Abstract: In embodiments of the present invention improved capabilities are described for providing data protection through the detection of tags associated with data or a file. In embodiments the present invention may provide for a step A, where data may be scanned that is intended to be communicated from the client computing facility. In response to step A, at step B, restricted data may be identified by identifying an absence of a tag associated with the data. And finally, in response to step B, at step C, an interruption to the intended communication may be caused.Type: GrantFiled: August 7, 2008Date of Patent: October 9, 2012Assignee: Sophos PLCInventors: Calum Anders McKay Grant, Rade Todorovic, Andrew James Thomas, Richard Jacobs
-
Publication number: 20100037324Abstract: In embodiments of the present invention improved capabilities are described for providing data protection through the detection of tags associated with data or a file. In embodiments the present invention may provide for a step A, where data may be scanned that is intended to be communicated from the client computing facility. In response to step A, at step B, restricted data may be identified by identifying an absence of a tag associated with the data. And finally, in response to step B, at step C, an interruption to the intended communication may be caused.Type: ApplicationFiled: August 7, 2008Publication date: February 11, 2010Inventors: Calum Anders McKay Grant, Rade Todorovic, Andrew James Thomas, Richard Jacobs