Patents by Inventor Carlos Villegas

Carlos Villegas has filed for patents to protect the following inventions. This listing includes patent applications that are pending as well as patents that have already been granted by the United States Patent and Trademark Office (USPTO).

  • Publication number: 20240141941
    Abstract: A rivet system comprises (i) a screw comprising a threaded shaft, (ii) a rigid sleeve comprising a hole extending therethrough for receiving the threaded shaft, (iii) a deformable sleeve comprising a hole extending therethrough; and (iv) a rigid base comprising a threaded hole on a first end of the rigid base, where the first end is configured to insert and advance into the hole of the deformable sleeve to allow the threaded hole of the rigid base to threadedly engage with the threaded shaft of the screw, and where the rigid base comprises an annular channel configured to receive at least part of the deformable sleeve when the first end of the rigid base is inserted and advanced into the hole of the deformable sleeve.
    Type: Application
    Filed: November 1, 2022
    Publication date: May 2, 2024
    Inventors: David Alejandro Villegas, Juan Carlos Lopez, Daniel John Fleming
  • Patent number: 11720674
    Abstract: In some examples, an analyzer manager configured to select one of a program code analyzer, a static data analyzer, and an unused memory location analyzer for malware detection within memory of a system. The program code analyzer can be executed to evaluate instruction data for executing a computer program at a first set of memory locations within the memory for malware in response to being selected by the analyzer manager. The static data analyzer can be executed to evaluate static data for use by the computer program at a second set of memory locations within the memory for the malware in response to being selected by the analyzer manager. The unused memory location analyzer can be executed to evaluate null data indicative of unused memory locations at a third set of memory locations within the memory for the malware in response to being selected by the analyzer manager.
    Type: Grant
    Filed: January 28, 2021
    Date of Patent: August 8, 2023
    Assignee: NORTHROP GRUMMAN SYSTEMS CORPORATION
    Inventor: Carlos A. Villegas
  • Publication number: 20220237290
    Abstract: In some examples, an analyzer manager configured to select one of a program code analyzer, a static data analyzer, and an unused memory location analyzer for malware detection within memory of a system. The program code analyzer can be executed to evaluate instruction data for executing a computer program at a first set of memory locations within the memory for malware in response to being selected by the analyzer manager. The static data analyzer can be executed to evaluate static data for use by the computer program at a second set of memory locations within the memory for the malware in response to being selected by the analyzer manager. The unused memory location analyzer can be executed to evaluate null data indicative of unused memory locations at a third set of memory locations within the memory for the malware in response to being selected by the analyzer manager.
    Type: Application
    Filed: January 28, 2021
    Publication date: July 28, 2022
    Applicant: NORTHROP GRUMMAN SYSTEMS CORPORATION
    Inventor: CARLOS A. VILLEGAS
  • Publication number: 20120139261
    Abstract: A wave energy conversion system is described. The system comprises a wave energy absorber for absorbing wave energy. At least one switched reluctance machine is driven by the wave energy absorber for converting mechanical energy to electrical energy. The switched reluctance machine has a generating mode and a motoring mode. A sensing means is provided for sensing an operating parameter generated by the wave energy absorber. A control means is co-operable with the sensing means for controlling the mode of the switched reluctance machine in response to the sensed operating parameter.
    Type: Application
    Filed: May 13, 2010
    Publication date: June 7, 2012
    Inventors: William Dick, Carlos Villegas
  • Publication number: 20050198520
    Abstract: A threat management domain controller is responsive to a computer-actionable threat management vector that includes a first computer-readable field that provides identification of at least one system type that is affected by a computer security threat, a second computer-readable field that provides identification of a release level for the system type and a third computer-readable field that provides identification of a set of possible countermeasures for a system type and release level. The threat management domain controller processes a threat management vector that is received for use by a domain of target computer systems, and transmits the threat management vector that has been processed to at least one of the target computer systems in the domain of target computer systems.
    Type: Application
    Filed: March 2, 2004
    Publication date: September 8, 2005
    Inventors: Jeffrey Bardsley, Ashley Brock, Charles Davis, Nathaniel Kim, John McKenna, Carlos Villegas
  • Publication number: 20050039046
    Abstract: A countermeasure for a computer security threat to a computer system is administered by establishing a baseline identification of an operating or application system type and an operating or application system release level for the computer system that is compatible with a Threat Management Vector (TMV). A TMV is then received, including therein a first field that provides identification of at least one operating system type that is affected by a computer security threat, a second field that provides identification of an operating system release level for the operating system type, and a third field that provides identification of a set of possible countermeasures for an operating system type and an operating system release level. Countermeasures that are identified in the TMV are processed if the TMV identifies the operating system type and operating system release level for the computer system as being affected by the computer security threat.
    Type: Application
    Filed: July 22, 2003
    Publication date: February 17, 2005
    Inventors: Jeffrey Bardsley, Ashley Brock, Charles Davis, Nathaniel Kim, John McKenna, Carlos Villegas
  • Publication number: 20050022021
    Abstract: Computer security threat management information is generated upon receiving notification of a computer security threat, by generating a computer-actionable Threat Management Vector (TMV) from the notification that was received. The TMV includes a first computer-readable field that provides identification of at least one system type that is affected by the security threat, a second computer-readable field that provides identification of a release level for the system type, and a third computer-readable field that provides identification of a set of possible countermeasures for a system type and a release level. The TMV that is generated is transmitted to target systems for processing.
    Type: Application
    Filed: July 22, 2003
    Publication date: January 27, 2005
    Inventors: Jeffrey Bardsley, Ashley Brock, Charles Davis, Nathaniel Kim, John McKenna, Carlos Villegas