Patents by Inventor Curtis Edwards

Curtis Edwards has filed for patents to protect the following inventions. This listing includes patent applications that are pending as well as patents that have already been granted by the United States Patent and Trademark Office (USPTO).

  • Publication number: 20240137377
    Abstract: Embodiments presented herein describe a method for processing streams of data of one or more networked computer systems. According to one embodiment of the present disclosure, an ordered stream of normalized vectors corresponding to information security data obtained from one or more sensors monitoring a computer network is received. A neuro-linguistic model of the information security data is generated by clustering the ordered stream of vectors and assigning a letter to each cluster, outputting an ordered sequence of letters based on a mapping of the ordered stream of normalized vectors to the clusters, building a dictionary of words from of the ordered output of letters, outputting an ordered stream of words based on the ordered output of letters, and generating a plurality of phrases based on the ordered output of words.
    Type: Application
    Filed: October 12, 2023
    Publication date: April 25, 2024
    Applicant: Intellective Ai, Inc.
    Inventors: Wesley Kenneth COBB, Ming-Jung SEOW, Curtis Edward COLE, JR., Cody Shay FALCON, Benjamin A. KONOSKY, Charles Richard MORGAN, Aaron POFFENBERGER, Thong Toan NGUYEN
  • Patent number: 11882154
    Abstract: Systems and methods are described for enabling users to model security resources and user access keys as resources in a template language. The template can be used to create and update a stack of resources that will provide a network-accessible service. The security resources and access keys can be referred to in the template during both stack creation process and the stack update process. The security resources can include users, groups and policies. Additionally, users can refer to access keys in the template as dynamic parameters without any need to refer to the access keys in plaintext. The system securely stores access keys within the system and allows for templates to refer to them once defined. These key references can then be passed within a template to resources that need them as well as passing them on securely to resources like server instances through the use of the user-data field.
    Type: Grant
    Filed: May 23, 2016
    Date of Patent: January 23, 2024
    Assignee: Amazon Technologies, Inc.
    Inventors: Avinash Jaisinghani, Reto Kramer, Christopher Whitaker, Venkates P. Balakrishnan, Prashant Jayaraman, Richard Curtis Edwards, Jr.
  • Patent number: 11818155
    Abstract: Embodiments presented herein describe a method for processing streams of data of one or more networked computer systems. According to one embodiment of the present disclosure, an ordered stream of normalized vectors corresponding to information security data obtained from one or more sensors monitoring a computer network is received. A neuro-linguistic model of the information security data is generated by clustering the ordered stream of vectors and assigning a letter to each cluster, outputting an ordered sequence of letters based on a mapping of the ordered stream of normalized vectors to the clusters, building a dictionary of words from of the ordered output of letters, outputting an ordered stream of words based on the ordered output of letters, and generating a plurality of phrases based on the ordered output of words.
    Type: Grant
    Filed: January 4, 2022
    Date of Patent: November 14, 2023
    Assignee: Intellective Ai, Inc.
    Inventors: Wesley Kenneth Cobb, Ming-Jung Seow, Curtis Edward Cole, Jr., Cody Shay Falcon, Benjamin A. Konosky, Charles Richard Morgan, Aaron Poffenberger, Thong Toan Nguyen
  • Publication number: 20230134470
    Abstract: A shotgun hydroblasting system includes a chassis. A motor is operable to drive movement of the chassis. A support arm assembly is mounted to the chassis. A shotgun nozzle mounted to the support arm assembly such that the shotgun nozzle is movable relative to the chassis on the support arm assembly. The shotgun nozzle includes a barrel defining a primary outlet for pressurized fluid and a suppressor defining a secondary outlet for the pressurized fluid. The barrel and the suppressor are positioned and oriented such that a force of the pressurized fluid exiting the secondary outlet opposes a force of the pressurized fluid exiting the primary outlet.
    Type: Application
    Filed: October 28, 2021
    Publication date: May 4, 2023
    Inventor: Curtis Edward Hodge
  • Publication number: 20220150267
    Abstract: Embodiments presented herein describe a method for processing streams of data of one or more networked computer systems. According to one embodiment of the present disclosure, an ordered stream of normalized vectors corresponding to information security data obtained from one or more sensors monitoring a computer network is received. A neuro-linguistic model of the information security data is generated by clustering the ordered stream of vectors and assigning a letter to each cluster, outputting an ordered sequence of letters based on a mapping of the ordered stream of normalized vectors to the clusters, building a dictionary of words from of the ordered output of letters, outputting an ordered stream of words based on the ordered output of letters, and generating a plurality of phrases based on the ordered output of words.
    Type: Application
    Filed: January 4, 2022
    Publication date: May 12, 2022
    Applicant: Intellective Ai, Inc.
    Inventors: Wesley Kenneth COBB, Ming-Jung SEOW, Curtis Edward COLE, JR., Cody Shay FALCON, Benjamin A. KONOSKY, Charles Richard MORGAN, Aaron POFFENBERGER, Thong Toan NGUYEN
  • Publication number: 20210300839
    Abstract: Systems for quenching peroxycarboxylic acid and peroxide chemistry runaway reactions provide safe and efficacious systems to prevent uncontrolled runaway reactions, such as decomposition reactions, of peroxycarboxylic acid and peroxide chemistry compositions are disclosed. The systems provide prompt detection and dispensing of a stabilizer into a tank or other storage vessel containing a peroxide composition, peroxycarboxylic acid composition or a peroxycarboxylic acid-forming composition to stop a runaway reaction. Methods for quenching peroxide and peroxycarboxylic acid runaway reactions are also disclosed.
    Type: Application
    Filed: March 31, 2021
    Publication date: September 30, 2021
    Inventors: David Andrew Mack, David D. McSherry, John W. Bolduc, Curtis Edward Finney, Corey Rosenthal, Junzhong Li
  • Publication number: 20210068481
    Abstract: A glove may be structured for multi-layer engagement. The glove may include an object engagement layer, an intermediary support layer and an anatomic engagement layer. The object engagement layer may include an outer distal portion, an outer middle portion, an outer proximal portion, and an outer palm portion. The anatomic engagement layer may include an inner distal portion, an inner middle portion, an inner proximal portion, and an inner palm portion. The support layer may be interposed between the object engagement layer and the anatomic engagement layer.
    Type: Application
    Filed: November 20, 2020
    Publication date: March 11, 2021
    Inventor: Curtis Edwards
  • Publication number: 20210014258
    Abstract: Embodiments presented herein describe a method for processing streams of data of one or more networked computer systems. According to one embodiment of the present disclosure, an ordered stream of normalized vectors corresponding to information security data obtained from one or more sensors monitoring a computer network is received. A neuro-linguistic model of the information security data is generated by clustering the ordered stream of vectors and assigning a letter to each cluster, outputting an ordered sequence of letters based on a mapping of the ordered stream of normalized vectors to the clusters, building a dictionary of words from of the ordered output of letters, outputting an ordered stream of words based on the ordered output of letters, and generating a plurality of phrases based on the ordered output of words.
    Type: Application
    Filed: July 31, 2020
    Publication date: January 14, 2021
    Applicant: Intellective Ai, Inc.
    Inventors: Wesley Kenneth COBB, Ming-Jung SEOW, Curtis Edward COLE, JR., Cody Shay FALCON, Benjamin A. KONOSKY, Charles Richard MORGAN, Aaron POFFENBERGER, Thong Toan NGUYEN
  • Patent number: 10735446
    Abstract: Embodiments presented herein describe a method for processing streams of data of one or more networked computer systems. According to one embodiment of the present disclosure, an ordered stream of normalized vectors corresponding to information security data obtained from one or more sensors monitoring a computer network is received. A neuro-linguistic model of the information security data is generated by clustering the ordered stream of vectors and assigning a letter to each cluster, outputting an ordered sequence of letters based on a mapping of the ordered stream of normalized vectors to the clusters, building a dictionary of words from of the ordered output of letters, outputting an ordered stream of words based on the ordered output of letters, and generating a plurality of phrases based on the ordered output of words.
    Type: Grant
    Filed: May 13, 2018
    Date of Patent: August 4, 2020
    Assignee: Intellective Ai, Inc.
    Inventors: Wesley Kenneth Cobb, Ming-Jung Seow, Curtis Edward Cole, Cody Shay Falcon, Benjamin A. Konosky, Charles Richard Morgan, Aaron Poffenberger, Thong Toan Nguyen
  • Publication number: 20200184394
    Abstract: A service provider system may implement an enterprise catalog service that manages software products and portfolios of software products on behalf of service provider customer organizations. Through an administrator interface of the service, a customer organization administrator may create constraints on the use of the software products, and each constraint may include one or more rules about how the products can be launched. These may include environmental constraints (specifying a region in which a product launches), restrictions on input parameter values (including the types of resource instances on which a product can be launched), quotas (controlling the number of product installations), or billing constraints. Constraints may be applied on a user-to-product arc or on a portfolio-to-product arc. Constraints may be stored as objects, and reference to those objects may be added to product or portfolio objects.
    Type: Application
    Filed: February 14, 2020
    Publication date: June 11, 2020
    Applicant: Amazon Technologies, Inc.
    Inventors: Frederik Christophe Delacourt, Quan Binh To, Christopher Whitaker, Richard Curtis Edwards, JR., Julien Jacques Ellie, Zachary Thomas Crowell, Benjamin David Newman
  • Patent number: 10572842
    Abstract: A service provider system may implement a notification service that manages actionable notification messages received from other services on behalf of a customer organization and its end users. An IT administrator of the customer organization may create and configure message inboxes to be maintained by the notification service. The messages stored in each inbox may be partitioned by source, type, targeted (authorized) recipients, or an associated message topic. Each message may include an identifier of the inbox to which it is directed, and active elements that, when selected by a recipient, cause a corresponding action to be performed. The service from which a message is received may, in response to a message recipient taking one of the available actions, submit a request to the notification service to update the message state. The notification service may provide APIs through which the other services and message recipients interact with the notification service.
    Type: Grant
    Filed: November 11, 2014
    Date of Patent: February 25, 2020
    Assignee: Amazon Technologies, Inc.
    Inventors: Quan Binh To, Richard Curtis Edwards, Jr., Frederik Christophe Delacourt, Christopher Whitaker, Jr., Julien Jacques Ellie, Zachary Thomas Crowell, Benjamin David Newman
  • Patent number: 10565534
    Abstract: A service provider system may implement an enterprise catalog service that manages software products and portfolios of software products on behalf of service provider customer organizations. Through an administrator interface of the service, a customer organization administrator may create constraints on the use of the software products, and each constraint may include one or more rules about how the products can be launched. These may include environmental constraints (specifying a region in which a product launches), restrictions on input parameter values (including the types of resource instances on which a product can be launched), quotas (controlling the number of product installations), or billing constraints. Constraints may be applied on a user-to-product arc or on a portfolio-to-product arc. Constraints may be stored as objects, and reference to those objects may be added to product or portfolio objects.
    Type: Grant
    Filed: November 11, 2014
    Date of Patent: February 18, 2020
    Assignee: Amazon Technologies, Inc.
    Inventors: Frederik Christophe Delacourt, Quan Binh To, Christopher Whitaker, Richard Curtis Edwards, Jr., Julien Jacques Ellie, Zachary Thomas Crowell, Benjamin David Newman
  • Publication number: 20190124101
    Abstract: Embodiments presented herein describe a method for processing streams of data of one or more networked computer systems. According to one embodiment of the present disclosure, an ordered stream of normalized vectors corresponding to information security data obtained from one or more sensors monitoring a computer network is received. A neuro-linguistic model of the information security data is generated by clustering the ordered stream of vectors and assigning a letter to each cluster, outputting an ordered sequence of letters based on a mapping of the ordered stream of normalized vectors to the clusters, building a dictionary of words from of the ordered output of letters, outputting an ordered stream of words based on the ordered output of letters, and generating a plurality of phrases based on the ordered output of words.
    Type: Application
    Filed: May 13, 2018
    Publication date: April 25, 2019
    Inventors: Wesley Kenneth COBB, Ming-Jung SEOW, Curtis Edward COLE, Cody Shay FALCON, Benjamin A. KONOSKY, Charles Richard MORGAN, Aaron POFFENBERGER, Thong Toan NGUYEN
  • Patent number: 9973523
    Abstract: Embodiments presented herein describe a method for processing streams of data of one or more networked computer systems. According to one embodiment of the present disclosure, an ordered stream of normalized vectors corresponding to information security data obtained from one or more sensors monitoring a computer network is received. A neuro-linguistic model of the information security data is generated by clustering the ordered stream of vectors and assigning a letter to each cluster, outputting an ordered sequence of letters based on a mapping of the ordered stream of normalized vectors to the clusters, building a dictionary of words from of the ordered output of letters, outputting an ordered stream of words based on the ordered output of letters, and generating a plurality of phrases based on the ordered output of words.
    Type: Grant
    Filed: November 29, 2016
    Date of Patent: May 15, 2018
    Assignee: Omni AI, Inc.
    Inventors: Wesley Kenneth Cobb, Ming-Jung Seow, Curtis Edward Cole, Jr., Cody Shay Falcon, Benjamin A. Konosky, Charles Richard Morgan, Aaron Poffenberger, Thong Toan Nguyen
  • Publication number: 20170163672
    Abstract: Embodiments presented herein describe a method for processing streams of data of one or more networked computer systems. According to one embodiment of the present disclosure, an ordered stream of normalized vectors corresponding to information security data obtained from one or more sensors monitoring a computer network is received. A neuro-linguistic model of the information security data is generated by clustering the ordered stream of vectors and assigning a letter to each cluster, outputting an ordered sequence of letters based on a mapping of the ordered stream of normalized vectors to the clusters, building a dictionary of words from of the ordered output of letters, outputting an ordered stream of words based on the ordered output of letters, and generating a plurality of phrases based on the ordered output of words.
    Type: Application
    Filed: November 29, 2016
    Publication date: June 8, 2017
    Inventors: Wesley Kenneth COBB, Ming-Jung SEOW, Curtis Edward COLE, JR., Cody Shay FALCON, Benjamin A. KONOSKY, Charles Richard MORGAN, Aaron POFFENBERGER, Thong Toan NGUYEN
  • Patent number: 9507768
    Abstract: Embodiments presented herein describe a method for processing streams of data of one or more networked computer systems. According to one embodiment of the present disclosure, an ordered stream of normalized vectors corresponding to information security data obtained from one or more sensors monitoring a computer network is received. A neuro-linguistic model of the information security data is generated by clustering the ordered stream of vectors and assigning a letter to each cluster, outputting an ordered sequence of letters based on a mapping of the ordered stream of normalized vectors to the clusters, building a dictionary of words from of the ordered output of letters, outputting an ordered stream of words based on the ordered output of letters, and generating a plurality of phrases based on the ordered output of words.
    Type: Grant
    Filed: August 11, 2014
    Date of Patent: November 29, 2016
    Assignee: Behavioral Recognition Systems, Inc.
    Inventors: Wesley Kenneth Cobb, Ming-Jung Seow, Curtis Edward Cole, Jr., Cody Shay Falcon, Benjamin A. Konosky, Charles Richard Morgan, Aaron Poffenberger, Thong Toan Nguyen
  • Publication number: 20160269446
    Abstract: Systems and methods are described for enabling users to model security resources and user access keys as resources in a template language. The template can be used to create and update a stack of resources that will provide a network-accessible service. The security resources and access keys can be referred to in the template during both stack creation process and the stack update process. The security resources can include users, groups and policies. Additionally, users can refer to access keys in the template as dynamic parameters without any need to refer to the access keys in plaintext. The system securely stores access keys within the system and allows for templates to refer to them once defined. These key references can then be passed within a template to resources that need them as well as passing them on securely to resources like server instances through the use of the user-data field.
    Type: Application
    Filed: May 23, 2016
    Publication date: September 15, 2016
    Applicant: Amazon Technologies, Inc.
    Inventors: AVINASH JAISINGHANI, RETO KRAMER, CHRISTOPHER WHITAKER, VENKATES P. BALAKRISHNAN, PRASHANT JAYARAMAN, RICHARD CURTIS EDWARDS, JR.
  • Patent number: 9350738
    Abstract: Systems and methods are described for enabling users to model security resources and user access keys as resources in a template language. The template can be used to create and update a stack of resources that will provide a network-accessible service. The security resources and access keys can be referred to in the template during both stack creation process and the stack update process. The security resources can include users, groups and policies. Additionally, users can refer to access keys in the template as dynamic parameters without any need to refer to the access keys in plaintext. The system securely stores access keys within the system and allows for templates to refer to them once defined. These key references can then be passed within a template to resources that need them as well as passing them on securely to resources like server instances through the use of the user-data field.
    Type: Grant
    Filed: February 2, 2015
    Date of Patent: May 24, 2016
    Assignee: Amazon Technologies, Inc.
    Inventors: Avinash Jaisinghani, Reto Kramer, Christopher Whitaker, Venkates P. Balakrishnan, Prashant Jayaraman, Richard Curtis Edwards, Jr.
  • Publication number: 20160132805
    Abstract: A service provider system may implement an enterprise catalog service that manages software products and portfolios of software products on behalf of service provider customer organizations. Through an administrator interface of the service, a customer organization administrator may create constraints on the use of the software products, and each constraint may include one or more rules about how the products can be launched. These may include environmental constraints (specifying a region in which a product launches), restrictions on input parameter values (including the types of resource instances on which a product can be launched), quotas (controlling the number of product installations), or billing constraints. Constraints may be applied on a user-to-product arc or on a portfolio-to-product arc. Constraints may be stored as objects, and reference to those objects may be added to product or portfolio objects.
    Type: Application
    Filed: November 11, 2014
    Publication date: May 12, 2016
    Applicant: AMAZON TECHNOLOGIES, INC.
    Inventors: FREDERIK CHRISTOPHE DELACOURT, QUAN BINH TO, CHRISTOPHER WHITAKER, RICHARD CURTIS EDWARDS, Jr., JULIEN JACQUES ELLIE, ZACHARY THOMAS CROWELL, BENJAMIN DAVID NEWMAN
  • Publication number: 20150150081
    Abstract: Systems and methods are described for enabling users to model security resources and user access keys as resources in a template language. The template can be used to create and update a stack of resources that will provide a network-accessible service. The security resources and access keys can be referred to in the template during both stack creation process and the stack update process. The security resources can include users, groups and policies. Additionally, users can refer to access keys in the template as dynamic parameters without any need to refer to the access keys in plaintext. The system securely stores access keys within the system and allows for templates to refer to them once defined. These key references can then be passed within a template to resources that need them as well as passing them on securely to resources like server instances through the use of the user-data field.
    Type: Application
    Filed: February 2, 2015
    Publication date: May 28, 2015
    Applicant: AMAZON TECHNOLOGIES, INC.
    Inventors: AVINASH JAISINGHANI, RETO KRAMER, CHRISTOPHER WHITAKER, VENKATES P. BALAKRISHNAN, PRASHANT JAYARAMAN, RICHARD CURTIS EDWARDS, JR.