Patents by Inventor Craig A. Jones
Craig A. Jones has filed for patents to protect the following inventions. This listing includes patent applications that are pending as well as patents that have already been granted by the United States Patent and Trademark Office (USPTO).
-
Patent number: 12214161Abstract: A medicinal fluid pooling device may be used to pool multiple containers of medicinal fluid to facilitate administration of the medicinal fluid to a patient. A medicinal pooling device may include spikes covered by spike sheaths which are pierced when a container of medicinal fluid is inserted into the medicinal pooling device. The medicinal pooling device may also include a cover configured to cover the spikes. The medicinal pooling device may also include a fluidic interface which may be used to fluidly connect the medicinal pooling device to an infusion pump or syringe.Type: GrantFiled: September 24, 2019Date of Patent: February 4, 2025Assignee: Takeda Pharmaceutical Company LimitedInventors: Seth Dale Jones, Madeleine Clare Gibson, Daniel Edward Roush, Dhairya Kiritkumar Mehta, Sujit K. Basu, Jennifer Craig Cordova
-
Patent number: 12197631Abstract: Systems, apparatuses, and methods related to security management for a ferroelectric memory device are described. An example method can include receiving, at a memory controller and from a host, a command and firmware data. The memory controller can manage a non-volatile memory device, such as a ferroelectric memory device, and the host and the memory controller can communicate using a compute express link (CXL) protocol. The command can be executed to update firmware stored on the non-volatile memory device. The method can further include accessing a first public key from the non-volatile memory device. The method can further include validating the first public key with a second public key within the firmware data. The method can further include validating the firmware data. The method can further include verifying a security version of the firmware data. The method can further include updating the non-volatile memory device with the firmware data.Type: GrantFiled: December 27, 2021Date of Patent: January 14, 2025Assignee: Micron Technology, Inc.Inventors: Danilo Caraccio, Federica Cresci, Alessandro Orlando, Paolo Amato, Angelo Alberto Rovelli, Craig A. Jones, Niccolò Izzo
-
Patent number: 12184939Abstract: A mobile software application implementing “live events,” via which a host of the event may sequentially offer one, two, three, four or more items to a plurality of guests in the event (e.g., via auction, via direct purchase, or via a giveaway). The host's device may obtain and transmit a real-time video stream, which is in turn provided to each guest's device in conjunction with real-time information about the item(s) being offered. Particular techniques further assist the host in sequencing two or more items to be offered in the same live event, thereby avoiding delays and cumbersome user interface interactions that might otherwise be involved in initiating the offering of a next item upon concluding an offering of a previous item.Type: GrantFiled: September 30, 2022Date of Patent: December 31, 2024Assignee: WHATNOT INC.Inventors: Ryan Rhodes, Laura Rothman, Benjamin Luce Brodie, Xiao Liu, Craig Jones
-
Publication number: 20240412805Abstract: A method can include detecting, by a glitch detector coupled via a connection matrix to a first processing unit, an indication of a glitch on a memory system. The method can include notifying, via the connection matrix, at least a second processing unit of the detected indication of the glitch. The method can include subsequent to notifying at least the second processing unit, transmitting via the at least the second processing unit a glitch confirmation signal.Type: ApplicationFiled: August 19, 2024Publication date: December 12, 2024Inventors: Angelo Alberto Rovelli, Craig A. Jones
-
Patent number: 12068050Abstract: A method can include detecting, by a glitch detector coupled via a connection matrix to a first processing unit, an indication of a glitch on a memory system. The method can include notifying, via the connection matrix, at least a second processing unit of the detected indication of the glitch. The method can include subsequent to notifying at least the second processing unit, transmitting via the at least the second processing unit a glitch confirmation signal.Type: GrantFiled: June 2, 2022Date of Patent: August 20, 2024Assignee: Micron Technology, Inc.Inventors: Angelo Alberto Rovelli, Craig A. Jones
-
Publication number: 20240185938Abstract: A method can include performing at least one glitch resistance operation and detecting, by a circuit included in a glitch detector coupled via a connection matrix to a first processing unit, an indication of a glitch on a memory system. The method can include notifying, via the connection matrix, at least a second processing unit of the detected indication of the glitch. The method can include subsequent to notifying at least the second processing unit, transmitting via the at least the second processing unit a glitch confirmation signal.Type: ApplicationFiled: November 21, 2023Publication date: June 6, 2024Inventors: Niccolò Izzo, David Hulton, Tamara Schmitz, Angelo Alberto Rovelli, Craig A. Jones, Danilo Caraccio
-
Publication number: 20240114213Abstract: A mobile software application implementing “live events,” via which a host of the event may sequentially offer one, two, three, four or more items to a plurality of guests in the event (e.g., via auction, via direct purchase, or via a giveaway). The host's device may obtain and transmit a real-time video stream, which is in turn provided to each guest's device in conjunction with real-time information about the item(s) being offered. Particular techniques further assist the host in sequencing two or more items to be offered in the same live event, thereby avoiding delays and cumbersome user interface interactions that might otherwise be involved in initiating the offering of a next item upon concluding an offering of a previous item.Type: ApplicationFiled: September 30, 2022Publication date: April 4, 2024Inventors: Ryan Rhodes, Laura Rothman, Benjamin Luce Brodie, Xiao Liu, Craig Jones
-
Publication number: 20240070284Abstract: Protection for a secure boot procedure can be provided in addition to cryptographic verification of boot firmware associated with the boot procedure. While the boot firmware is being verified, an open sub-system can be placed into a halt state, during which the open sub-system is prevented from performing the boot procedure. The open sub-system can be subsequently placed into a resume state to further perform the boot procedure when the boot firmware is verified. The open sub-system is still prevented from performing the boot procedure even if the boot firmware is verified unless the open sub-system is placed into the resume state again.Type: ApplicationFiled: August 23, 2023Publication date: February 29, 2024Inventors: Alessandro Orlando, Niccolò Izzo, Angelo Alberto Rovelli, Danilo Caraccio, Federica Cresci, Craig A. Jones
-
Publication number: 20240070283Abstract: Protection for a secure boot procedure can be provided in addition to cryptographic verification of boot firmware associated with the boot procedure. While the boot firmware is being verified and executed at a secure sub-system, an open sub-system can be put into a halt state, during which the open sub-system is prevented from performing the boot procedure. The open sub-system is still prevented from performing the boot procedure even if the boot firmware is verified and/or executed unless the open sub-system is put into the resume state again.Type: ApplicationFiled: August 23, 2023Publication date: February 29, 2024Inventors: Alessandro Orlando, Niccolò Izzo, Angelo Alberto Rovelli, Danilo Caraccio, Federica Cresci, Craig A. Jones
-
Publication number: 20230421579Abstract: Threat management devices and methods. The methods include receiving, at an interface of a threat management device, contextual data associated with a first endpoint device that is in operable connectivity with the threat management device, wherein the threat management device is configured to execute at least one subsystem to scan network traffic. The methods further include determining at least a first signature from a plurality of signatures to use in scanning the network traffic based on the received contextual data and instructing the at least one subsystem to scan network traffic using at least the first determined signature.Type: ApplicationFiled: June 27, 2022Publication date: December 28, 2023Inventors: Andrew Thomas, Craig Jones, Michael Shannon
-
Publication number: 20230394155Abstract: Methods, systems, and devices related to field firmware update (FFU). A first memory of a memory module may receive an encrypted segment of a FW package associated with FFU. A decrypted segment of the FW package may be stored by the first memory. A re-encrypted segment of the FW package may be stored by the first memory. The re-encrypted segment of the FW package may be communicated to a second memory of the memory module.Type: ApplicationFiled: October 20, 2022Publication date: December 7, 2023Inventors: Angelo Alberto Rovelli, Alessandro Orlando, Craig A. Jones, Federica Cresci, Niccolò Izzo, Danilo Caraccio
-
Publication number: 20230395181Abstract: A method can include detecting, by a glitch detector coupled via a connection matrix to a first processing unit, an indication of a glitch on a memory system. The method can include notifying, via the connection matrix, at least a second processing unit of the detected indication of the glitch. The method can include subsequent to notifying at least the second processing unit, transmitting via the at least the second processing unit a glitch confirmation signal.Type: ApplicationFiled: June 2, 2022Publication date: December 7, 2023Inventors: Angelo Alberto Rovelli, Craig A. Jones
-
Publication number: 20230394140Abstract: In some implementations, a system includes a set of servers configured to establish a set of virtual machines to provide a computing environment; a set of compute express link (CXL) interface components configured to communicate with the set of servers via a set of CXL interconnects; and a controller configured to at least one of: encrypt protocol data against a CXL interposer security threat associated with the set of CXL interconnects or a malicious extension security threat, provide a secure handshake verification of an identity of the set of CXL interface components, enforce a chain of trust rooted in hardware of the set of CXL interface components; restrict access to an area of memory of the set of CXL interface components that stores security data for verified or secured processes; or perform a security check and set up a set of security features of the set of CXL interface components.Type: ApplicationFiled: July 11, 2022Publication date: December 7, 2023Inventors: Alessandro ORLANDO, Niccolò IZZO, Federica CRESCI, Angelo Alberto ROVELLI, Craig A. JONES, Danilo CARACCIO, Luca CASTELLAZZI
-
Publication number: 20230382707Abstract: A beverage dispense fount apparatus (1) suitable for dispensing beverages such as beers or ciders with the addition of additives such as sweeteners and flavourings. The apparatus (1) comprises a beverage inlet (2) connectable to a beverage supply; a beverage outlet (3) configured to dispense beverage into a beverage container; a supply line formed between the beverage inlet (2) and the beverage outlet (3); one or more additive containers (13), each removably mounted within the apparatus and each in fluid connection with a separate additive dispensing line (14); a dispensing pump (15) for each additive container (13) to dispense additive through the additive dispensing lines (14); and a controller for controlling dispensing of additives from the fount apparatus (1). The apparatus (1) may comprise a video screen (9) for interactive video display to customers and a touch screen (10) for controlling operation of the apparatus (1).Type: ApplicationFiled: November 1, 2021Publication date: November 30, 2023Inventors: Tim WHATELEY, Craig JONES
-
Patent number: 11784999Abstract: Embodiments are directed to credential management for distributed services. A plurality of mesh agents for an overlay network may be provided such that the overlay network may be employed to provide a secure tunnel between a client and a resource server. If client request that requires user credentials is provided to a mesh agent associated with the resource server, credential instructions may be provided to the mesh agent and the credential instructions may be employed to determine credential information that enables access to the resource server. The mesh agent may be employed to communicate the client request and the credential information to the resource server; determining a response to the client request from the resource server; employing the mesh agent to receive a response to the client request from the resource server and forwarded to the client over the overlay network.Type: GrantFiled: December 30, 2022Date of Patent: October 10, 2023Assignee: strongDM, Inc.Inventors: William Craig Jones, Justin Allan McCarthy, Patrick David Stephen, Evan Michael Todd
-
Patent number: 11546323Abstract: Embodiments are directed to credential management for distributed services. A plurality of mesh agents for an overlay network may be provided such that the overlay network may be employed to provide a secure tunnel between a client and a resource server. If client request that requires user credentials is provided to a mesh agent associated with the resource server, credential instructions may be provided to the mesh agent and the credential instructions may be employed to determine credential information that enables access to the resource server. The mesh agent may be employed to communicate the client request and the credential information to the resource server; determining a response to the client request from the resource server; employing the mesh agent to receive a response to the client request from the resource server and forwarded to the client over the overlay network.Type: GrantFiled: August 17, 2022Date of Patent: January 3, 2023Assignee: strongDM, Inc.Inventors: William Craig Jones, Justin Allan McCarthy, Patrick David Stephen, Evan Michael Todd
-
Publication number: 20220207193Abstract: Systems, apparatuses, and methods related to security management for a ferroelectric memory device are described. An example method can include receiving, at a memory controller and from a host, a command and firmware data. The memory controller can manage a non-volatile memory device, such as a ferroelectric memory device, and the host and the memory controller can communicate using a compute express link (CXL) protocol. The command can be executed to update firmware stored on the non-volatile memory device. The method can further include accessing a first public key from the non-volatile memory device. The method can further include validating the first public key with a second public key within the firmware data. The method can further include validating the firmware data. The method can further include verifying a security version of the firmware data. The method can further include updating the non-volatile memory device with the firmware data.Type: ApplicationFiled: December 27, 2021Publication date: June 30, 2022Inventors: Danilo Caraccio, Federica Cresci, Alessandro Orlando, Paolo Amato, Angelo Alberto Rovelli, Craig A. Jones, Niccolò Izzo
-
Patent number: D961978Type: GrantFiled: November 5, 2019Date of Patent: August 30, 2022Inventors: Tim Whateley, Craig Jones, Jonathan Ashbridge
-
Patent number: D991726Type: GrantFiled: April 6, 2021Date of Patent: July 11, 2023Assignee: Anheuser-Busch InBev S.AInventors: Lieven Dirx, Craig Jones, Jonathan Ashbridge, Tim Whateley, Adam Haworth
-
Patent number: D996133Type: GrantFiled: February 13, 2023Date of Patent: August 22, 2023Assignee: Anheuser-Busch Inbev S.A.Inventors: Lieven Dirx, Craig Jones, Jonathan Ashbridge, Tim Whateley, Adam Haworth