Patents by Inventor Curtis Edwards
Curtis Edwards has filed for patents to protect the following inventions. This listing includes patent applications that are pending as well as patents that have already been granted by the United States Patent and Trademark Office (USPTO).
-
Publication number: 20240137377Abstract: Embodiments presented herein describe a method for processing streams of data of one or more networked computer systems. According to one embodiment of the present disclosure, an ordered stream of normalized vectors corresponding to information security data obtained from one or more sensors monitoring a computer network is received. A neuro-linguistic model of the information security data is generated by clustering the ordered stream of vectors and assigning a letter to each cluster, outputting an ordered sequence of letters based on a mapping of the ordered stream of normalized vectors to the clusters, building a dictionary of words from of the ordered output of letters, outputting an ordered stream of words based on the ordered output of letters, and generating a plurality of phrases based on the ordered output of words.Type: ApplicationFiled: October 12, 2023Publication date: April 25, 2024Applicant: Intellective Ai, Inc.Inventors: Wesley Kenneth COBB, Ming-Jung SEOW, Curtis Edward COLE, JR., Cody Shay FALCON, Benjamin A. KONOSKY, Charles Richard MORGAN, Aaron POFFENBERGER, Thong Toan NGUYEN
-
Patent number: 11882154Abstract: Systems and methods are described for enabling users to model security resources and user access keys as resources in a template language. The template can be used to create and update a stack of resources that will provide a network-accessible service. The security resources and access keys can be referred to in the template during both stack creation process and the stack update process. The security resources can include users, groups and policies. Additionally, users can refer to access keys in the template as dynamic parameters without any need to refer to the access keys in plaintext. The system securely stores access keys within the system and allows for templates to refer to them once defined. These key references can then be passed within a template to resources that need them as well as passing them on securely to resources like server instances through the use of the user-data field.Type: GrantFiled: May 23, 2016Date of Patent: January 23, 2024Assignee: Amazon Technologies, Inc.Inventors: Avinash Jaisinghani, Reto Kramer, Christopher Whitaker, Venkates P. Balakrishnan, Prashant Jayaraman, Richard Curtis Edwards, Jr.
-
Patent number: 11818155Abstract: Embodiments presented herein describe a method for processing streams of data of one or more networked computer systems. According to one embodiment of the present disclosure, an ordered stream of normalized vectors corresponding to information security data obtained from one or more sensors monitoring a computer network is received. A neuro-linguistic model of the information security data is generated by clustering the ordered stream of vectors and assigning a letter to each cluster, outputting an ordered sequence of letters based on a mapping of the ordered stream of normalized vectors to the clusters, building a dictionary of words from of the ordered output of letters, outputting an ordered stream of words based on the ordered output of letters, and generating a plurality of phrases based on the ordered output of words.Type: GrantFiled: January 4, 2022Date of Patent: November 14, 2023Assignee: Intellective Ai, Inc.Inventors: Wesley Kenneth Cobb, Ming-Jung Seow, Curtis Edward Cole, Jr., Cody Shay Falcon, Benjamin A. Konosky, Charles Richard Morgan, Aaron Poffenberger, Thong Toan Nguyen
-
Publication number: 20230134470Abstract: A shotgun hydroblasting system includes a chassis. A motor is operable to drive movement of the chassis. A support arm assembly is mounted to the chassis. A shotgun nozzle mounted to the support arm assembly such that the shotgun nozzle is movable relative to the chassis on the support arm assembly. The shotgun nozzle includes a barrel defining a primary outlet for pressurized fluid and a suppressor defining a secondary outlet for the pressurized fluid. The barrel and the suppressor are positioned and oriented such that a force of the pressurized fluid exiting the secondary outlet opposes a force of the pressurized fluid exiting the primary outlet.Type: ApplicationFiled: October 28, 2021Publication date: May 4, 2023Inventor: Curtis Edward Hodge
-
Publication number: 20220150267Abstract: Embodiments presented herein describe a method for processing streams of data of one or more networked computer systems. According to one embodiment of the present disclosure, an ordered stream of normalized vectors corresponding to information security data obtained from one or more sensors monitoring a computer network is received. A neuro-linguistic model of the information security data is generated by clustering the ordered stream of vectors and assigning a letter to each cluster, outputting an ordered sequence of letters based on a mapping of the ordered stream of normalized vectors to the clusters, building a dictionary of words from of the ordered output of letters, outputting an ordered stream of words based on the ordered output of letters, and generating a plurality of phrases based on the ordered output of words.Type: ApplicationFiled: January 4, 2022Publication date: May 12, 2022Applicant: Intellective Ai, Inc.Inventors: Wesley Kenneth COBB, Ming-Jung SEOW, Curtis Edward COLE, JR., Cody Shay FALCON, Benjamin A. KONOSKY, Charles Richard MORGAN, Aaron POFFENBERGER, Thong Toan NGUYEN
-
Publication number: 20210300839Abstract: Systems for quenching peroxycarboxylic acid and peroxide chemistry runaway reactions provide safe and efficacious systems to prevent uncontrolled runaway reactions, such as decomposition reactions, of peroxycarboxylic acid and peroxide chemistry compositions are disclosed. The systems provide prompt detection and dispensing of a stabilizer into a tank or other storage vessel containing a peroxide composition, peroxycarboxylic acid composition or a peroxycarboxylic acid-forming composition to stop a runaway reaction. Methods for quenching peroxide and peroxycarboxylic acid runaway reactions are also disclosed.Type: ApplicationFiled: March 31, 2021Publication date: September 30, 2021Inventors: David Andrew Mack, David D. McSherry, John W. Bolduc, Curtis Edward Finney, Corey Rosenthal, Junzhong Li
-
Publication number: 20210068481Abstract: A glove may be structured for multi-layer engagement. The glove may include an object engagement layer, an intermediary support layer and an anatomic engagement layer. The object engagement layer may include an outer distal portion, an outer middle portion, an outer proximal portion, and an outer palm portion. The anatomic engagement layer may include an inner distal portion, an inner middle portion, an inner proximal portion, and an inner palm portion. The support layer may be interposed between the object engagement layer and the anatomic engagement layer.Type: ApplicationFiled: November 20, 2020Publication date: March 11, 2021Inventor: Curtis Edwards
-
Publication number: 20210014258Abstract: Embodiments presented herein describe a method for processing streams of data of one or more networked computer systems. According to one embodiment of the present disclosure, an ordered stream of normalized vectors corresponding to information security data obtained from one or more sensors monitoring a computer network is received. A neuro-linguistic model of the information security data is generated by clustering the ordered stream of vectors and assigning a letter to each cluster, outputting an ordered sequence of letters based on a mapping of the ordered stream of normalized vectors to the clusters, building a dictionary of words from of the ordered output of letters, outputting an ordered stream of words based on the ordered output of letters, and generating a plurality of phrases based on the ordered output of words.Type: ApplicationFiled: July 31, 2020Publication date: January 14, 2021Applicant: Intellective Ai, Inc.Inventors: Wesley Kenneth COBB, Ming-Jung SEOW, Curtis Edward COLE, JR., Cody Shay FALCON, Benjamin A. KONOSKY, Charles Richard MORGAN, Aaron POFFENBERGER, Thong Toan NGUYEN
-
Patent number: 10735446Abstract: Embodiments presented herein describe a method for processing streams of data of one or more networked computer systems. According to one embodiment of the present disclosure, an ordered stream of normalized vectors corresponding to information security data obtained from one or more sensors monitoring a computer network is received. A neuro-linguistic model of the information security data is generated by clustering the ordered stream of vectors and assigning a letter to each cluster, outputting an ordered sequence of letters based on a mapping of the ordered stream of normalized vectors to the clusters, building a dictionary of words from of the ordered output of letters, outputting an ordered stream of words based on the ordered output of letters, and generating a plurality of phrases based on the ordered output of words.Type: GrantFiled: May 13, 2018Date of Patent: August 4, 2020Assignee: Intellective Ai, Inc.Inventors: Wesley Kenneth Cobb, Ming-Jung Seow, Curtis Edward Cole, Cody Shay Falcon, Benjamin A. Konosky, Charles Richard Morgan, Aaron Poffenberger, Thong Toan Nguyen
-
Publication number: 20200184394Abstract: A service provider system may implement an enterprise catalog service that manages software products and portfolios of software products on behalf of service provider customer organizations. Through an administrator interface of the service, a customer organization administrator may create constraints on the use of the software products, and each constraint may include one or more rules about how the products can be launched. These may include environmental constraints (specifying a region in which a product launches), restrictions on input parameter values (including the types of resource instances on which a product can be launched), quotas (controlling the number of product installations), or billing constraints. Constraints may be applied on a user-to-product arc or on a portfolio-to-product arc. Constraints may be stored as objects, and reference to those objects may be added to product or portfolio objects.Type: ApplicationFiled: February 14, 2020Publication date: June 11, 2020Applicant: Amazon Technologies, Inc.Inventors: Frederik Christophe Delacourt, Quan Binh To, Christopher Whitaker, Richard Curtis Edwards, JR., Julien Jacques Ellie, Zachary Thomas Crowell, Benjamin David Newman
-
Patent number: 10572842Abstract: A service provider system may implement a notification service that manages actionable notification messages received from other services on behalf of a customer organization and its end users. An IT administrator of the customer organization may create and configure message inboxes to be maintained by the notification service. The messages stored in each inbox may be partitioned by source, type, targeted (authorized) recipients, or an associated message topic. Each message may include an identifier of the inbox to which it is directed, and active elements that, when selected by a recipient, cause a corresponding action to be performed. The service from which a message is received may, in response to a message recipient taking one of the available actions, submit a request to the notification service to update the message state. The notification service may provide APIs through which the other services and message recipients interact with the notification service.Type: GrantFiled: November 11, 2014Date of Patent: February 25, 2020Assignee: Amazon Technologies, Inc.Inventors: Quan Binh To, Richard Curtis Edwards, Jr., Frederik Christophe Delacourt, Christopher Whitaker, Jr., Julien Jacques Ellie, Zachary Thomas Crowell, Benjamin David Newman
-
Patent number: 10565534Abstract: A service provider system may implement an enterprise catalog service that manages software products and portfolios of software products on behalf of service provider customer organizations. Through an administrator interface of the service, a customer organization administrator may create constraints on the use of the software products, and each constraint may include one or more rules about how the products can be launched. These may include environmental constraints (specifying a region in which a product launches), restrictions on input parameter values (including the types of resource instances on which a product can be launched), quotas (controlling the number of product installations), or billing constraints. Constraints may be applied on a user-to-product arc or on a portfolio-to-product arc. Constraints may be stored as objects, and reference to those objects may be added to product or portfolio objects.Type: GrantFiled: November 11, 2014Date of Patent: February 18, 2020Assignee: Amazon Technologies, Inc.Inventors: Frederik Christophe Delacourt, Quan Binh To, Christopher Whitaker, Richard Curtis Edwards, Jr., Julien Jacques Ellie, Zachary Thomas Crowell, Benjamin David Newman
-
Publication number: 20190124101Abstract: Embodiments presented herein describe a method for processing streams of data of one or more networked computer systems. According to one embodiment of the present disclosure, an ordered stream of normalized vectors corresponding to information security data obtained from one or more sensors monitoring a computer network is received. A neuro-linguistic model of the information security data is generated by clustering the ordered stream of vectors and assigning a letter to each cluster, outputting an ordered sequence of letters based on a mapping of the ordered stream of normalized vectors to the clusters, building a dictionary of words from of the ordered output of letters, outputting an ordered stream of words based on the ordered output of letters, and generating a plurality of phrases based on the ordered output of words.Type: ApplicationFiled: May 13, 2018Publication date: April 25, 2019Inventors: Wesley Kenneth COBB, Ming-Jung SEOW, Curtis Edward COLE, Cody Shay FALCON, Benjamin A. KONOSKY, Charles Richard MORGAN, Aaron POFFENBERGER, Thong Toan NGUYEN
-
Patent number: 9973523Abstract: Embodiments presented herein describe a method for processing streams of data of one or more networked computer systems. According to one embodiment of the present disclosure, an ordered stream of normalized vectors corresponding to information security data obtained from one or more sensors monitoring a computer network is received. A neuro-linguistic model of the information security data is generated by clustering the ordered stream of vectors and assigning a letter to each cluster, outputting an ordered sequence of letters based on a mapping of the ordered stream of normalized vectors to the clusters, building a dictionary of words from of the ordered output of letters, outputting an ordered stream of words based on the ordered output of letters, and generating a plurality of phrases based on the ordered output of words.Type: GrantFiled: November 29, 2016Date of Patent: May 15, 2018Assignee: Omni AI, Inc.Inventors: Wesley Kenneth Cobb, Ming-Jung Seow, Curtis Edward Cole, Jr., Cody Shay Falcon, Benjamin A. Konosky, Charles Richard Morgan, Aaron Poffenberger, Thong Toan Nguyen
-
Publication number: 20170163672Abstract: Embodiments presented herein describe a method for processing streams of data of one or more networked computer systems. According to one embodiment of the present disclosure, an ordered stream of normalized vectors corresponding to information security data obtained from one or more sensors monitoring a computer network is received. A neuro-linguistic model of the information security data is generated by clustering the ordered stream of vectors and assigning a letter to each cluster, outputting an ordered sequence of letters based on a mapping of the ordered stream of normalized vectors to the clusters, building a dictionary of words from of the ordered output of letters, outputting an ordered stream of words based on the ordered output of letters, and generating a plurality of phrases based on the ordered output of words.Type: ApplicationFiled: November 29, 2016Publication date: June 8, 2017Inventors: Wesley Kenneth COBB, Ming-Jung SEOW, Curtis Edward COLE, JR., Cody Shay FALCON, Benjamin A. KONOSKY, Charles Richard MORGAN, Aaron POFFENBERGER, Thong Toan NGUYEN
-
Patent number: 9507768Abstract: Embodiments presented herein describe a method for processing streams of data of one or more networked computer systems. According to one embodiment of the present disclosure, an ordered stream of normalized vectors corresponding to information security data obtained from one or more sensors monitoring a computer network is received. A neuro-linguistic model of the information security data is generated by clustering the ordered stream of vectors and assigning a letter to each cluster, outputting an ordered sequence of letters based on a mapping of the ordered stream of normalized vectors to the clusters, building a dictionary of words from of the ordered output of letters, outputting an ordered stream of words based on the ordered output of letters, and generating a plurality of phrases based on the ordered output of words.Type: GrantFiled: August 11, 2014Date of Patent: November 29, 2016Assignee: Behavioral Recognition Systems, Inc.Inventors: Wesley Kenneth Cobb, Ming-Jung Seow, Curtis Edward Cole, Jr., Cody Shay Falcon, Benjamin A. Konosky, Charles Richard Morgan, Aaron Poffenberger, Thong Toan Nguyen
-
Publication number: 20160269446Abstract: Systems and methods are described for enabling users to model security resources and user access keys as resources in a template language. The template can be used to create and update a stack of resources that will provide a network-accessible service. The security resources and access keys can be referred to in the template during both stack creation process and the stack update process. The security resources can include users, groups and policies. Additionally, users can refer to access keys in the template as dynamic parameters without any need to refer to the access keys in plaintext. The system securely stores access keys within the system and allows for templates to refer to them once defined. These key references can then be passed within a template to resources that need them as well as passing them on securely to resources like server instances through the use of the user-data field.Type: ApplicationFiled: May 23, 2016Publication date: September 15, 2016Applicant: Amazon Technologies, Inc.Inventors: AVINASH JAISINGHANI, RETO KRAMER, CHRISTOPHER WHITAKER, VENKATES P. BALAKRISHNAN, PRASHANT JAYARAMAN, RICHARD CURTIS EDWARDS, JR.
-
Patent number: 9350738Abstract: Systems and methods are described for enabling users to model security resources and user access keys as resources in a template language. The template can be used to create and update a stack of resources that will provide a network-accessible service. The security resources and access keys can be referred to in the template during both stack creation process and the stack update process. The security resources can include users, groups and policies. Additionally, users can refer to access keys in the template as dynamic parameters without any need to refer to the access keys in plaintext. The system securely stores access keys within the system and allows for templates to refer to them once defined. These key references can then be passed within a template to resources that need them as well as passing them on securely to resources like server instances through the use of the user-data field.Type: GrantFiled: February 2, 2015Date of Patent: May 24, 2016Assignee: Amazon Technologies, Inc.Inventors: Avinash Jaisinghani, Reto Kramer, Christopher Whitaker, Venkates P. Balakrishnan, Prashant Jayaraman, Richard Curtis Edwards, Jr.
-
Publication number: 20160132805Abstract: A service provider system may implement an enterprise catalog service that manages software products and portfolios of software products on behalf of service provider customer organizations. Through an administrator interface of the service, a customer organization administrator may create constraints on the use of the software products, and each constraint may include one or more rules about how the products can be launched. These may include environmental constraints (specifying a region in which a product launches), restrictions on input parameter values (including the types of resource instances on which a product can be launched), quotas (controlling the number of product installations), or billing constraints. Constraints may be applied on a user-to-product arc or on a portfolio-to-product arc. Constraints may be stored as objects, and reference to those objects may be added to product or portfolio objects.Type: ApplicationFiled: November 11, 2014Publication date: May 12, 2016Applicant: AMAZON TECHNOLOGIES, INC.Inventors: FREDERIK CHRISTOPHE DELACOURT, QUAN BINH TO, CHRISTOPHER WHITAKER, RICHARD CURTIS EDWARDS, Jr., JULIEN JACQUES ELLIE, ZACHARY THOMAS CROWELL, BENJAMIN DAVID NEWMAN
-
Publication number: 20150150081Abstract: Systems and methods are described for enabling users to model security resources and user access keys as resources in a template language. The template can be used to create and update a stack of resources that will provide a network-accessible service. The security resources and access keys can be referred to in the template during both stack creation process and the stack update process. The security resources can include users, groups and policies. Additionally, users can refer to access keys in the template as dynamic parameters without any need to refer to the access keys in plaintext. The system securely stores access keys within the system and allows for templates to refer to them once defined. These key references can then be passed within a template to resources that need them as well as passing them on securely to resources like server instances through the use of the user-data field.Type: ApplicationFiled: February 2, 2015Publication date: May 28, 2015Applicant: AMAZON TECHNOLOGIES, INC.Inventors: AVINASH JAISINGHANI, RETO KRAMER, CHRISTOPHER WHITAKER, VENKATES P. BALAKRISHNAN, PRASHANT JAYARAMAN, RICHARD CURTIS EDWARDS, JR.