Patents by Inventor Christopher Key

Christopher Key has filed for patents to protect the following inventions. This listing includes patent applications that are pending as well as patents that have already been granted by the United States Patent and Trademark Office (USPTO).

  • Publication number: 20240098114
    Abstract: A computerized method features operations conducted by a security analyzer device to process incoming information to ascertain a presence of cybersecurity threats based on a top threat list provided to the security analyzer device. The top threat list includes a plurality of cybersecurity threats prioritized for an enterprise that is subscribing to a threat management system and protected by the security analyzer device. The computerized method further conducts analytics of incoming information to determine a level of correlation between at least a portion of the incoming information and any of the plurality of cybersecurity threats within the top threat lists content, and upon determining the level of correlation between the portion of the incoming information and a cybersecurity threat of the plurality of cybersecurity threats exceeding a first threshold, may conduct operations to neutralize or mitigate the cybersecurity threat.
    Type: Application
    Filed: September 13, 2022
    Publication date: March 21, 2024
    Inventors: Benjamin Withnell, Nalani Fraser, Christopher Key
  • Publication number: 20240095350
    Abstract: A threat management system features a recommendation engine and an action engine. The recommendation engine is configured to (i) conduct analytics on content from the threat catalog and content from the enterprise profile to generate results that identify a plurality of threats directed to the enterprise and (ii) generate a top threat list based on the analytic results. The action engine is communicatively coupled to the recommendation engine. The action engine is configured to receive the top threat list and generate a plurality of actions corresponding to each threat of the top threat list, where each action of the plurality of actions includes information directed to operations to mitigate or neutralize a risk associated with a threat of the top threat list.
    Type: Application
    Filed: September 13, 2022
    Publication date: March 21, 2024
    Inventors: Benjamin Withnell, Nalani Fraser, Christopher Key
  • Publication number: 20230408144
    Abstract: A heating system comprising: a liquid supply system; a cell configured to: receive liquid from the liquid supply system, provide heating thereof, and output heated fluid; a work extraction system configured to extract useable work from heated fluid output from the cell; wherein the cell comprises: (i) a housing arranged to define an internal portion for receiving liquid to be heated, and (ii) a plurality of electrodes configured to apply electrical energy to fluid in the internal portion; and wherein the electrodes are configured to apply electrical energy to said fluid in the internal portion to generate one or more bubbles of plasma for releasing energy into said fluid in the internal portion and the housing to provide heating of the fluid in the internal portion.
    Type: Application
    Filed: February 28, 2022
    Publication date: December 21, 2023
    Inventors: Andrew Atkins, Raymond Coles, Bob Dye, Christopher Key, Barry Malizia, Robert Wright
  • Publication number: 20230310658
    Abstract: Compositions and methods are provided that mitigate iron imbalance resulting from inflammation and/or mitigate the effects of inflammatory disease by correcting dysregulation of iron internalization. Such correction is provided by modulating expression of TFR2, transferrin, and/or hepcidin activity in an individual in need of treatment.
    Type: Application
    Filed: March 30, 2022
    Publication date: October 5, 2023
    Inventor: Christopher Key
  • Patent number: 8850565
    Abstract: The present invention provides a system and method to process information regarding a network attack through an automated workflow that actively reconfigures a plurality of heterogeneous network-attached devices and applications to dynamically counter the attack using the network's own self-defense mechanisms. The present invention leverages the security capabilities present within existing and new network-attached devices and applications to effect a distributed defense that immediately quarantines and/or mitigates attacks from hostile sources at multiple points simultaneously throughout the network. In a preferred embodiment, deployed countermeasures are automatically lifted following remediation activities.
    Type: Grant
    Filed: January 10, 2005
    Date of Patent: September 30, 2014
    Assignee: Hewlett-Packard Development Company, L.P.
    Inventors: Robert Patrick, Christopher Key, Paul Holzberger
  • Publication number: 20060212932
    Abstract: The present invention provides a system and method to process information regarding a network attack through an automated workflow that actively reconfigures a plurality of heterogeneous network-attached devices and applications to dynamically counter the attack using the network's own self-defense mechanisms. The present invention leverages the security capabilities present within existing and new network-attached devices and applications to affect a distributed defense that immediately quarantines and/or mitigates attacks from hostile sources at multiple points simultaneously throughout the network. In a preferred embodiment, deployed countermeasures are automatically lifted following remediation activities.
    Type: Application
    Filed: January 10, 2005
    Publication date: September 21, 2006
    Inventors: Robert Patrick, Christopher Key, Paul Holzberger
  • Patent number: D682622
    Type: Grant
    Filed: August 3, 2012
    Date of Patent: May 21, 2013
    Inventor: Adam Christopher Keys